Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

200-301Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 176

When more than one AP-Manager interface is provisioned on a wireless LAN controller, how is the request handled by the AP?

  • A: The discovery response from the AP to the AP-Manager interface disables the WLAN port.
  • B: The AP join request fails and must be configured statically on the AP-Manager interface.
  • C: The AP-Manager with the fewest number of APs is used by the AP to join.
  • D: The first AP-Manager interface to respond is chosen by the AP.

Question 177

What are two characteristics of an SSID? (Choose two.)

  • A: It uniquely identifies a client in a WLAN.
  • B: It is at most 32 characters long
  • C: It uniquely identifies an access point in a WLAN
  • D: It provides secured access to a WLAN.
  • E: It can be hidden or broadcast in a WLAN.

Question 178

How does MAC learning function on a switch?

  • A: protects against denial of service attacks
  • B: sends frames with unknown destinations to a multicast group
  • C: adds unknown source MAC addresses to the address table
  • D: sends a retransmission request when a new frame is received

Question 179

Which SNMP message type is reliable and precedes an acknowledgment response from the SNMP manager?

  • A: Get
  • B: Inform
  • C: Traps
  • D: Set

Question 180

What is a characteristic of private IPv4 addressing?

  • A: provides unlimited address ranges
  • B: is used when the network has multiple endpoint listeners
  • C: reduces network complexity
  • D: alleviates the shortage of IPv4 addresses

Question 181

Which interface condition is occurring in this output?

Image 1
  • A: collisions
  • B: bad NIC
  • C: duplex mismatch
  • D: broadcast storm

Question 182

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Image 1

Question 183

How does frame switching function on a switch?

  • A: floods unknown destinations to all ports except the receiving port
  • B: buffers and forwards frames with less than 5 CRCs
  • C: forwards frames to a neighbor port using CDP
  • D: sends frames with unknown destinations to a multicast group

Question 184

Which interface is used to send traffic to the destination network?

Image 1
  • A: F0/9
  • B: F0/16
  • C: F0/7
  • D: F0/24

Question 185

What is a characteristic of encryption in wireless networks?

  • A: intercepts data threats before they attack a network
  • B: uses policies to prevent unauthorized users
  • C: must include a combination of letters and numbers
  • D: encodes and decodes data for authorized users

Question 186

What is represented by the word "firewall" within this JSON schema?

Image 1
  • A: value
  • B: key
  • C: object
  • D: array

Question 187

When a switch receives a frame for a known destination MAC address, how is the frame handled?

  • A: flooded to all ports except the one from which it originated
  • B: forwarded to the first available port
  • C: sent to the port identified for the known MAC address
  • D: broadcast to all ports

Question 188

DRAG DROP

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Image 1

Question 189

DRAG DROP

Drag and drop the IPv6 address from the left onto the type on the right.

Image 1

Question 190

Image 1

Refer to the exhibit. Which switch becomes the root bridge?

  • A: SW 3 - Bridge Priority - 45056 - mac-address 02:f8:c4:07:b7:69
  • B: SW 2 - Bridge Priority - 49152 - mac-address 0d:d6 43:23:ac:87
  • C: SW 4 - Bridge Priority - 49152 - mac-address 03:be 04:5e:64:58
  • D: SW 1 - Bridge Priority - 45056 - mac-address 09:e6:35:f4:38:29

Question 191

What is a reason why a company would choose to use network automation in an enterprise?

  • A: Provide data services faster.
  • B: Enable network segmentation.
  • C: Mitigate spanning-tree loop avoidance.
  • D: Implement granular QoS.

Question 192

Image 1

Refer to the exhibit. A packet sourced from 172.16.32.254 is destined for 172.16.32.8. What is the subnet mask of the preferred destination route?

  • A: 255.255.224.0
  • B: 255.255.255.0
  • C: 255.255.255.192
  • D: 255.255.255.252

Question 193

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices

• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked the lab closes and cannot be reopened

Topology

Image 1

Tasks

R1 has been pre-configured with all the necessary commands. All physical cabling is in place and verified. Connectivity from PC1, PC3, and the Server must be established to the switches, and each port must only allow one VLAN.

  1. Configure the VLAN connecting to the switch port for PC3 with the name "SALES"
  2. Configure the switch port connecting to Server1
  3. Configure the switch port connecting to PC3
  4. Ensure R1 discovers SW-1 via the Cisco proprietary neighbor discovery protocol and all other devices on the network are unable to discover SW-1

Question 194

Image 1

Refer to the exhibit. The IPv6 address for the LAN segment on router R1 must be configured using the EUI-64 format. When configured which Ipv6 address Is produced by the router?

  • A: 2001:db8:1006:1968:4564:877F:FE99:1
  • B: 2001:db8:1006:1968:1119:BEFF:FE67:1
  • C: 2001:db8:1006:1968:1130:ABFF:FECC:1
  • D: 2001:db8:1006:1968:12D8:BAFE:FF01:1

Question 195

Image 1

Refer to the exhibit. Users at a branch office are experiencing application performance issues, poor VoIP audio quality, and slow downloads. What is the cause of the issues?

  • A: QoS queuing
  • B: interface configuration
  • C: broadcast storm
  • D: overutilization

Question 196

SIMULATION

Guidelines

This is a lab item in which tasks will be performed on virtual devices:

• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked the lab closes and cannot be reopened

Topology

Image 1

Tasks

All physical cabling is in place. Routers R3 and R4 are fully configured and inaccessible. Configure static routes for various connectivity to the ISP and the LAN that resides on R4.

  1. Configure a route on R1 to ensure that R1 prefers R2 when traffic is destined to the server only.
  2. Configure a default route on R2 to the ISP
  3. Configure a route on R1 to ensure that R1 will use R2 for the R4 LAN if the link fails between R3 and R4
  4. Configure a route on R1 to ensure that R1 prefers R3 when traffic is destined to the R4 LAN at 10.0.41.0/24

Question 197

An engineer needs to configure an access point to forward all client traffic through a wireless controller. Which mode must be enabled to accomplish this task?

  • A: local
  • B: monitor
  • C: autonomous
  • D: rogue detector

Question 198

DRAG DROP -
Drag and drop the IPv6 address details from the left onto the corresponding types on the right.
Select and Place:

Image 1

Question 199

An Ethernet frame arrived at switch interface G0/1, but the destination MAC address is missing from the MAC address table. How does the switch process the frame?

  • A: It sends an ARP request to attempt to locate the destination
  • B: It updates the destination to FFFF.FFFF.FFFF.
  • C: It drops the frame and notifies the sending host.
  • D: It floods the frame out of the remaining switch interfaces.

Question 200

In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?

  • A: when the subnet must be available only within an organization
  • B: when the subnet does not need to be routable
  • C: when the addresses on the subnet must be equivalent to private IPv4 addresses
  • D: when the subnet must be routable over the internet
Page 8 of 55 • Questions 176-200 of 1369

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!