ExamTopics - 200 301 - v2024 09 02 - 1340 1384

Download as pdf or txt
Download as pdf or txt
You are on page 1of 51

- Expert Verified, Online, Free.

Get PDF for Cisco 200-301 Exam


Including Answers & Discussions

Download PDF - $49.99

 Custom View Settings

Question #1340 Topic 1

An administrator is configuring a Cisco Catalyst switch so that it will accept management connections only from hosts in the 203.0.113.0/24

network. Other traffic passing through the switch must transit without interruption. Which two configurations must the engineer apply to the

router? (Choose two.)

A. interface range vlan 1 - 4094

ip access-group Management out

B. line vty 0 15

access-class Management in

C. ip access-list standard Management

permit 203.0.113.0 0.0.0.255

D. ip access-list standard Management

permit 203.0.113.0 255.255.255.0

E. ip access-list extended Management

permit tcp any range 22 23 203.0.113.0 0.0.0.255

Correct Answer: BC

Community vote distribution


BC (100%)
Question #1341 Topic 1

Refer to the exhibit. PC1 tries to ping PC3 for the first time and sends out an ARP to S1. Which action is taken by S1?

A. It is flooded out every port except G0/0. Most Voted

B. It drops the frame.

C. It forwards it out G0/3 only.

D. It forwards it out interface G0/2 only.

Correct Answer: A

Community vote distribution


A (71%) C (29%)
Question #1342 Topic 1

Which interface condition is occurring in this output?

A. duplex mismatch

B. high throughput

C. bad NIC

D. queueing

Correct Answer: A

Community vote distribution


A (100%)
Question #1343 Topic 1

Refer to the exhibit. Which set of commands must be applied to the two switches to configure an LACP Layer 2 EtherChannel?

A. SW1(config)#interface range f0/13 -14

SW1(config-if-range)#channel-group 1 mode auto

SW2(config)#interface range f0/13 -14

SW2(config-if-range)#channel-group 1 mode passive

B. SW1(config)#interface range f0/13 -14

SW1(config-if-range)#channel-group 1 mode desirable

SW2(config)#interface range f0/13 -14

SW2(config-if-range)#channel-group 1 mode passive

C. SW1(config)#interface range f0/13 -14

SW1(config-if-range)#channel-group 1 mode on

SW2(config)#interface range f0/13 -14

SW2(config-if-range)#channel-group 1 mode passive

D. SW1(config)#interface range f0/13 -14

SW1(config-if-range)#channel-group 1 mode active

SW2(config)#interface range f0/13 -14

SW2(config--range)#channel-group 1 mode passive

Correct Answer: D

Community vote distribution


D (100%)
Question #1344 Topic 1

SIMULATION

R1 has been pre-configured with all the necessary commands. All physical cabling is in place and verified. Connectivity to the end devices must be

configured.

1. Configure SW-1 switch port 0/1 to carry traffic for the Cisco IP phone and PC

2. Configure SW-2 E0/1 to carry traffic for PC2

3. Configure VLAN 10 with the name “Engineering” on SW-1

4. Configure the link between SW-1 and SW-2 to use the vendor neutral neighbor discovery protocol

5. Configure the link on SW-1 to R1 so that it does not allow the Cisco neighbor discovery protocol to pass
Correct Answer:

Question #1345 Topic 1

How is noise defined in Wi-Fi?

A. measured difference between the desired Wi-Fi signal and an interfering Wi-Fi signal

B. any interference that is not Wi-Fi traffic that degrades the desired signal

C. signals from other Wi-Fi networks that interfere with the local signal

D. ratio of signal-to-noise rating supplied by the wireless device

Correct Answer: B

Community vote distribution


B (100%)
Question #1346 Topic 1

Refer to the exhibit. The IPv6 address for the LAN segment on router R2 must be configured using the EUI-64 format. When configured which ipv6

address is produced by the router?

A. 2001:db8:8bb8:8bb1:C081:B8FF:FF4B:1

B. 2001:db8:8bb8:8bb1:C001:8BFE:FF01:1

C. 2001:db8:8bb8:8bb4:6792:43FF:EF87:1

D. 2001:db8:8bb8:8bb1:C801:B8FF:FEB8:1

Correct Answer: D

Community vote distribution


D (100%)

Question #1347 Topic 1

What is a characteristics of frame switching?

A. floods unknown destinations to all ports except the receiving port

B. inspects and drops frames from unknown destinations

C. forwards frames to a neighbor port using CDP

D. protects against denial of service attacks

Correct Answer: A

Community vote distribution


A (100%)
Question #1348 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked the lab closes and cannot be reopened.

Topology

Tasks

All physical cabling is in place and verified. Connectivity for the Switches on ports E0/1, E0/2, and E0/3 must be configured and available for voice

and data capabilities.

1. Configure Sw1 and Sw2 with both VLANS, naming them according to the VLAN Name provided in the topology.

2. Configure the E0/1, E0/2, and E0/3 ports on both switches for both VLANS and ensure that Cisco IP phones and PCs pass traffic.

3. Configure Sw1 and Sw2 to allow neighbor discovery via the vendor-neutral protocol on e0/0.
Correct Answer:

Question #1349 Topic 1

What are two reasons to implement DHCP in a network? (Choose two.)

A. manually control and configure IP addresses on network devices

B. control the length of time an IP address is used by a network device Most Voted

C. reduce administration time in managing IP address ranges for clients Most Voted

D. dynamic control over the best path to reach an IP address

E. access a website by name instead of by IP address

Correct Answer: BC

Community vote distribution


BC (100%)
Question #1350 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab doses and cannot be reopened.

Topology

Tasks

SW-3 and SW-4 are preconfigured with all necessary commands. All physical cabling is in place and verified. All connectivity must be operational.

1. Configure both SW-1 and SW-2 switch ports e0/0 and e0/1 for 802.1q trunking with only VLANS 1, 12, and 22 permitted.
2. Configure SW-1 port e0/2 for 802.1q trunking and include only VLANS 12 and 22.

3. Configure both SW-1 and SW-2 switch ports e0/0 and e0/1 for link aggregation using the industry standard protocol. All ports must be

configured so that they immediately negotiate the link.

Correct Answer:
Question #1351 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab doses and cannot be reopened.

Topology

Tasks

Refer to the topology. All physical cabling is in place. Configure a local user account, a Named ACL (NACL) and security.

1. Configure a local account on Sw101 with telnet access only on virtual ports 0-4. Use the following information:
o Username: netops

o Password: ipsec4all

o Algorithm: "Vigenere"

o Privilege level: Exec mode

2. Configure and apply a single NACL on Sw103 using the following:

o name: ENT_ACL

o Restrict only PC1 on VLAN 10 from pinging PC2

o Allow only PC1 on VLAN 10 to telnet to R1 (172.16.30.2)

o Prevent all other devices from telnetting from VLAN 10

o Allow all other network traffic from VLAN 10

3. Configure security on interface Ethernet 0/0 of Sw102:

o Set the maximum number of secure MAC addresses to two

o Ensure that the port discards the packet, counts the number of violations and sends a syslog message

o Allow secure mac addresses to be learned dynamically

Correct Answer:
Question #1352 Topic 1

Refer to the exhibit. The IPv6 address for the LAN segment on router R2 must be configured using the EUI-64 format. When configured which ipv6

address is produced by the router?

A. 2001:db8:9bb6:6bb9:C801:B6FF:FEB4:1 Most Voted

B. 2001:db8:9bb6:6bb9:C001:6BFE:FF01:1

C. 2001:db8:9bb6:6bb9:C081:B6FF:FF4B:1

D. 2001:db8:9bb6:6bb9:4736:931F:FE37:1

Correct Answer: C

Community vote distribution


A (100%)
Question #1353 Topic 1

Refer to the exhibit. What is the metric for the route to the 192.168.10.33 host?

A. 84

B. 110

C. 192

D. 193

Correct Answer: D

Community vote distribution


D (100%)
Question #1354 Topic 1

Refer to the exhibit. The IPv6 address for the LAN segment on router R1 must be configured using the EUI-64 format. When configured which ipv6

address is produced by the router?

A. 2001:db8:8bb3:8bb1:C001:8BFE:FF31:1

B. 2001:db8:8bb3:8bb1:C081:B8FF:FF3B:1

C. 2001:db8:8bb3:8bb1:C801:B8FF:FEB3:1 Most Voted

D. 2001:db8:8bb3:8bb4:7397:79FF:EF41:1

Correct Answer: A

Community vote distribution


C (100%)
Question #1355 Topic 1

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command

must be entered to configure the router?

A. ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

B. ip route 10.0.2.0 255.255.255.240 10.0.0.6 91

C. ip route 10.0.2.0 255.255.255.248 null0 93

D. ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

Correct Answer: D

Community vote distribution


D (100%)
Question #1356 Topic 1

Refer to the exhibit. The LACP EtherChannel is configured, and the last change is to modify the interfaces on SwitchA to respond to packets

received, but not to initiate negotiation. The interface range gigabitethernet0/0/0-15 command is entered. What must be configured next?

A. SwitchA(config-if-range)#channel-group 1 mode auto

B. SwitchA(config-if-range)#channel-group 1 mode active

C. SwitchA(config-if-range)#channel-group 1 mode desirable

D. SwitchA(config-if-range)#channel-group 1 mode passive

Correct Answer: D

Community vote distribution


D (100%)
Question #1357 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

IP connectivity between the three routers is established. IP Services must be configured in the order presented to complete the implementation.

1. Configure dynamic one-to-one address mapping on R2 using a standard list named XLATE, which allows all traffic to translate the source

address of R3 to a pool named test_pool using the 10.10.10.0/24 network for traffic sent from R3 to R1. Avoid using an NVI configuration. Verify

reachability by sending a ping to 192.168.100.1 from R3.

2. Configure R3 to dynamically receive an IP address on Ethernet0/2 from the DHCP server.

3. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address 10.1.2.1.

4. Configure SSH access from R1 to R3, while excluding access via other remote connection protocols using the user root and password s3cret on

router R3 using RSA. Verify connectivity from router R1 to R3 using a destination address assigned to interface E0/2 on R3.
Correct Answer:
Question #1358 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

All physical cabling is in place and verified. Connectivity for PC1, PC2 and PC3 must be established to the switches. Each port connecting to the

PCs must be configured as an end-user port and only allow the designated VLAN.

1. Configure VLAN 99 on all three switches and label it exactly as FINANCIAL

2. Configure the switch ports connecting to PC1, PC2 and PC3

3. Cisco's neighbor discovery protocol has been disabled on SW-1 and must be re-enabled

4. PC1 must not be able to discover SW-1


Correct Answer:
Question #1359 Topic 1

Refer to the exhibit. Network services must be enabled on interface Gi1/0/34. Which configuration meets the needs for this implementation?

A. interface Gi1/0/34

switchport mode trunk

switchport

trunk allowed native vlan 400

switchport

voice vlan 4041

B. interface Gi1/0/34

switchport mode trunk

switchport

trunk allowed vlan 400, 4041

switchport voice vlan 4041

C. interface Gi1/0/34

switchport mode access

switchport

access vlan 400

switchport voice vlan 4041

D. interface Gi1/0/34

switchport mode access

switchport

access vlan 4041

switchport voice vlan 400

Correct Answer: C
Question #1360 Topic 1

Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?

A. It will always prefer the static route over dynamic routes and choose the route

S 100.100.0.0/16 [1/0] via 192.168.4.1.

B. It will choose the route with the lowest metric,

R 100.0.0.0/8 [120/2] via 192.168.3.1, 00:00:13, Ethernet0/3.

C. It will choose the route with the highest metric,

D 100.100.100.0/24 [90/435200] via 192.168.2.1, 00:00:13, Ethernet0/2.

D. It will choose the route with the longest match,

O 100.100.100.100/32 [110/21] via 192.168.1.1, 00:05:57, Ethernet0/1.

Correct Answer: D

Community vote distribution


D (100%)
Question #1361 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices:

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary pre-configurations have been applied.

• Do not remove any existing configurations from the devices, only those necessary to make the appropriate changes required to fulfill the listed

tasks.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

Reference Topology Diagram and table. Configure IPv4 and IPv6 between the two routers.

Task 1:

• Configure R1 with the first usable host IP address in the IPv4 network.

• Configure R2 with the last usable host IP address in the IPv4 network.

• Verify connectivity using ping.

Task 2:
• Do not assign the subnet router anycast address to either router.

• Configure R1 with the first usable host IP address in the IPv6 network.

• Configure R2 with the last usable host IP address in the IPv6 network.

• Verify connectivity using ping.

Correct Answer:
Question #1362 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary pre-configurations have been applied.

• Do not remove any existing configurations from the devices, only those necessary to make the appropriate changes required to fulfill the listed

tasks.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-
Task 1

• Configure a host route on R5 for the destination of 10.200.220.6.

• Configure a static default route on R1 preferring the path through R3 towards R6.

• From R5, use traceroute and ping to verify the path towards and reachability of R6.

Task 2

• Configure a floating static default route on R1, preferring the path through R2 towards R6 if the link to R3 should fail.

• Configure the administrative distance for 225.

• Configure a static route on R2 to forward the return traffic towards 10.100.110.0/25.

• After shutting interface e0/1 on R1, use traceroute and ping from R5 to verify path towards and reachability of R6.

Correct Answer:

Question #1363 Topic 1

Which two statements distinguish authentication from accounting? (Choose two.)

A. Only authentication supports user-activity audits.

B. Only authentication challenges users for their credentials and returns a response.

C. Only authentication validates "who you are."

D. Only authentication records the duration of a user's connection.

E. Only authentication provides supporting information for billing users.


Question #1364 Topic 1

Refer to the exhibit. Which switch in this configuration will be elected as the root bridge?

SW1: 0C:E4:82:33:62:23 -

SW2: 0C:0E:16:11:05:97 -

SW3: 0C:E0:16:1A:3C:9D -

SW4: 0C:00:18:A1:B3:19

A. SW1

B. SW2

C. SW3

D. SW4

Correct Answer: B
Question #1365 Topic 1

Refer to the exhibit. Which switch in this configuration will be elected as the root bridge?

A. SW1: 0C:4A:82.:65:62:72

B. SW2: 0C:0A:A8:1A:3C:9D

C. SW3: 0C:0A:18:81:B3:19

D. SW4: 0C:0A:05:22:05:97

Correct Answer: D
Question #1366 Topic 1

Refer to the exhibit. All routers in the network are configured correctly, and the expected routes are being exchanged among the routers. Which set

of routes are learned from neighbors and installed on router 2?

A. 10.129.9.0/23

10.139.2.0/30

10.2.191.0/30

10.129.9.0/25

B. 10.129.9.0/23

10.40.1.0/30

10.2.191.0/30

10.129.9.0/25

C. 10.40.1.0/30

10.139.2.0/30

10.2.191.0/30

10.129.9.0/25

D. 10.129.9.0/23

10.139.2.0/30

10.129.9.0/25

10.22.1.0/24

Correct Answer: A

Community vote distribution


A (100%)
Question #1367 Topic 1

Refer to the exhibit. Router-WAN1 has a new connection via Gi0/0 to the ISP. Users running the web applications indicate that connectivity is

unstable to the internet. What is causing the interface issue?

A. The receive buffer is full due to a broadcast storm.

B. Frames are discarded due to a half-duplex negotiation.

C. Broadcast packets are rejected because ARP timeout is enabled.

D. Small frames less than 64 bytes are rejected due to size.

Correct Answer: B

Question #1368 Topic 1

A network engineer is configuring a new router at a branch office. The router is connected to an upstream WAN network that allows the branch to

communicate with the head office. The central time server with IP address 172.24.54.8 is located behind a firewall at the head office. Which

command must the engineer configure so that the software clock of the new router synchronizes with the time server?

A. ntp server 172.24.54.8

B. ntp master 172.24.54.8

C. ntp peer 172.24.54.8

D. ntp client 172.24.54.8

Correct Answer: A
Question #1369 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary pre-configurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

Refer to the topology. All physical cabling is in place. Configure local user account, configure a Named ACL (NACL), and Dynamic Arp Inspection.

1. Configure a local account on Sw3 with telnet access only on virtual ports 0-4. Use the following information:

o Username: tech12

o Password: load1key

o Algorithm type: md5


o Privilege level: Exec mode

2. Configure and apply a NACL on R1 to control network traffic towards ISP:

o Name: ISP_ACL

o Restrict RFC 1918 class A and B addresses

o Allow all other addresses

3. A DHCP IP Pool is preconfigured on R1 for VLAN 5, and DHCP Snooping is configured on Sw2. Configure on Sw2:

o Dynamic Arp Inspection for VLAN 5

o Enable validation of the ARP packet destination MAC address

o Enable validation of the ARP packet source MAC address

o Enable validation of the ARP Packet IP address

Correct Answer:

Question #1370 Topic 1

Refer to the exhibit. Which type of JSON data is represented?

A. number

B. array

C. object

D. string

Correct Answer: B
Question #1371 Topic 1

What is the RFC 4627 default encoding for JSON text?

A. UCS-2

B. GB18030

C. UTF-8

D. Hex

Correct Answer: C

Question #1372 Topic 1

Refer to the exhibit. A network engineer is configuring a WLAN to use a WPA2 PSK and allow only specific clients to join. Which two actions must

be taken to complete the process? (Choose two.)

A. Enable the OSEN Policy option.

B. Enable the 802.1X option for Authentication Key Management.

C. Enable the WPA2 Policy option.

D. Enable the MAC Filtering option.

E. Enable the CCKM option for Authentication Key Management.

Correct Answer: CD
Question #1373 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary pre-configurations have been applied.

• Do not remove any existing configurations from the devices, only those necessary to make the appropriate changes required to fulfill the listed

tasks.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

Task 1

Configure trunks between Sw1 and Sw2 on ports E0/0 and E0/1 using the IEEE standard frame tagging method.
• Add VLAN 99 as untagged on the trunk ports.

• Only extend VLAN 110 and the untagged VLAN across the trunk.

• Verify that PC1 is capable of pinging PC2.

Task 2

On Sw1 and Sw2, use IEEE 802.3ad link aggregation.

• Combine E0/0 and E0/1 into a single logical link while leaving the trunk configurations intact.

• Assign number 20 to the link.

• Both links must negotiate aggregation.

Correct Answer:
Question #1374 Topic 1

Refer to the exhibit. Which configuration parameter is preventing host С from reaching the internet?

A. IP address assignment

B. IP network mask

C. default gateway

D. automatic DNS

Correct Answer: C
Question #1375 Topic 1

Refer to the exhibit. Which switch in this configuration will be elected as the root bridge?

SW1 0С:0A:05:22:05:97 -

SW2 0С:4A:82:07:57:58 -

SW3 0C:0A:A8:1A:3C:9D -

SW4 0С:0A:18:A1:B3:19

A. SW1

B. SW2

C. SW3

D. SW4

Correct Answer: A
Question #1376 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab doses and cannot be reopened.

Topology

Tasks

All physical cabling is in place and verified. Connectivity for the Switches on ports E0/1, E0/2, and E0/3 must be configured and available for voice

and data capabilities.

1. Configure Sw1 and Sw2 with the VLAN naming as indicated.

2. Assign the VLANs to the appropriate interfaces and set a non-trunking, non-tagged, single-VLAN for each interface according to the topology.

3. Configure both switches to use the L2 vendor-neutral discovery protocol to broadcast device information, including the native VLAN across the

e0/0 interfaces.
Correct Answer:
Question #1377 Topic 1

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab doses and cannot be reopened.

Topology

Tasks

Refer to the topology. All physical cabling is in place. Routers 2 and 3 are inaccessible. Configure OSPF routing for the network and ensure R1 has

joined Area 0 without using network statements.

Task 1

• Configure OSPF on R1 with a process ID and router- ID only as follows:

o use process ID 33

o use EO/1 IP as the router ID


Task 2

• Configure R1 to establish neighbor adjacencies with R2 and R3. The network statement under the OSPF process must not be used.

• Configure R1 to always become the DR for Area 0

Correct Answer:
Question #1378 Topic 1

Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz.

Which two tasks must the engineer perform to complete the process? (Choose two.)

A. Select the 802.1x option for Auth Key Management

B. Select the AES (CCMP128) option for WPA2 WPA3 Encryption

C. Select the AES option for Auth Key Management

D. Select the PSK option for Auth Key Management

E. Select the WPA Policy option.

Correct Answer: BD

Question #1379 Topic 1

Which Rapid PVST+ port state does a port operate in without receiving BPDUs from neighbors or updating the address database?

A. listening

B. forwarding

C. disabled

D. blocking

Correct Answer: C

Community vote distribution


D (100%)
Question #1380 Topic 1

Which protocol should be used to transfer large files on a company intranet that allows TCP 20 and 21 through the firewall?

A. SMTP

B. REST API

C. TFTP

D. FTP

Correct Answer: D
Question #1381 Topic 1

Refer to the exhibit. What is the cause of poor performance on router R19?

A. excessive collisions

B. excessive CRC errors

C. port oversubscription

D. speed and duplex mismatch

Correct Answer: C
Question #1382 Topic 1

Why is UDP more suitable than TCP for applications that require low latency, such as VoIP?

A. UDP uses sequencing data for packets to arrive in order, and TCP offers the capability to receive packets in random order.

B. TCP uses congestion control for efficient packet delivery, and UDP uses flow control mechanisms for the delivery of packets

C. UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.

D. TCP sends an acknowledgment for every packet that is received, and UDP operates without acknowledgments.

Correct Answer: D
Question #1383 Topic 1

Refer to the exhibit. Which switch in this configuration will be elected as the root bridge?

SW1: 0С:0А:05:22:05:97 -

SW2: 0C:0A:A8:1A:3C:9D -

SW3: 0С:0А:18:81:ВЗ:19 -

SW4: 0С:4А:82:56:35:78

A. SW1

B. SW2

C. SW3

D. SW4

Correct Answer: A
Question #1384 Topic 1

Which alternative to password authentication is implemented to allow enterprise devices to log in to the corporate network?

A. 90-day renewal policies

B. magic links

C. one-time passwords

D. digital certificates

Correct Answer: D

Get IT Certification

Unlock free, top-quality video courses on ExamTopics with a simple


registration. Elevate your learning journey with our expertly curated content.
Register now to access a diverse range of educational resources designed for
your success. Start learning today with ExamTopics!

Start Learning for free

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy