Make success possible with our Latest and Unique CCNA 200-301 Practice Exam!
Name: Cisco Certified Network Associate
Exam Code: 200-301
Certification: CCNA
Vendor: Cisco
Total Questions: 1005
Last Updated: April 24, 2025
585 Satisfied Customers
Success is simply the result of the efforts you put into the preparation. We at Dumpsgroup wish to make that preparation a lot easier. The Cisco Certified Network Associate 200-301 Practice Exam we offer is solely for best results. Our IT experts put in their blood and sweat into carefully selecting and compiling these unique Practice Questions. So, you can achieve your dreams of becoming a CCNA professional. Now is the time to press that big buy button and take the first step to a better and brighter future.
Passing the Cisco 200-301 exam is simpler if you have globally valid resources and Dumpsgroup provides you just that. Millions of customers come to us daily, leaving the platform happy and satisfied. Because we aim to provide you with CCNA Practice Questions aligned with the latest patterns of the Cisco Certified Network Associate Exam. And not just that, our reliable customer services are 24 hours at your beck and call to support you in every way necessary. Order now to see the 200-301 Exam results you always desired.
You must have heard about candidates failing in a large quantity and perhaps tried yourself and fail to pass Cisco Certified Network Associate. It is best to try Dumpsgroup’s 200-301 Practice Questions this time around. Dumpsgroup not only provides an authentic, valid, and accurate resource for your preparation. They simplified the training by dividing it into two different formats for ease and comfort. Now you can get the Cisco 200-301 in both PDF and Online Test Engine formats. Choose whichever or both to start your CCNA certification exam preparation.
Furthermore, Dumpsgroup gives a hefty percentage off on these Spoto 200-301 Practice Exam by applying a simple discount code; when the actual price is already so cheap. The updates for the first three months, from the date of your purchase, are FREE. Our esteemed customers cannot stop singing praises of our Cisco 200-301 Practice Questions. That is because we offer only the questions with the highest possibility of appearing in the actual exam. Download the free demo and see for yourself.
We know you have been struggling to compete with your colleagues in your workplace. That is why we provide the 200-301 Practice Questions to let you gain the upper hand that you always wanted. These questions and answers are a thorough guide in a simple and exam-like format! That makes understanding and excelling in your field way lot easier. Our aim is not just to help to pass the CCNA Exam but to make a Cisco professional out of you. For that purpose, our 200-301 Practice Exams are the best choice.
There are many resources available online for the preparation of the Cisco Certified Network Associate Exam. But that does mean that all of them are reliable. When your future as a CCNA certified is at risk, you have got to think twice while choosing Cisco 200-301 Practice Questions. Dumpsgroup is not only a verified source of training material but has been in this business for years. In those years, we researched on 200-301 Practice Exam and came up with the best solution. So, you can trust that we know what we are doing. Moreover, we have joined hands with Cisco experts and professionals who are exceptional in their skills. And these experts approved our 200-301 Practice Questions for Cisco Certified Network Associate preparation.
What are two purposes of HSRP? (Choose two.)
A. It groups two or more routers to operate as one virtual router.
B. It improves network availability by providing redundant gateways.
C. It passes configuration information to hosts in a TCP/IP network.
D. It helps hosts on the network to reach remote subnets without a default gateway.
E. It provides a mechanism for diskless clients to autoconfigure their IP parameters during boot.
ANSWER : A,B
A wireless access point is needed and must meet these requirements: • "zero-touch" deployed and managed by a WLC
A. autonomous
B. lightweight
C. mesh
D. cloud-based
ANSWER : B
A. multicast address
B. loopback IP address
C. virtual IP address
D. broadcast address
ANSWER : C
Refer to the exhibit.
A. 0.0.0.0.0/0
B. 10.56.0.1
C. 10.56.128.19
D. Vlan57
ANSWER : B
Refer to the exhibit.
A. interface range gigabitethernet0/0/0-15 channel-group 1 mode on
B. interface range gigabitethernet0/0/0-15 channel-group 1 mode desirable
C. interface port-channel 1 channel-group 1 mode auto
D. interface port-channel 1 channel-group 1 mode passive
ANSWER : D
Refer to the exhibit
A. MDF-DC-4:08:E0:19: 08:B3:19
B. MDF-DC-3:08:0E:18::1A:3C:9D
C. MDF-DC-08:0E:18:22:05:97
D. MDF-DC-1:DB:E:44:02:54:79
ANSWER : C
What is the primary purpose of a console port on a Cisco WLC?
A. In-band management via an asynchronous transport
B. out-of-band management via an IP transport
C. in-band management via an IP transport
D. out-of-band management via an asynchronous transport
ANSWER : D
A. discarding
B. listening
C. forwarding
D. learning
ANSWER : A
A. Unlike lightweight access points, which require redundant WLCs to support firmwareupgrades, autonomous access points require only one WLC.
B. Unlike autonomous access points, lightweight access points store a complete copy ofthe current firmware for backup.
C. Unlike lightweight access points, autonomous access points can recover automaticallyfrom a corrupt firmware update.
D. Unlike autonomous access points, lightweight access points require a WLC toimplement remote firmware updates.
ANSWER : D
Which WPA mode uses PSK authentication?
A. Local
B. Client
C. Enterprise
D. Personal
ANSWER : C
A. Discovery response
B. DHCP request
C. DHCP discover
D. Discovery request
ANSWER : D
Refer to the exhibit.
What must be configured to enable 802.11w on the WLAN?
A. Set PMF to Required.
B. Enable MAC Filtering.
C. Enable WPA Policy.
D. Set Fast Transition to Enabled
ANSWER : A
A. to enable the number of MAC addresses learned on the port to l
B. to protect the operation of the port from topology change processes
C. to enable the pod to enter the forwarding state immediately when the host boots up
D. to prevent the port from participating in Spanning Tree Protocol operations
E. to block another switch or host from communicating through the port
ANSWER : B,C
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : C
What should a network administrator consider when deciding to implement automation?
A. Automated systems may have difficulty expanding network changes at scale.
B. Network automation typically is limited to the configuration and management of virtual devices within a network.
C. Network automation typically increases enterprise management operating costs.
D. Manual changes frequently lead to configuration errors and inconsistencies.
ANSWER : D
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : B
A. /64
B. /96
C. /124
D. /128
ANSWER : D
Refer to the exhibit.
A. 192.168.1.226
B. 192.168.1.100
C. 192.168.1.254
D. 192.168.1.253
ANSWER : D
Refer to the exhibit.
A. ip route 10.80.65.10 255.255.255.254 10.80.65.1
B. ip route 10.8065.10 255.255.255.255 10.73.65.66
C. ip route 1073.65.65 255.0.0.0 10.80.65.10
D. ip route 10.73.65.66 0.0.0.255 10.80.65.10
ANSWER : B
A. interface Gi0/1ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA02:/127
B. interface Gi0/0ipv6 address 2001:db8:1:AFFF::/64 eui-64
C. interface Gi0/1ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA00:/127
D. interface Gi0/0ipv6 address 2001:db8:0:AFFF::/64 eui-64
E. interface Gi0/0ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA03;/127
ANSWER : C,D
A. Configure the switchport trunk allowed vlan 300 command on SW1 port-channel 1
B. Configure the switchport trunk allowed vlan 300 command on interface Fa0/2 on SW1.
C. Configure the switchport trunk allowtd vlan add 300 command on interface FaO 2 on SW2.
D. Configure the switchport trunk allowtd vlan add 300 command on SW1 port-channel 1
ANSWER : B
A. It uses preshared keys for encryption
B. It requires both sides to have identical keys
C. It is a private-key encryption algorithm
D. It is a public-key cryptosystem
ANSWER : D
What is the function of "off-the-shell" switches in a controller-based network?
A. providing a central view of the deployed network
B. forwarding packets
C. making routing decisions
D. setting packet-handling policies
ANSWER : D
A. Generic Router Encapsulation (GRE)
B. Virtual Local Area Network (VLAN)
C. Virtual Extensible LAN (VXLAN)
D. Point-to-Point Protocol
ANSWER : C
A. broadcast to all ports on the switch
B. flooded to all ports except the origination port
C. forwarded to the first available port
D. inspected and dropped by the switch
ANSWER : D
A. The router chooses the route with the oldest age.
B. The router load-balances traffic over all routes to the destination.
C. The router chooses the next hop with the lowest MAC address.
D. The router chooses the next hop with the lowest IP address.
ANSWER : B
A. SLB
B. FHRP
C. VRRP
D. HSRP
ANSWER : D
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : B
Refer to the exhibit.
A. value
B. object
C. key
D. array
ANSWER : D
Refer to the exhibit.
A. 10.10.13.0/25 [108/0] via 10.10.10.10
B. 10.10.13.0/25 [110/2] via 10.10.10.2
C. 10.10.13.0/25 [110/2] via 10.10.10.6
D. 10.10.13.0/25 [1/0] via 10.10.10.2
ANSWER : D
A. ratio of signal-to-noise rating supplied by the wireless device
B. signals from other Wi-Fi networks that interfere with the local signal
C. measured difference between the desired Wi-Fi signal and an interfering Wi-Fi signal
D. any interference that is not Wi-Fi traffic that degrades the desired signal
ANSWER : A
Refer to the exhibit.
A. R1(conftg)#lp route 10.10.10.0 255.255.255.0 192.168.0.2
B. R1(Config)#lp route 10.10.10.10 265.255.255.255 192 168.0.2
C. R1(config)#ip route 192.168.0.2 255.255.255.255 10.10.10.10
D. R1(config)3|p route 0.0.0.0 0.0 0.0 192 168.0.2
ANSWER : B
A. Both require fiber cable media for transmission.
B. Both require UTP cable media for transmission.
C. Both use the single-mode fiber type.
D. Both use the multimode fiber type.
ANSWER : A
A. Get
B. GetNext
C. Set
D. GetBulk
E. Inform
ANSWER : A,D
Which is a fact related to FTP?
A. It uses block numbers to identify and mitigate data-transfer errors
B. It always operates without user authentication
C. It relies on the well-known UDP port 69.
D. It uses two separate connections for control and data traffic
ANSWER : D
How does authentication differ from authorization?
A. Authentication verifies the identity of a person accessing a network, and authorizationdetermines what resource a user can access.
B. Authentication is used to record what resource a user accesses, and authorization isused to determine what resources a user can access
C. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network
D. Authentication is used to verify a person's identity, and authorization is used to createsyslog messages for logins.
ANSWER : A
How does authentication differ from authorization?
A. Authentication verifies the identity of a person accessing a network, and authorizationdetermines what resource a user can access.
B. Authentication is used to record what resource a user accesses, and authorization isused to determine what resources a user can access
C. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network
D. Authentication is used to verify a person's identity, and authorization is used to createsyslog messages for logins.
ANSWER : A
A. switchport port-security mac-address abcd.abcd.abcd
B. switchport port-security mac-address abed.abed.abed vlan 4
C. switchport port-security mac-address sticky abcd.abcd.abcd vlan 4
D. switchport port-security mac-address abcd.abcd.abcd vlan voice
ANSWER : A
Refer to the exhibit.
Which prefix did router R1 learn from internal EIGRP?
A. 192.168.10/24
B. 192.168.3.0/24
C. 192.168.2.0/24
D. 172.16 1.0/24
ANSWER : C
What is a purpose of traffic shaping?
A. It enables dynamic flow identification.
B. It enables policy-based routing.
C. It provides best-effort service.
D. It limits bandwidth usage.
ANSWER : A
A. UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.
B. UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.
C. UDP uses flow control mechanisms for the delivery of packets, and TCP usescongestion control for efficient packet delivery.
D. UDP uses sequencing data tor packets to arrive in order, and TCP offers trie capabilityto receive packets in random order.
ANSWER : A
A)
A. Option
B. Option
C. Option
D. Option
ANSWER : D
What is a reason to implement LAG on a Cisco WLC?
A. Increase the available throughput on the link.
B. Increase security by encrypting management frames
C. Allow for stateful failover between WLCs
D. Enable the connected switch ports to use different Layer 2 configurations
ANSWER : A
What are two protocols within the IPsec suite? (Choose two)
A. AH
B. 3DES
C. ESP
D. TLS
E. AES
ANSWER : D,E
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : C
A. Password complexity enable
B. confreg 0x2142
C. Login authentication my-auth-list
D. service password-encryption
ANSWER : A
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : B
Which WAN topology has the highest degree of reliability?
A. full mesh
B. Point-to-point
C. hub-and-spoke
D. router-on-a-stick
ANSWER : A
A. to rate-limit messages for different seventy levels from each device
B. to set the severity of syslog messages from each device
C. to identify the source from which each syslog message originated
D. to control the number of syslog messages from different devices that are stored locally
ANSWER : B
Refer to the exhibit.
A. ip route 172.25.25 0 255 255 255.0 192.168.2.1
B. ip route 172.25.25 1 255 255 255 255 g0/1
C. ip route 172.25.25.0.255.255.255.0.192.168.2.2
ANSWER : C
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : B
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : B
Which components are contained within a virtual machine?
A. physical resources, including the NIC, RAM, disk, and CPU
B. configuration files backed by physical resources from the Hypervisor
C. applications running on the Hypervisor
D. processes running on the Hypervisor and a guest OS
ANSWER : B
Refer to the exhibit.
What is the prefix length for the route that router1 will use to reach host A?
A. /25
B. /27
C. /28
D. /29
ANSWER : D
A. BPDU guard
B. loop guard
C. portfast
D. uplinkfast
ANSWER : C
A. ARP
B. CDP
C. flooding
D. multicast
ANSWER : C
A. LAG
B. EtherChannel
C. trunk
D. access
ANSWER : C
A. global unicast
B. public
C. private
D. multicast
ANSWER : C
A. WPA2
B. WPA3
C. Wi-Fi 6
D. WEP
E. WPA
ANSWER : B,D
A. tunnel
B. transport
C. aggressive
D. main
ANSWER : B
Refer to the exhibit.
Which per-hop QoS behavior is R1 applying to incoming packets?
A. queuing
B. marking
C. shaping
D. policing
ANSWER : D
A. when a gateway protocol is required that support more than two Cisco devices for redundancy
B. to enable normal operations to continue after a member failure without requiring a change In a host ARP cache
C. to ensure that the spanning-tree forwarding path to the gateway is loop-free
D. to interoperate normally with all vendors and provide additional security features for Cisco devices
ANSWER : A
Refer to the exhibit.
A. Enable the Broadcast SSID option
B. Enable the Status option.
C. Set the Radio Policy option to 802 11g Only.
D. Set the Radio Policy option to 802.11a Only.
E. Set the Interface/Interface Group(G) to an interface other than guest
ANSWER : A,B
Refer to the exhibit.
A. Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 265 255.255.252
B. Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255 255.255.248
C. Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255 255.255.0
D. Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255.255.255.128
ANSWER : B
A. Cisco DNA Center correlates information from different management protocols to obtaininsights, and traditional campus management requires manual analysis.
B. Cisco DNA Center handles management tasks at the controller to reduce the load oninfrastructure devices, and traditional campus management uses the data backbone.
C. Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric andnonfabric devices, and traditional campus management uses CLI exclusively.
D. Cisco DNA Center automatically compares security postures among network devices,and traditional campus management needs manual comparisons.
ANSWER : C
What is the function of northbound API?
A. It upgrades software and restores files.
B. It relies on global provisioning and configuration.
C. It supports distributed processing for configuration.
D. It provides a path between an SDN controller and network applications.
ANSWER : D
Which type of hypervisor operates without an underlying OS to host virtual machines?
A. Type 1
B. Type 2
C. Type 3
D. Type 12
ANSWER : A
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : C
A. To simplify the process of maintaining a consistent configuration state across all devices
B. To centralize device information storage
C. To implement centralized user account management
D. To deploy the management plane separately from the rest of the network Answer: A
ANSWER : A
Refer to the exhibit.
A. Option
B. Option
C. Option
D. Option
ANSWER : C
Refer to the exhibit.
A. Reconfigure the static NAT entries that overlap the NAT pool
B. Configure the NAT outside interface
C. Modify the access list for the internal network on e0/1
D. Apply the ACL to the pool configuration
ANSWER : B
What provides connection redundancy increased bandwidth and load sharing between a wireless LAN controller and a Layer 2 switch?
A. VLAN trunking
B. tunneling
C. first hop redundancy
D. link aggregation
ANSWER : D
What is the purpose of the Cisco DNA Center controller?
A. to secure physical access to a data center
B. to scan a network and generate a Layer 2 network diagram
C. to securely manage and deploy network devices
D. to provide Layer 3 services to autonomous access points
ANSWER : C
A. forwarding mode and provides the lowest-cost path to the root bridge for each VLAN
B. learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN
C. blocking mode and provides an alternate path toward the designated bridge
D. listening mode and provides an alternate path toward the root bridge
ANSWER : C
A. All four pairs of the cable are used
B. It detects the device is a powered device
C. The default level is used for the access point
D. Power policing is enabled at the same time
ANSWER : D
What is a characteristics of a collapsed-core network topology?
A. It allows the core and distribution layers to run as a single combined layer.
B. It enables the core and access layers to connect to one logical distribution device over an EtherChannel.
C. It enables all workstations in a SOHO environment to connect on a single switch with internet access.
D. It allows wireless devices to connect directly to the core layer, which enables faster data transmission.
ANSWER : B
A. snmp-server host
B. snmp-server community
C. snmp-server enable traps
D. snmp-server user
ANSWER : B
What is used to identify spurious DHCP servers?
A. DHCPREQUEST
B. DHCPDISCOVER
C. DHCPACK
D. DHCPOFFER
ANSWER : D
Refer to the exhibit.
A. It queues the packets waiting for the route to be learned.
B. It floods packets to all learned next hops.
C. It discards the packets.
D. It uses a route that is similar to the destination address.
ANSWER : D
What describes the functionality of southbound APIs?
A. They use HTTP messages to communicate.
B. They enable communication between the controller and the network device.
C. They convey information from the controller to the SDN applications.
D. They communicate with the management plane.
ANSWER : B
A. It is used directly by an individual user to access network services
B. It passes unicast communication between hosts in a network
C. It transmits broadcast traffic between devices in the same VLAN
D. It provides security between trusted and untrusted sections of the network.
ANSWER : A
Which benefit does Cisco ONA Center provide over traditional campus management?
A. Cisco DNA Center leverages SNMPv3 tor encrypted management, and traditionalcampus management uses SNMPv2.
B. Cisco DNA Center automates HTTPS for secure web access, and traditional campusmanagement uses HTTP.
C. Cisco DNA Center leverages APIs, and traditional campus management requiresmanual data gathering.
D. Cisco DNA Center automates SSH access for encrypted entry, and SSH Is absent fromtraditional campus management.
ANSWER : B
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : C
Refer to the exhibit.
A packet sourced from 10.10.10.32 is destined for the internet.
A. 0
B. 1
C. 2
D. 32
ANSWER : B
Which interface is used for out-of-band management on a WLC?
A. dynamic
B. service port
C. virtual
D. management
ANSWER : D
Which type of IPv4 address type helps to conserve the globally unique address classes?
A. multicast
B. private
C. loopback
D. public
ANSWER : B
A. crypto key generate rsa general-keys modulus 1024
B. transport input all
C. crypto key generate rsa usage-keys
D. crypto key generate rsa modulus 2048
E. transport Input ssh
ANSWER : A,E
A. crypto key generate rsa general-keys modulus 1024
B. transport input all
C. crypto key generate rsa usage-keys
D. crypto key generate rsa modulus 2048
E. transport Input ssh
ANSWER : A,E
A. crypto key generate rsa general-keys modulus 1024
B. transport input all
C. crypto key generate rsa usage-keys
D. crypto key generate rsa modulus 2048
E. transport Input ssh
ANSWER : A,E
A. personal 10-digit PIN and RSA certificate
B. complex password and personal 10-digit PIN
C. password of 8 to 15 characters and personal 12-digit PIN
D. fingerprint scanning and facial recognition
ANSWER : A
Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?
A. virtual interface
B. management interface
C. console port
D. service port
ANSWER : B
A. switch(config)#spanning-tree vlan 1 max-age 6
B. switch(config)#spanning-tree vlan 1 hello-time 10
C. switch(config)#spanning-tree vlan 1 priority 4096
D. switch(config)#spanning-tree vlan 1 forward-time 20
ANSWER : D
Refer to the exhibit.
A. Port security
B. High throughput
C. Cable disconnect
D. duplex mismatch
ANSWER : C
What is the role of SNMP in the network?
A. to monitor network devices and functions using a TCP underlay that operates on the presentation layer
B. to collect data directly from network devices using an SSL underlay that operates on the transport layer
C. to monitor and manage network devices using a UDP underlay that operates on the application layer
D. to collect telemetry and critical information from network devices using an SSH underlay that operates on the network layer
ANSWER : C
Refer to the exhibit.
Which IP route command created the best path for a packet destined for 10.10.10.3?
A. ip route 10.10.0.0 255.255.252.0 g0/0
B. ip route 10.0.0.0 255.0.0.0 g0/0
C. ip route 10.10.10.1 255.255.255.255 g0/0
D. ip route 10.10.10.0 255.255.255.240 g0/0
ANSWER : D
A. Null0
B. VIan58
C. Vlan60
D. VIan59
ANSWER : B
A. when the subnet must be available only within an organization
B. when the subnet does not need to be routable
C. when the addresses on the subnet must be equivalent to private IPv4 addresses
D. when the subnet must be routable over the internet
ANSWER : D
A. when the subnet must be available only within an organization
B. when the subnet does not need to be routable
C. when the addresses on the subnet must be equivalent to private IPv4 addresses
D. when the subnet must be routable over the internet
ANSWER : D
A. data center network pokey con
B. console server that permits secure access to all network devices
C. IP address cool distribution scheduler
D. software-defined controller for automaton of devices and services
ANSWER : D
A. The default gateway for site B is configured incorrectly
B. The lack of a default route prevents delivery of the traffic
C. The traffic is blocked by an implicit deny in an ACL on router2
D. The traffic to 192 168 010 requires a static route to be configured in router 1.
ANSWER : B
A. service
B. trunk
C. AP-manager
D. virtual AP connection
ANSWER : C
A. 802.1x authentication
B. preshared key
C. TKIP/MIC encryption
D. small Wi-Fi application
ANSWER : A
A. /29
B. /30
C. /27
D. /28
ANSWER : A
Which capability does TFTP provide?
A. loads configuration files on systems without data storage devices
B. provides authentication for data communications over a private data network
C. provides encryption mechanisms for file transfer across a WAN
D. provides secure file access within the LAN
ANSWER : A
What is used as a solution for protecting an individual network endpoint from attack?
A. Router
B. Wireless controller
C. Anti software
D. Cisco DNA Center
ANSWER : C
Refer to the exhibit.
A. ip route 192.168.23.0 255.255.255.0 192.168.13.3 100
B. ip route 192.168.23.0 255.255.255.0 192.168.13.3 121
C. ip route 192.168.23.0 255.255.255.255 192.168.13.3 121
D. ip route 192.168.23.0 255.255.255.0 192.168.13.3
ANSWER : B
Which two server types support dornas name to IP address resolution? (Choose two >
A. ESX host
B. resolver
C. web
D. file transfer
E. authentication
ANSWER : A,C
Refer to the exhibit.
A. 2001 :db8::5000:0004:5678:0090/64
B. 2001 :db8:4425:5400:77ft:fe07:/64
C. 2001 :db8::5000:00ff:fe04 0000/64
D. 2001 :db8::5200:00ff:fe04:0000/64
ANSWER : C
Refer to the exhibit.
What are two conclusions about this configuration? {Choose two.)
A. The spanning-tree mode is Rapid PVST+.
B. This is a root bridge.
C. The root port is FastEthernet 2/1.
D. The designated port is FastEthernet 2/1.
E. The spanning-tree mode is PVST+.
ANSWER : A
A. The switch references the MAC address aging table for historical addresses on the port that received the frame.
B. The switch floods the frame to all ports in all VLANs except the port that received the frame
C. The switch drops the frame and learns the destination MAC address again from the port that received the frame
D. The switch floods the frame to all ports in the VLAN except the port that received the frame.
ANSWER : D
Refer to the exhibit.
A. Select PSK under Authentication Key Management
B. Select WPA+WPA2 on Layer 2 Security
C. Select Static-WEP + 802.1X on Layer 2 Security
D. Select WPA Policy with TKIP Encryption
E. Select 802.1X from under Authentication Key Management
ANSWER : B,E
A. It serves as a sequence tag on SNMP traffic messages.
B. It serves as a password lo protect access to MIB objects.
C. It passes the Active Directory username and password that are required for device access
D. It translates alphanumeric MIB output values to numeric values.
ANSWER : B
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : D
A. Place the AP into manual containment.
B. Remove the AP from WLC management.
C. Manually remove the AP from Pending state.
D. Set the AP Class Type to Friendly.
ANSWER : B
Refer to the exhibit.
A. Option
B. Option
C. Option
ANSWER : C
Refer to the exhibit.
What is the subnet mask for route 172.16.4.0?
A. 255.255.248.0
B. 255.255.254.0
C. 255.255.255.192
D. 255.255.240.0
ANSWER : A
A. user training
B. user awareness
C. vulnerability verification
D. physical access control
ANSWER : D
Which functionality is provided by the console connection on a Cisco WLC?
A. out-of-band management
B. secure in-band connectivity for device administration
C. unencrypted in-band connectivity for file transfers
D. HTTP-based GUI connectivity
ANSWER : B
A. ::ffif 1014 1011/96
B. 2001 7011046:1111:1/64
C. ;jff06bb43cd4dd111bbff02 4545234d
D. 2002 5121204b 1111:1/64
E. FF02::0WlFF00:0l)00/104
ANSWER : B
Which enhancements were implemented as part of WPA3?
A. 802.1x authentication and AES-128 encryption
B. TKIP encryption improving WEP and per-packet keying
C. AES-64 m personal mode and AES-128 in enterprise mode
D. forward secrecy and SAE in personal mode for secure initial key exchange
ANSWER : D
What is the default port-security behavior on a trunk link?
A. It causes a network loop when a violation occurs.
B. It disables the native VLAN configuration as soon as port security is enabled.
C. It places the port in the err-disabled state if it learns more than one MAC address.
D. It places the port in the err-disabled slate after 10 MAC addresses are statically configured.
ANSWER : A
A. ipconfig /all
B. ifconfig -a
C. show interface
D. netstat -r
ANSWER : A
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
ANSWER : D