200-301 Practice Test Questions

863 Questions


Topic 1: Exam Pool A

   

desc about topic

Refer to the exhibit.

A router reserved these five routes from different routing information sources.
Which two routes does the router install in its routing table? (Choose two)


A. RIP route 10.0.0.0/30


B. iBGP route 10.0.0.0/30


C. OSPF route 10.0.0.0/30


D. EIGRP route 10.0.0.1/32


E. OSPF route 10.0.0.0/16





C.
  OSPF route 10.0.0.0/30

D.
  EIGRP route 10.0.0.1/32

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?


A. SMTP


B. SNMP


C. SNMP


D. FTP





B.
  SNMP

An engineer must configure Interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?


A. configure IEEE 802.1p


B. configure IEEE 802.1q


C. configure ISL


D. configure ISL





B.
  configure IEEE 802.1q

Which implementation provides the strongest encryption combination for the wireless environment?


A. WPA2 + AES


B. WPA + AES


C. WEP


D. WPA + TKIP





A.
  WPA2 + AES

Which two encoding methods are supported by REST APIs? (Choose two)


A. YAML


B. JSON


C. EBCDIC


D. SGML


E. XML





B.
  JSON

E.
  XML

Explanation:

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/2- x/rest_cfg/2_1_x/b_Cisco_APIC_REST_API_Configuration_Guide/b_Cisco_APIC_REST_
API_Configuration_Guide_chapter_01.html

Reference:

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/5_x/rest_api_co nfig/b_Cisco_N1KV_VMware_REST_API_Config_5x/b_Cisco_N1KV_VMware_REST_API
_Config_5x_chapter_010.pdf The Application Policy Infrastructure Controller (APIC) REST API is a programmatic interface that uses REST architecture. The API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents.

What is the primary purpose of a First Hop Redundancy Protocol?


A.

It allows directly connected neighbors to share configuration information.


B.

It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.


C.

It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.


D.

It reduces routing failures by allowing more than one router to represent itself, as the
default gateway of a network.





D.
  

It reduces routing failures by allowing more than one router to represent itself, as the
default gateway of a network.



What is the primary effect of the spanning-tree portfast command?


A. it enables BPDU messages


B. It minimizes spanning-tree convergence time


C. It immediately puts the port into the forwarding state when the switch is reloaded


D. It immediately enables the port in the listening state





B.
  It minimizes spanning-tree convergence time

Reference:


https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-
2_55_se/configuration/guide/3560_scg/swstpopt.html

Refer to the exhibit.


A. Option


B. Option


C. Option


D. Option





D.
  Option

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?


A. IPsec tunnel mode with AH


B. IPsec transport mode with AH


C. IPsec tunnel mode with ESP


D. IPsec transport mode with ESP





C.
  IPsec tunnel mode with ESP

Explanation:

“Encapsulating Security Payload…Unlike Authentication Header (AH), ESP in transport mode does not provide integrity and authentication for the entire IP packet. However, in Tunnel Mode, where the entire original IP packet is encapsulated with a new packet header added, ESP protection is afforded to the whole inner IP packet (including the inner header) while the outer header (including any outer IPv4 options or IPv6 extension headers) remains unprotected.

An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured Drag and drop the configuration commands from the left into the correct sequence on the right Not all commands are used






Which statement identifies the functionality of virtual machines?


A. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor


B. The hypervisor can virtualize physical components including CPU. memory, and storage


C. Each hypervisor can support a single virtual machine and a single software switch


D. The hypervisor communicates on Layer 3 without the need for additional resources





B.
  The hypervisor can virtualize physical components including CPU. memory, and storage

How do TCP and UDP differ in the way that they establish a connection between two endpoints?


A. TCP uses synchronization packets, and UDP uses acknowledgment packets.


B. UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits


C. UDP provides reliable message transfer and TCP is a connectionless protocol


D. TCP uses the three-way handshake and UDP does not guarantee message delivery-





D.
  TCP uses the three-way handshake and UDP does not guarantee message delivery-


Page 18 out of 72 Pages
Previous