200-301 Exam Questions

Total 864 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

   

desc about topic

Which state does the switch port move to when PortFast is enabled?


A.

learning


B.

forwarding


C.

blocking


D.

listening





B.
  

forwarding



In which situation is private IPv4 addressing appropriate for a new subnet on the network of
an organization?


A.

There is limited unique address space, and traffic on the new subnet will stay local
within the organization.


B.

The network has multiple endpoint listeners, and it is desired to limit the number of
broadcasts.


C.

Traffic on the subnet must traverse a site-to-site VPN to an outside organization.


D.

The ISP requires the new subnet to be advertised to the internet for web services.





A.
  

There is limited unique address space, and traffic on the new subnet will stay local
within the organization.



Aside from discarding, which two states does the switch port transition through while using
RSTP (802.1w)? (Choose two)


A.

listening


B.

blocking


C.

forwarding


D.

learning


E.

speaking





C.
  

forwarding



D.
  

learning



How will Link Aggregation be Implemented on a Cisco Wireless LAN Controller?


A.

One functional physical port is needed to pass client traffic


B.

The EthernetChannel must be configured in "mode active".


C.

When enabled, the WLC bandwidth drops to 500 Mbps.


D.

To pass client traffic, two or more ports must be configured.





A.
  

One functional physical port is needed to pass client traffic



Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-5/configurationguide/
b_cg75/b_cg75_chapter_0100010.html

Which feature on the Cisco Wireless LAN Controller when enabled restricts management
access from specific networks?


A.

CPU ACL


B.

TACACS


C.

Flex ACL


D.

RADIUS





A.
  

CPU ACL



Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlansecurity/
71978-acl-wlc.html

Refer to the exhibit.

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF
Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the
routing table of R4?


A.

the path through R1, because the OSPF administrative distance is 110


B.

the path through R2. because the IBGP administrative distance is 200


C.

the path through R2 because the EBGP administrative distance is 20


D.

the path through R3. because the EIGRP administrative distance is lower than OSPF
and BGP





C.
  

the path through R2 because the EBGP administrative distance is 20



Refer to the exhibit

Which switch becomes the root bridge?


A.

S1


B.

S2


C.

S3


D.

S4





B.
  

S2



What are two functions of a Layer 2 switch? (Choose two)


A.

acts as a central point for association and authentication servers


B.

selects the best route between networks on a WAN


C.

moves packets within a VLAN


D.

moves packets between different VLANs


E.

makes forwarding decisions based on the MAC address of a packet





A.
  

acts as a central point for association and authentication servers



E.
  

makes forwarding decisions based on the MAC address of a packet



What are two benefits of controller-based networking compared to traditional networking?


A.

controller-based increases network bandwidth usage, while traditional lightens the load
on the network.


B.

controller-based inflates software costs, while traditional decreases individual licensing
costs


C.

Controller-based reduces network configuration complexity, while traditional increases
the potential for errors


D.

Controller-based provides centralization of key IT functions. While traditional requires
distributes management function


E.

controller-based allows for fewer network failure, while traditional increases failure rates





C.
  

Controller-based reduces network configuration complexity, while traditional increases
the potential for errors



D.
  

Controller-based provides centralization of key IT functions. While traditional requires
distributes management function



Explanation:
Cisco DNA Center Device Management
3. Monitor the cloud for software update
5. Uses CLI templates to apply a consistent configuration to multiple devices at an
individual location
6. Uses NetFlow to analyse potential security threats throughout the network and
take appropriate action on that traffic
Traditional device management
2. Manages device configuration on a per-device basis
4. Security is managed near the perimeter of the network with firewalls, VPNs, and
IPS
Implements changes via an SSH terminal

What must be considered when using 802:11 ta?


A.

It is compatible with 802 lib- and 802 11-compliant wireless devices


B.

It is used in place of 802 11b/g when many nonoverlapping channels are required


C.

It is susceptible to interference from 2 4 GHz devices such as microwave ovens.


D.

It is chosen over 802 11b/g when a lower-cost solution is necessary





A.
  

It is compatible with 802 lib- and 802 11-compliant wireless devices




Page 3 out of 87 Pages
Previous