Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

200-301Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 101

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Image 1

Question 102

Image 1

Refer to the exhibit. Each router must be configured with the last usable IP address in the subnet. Which configuration fulfills this requirement?

  • A: R7# interface FastEthernet1/0 ip address 10.88.31.127 255.255.255.192 R8# interface FastEthernet0/0 ip address 10.19.63.95 255.255.255.240 R9# interface FastEthernet1/1 ip address 10.23.98.159 255.255.255.224
  • B: R7# interface FastEthernet1/0 ip address 10.88.31.126 255.255.255.240 R8# interface FastEthernet0/0 ip address 10.19.63.94 255.255.255.192 R9# interface FastEthernet1/1 ip address 10.23.98.158 255.255.255.248
  • C: R7# interface FastEthernet1/0 ip address 10.88.31.127 255.255.255.240 R8# interface FastEthernet0/0 ip address 10.19.63.95 255.255.255.192 R9# interface FastEthernet1/1 ip address 10.23.98.159 255.255.255.248
  • D: R7# interface FastEthernet1/0 ip address 10.88.31.126 255.255.255.192 R8# interface FastEthernet0/0 ip address 10.19.63.94 255.255.255.240 R9# interface FastEthernet1/1 ip address 10.23.98.158 255.255.255.224

Question 103

DRAG DROP

Drag and drop the IPv6 address from the left onto the type on the right.

Image 1

Question 104

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Image 1

Question 105

DRAG DROP

Drag and drop the IPv6 address from the left onto the type on the right.

Image 1

Question 106

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Image 1

Question 107

What is a characteristic of private IPv4 addressing?

  • A: is used without allocation from a regional internet authority
  • B: is used when traffic on the subnet must traverse a site-to-site VPN to an outside organization
  • C: reduces the forwarding table on network routers
  • D: provides unlimited address ranges

Question 108

Which interface condition is occurring in this output?

Image 1
  • A: bad NIC
  • B: high throughput
  • C: queueing
  • D: broadcast storm

Question 109

What is a characteristic of private IPv4 addressing?

  • A: is used when the ISP requires the new subnet to be advertised to the internet for web services
  • B: provides unlimited address ranges
  • C: is used when the network has multiple endpoint listeners
  • D: alleviates the shortage of IPv4 addresses

Question 110

What is a characteristic of private IPv4 addressing?

  • A: is used when traffic on the subnet must traverse a site-to-site VPN to an outside organization
  • B: allows endpoints to communicate across public network boundaries
  • C: is used on hosts that communicate only with other internal hosts
  • D: reduces network complexity

Question 111

What is a characteristic of private IPv4 addressing?

  • A: traverses the internet when an outbound ACL is applied
  • B: alleviates the shortage of IPv4 addresses
  • C: is used when the ISP requires the new subnet to be advertised to the internet for web services
  • D: enables secure connectivity over the internet

Question 112

Which interface condition is occurring in this output?

Image 1
  • A: broadcast storm
  • B: duplex mismatch
  • C: high throughput
  • D: queueing

Question 113

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two.)

  • A: 2000::/3
  • B: 2002::5
  • C: FC00::/7
  • D: FF02::1
  • E: FF02::2

Question 114

How do TCP and UDP fit into a query-responsible model?

  • A: TCP avoids using sequencing and UDP avoids using acknowledgments
  • B: TCP establishes a connection prior to sending data, and UDP sends immediately
  • C: TCP encourages out-of-order packet delivery, and UDP prevents re-ordering
  • D: TCP uses error detection for packets, and UDP uses error recovery.

Question 115

What is a characteristic of private IPv4 addressing?

  • A: is used when the ISP requires the new subnet to be advertised to the internet for web services
  • B: allows multiple companies to use the same addresses without conflict
  • C: is used on the external interface of a firewall
  • D: allows endpoints to communicate across public network boundaries

Question 116

DRAG DROP

Drag and drop the IPv6 address from the left onto the type on the right.

Image 1

Question 117

DRAG DROP

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Image 1

Question 118

DRAG DROP

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Image 1

Question 119

What is a characteristic of an SSID in wireless networks?

  • A: identifies an access point on a WLAN
  • B: uses the password to connect to an access point
  • C: uses policies to prevent unauthorized users
  • D: uses a case-sensitive text string

Question 120

What is a characteristic of private IPv4 addressing?

  • A: reduces network complexity
  • B: is used on hosts that communicate only with other internal hosts
  • C: simplifies the addressing in the network
  • D: reduces network maintenance costs

Question 121

What is a characteristic of encryption in wireless networks?

  • A: identifies an access point on a WLAN
  • B: uses the password to connect to an access point
  • C: uses integrity checks to identify forgery attacks in the frame
  • D: uses authentication protocols to secure a network

Question 122

What is a characteristic of private IPv4 addressing?

  • A: simplifies the addressing in the network
  • B: complies with PCI regulations
  • C: reduces the forwarding table on network routers
  • D: is used on hosts that communicate only with other internal hosts

Question 123

What is a characteristic of an SSID in wireless networks?

  • A: eliminates network piggybacking
  • B: prompts a user for a login ID
  • C: broadcasts a beacon signal to announce its presence by default
  • D: must include a combination of letters and numbers

Question 124

What is a characteristic of encryption in wireless networks?

  • A: provides increased protection against spyware
  • B: prompts a user for a login ID
  • C: uses ciphers to detect and prevent zero-day network attacks
  • D: prevents the interception of data as it transits a network

Question 125

What provides centralized control of authentication and roaming in an enterprise network?

  • A: a lightweight access point
  • B: a wireless LAN controller
  • C: a firewall
  • D: a LAN switch
Page 5 of 55 • Questions 101-125 of 1369

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!