Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

200-301Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 151

Image 1

Refer to the exhibit. An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

  • A: Configure the ip helper-address 172.16.2.2 command under interface Gi0/0.
  • B: Configure the ip dhcp relay information command under interface Gi0/1
  • C: Configure the ip address dhcp command under interface Gi0/0
  • D: Configure the ip dhcp smart-relay command globally on the router.

Question 152

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked the lab closes and cannot be reopened

Topology

Image 1

Tasks

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

  1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.
  2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.
  3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.
  4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.
Image 2

Question 153

DRAG DROP

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Image 1

Question 154

Image 1

Refer to the exhibit. Which switch becomes the root bridge?

  • A: SW4 - Bridge Priority - 8192 - mac-address 05:4a:f7:06:33:22
  • B: SW2 - Bridge Priority - 8192 - mac-address 05:52:bd:0c:be:69
  • C: SW3 - Bridge Priority - 61440 - mac-address 06:15:2e:7f:20:58
  • D: SW4 - Bridge Priority - 61440 - mac-address 0a:e5:03:a6:6e:37

Question 155

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Image 1

Question 156

What is a characteristic of encryption in wireless networks?

  • A: provides increased protection against spyware
  • B: uses policies to prevent unauthorized users
  • C: converts electrical current to radio waves
  • D: prevents the interception of data as it transits a network

Question 157

Which interface is used to send traffic to the destination network?

Image 1
  • A: G0/9
  • B: G0/12
  • C: G0/19
  • D: G0/1

Question 158

What is a requirement for nonoverlapping Wi-Fi channels?

  • A: different security settings
  • B: discontinuous frequency ranges
  • C: unique SSIDs
  • D: different transmission speeds

Question 159

A network administrator is evaluating network security in the aftermath of an attempted ARP spoofing attack. If Port-channel1 is the uplink interface of the access-layer switch toward the distribution-layer switch, which two configurations must the administrator configure on the access-layer switch to provide adequate protection? (Choose two.)

  • A: ip dhcp snooping vlan 1-4094 ! interface Port-channel1 switchport protected switchport port-security maximum 1
  • B: ip dhcp snooping vlan 1-4094 ip dhcp snooping ! interface Port-channel1 ip dhcp snooping trust
  • C: ip dhcp snooping ! interface Port-channel1 switchport port-security maximum 1 switchport port-security
  • D: ip arp inspection trust ! interface Port-channel1 switchport port-security maximum 4094 switchport port-security ip verify source mac-check
  • E: ip arp inspection vlan 1-4094 ! interface Port-channel1 ip arp inspection trust

Question 160

Which type of hypervisor operates without an underlying OS to host virtual machines?

  • A: Type 1
  • B: Type 2
  • C: Type 3
  • D: Type 12

Question 161

DRAG DROP

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Image 1

Question 162

Which interface is used to send traffic to the destination network?

Image 1
  • A: G0/10
  • B: G0/24
  • C: G0/5
  • D: G0/1

Question 163

What is a characteristic of private IPv4 addressing?

  • A: enables secure connectivity over the internet
  • B: complies with PCI regulations
  • C: provides an added level of protection against internet threats
  • D: is used on internal hosts that stream data solely to external resources

Question 164

DRAG DROP

Drag and drop the traffic types from the left onto the QoS delivery mechanisms on the right.

Image 1

Question 165

What is a characteristic of private IPv4 addressing?

  • A: is used when the ISP requires the new subnet to be advertised to the internet for web services
  • B: provides unlimited address ranges
  • C: is used when the network has multiple endpoint listeners
  • D: is used on hosts that communicate only with other internal hosts

Question 166

Image 1

Refer to the exhibit. The engineer configured the VLANs on the new AccSw2 switch. A router-on-a-stick is connected to both switches. How must the ports be configured on AccSw2 to establish full connectivity between the two switches and for Server1?

  • A: interface GigabitEthernet1/1 switchport access vlan 11 ! interface GigabitEthernet1/24 switchport mode trunk switchport trunk allowed vlan 10,11
  • B: interface GigabitEthernet1/3 switchport mode access switchport access vlan 10 ! interface GigabitEthernet1/24 switchport mode trunk switchport trunk allowed vlan 2,10
  • C: interface GigabitEthernet1/3 switchport mode access switchport access vlan 10 ! interface GigabitEthernet1/24 switchport mode trunk
  • D: interface GigabitEthernet1/1 switchport mode access switchport access vlan 11 ! interface GigabitEthernet1/24 switchport mode trunk

Question 167

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

  • A: interface vlan 2000 ipv6 address ff00:0000:aaaa::1234:2343/64
  • B: interface vlan 2000 ipv6 address fd00::1234:2343/64
  • C: interface vlan 2000 ipv6 address fe80:0000:aaaa::1234:2343/64
  • D: interface vlan 2000 ipv6 address fc00:0000:aaaa::a15d:1234:2343:8aca/64

Question 168

How does frame switching function on a switch?

  • A: floods unknown destinations to all ports except the receiving port
  • B: modifies frames that contain a known source VLAN
  • C: rewrites the source and destination MAC address
  • D: buffers and forwards frames with less than 5 CRCs

Question 169

Image 1

Refer to the exhibit. Which address will the client contact to renew their IP address when the current lease expires?

  • A: 192.168.25.103
  • B: 192.168.25.1
  • C: 192.168.25.100
  • D: 192.168.25.254

Question 170

Image 1

Refer to the exhibit. Which switch becomes the root bridge?

  • A: SW4 - Bridge Priority - 8192 - mac-address 05:0f:e8:ed:b2:98
  • B: SW2 - Bridge Priority - 8192 - mac-address 00:ac:f0:9b:dc:72
  • C: SW3 - Bridge Priority - 16384 - mac-address 0e:6c:e4:b1:8a:57
  • D: SW4 - Bridge Priority - 16384 - mac-address 0a:45:22:26:29:77

Question 171

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Image 1

Question 172

How is a configuration change made to a wireless AP in lightweight mode?

  • A: SSH connection to the management IP of the AP
  • B: CAPWAP/LWAPP connection via the parent WLC
  • C: EoIP connection via the parent WLC
  • D: HTTPS connection directly to the out-of-band address of the AP

Question 173

DRAG DROP

Drag and drop the HTTP verbs from the left onto the API operations on the right.

Image 1

Question 174

Which plane is centralized in software-defined networking?

  • A: application
  • B: services
  • C: data
  • D: control

Question 175

What is a service that is provided by a wireless controller?

  • A: It mitigates threats from the internet.
  • B: It manages interference in a dense network.
  • C: It provides Layer 3 routing between wired and wireless devices.
  • D: It issues IP addresses to wired devices.
Page 7 of 55 • Questions 151-175 of 1369

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!