200-301 Practice Test Questions

863 Questions


Topic 1: Exam Pool A

   

desc about topic

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?


A. CPU ACL


B. TACACS


C. Flex ACL


D. RADIUS





A.
  CPU ACL

Reference:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlansecurity/ 71978-acl-wlc.html

Refer to the exhibit.

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?


A. the path through R1, because the OSPF administrative distance is 110


B. the path through R2. because the IBGP administrative distance is 200


C. the path through R2 because the EBGP administrative distance is 20


D. the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP





C.
  the path through R2 because the EBGP administrative distance is 20

Refer to the exhibit

Which switch becomes the root bridge?


A. S1


B. S2


C. S3


D. S4





B.
  S2

What are two functions of a Layer 2 switch? (Choose two)


A. acts as a central point for association and authentication servers


B. selects the best route between networks on a WAN


C. moves packets within a VLAN


D. moves packets between different VLANs


E. makes forwarding decisions based on the MAC address of a packet





A.
  acts as a central point for association and authentication servers

E.
  makes forwarding decisions based on the MAC address of a packet

What are two benefits of controller-based networking compared to traditional networking?


A. controller-based increases network bandwidth usage, while traditional lightens the load
on the network.


B. controller-based inflates software costs, while traditional decreases individual licensing costs


C. Controller-based reduces network configuration complexity, while traditional increases the potential for errors


D. Controller-based provides centralization of key IT functions. While traditional requires distributes management function


E. controller-based allows for fewer network failure, while traditional increases failure rates





C.
  Controller-based reduces network configuration complexity, while traditional increases the potential for errors

D.
  Controller-based provides centralization of key IT functions. While traditional requires distributes management function

Explanation:

Cisco DNA Center Device Management
3. Monitor the cloud for software update
5. Uses CLI templates to apply a consistent configuration to multiple devices at an individual location 6. Uses NetFlow to analyse potential security threats throughout the network and take appropriate action on that traffic Traditional device management
2. Manages device configuration on a per-device basis
4. Security is managed near the perimeter of the network with firewalls, VPNs, and
IPS Implements changes via an SSH terminal

What must be considered when using 802:11 ta?


A. It is compatible with 802 lib- and 802 11-compliant wireless devices


B. It is used in place of 802 11b/g when many nonoverlapping channels are required


C. It is susceptible to interference from 2 4 GHz devices such as microwave ovens.


D. It is chosen over 802 11b/g when a lower-cost solution is necessary





A.
  It is compatible with 802 lib- and 802 11-compliant wireless devices

Refer to the exhibit.


After the election process what is the root bridge in the HQ LAN?


A. Switch 1


B. Switch 2


C. Switch 3


D. Switch 4





C.
  Switch 3

Explanation:

The root bridge is determined by the lowest bridge ID, which consists of the priority value and the MAC address. Because the priority values of all of the switches are not avalable, the MAC address is used to determine the root bridge. Because S3 has the

When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)


A. ASCII


B. base64


C. binary


D. decimal


E. hexadecimal





A.
  ASCII

E.
  hexadecimal

Reference:

https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_ chapter_01010001.html

What occurs when overlapping Wi-Fi channels are implemented?


A. The wireless network becomes vulnerable to unauthorized access.


B. Wireless devices are unable to distinguish between different SSIDs


C. Users experience poor wireless network performance.


D. Network communications are open to eavesdropping.





C.
  Users experience poor wireless network performance.

A network engineer is configuring an OSPFv2 neighbor adjacency Drag and drop the parameters from the left onto their required categories on the right. Not all parameters are used






Refer to the exhibit.

Which command provides this output?


A. show ip route


B. show ip interface


C. show interface


D. show cdp neighbor





D.
  show cdp neighbor

Which MAC address is recognized as a VRRP virtual address?


A. 0000.5E00.010a/


B. 0005.3711.0975


C. 0000.0C07.AC99


D. 0007.C070/AB01





A.
  0000.5E00.010a/

Explanation:

With VRRP, the virtual router’s MAC address is 0000.5E00.01xx , in which xx is the VRRP group


Page 3 out of 72 Pages
Previous