200-301 Practice Test Questions

863 Questions


Topic 2, Exam B

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?


A. Ansible


B. Python


C. Puppet


D. Chef





A.
  Ansible

Refer to the exhibit


Which route does R1 select for traffic that is destined to 192 168.16.2?


A. 192.168.16.0/21


B. 192.168.16.0/24


C. 192.168 26.0/26


D. 192.168 26.0/26





D.
  192.168 26.0/26

Explanation:

The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it will be chosen. This is called the “longest prefix match” rule.

What are two descriptions of three-tier network topologies? (Choose two)


A. The core and distribution layers perform the same functions


B. The access layer manages routing between devices in different domains


C. The network core is designed to maintain continuous connectivity when devices fail.


D. The core layer maintains wired connections for each host


E. The distribution layer runs Layer 2 and Layer 3 technologies





C.
  The network core is designed to maintain continuous connectivity when devices fail.

E.
  The distribution layer runs Layer 2 and Layer 3 technologies

Refer to the exhibit

How does router R1 handle traffic to 192.168.10.16?


A. It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.


B. It selects the EIGRP route because it has the lowest administrative distance.


C. It selects the OSPF route because it has the lowest cost.


D. It selects the RIP route because it has the longest prefix inclusive of the destination address.





D.
  It selects the RIP route because it has the longest prefix inclusive of the destination address.

Which two actions influence the EIGRP route selection process? (Choose two)


A. The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.


B. The router calculates the best backup path to the destination route and assigns it as the feasible successor.


C. The router calculates the feasible distance of all paths to the destination route


D. The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link


E. The router must use the advertised distance as the metric for any given route





B.
  The router calculates the best backup path to the destination route and assigns it as the feasible successor.

C.
  The router calculates the feasible distance of all paths to the destination route

Explanation:

The reported distance (or advertised distance) is the cost from the neighbor to the destination. It is calculated from the router advertising the route to the network. For example in the topology below, suppose router A & B are exchanging their routing tables for the first time. Router B says “Hey, the best metric (cost) from me to IOWA is 50 and the metric from you to IOWA is 90” and advertises it to router A. Router A considers the first metric (50) as the Advertised distance. The second metric (90), which is from NEVADA to IOWA (through IDAHO), is called the Feasible distance

Refer to the exhibit.

Which two prefixes are included in this routing table entry? (Choose two.)


A. 192.168.1.17


B. 192.168.1.61


C. 192.168.1.64


D. 192.168.1.127


E. 192.168.1.127





B.
  192.168.1.61

C.
  192.168.1.64

Refer to the exhibit

Router R1 Fa0/0 is unable ping router R3 Fa0/1.
Which action must be taken in router R1 to help resolve the configuration issue?


A. set the default network as 20.20.20.0/24


B. set the default gateway as 20.20.20.2


C. configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network


D. configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network





D.
  configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?


A. modify hello interval


B. modify process ID


C. modify priority


D. modify network type





A.
  modify hello interval

Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?


A. DTP


B. FTP


C. SMTP


D. TFTP





B.
  FTP

Drag and drop the application protocols from the left onto the transport protocols that it uses on the right






An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?


A. Exchange


B. 2-way


C. Full


D. Init





C.
  Full

What are two differences between optical-fiber cabling and copper cabling? (Choose two)


A. Light is transmitted through the core of the fiber


B. A BNC connector is used for fiber connections


C. The glass core component is encased in a cladding


D. Fiber connects to physical interfaces using Rj-45 connections


E. The data can pass through the cladding





A.
  Light is transmitted through the core of the fiber

C.
  The glass core component is encased in a cladding


Page 33 out of 72 Pages
Previous