Happy Black Friday Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 1b2718643m

200-301 Exam Dumps - Cisco Certified Network Associate

Question # 4

Refer to the exhibit. An administrator must configure interfaces GM/1 and GM/3 on switch SW11. PC-1 and PC-2 must be placed in the Data VLAN, and Phone-1 must be placed in the Voice VLAN. Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

Which IPv6 address type provides communication between subnets and is unable to route on the Internet?

A.

global unicast

B.

unique local

C.

link-local

D.

multicast

Full Access
Question # 6

Which two conditions must be met before SSH operates normally on a Cisco IOS switch? (Choose two.)

A.

The switch must be running a k9 (crypto) IOS image

B.

The Ip domain-name command must be configured on the switch

C.

IP routing must be enabled on the switch

D.

A console password must be configured on the switch

E.

Telnet must be disabled on the switch

Full Access
Question # 7

Which WAN topology provides a combination of simplicity, quality, and availability?

A.

partial mesh

B.

full mesh

C.

point-to-point

D.

hub-and-spoke

Full Access
Question # 8

Refer to the exhibit. What does router R1 use as its OSPF router-ID?

A.

10.10.1.10

B.

10.10.10.20

C.

172.16.15.10

D.

192.168.0.1

Full Access
Question # 9

I1

Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two)

A.

interface GigabitEthernet0/0/1

channel-group 10 mode on

B.

interface GigabitEthernet0/0/1

channel-group 10 mode active

C.

interface GigabitEthernet0/0/1

channel-group 10 mode auto

D.

interface port-channel 10

switchport

switchport mode trunk

E.

interface port-channel 10

no switchport

ip address 172.16.0.1.255.255.255.0

Full Access
Question # 10

How does HSRP provide first hop redundancy?

A.

It load-balances traffic by assigning the same metric value to more than one route to the same destination m the IP routing table.

B.

It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.

C.

It forwards multiple packets to the same destination over different routed links n the data path

D.

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN

Full Access
Question # 11

Refer to the exhibit.

Which two prefixes are included in this routing table entry? (Choose two.)

A.

192.168.1.17

B.

192.168.1.61

C.

192.168.1.64

D.

192.168.1.127

E.

192.168.1.254

Full Access
Question # 12

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?

A.

modify hello interval

B.

modify process ID

C.

modify priority

D.

modify network type

Full Access
Question # 13

which IPv6 address block forwards packets to a multicast address rather than a unicast address?

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/12

Full Access
Question # 14

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

A.

TKiP encryption

B.

AES encryption

C.

scrambled encryption key

D.

SAE encryption

Full Access
Question # 15

Which mechanism carries multicast traffic between remote sites and supports encryption?

A.

ISATAP

B.

GRE over iPsec

C.

iPsec over ISATAP

D.

GRE

Full Access
Question # 16

Refer to Exhibit.

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

A.

ipv6 router 2000::1/128 2012::1

B.

ipv6 router 2000::1/128 2012::1 5

C.

ipv6 router 2000::1/128 2012::2

D.

ipv6 router 2000::1/128 2023::2 5

E.

ipv6 router 2000::1/128 2023::3 5

Full Access
Question # 17

When deploying syslog, which severity level logs informational message?

A.

0

B.

2

C.

4

D.

6

Full Access
Question # 18

What identifies the functionality of virtual machines?

A.

Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor

B.

The hypervisor can virtualize physical components including CPU. memory, and storage

C.

Each hypervisor can support a single virtual machine and a single software switch

D.

The hypervisor communicates on Layer 3 without the need for additional resources

Full Access
Question # 19

Refer to the exhibit.

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

Full Access
Question # 20

Which action is taken by a switch port enabled for PoE power classification override?

A.

When a powered device begins drawing power from a PoE switch port a syslog message is generated

B.

As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused

C.

If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects

D.

Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled

Full Access
Question # 21

Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)

A.

management interface settings

B.

QoS settings

C.

Ip address of one or more access points

D.

SSID

E.

Profile name

Full Access
Question # 22

What is the expected outcome when an EUI-64 address is generated?

A.

The seventh bit of the original MAC address of the interface is inverted

B.

The interface ID is configured as a random 64-bit value

C.

The characters FE80 are inserted at the beginning of the MAC address of the interface

D.

The MAC address of the interface is used as the interface ID without modification

Full Access
Question # 23

When a switch receives a frame for a known destination MAC address, how is the frame handled?

A.

sent to the port identified for the known MAC address

B.

broadcast to all ports

C.

forwarded to the first available port

D.

flooded to all ports except the one from which it originated

Full Access
Question # 24

The service password-encryption command is entered on a router. What is the effect of this configuration?

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.

encrypts the password exchange when a VPN tunnel is established

C.

prevents network administrators from configuring clear-text passwords

D.

protects the VLAN database from unauthorized PC connections on the switch

Full Access
Question # 25

Refer to the exhibit.

Drag and drop the networking parameters from the left onto the correct values on the right.

Full Access
Question # 26

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

Full Access
Question # 27

Which implementation provides the strongest encryption combination for the wireless environment?

A.

WPA2 + AES

B.

WPA + AES

C.

WEP

D.

WPA + TKIP

Full Access
Question # 28

Which protocol does an access point use to draw power from a connected switch?

A.

Internet Group Management Protocol

B.

Adaptive Wireless Path Protocol

C.

Cisco Discovery Protocol

D.

Neighbor Discovery Protocol

Full Access
Question # 29

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

A.

Exchange

B.

2-way

C.

Full

D.

Init

Full Access
Question # 30

Refer to the exhibit.

A network administrator has been tasked with securing VTY access to a router Which access-list entry accomplishes this task?

A.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh

B.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp

C.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet

D.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https

Full Access
Question # 31

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

A.

configure the hello and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Full Access
Question # 32

When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI, which format is supported?

A.

Unicode

B.

base64

C.

decimal

D.

ASCII

Full Access