Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

200-301 Cisco Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

200-301 Cisco exam

Question 1
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network
device? (Choose two.)
· A. Enable NTP authentication.
· B Verify the time zone
· C. Specify the IP address of the NTP server.
· D. Set the NTP server private key.
· E Disable NTP broadcasts.

Answer: AC
Section: IP Services
Explanation:
To configure authentication, perform this task in privileged mode:
Step 1: Configure an authentication key pair for NTP and specify whether the key will be trusted or
untrusted Step 2: Set the IP address of the NTP server and the public key.
Step 3: Enable NTP client mode.
Step 4: Enable NTP authentication.
Step 5: Verify the NTP configuration

Reference:
https ://www cisco com/c/en/us/td/docs/switches/lan/catalvst4000/8-2Qlx/confiauration/auide/ntp html

Question 2
Which two actions influence the EIGRP route selection process? (Choose two.)
· A. The advertised distance is calculated by a downstream neighbor to inform the local router of the
bandwidth on the link.
· B The router calculates the feasible distance of all paths to the destination route
· C. The router must use the advertised distance as the metric for any given route.
· D. The router calculates the best backup path to the destination route and assigns it as the feasible
successor.
· E The router calculates the reported distance by multiplying the delay on the exiting interface by 256.

Answer: BD
Section: IP Connectivity

Explanation:
The reported distance (or advertised distance) is the cost from the neighbor to the destination. It is
calculated from the router advertising the route to the network. For example in the topology below, suppose
router A & B are exchanging their routing tables for the first time Router B says Hey, the best metric (cost)
from me to IOWA is 50 and the metric from you to IOWA is 90 r and advertises it to router A. Router A
considers the first metric (50) as the Advertised distance The second metric (90), which is from NEVADA to
IOWA (through IDAHO), is called the Feasible distance

Question 3
In an SDN architecture, which function of a network node is centralized on a controller?

O A. Creates the IP routing table


O B Discards a message due filtering
O C. Makes a routing decision
O D. Provides protocol access for remote access devices
Answer: C
Section: Security Fundamentals Explanation:
A controller, or SDN controller, centralizes the control of the networking devices. The degree of control,
and the type of control, varies widely. For instance, the controller can perform all control plane functions
(such as making routing decisions) replacing the devices' distributed control plane
Reference: https ://www ciscooress com/articles/article asp?p=2995354&seoNum=2# - text=A
%2Qcontroller%2C%20or%2QSDN%20controller the%20devices,%20distributed
%20control%2Qplane

Question 4
When a client and server are not on the same physical network, which device is used to forward requests and
replies between client and server for DHCP?
O A. DHCPOFFER
O B DHCP relay agent
O C. DHCP server
O D. DHCPDISCOVER

Answer: B

Question 5
Which 802.11 frame type is Association Response?
O A. management
O B protected frame
O C. action
O D. control

Answer: A
Section: Network Fundamentals

There are three main types of 802.11 frames: the Data Frame, the Management Frame and the Control
Frame. Association Response belongs to Management Frame. Association response is sent in response to
an association request.

Reference:
https://en.wikipedia.org/wiki/802.11_Frame_TyDes

Question 6
Why would VRRP be implemented when configuring a new subnet in a multivendor environment?
O A. when a gateway protocol is required that supports more than two Cisco devices for redundancy
O B to interoperate normally with all vendors and provide additional security features for Cisco devices
O C. to ensure that the spanning-tree forwarding path to the gateway is loop-free
O D to enable normal operations to continue after a member failure without requiring a change in a host
ARP cache

Answer: B
Section: IP Connectivity Explanation:
VRRP is the industry standards based FHRP similar to Cisco's HSRP but is supported by multiple vendors

Question 7
Which network allows devices to communicate without the need to access the Internet?
O A. 172 9 0 0/16
O B 172 28 0 0/16
O C. 192 0 0 0/8
O D 209 165 201.0/24
Answer: B
Section: Network Fundamentals Explanation:
This question asks about the private ranges of IPv4 addresses. The private ranges of each class of IPv4 are listed
below:

Class A private IP address ranges from 10 0 0 0 to 10.255.255.255

Class B private IP address ranges from 172.16 0 0 to 172.31.255.255

Class C private IP address ranges from 192.168 0 0 to 192.168.255.255

Only the network 172.28 0.0/16 belongs to the private IP address (of class B).

Question 8
Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
O A. Platinum
O B Bronze
O C. Gold
O D. Silver

Answer: A
Section: Network Access
Explanation:
Cisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice, GoldA/ideo,
Silver/Best Effort (default), and Bronze/Background Reference:
https //www cisco com./c/en/us/td/docs/wireless/controller/74/confÍQuration/Quides/consolidated/b cq74
CONSOLIDATED/b ca74 CONSOLIDATED chapter 01010111 html

Question 9
Which command is used to display the collection of OSPF link states?
O A. show ip ospf link-state
O B show ip ospf Isa database
O C. show ip ospf neighbors
O D. show ip ospf database

Answer: D
Section: IP
Connectivity
Explanation:
The "show ip ospf database" command displays the link states. Here is an example:
Here is the Isa database on R2
R2#show ip ospf database
OSPF Router with ID (2.2.2 2) (Process ID 1)
Router Link States (Area 0)
Link ID ADV Router Age Seq# Checksum Link count2.2.2.2 2.2.2 2 793 0x80000003 0x004F85 210 4.4 4
10.4 4 4 776 0x80000004 0x005643 1111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA
2133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0)
Link ID ADV Router Age Seq# Checksum10 1.1 1 111.111.111.111 794 0x80000001 0x001E8B10.2.2.3
133.133.133.133 812 0x80000001 0x004BA910.4 4.1 111.111.111.111 755 0x80000001 0x007F1610 4 4 3
133.133 133.133 775 0x80000001 0x00C31F

Question 10
Which statements describe the routing protocol OSPF? (Choose three.)
· A. It supports VLSM.
· B It is used to route between autonomous systems.
· C. It confines network instability to one area of the network.
· D. It increases routing overhead on the network.
· E It allows extensive control of routing updates.
· F. It is simpler to configure than RIP v2.

Answer: ACE
Sectrion: IP connectivity
Explanation:
The OSPF protocol is based on link-state technology, which is a departure from the Bellman-Ford vector
based algorithms used in traditional Internet routing protocols such as RIP OSPF has introduced new
concepts such as authentication of routing updates. Variable Length Subnet Masks (VLSM). route
summarization, and so forth.
OSPF uses flooding to exchange link-state updates between routers. Any change in routing information is
flooded to all routers in the network. Areas are introduced to put a boundary on the explosion of link-state
updates Flooding and calculation of the Dijkstra algorithm on a router is limited to changes within an area

Question 11
What is the difference between AAA authentication and authorization?
O A. Authentication identifies and verifies a user who is attempting to access a system, and
authorization controls the tasks the user performs.
OB Authentication controls the system processes a user accesses, and authorization logs the
activities the user initiates.
O C. Authentication verifies a username and password, and authorization handles the communication
between the authentication agent and the user database.
OD Authentication identifies a user who is attempting to access a system, and authorization validates
the user's password.

Answer: A
Section : Security Fundamentals Explanation :
AAA stands for Authentication, Authorization and Accounting.

· Authentication: Specify who you are (usually via login username & password)
· Authorization: Specify what actions you can do, what resource you can access
· Accounting: Monitor what you do, how long you do it (can be used for billing and auditing)

An example of AAA is shown below:

· Authentication: ‘I am a normal user. My username/password is userjom/learnforever'


· Authorization: 'user_tom can access LearnCCNA server via HTTP and FTP"
· Accounting: 'user_tom accessed LearnCCNA server for 2 hours'. This user only uses 'show' commands

Question 12
Which interface mode must be configured to connect the lightweight APs in a centralized architecture?
O A. WLAN dynamic
O B. trunk
O C. access
O D. management

Answer: C
Section: Network Access Explanation:
While the Cisco WLCs always connect to 802.1Q trunks, Cisco lightweight APs do not understand VLAN
tagging and should only be connected to the access ports of the neighbor switch.
This is an example switch port configuration from the Catalyst 3750: interface GigabitEthernet 1/0/22
description Access Port Connection to Cisco Lightweight AP switchport access vlan 5 switchport mode
access no shutdown
Reference: https://www.cisco.eom/c/en/us/suPDort/docs/wireless/4400-series-wireless-lan-controllers/
69719-wlc-lwap-config.html

Question 13

Which command is used to enable LLDP globally on a Cisco IOS ISR?


O A. lldp run
O B lldp enable
O C. lldp transmit
O D. cdp run
O E. cdp enable

Answer: A:
Section: Network Access

Link Layer Discovery Protocol (LLDP) is an industry standard protocol that allows devices to advertise, and
discover connected devices, and their capabilities (same as CDP of Cisco). To enable it on Cisco devices,
we must use this command under global configuration mode:
Sw(config)# lldp run

Question 14
How will Link Aggregation be implemented on a Cisco Wireless LAN Controller?

O A. The EtherChannel must be configured in "mode active'.


O B When enabled, the WLC bandwidth drops to 500 Mbps.
O C. To pass client traffic, two or more ports must be configured.
O D. One functional physical port is needed to pass client traffic

Answer: D
Section: Network Access Reference:
https //www cisco com/c/en/us/td/docs/wireless/controller/8-2/confiQ-Quide/b co82/b co82 chapter
010101011 html

Question 15
Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?
O A. lldp timer
O B lldp tlv-select
O C. lldp reinit
O D. lldp holdtime
Answer: C
Section: Network Access Explanation:
· lldp holdtime seconds: Specify the amount of time a receiving device should hold the information from
your device before discarding it
· lldp reinit delay: Specify the delay time in seconds for LLDP to initialize on an interface
· lldp timer rate: Set the sending frequency of LLDP updates in seconds

Reference:
https://www cisco com/c/en/us/td/docs/switches/lan/catalvst356Q/software/release/12-2 55
se/confiauration/auide/3560 sca/swlldp html

Question 16
Which command enables a router to become a DHCP client?
O A. ip address dhcp
O B ip dhcp client
O C ip helper-address
O D ip dhcp pool
Answer: A
Section: IP Service
Explanation:
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command 'ip
address dhcp". Note: The command 'ip helper-address" enables a router to become a DHCP Relay Agent.

Question 17
In QoS, which prioritization method is appropriate for interactive voice and video?
O A. traffic policing
O B round-robin scheduling
O C low-latency queuing
O D. expedited forwarding

Answer: C
Section: IP Service
Explanation:
Low Latency Queuing (LLQ) is the preferred queuing policy for VoIP audio. Given the stringent delay/jitter
sensitive requirements of voice and video and the need to synchronize audio and video for CUVA, priority
(LLQ) queuing is the recommended for all video traffic as well. Note that, for video, priority bandwidth is
generally fudged up by 20% to account for the overhead

Question 18
In a CDP environment, what happens when the CDP interface on an adjacent device is configured without
an IP address?
O A. CDP becomes inoperable on that neighbor
O B CDP uses the IP address of another interface for that neighbor
O C. CDP operates normally, but it cannot provide IP address information for that neighbor
O D. CDP operates normally, but it cannot provide any information forthat neighbor

Answer: C
Section: Network Access
Although CDP is a Layer 2 protocol, but we can check the neighbor IP address with the "show cdp neighbor
detail' command If the neighbor does not has an IP address then CDP still operates without any problem.
But the IP address ofthat neighbor is not provided

Question 19
When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of
characters that is required in ASCII format?
O A. 6
O B. 8
O C. 12
O D. 18

Answer: B

Question 20
Which feature or protocol determines whether the QOS on the network is sufficient to support IP services?
O A. LLDP
O B CDP
O C. IP SLA
O D. EEM

Answer: C
Section: IP Services
Explanation:
IP SLA allows an IT professional to collect information about network performance in real time. Therefore, it
helps determine whether the QoS on the network is sufficient for IP services or not
Cisco IOS Embedded Event Manager (EEM) is a powerful and flexible subsystem that provides real-time
network event detection and onboard automation. It gives you the ability to adapt the behavior of your
network devices to align with your business needs.

You might also like