D. Router(config)#ip domain-name cisco.com Router(config)#crypto key generate rsa general-keys modulus 1024 Router(contig)#ip ssh version 2 - Router(config-line)#line vty 0 15 Router(config-line)# transport input all Router(config)#ip ssh logging events
Show Answer
Correct Answer:
A. Router(config)#hostname R15 - R15(config)#ip domain-name cisco.com R15(config)#crypto key generate rsa general-keys modulus 1024 R15(config)#ip ssh version 2 - R15(config-line)#line vty 0 15 - R15(config-line)# transport input ssh
Question 5
Which three describe the reasons large OSPF networks use a hierarchical design? (Choose three.)
A. to speed up convergence
B. to reduce routing overhead
C. to lower costs by replacing routers with distribution layer switches
D. to decrease latency by increasing bandwidth
E. to confine network instability to single areas of the network
F. to reduce the complexity of router configuration
Show Answer
Correct Answer:
A. to speed up convergence
B. to reduce routing overhead
E. to confine network instability to single areas of the network
Question 6
What is a function of TFTP in network operations?
A. transfers IOS images from a server to a router for firmware upgrades
B. transfers a backup configuration file from a server to a switch using a username and password
C. transfers configuration files from a server to a router on a congested link
D. transfers files between file systems on a router
Show Answer
Correct Answer:
A. transfers IOS images from a server to a router for firmware upgrades
Question 7
A network administrator plans an update to the WI-FI networks in multiple branch offices. Each location is configured with an SSID called “Office”. The administrator wants every user who connects to the SSID at any location to have the same access level. What must be set the same on each network to meet the requirement?
A. radio policy
B. profile name
C. NAS-ID configuration
D. security policies
Show Answer
Correct Answer:
D. security policies
Question 8
Which two features introduced in SNMPv2 provide the ability to retrieve large amounts of data in one request and acknowledge a trap using PDUs? (Choose two.)
A. Get
B. GetNext
C. Set
D. GetBulk
E. Inform
Show Answer
Correct Answer:
D. GetBulk
E. Inform
Question 9
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received. Which interface counter increments?
A. runt
B. collision
C. late collision
D. CRC
Show Answer
Correct Answer:
C. late collision
Question 10
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
A. Its modular design allows the implementation of different versions to meet the specific needs of an organization
B. It only supports auto-discovery of network elements in a greenfield deployment
C. It omits support high availability of management functions when operating in cluster mode
D. It abstracts policy from the actual device configuration
Show Answer
Correct Answer:
D. It abstracts policy from the actual device configuration
Question 11
An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration for a Secure Shell access RSA key?
A. crypto key import rsa pem
B. crypto key generate rsa
C. crypto key zeroize rsa
D. crypto key pubkey-chain rsa
Show Answer
Correct Answer:
B. crypto key generate rsa
Question 12
Which HTTP status code is returned after a successful REST API request?
A. 200
B. 301
C. 404
D. 500
Show Answer
Correct Answer:
A. 200
Question 13
Which technology prevents client devices from arbitrarily connecting to the network without state remediation?
A. 802.11n
B. 802.1x
C. MAC Authentication Bypass
D. IP Source Guard
Show Answer
Correct Answer:
B. 802.1x
Question 14
What is the benefit of using FHRP?
A. reduced ARP traffic on the network
B. balancing traffic across multiple gateways in proportion to their loads
C. higher degree of availability
D. reduced management overhead on network routers
Show Answer
Correct Answer:
C. higher degree of availability
Question 15
Which configuration ensures that the switch is always the root for VLAN 750?
A. Switch(config)#spanning-tree vlan 750 priority 38418607
B. Switch(config)#spanning-tree vlan 750 priority 0
C. Switch(config)#spanning-tree vlan 750 root primary
D. Switch(config)#spanning-tree vlan 750 priority 614440
Show Answer
Correct Answer:
B. Switch(config)#spanning-tree vlan 750 priority 0
Question 16
What is a characteristic of a Layer 2 switch?
A. tracks the number of active TCP connections
B. maintains stateful transaction information
C. filters based on a transport layer protocol
D. supports segmentation using tagging protocols
Show Answer
Correct Answer:
D. supports segmentation using tagging protocols
Question 17
What are two reasons to configure PortFast on a switch port attached to an end host? (Choose two.)
A. to block another switch or host from communicating through the port
B. to enable the port to enter the forwarding state immediately when the host boots up
C. to prevent the port from participating in Spanning Tree Protocol operations
D. to protect the operation of the port from topology change processes
E. to limit the number of MAC addresses learned on the port to 1
Show Answer
Correct Answer:
B. to enable the port to enter the forwarding state immediately when the host boots up
D. to protect the operation of the port from topology change processes
Question 18
What is a characteristic of spine-and-leaf architecture?
A. Each link between leaf switches allows for higher bandwidth
B. It provides greater predictability on STP blocked ports
C. It provides variable latency
D. Each device is separated by the same number of hops
Show Answer
Correct Answer:
D. Each device is separated by the same number of hops
Question 19
What is the function of the controller in a software-defined network?
A. forwarding packets
B. multicast replication at the hardware level
C. making routing decisions
D. fragmenting and reassembling packets
Show Answer
Correct Answer:
C. making routing decisions
Question 20
Which protocol is implemented when an organization must verify network performance, troubleshoot issues, and use an agent to communicate between monitoring tools and end devices?
A. FIP
B. NIP
C. NFS
D. SNMP
Show Answer
Correct Answer:
D. SNMP
Aced these? Get the Full Exam
Download the complete 200-301 study bundle with 762+ questions in a single printable PDF.