0% found this document useful (0 votes)
2 views

Answer: Provide One Year Free Update!

Uploaded by

Bitbit Bit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Answer: Provide One Year Free Update!

Uploaded by

Bitbit Bit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

QUESTION

& ANSWER
HIGHER QUALITY, BETTER SERVICE

Provide One Year Free Update!


https://www.passquestion.com
The safer , easier way to help you pass any IT exams.

Exam : 200-601

Title : Managing Industrial


Networking for
Manufacturing with Cisco
Technologies

Version : DEMO

1/2
The safer , easier way to help you pass any IT exams.

1.Which selection is a reason why IGMP snooping should be configured on a switched network?
A. IGMP snooping populates the snooping table with the results of DHCP requests and can be used by
Dynamic ARP Inspection to block IP spoofing attacks at Layer-2.
B. IGMP snooping verifies the source IP address of every IPv4 packet to ensure that it hasn't been
originated from a port different than its return path.
C. IGMP snooping is used to filter ping requests and results to avoid overflowing the MAC address table
of the switch.
D. IGMP snooping allows a Layer-2 switch to limit the transmission of multicast frames to only the ports
that have members of the relevant IGMP group.
Answer: D

2.What is the reason that ProfiNET frames are discarded by default on Catalyst switches?
A. ProfiNET uses a nonstandard Ethernet frame format
B. The frames have an 802.1q tag with VLAN ID equal to 0 (zero)
C. Catalyst switches do not support ProfiNET traffic
D. A ProfiNET VLAN must be configured and enabled on a Catalyst switch
Answer: B

3.What security component can be deployed to increase the defense in depth and specifically can be
positioned against 'man-in-the-middle' attack?
A. Deploy 802.1AE
B. Deploy 802.1X
C. Deploy 802.1Q
D. Deploy 802.1AX
Answer: A

4.Given the CIA triad elements, which ensures first that the data is encrypted and secure, second that the
data is trustworthy, and third that the data is accessible by those who need it?
A. CIA
B. ICA
C. ACI
D. CAI
Answer: A

5.To ensure ProfiNET Layer 2 Class-of-Service markings from ProfiNET devices are trusted by the switch,
which command must be entered on the interface attached to the device?
A. switch(config-if)#mls qos trust cos
B. switch(config-if)#qos trust cos
C. switch(config-if)#profinet cos trust
D. switch(config-if)#trust qos cos
Answer: A

2/2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy