Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

200-301Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 251

Image 1

Refer to the exhibit. A network engineer must configure the WLC to allow only DHCP and DNS packets for User1 and User2. Which configuration must be used?

  • A: Enable Web Authentication for 802.1X standard in the Layer 2 Security configuration
  • B: Enable Fallback Policy with MAC filtering under the Layer 3 Security configuration
  • C: Enable Web policy and Authentication in the Layer 3 Security configuration.
  • D: Enable Web Authentication under the AAA Server configuration on the WLAN.

Question 252

Which connection type is used when an engineer connects to an AP without a configured IP address or dial-up number to manage the device?

  • A: AUX
  • B: Ethernet
  • C: VIY
  • D: console

Question 253

What is a function of a firewall on an enterprise network?

  • A: It allows and denies ingress and egress traffic.
  • B: It serves as a default gateway to hosts on the internet.
  • C: It processes traffic based on stateless inspection.
  • D: It acts as the intermediary device between the enterprise and its ISP.

Question 254

What is a difference between an IPv6 multicast address and an IPv6 anycast address?

  • A: An IPv6 multicast address uses the prefix 2002::/15 and forwards to one destination, and an IPv6 anycast address uses the prefix ff00:/8 and forwards to any destination in a group.
  • B: A packet sent to an IPv6 multicast address is delivered to one or more destinations at once, but a packet sent to an IPv6 anycast address is routed to the closest interface with that address.
  • C: IPV6 multicast addresses are used to transition from IPv4 to IPv6, and IPv6 anycast addresses are used for address aggregation in an IPv6-only environment.
  • D: An IPV6 multicast address is assigned to numerous interfaces within a subnet, but an IPv6 anycast address is used for a predefined group of nodes in an all-IPv6 routers group.

Question 255

Which syslog message logging level displays interface line protocol up/down events?

  • A: informational
  • B: alerts
  • C: debugging
  • D: notifications

Question 256

Which device protects an internal network from the Internet?

  • A: router
  • B: firewall
  • C: access point
  • D: Layer 2 switch

Question 257

Which encryption mode is used when a packet is sent from a site-to-site VPN connection where the source and destination IP address portion of a packet is unencrypted?

  • A: PPTP
  • B: Secure Shell
  • C: Transport
  • D: PPPoE

Question 258

What is a reason why an administrator would choose to implement an automated network management approach?

  • A: Enable "box by box" configuration and deployment.
  • B: Decipher simple password policies.
  • C: Reduce inconsistencies in the network configuration.
  • D: Increase recurrent management costs.

Question 259

Which protocol uses the SSL?

  • A: SSH
  • B: HTTPS
  • C: HTTP
  • D: Telnet

Question 260

Image 1

Refer to the exhibit. The router R1 is in the process of being configured. Routers R2 and R3 are configured correctly for the new environment. Which two commands must be configured on R1 for PC1 to communicate to all PCs on the 10.10.10.0/24 network? (Choose two.)

  • A: ip route 10.10.10.0 255.255.255.0 192.168.2.3 ip route 10.10.10.10 255.255.255.255 192.168.2.2
  • B: ip route 10.10.10.0 255.255.255.0 192.168.2.2 ip route 10.10.2.2 255.255.255.255 10.10.10.10
  • C: ip route 10.10.10.0 255.255.255.0 192.168.2.3 ip route 10.10.10.8 255.255.255.252 g0/0
  • D: ip route 10.10.10.0 255.255.255.248 192.168.2.2 ip route 10.10.2.8 255.255.255.252 g0/1

Question 261

Image 1

Refer to the exhibit. A packet sourced from 172.18.33.2 is destined for 172.18.32.38. Where does the router forward the packet?

  • A: 10.1.1.1
  • B: 10.1.1.3
  • C: Loopback0
  • D: GigabitEthernet0/0

Question 262

Image 1

Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:

• Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.
• Wireless clients on this WLAN must be able to apply VLAN settings on the returned RADIUS attributes.

Which two actions meet these requirements? (Choose two.)

  • A: Enable the Client Band Select option.
  • B: Enable the Coverage Hole Detection option.
  • C: Enable the Allow AAA Override option.
  • D: Set the MFP Client Protection option to Required.
  • E: Enable the Aironet IE option

Question 263

Which type of protocol is VRRP?

  • A: allows two or more routers to act as a default gateway
  • B: uses Cisco-proprietary First Hop Redundancy Protocol
  • C: uses a destination IP address 224.0.0.102 for router-to-router communication
  • D: uses dynamic IP address assignment

Question 264

Image 1

Refer to the exhibit. The switch cat9k-acc-1 connects users to the campus LAN. Printing services are inaccessible through the network. Which interface issue is causing the connectivity problems?

  • A: A bad checksum is causing Ethernet frames to drop.
  • B: Excessive collisions are causing dropped frames.
  • C: A large number of broadcast packets are resulting in a port reset.
  • D: The interface output queue cannot process the Ethernet frames.

Question 265

Which standard is required when more than one distribution system port and only one IP address are configured for a Cisco WLC?

  • A: 802.3ad
  • B: 802.1q
  • C: 802.1d
  • D: 802.1af

Question 266

Which capability does TFTP provide?

  • A: loads configuration files on systems without data storage devices
  • B: provides authentication for data communications over a private data network
  • C: provides encryption mechanisms for file transfer across a WAN
  • D: provides secure file access within the LAN

Question 267

Which action protects a network from VLAN hopping attacks?

  • A: Implement port security on internet-facing VLANs.
  • B: Change the native VLAN to an unused VLAN ID.
  • C: Enable dynamic ARP inspection.
  • D: Configure an ACL to prevent traffic from changing VLANs.

Question 268

What should a network administrator consider when deciding to implement automation?

  • A: Automated systems may have difficulty expanding network changes at scale.
  • B: Network automation typically is limited to the configuration and management of virtual devices within a network.
  • C: Network automation typically increases enterprise management operating costs.
  • D: Manual changes frequently lead to configuration errors and inconsistencies.

Question 269

Why is UDP more suitable than TCP for applications that require low latency such as VoIP?

  • A: UDP reliably guarantees delivery of all packets: TCP drops packets under heavy load
  • B: UDP uses sequencing data for packets to arrive in order TCP offers the capability to receive packets in random order
  • C: TCP uses congestion control for efficient packet delivery: UDP uses flow control mechanisms for the delivery of packets
  • D: TCP sends an acknowledgement for every packet received: UDP operates without acknowledgments

Question 270

Company has decided to require multifactor authentication for all systems. Which set of parameters meets the requirement?

  • A: personal 10-digit PIN and RSA certificate
  • B: complex password and personal 10-digit PIN
  • C: password of 8 to 15 characters and personal 12-digit PIN
  • D: fingerprint scanning and facial recognition

Question 271

How does IPsec provide secure networking for applications within an organization?

  • A: It takes advantage of FTP to secure file transfers between nodes on the network.
  • B: It provides GRE tunnels to transmit traffic securely between network nodes.
  • C: It enables sets of security associations between peers.
  • D: It leverages TFTP providing secure file transfers among peers on the network.

Question 272

What is a characteristic of frame switching?

  • A: populates the ARP table with the egress port
  • B: drops received MAC addresses not listed in the address table
  • C: stores and forwards frames in a buffer and uses error checking
  • D: rewrites the source and destination MAC address

Question 273

What is represented by the word "R20" within this JSON schema?

Image 1
  • A: value
  • B: array
  • C: object
  • D: key

Question 274

Image 1

Refer to the exhibit. Which switch becomes the root bridge?

  • A: SW3 - Bridge Priority - 28672 - mac-address 00:10:a1:51:57:51
  • B: SW2 - Bridge Priority - 28672 - mac-address 00:10:a1:82:03:94
  • C: SW1 - Bridge Priority - 12288 - mac-address 00:10:a1:95:2b:77
  • D: SW4 - Bridge Priority - 12288 - mac-address 00:10:a1:03:42:e8

That’s the end of your free questions

You’ve reached the preview limit for 200-301

Consider upgrading to gain full access!

Page 11 of 55 • Questions 251-275 of 1369

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!