200-301 Exam Questions

Total 864 Questions

Last Updated Exam : 30-Dec-2024

Topic 1: Exam Pool A

   

desc about topic

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.






Which 802.11 frame type is association response?


A.

management


B.

protected frame


C.

control


D.

action





A.
  

management



Reference: https://en.wikipedia.org/wiki/802.11_Frame_Types

What is a function of Wireless LAN Controller? 


A.

register with a single access point that controls traffic between wired and wireless endpoints.


B.

use SSIDs to distinguish between wireless clients.


C.

send LWAPP packets to access points.


D.

monitor activity on wireless and wired LANs





C.
  

send LWAPP packets to access points.



Explanation: Lightweight APs (LAPs) is devices require no initial configuration. LAPs use the Lightweight Access Point Protocol (LWAPP) to communicate with a WLAN controller (WLC), as shown in the below figure. Controller-based APs are useful in situations where many APs are required in the network. As more APs are added, each AP is automatically configured and managed by the WLC.




 

What is the benefit of using FHRP?


A.

reduced management overhead on network routers


B.

balancing traffic across multiple gateways in proportion to their loads


C.

higher degree of availability


D.

reduced ARP traffic on the network





C.
  

higher degree of availability



Which option about JSON is true?


A.

uses predefined tags or angle brackets () to delimit markup text


B.

used to describe structured data that includes arrays


C.

used for storing information


D.

similar to HTML, it is more verbose than XML





B.
  

used to describe structured data that includes arrays



Explanation: JSON data is written as name/value pairs.A name/value pair consists of a
field name (in double quotes), followed by a colon, followed by a value:“name”:”Mark”JSON
can use arrays. Array values must be of type string, number, object, array, boolean or
null..For example:{“name”:”John”,“age”:30,“cars”:[ “Ford”, “BMW”, “Fiat” ]}

How does Cisco DNA Center gather data from the network?


A.

Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller


B.

Devices establish an iPsec tunnel to exchange data with the controller


C.

Devices use the call-home protocol to periodically send data to the controller.


D.

The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to the controller.





A.
  

Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller



which purpose does a northbound API serve in a controller-based networking architecture?


A.

communicates between the controller and the physical network hardware


B.

reports device errors to a controller


C.

generates statistics for network hardware and traffic


D.

facilitates communication between the controller and the applications





D.
  

facilitates communication between the controller and the applications



A network administrator is asked to configure VLANS 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused remaining. Which action should be taken for the unused ports?


A.

configure port in the native VLAN


B.

configure ports in a black hole VLAN


C.

configure in a nondefault native VLAN


D.

configure ports as access ports





B.
  

configure ports in a black hole VLAN



An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B
on the serial0/0 interface of the HQ router and wants to compress it for easier
configuration. Which command must be issued on the router interface?


A.

ipv6 address 2001:db8::700:3:400F:572B


B.

ipv6 address 2001:db8:0::700:3:4F:572B


C.

ipv6 address 2001:Odb8::7:3:4F:572B


D.

ipv6 address 2001::db8:0000::700:3:400F:572B





A.
  

ipv6 address 2001:db8::700:3:400F:572B



Which action does the router take as it forwards a packet through the network?


A.

The router replaces the original source and destination MAC addresses with the sending
router MAC address as the source and neighbor MAC address as the destination


B.

The router encapsulates the original packet and then includes a tag that identifies the
source router MAC address and transmits it transparently to the destination


C.

The router encapsulates the source and destination IP addresses with the sending
router IP address as the source and the neighbor IP address as the destination


D.

The router replaces the source and destination labels with the sending router interface
label as a source and the next hop router label as a destination





A.
  

The router replaces the original source and destination MAC addresses with the sending
router MAC address as the source and neighbor MAC address as the destination




Page 17 out of 87 Pages
Previous