This page was exported from Free Exams Dumps Materials [ http://exams.dumpsmaterials.com ] Export date:Sat Dec 21 15:41:14 2024 / +0000 GMT ___________________________________________________ Title: [Jun-2023] Valid Way To Pass Cisco Exam Dumps with 200-301 Exam Study Guide [Q357-Q379] --------------------------------------------------- [Jun-2023] Valid Way To Pass Cisco Exam Dumps with 200-301 Exam Study Guide All 200-301 Dumps and Cisco Certified Network Associate Exam Training Courses Help candidates to study and pass the Exams hassle-free! Q357. What are two benefits of using VTP in a switching environment? (Choose two.)  It allows switches to read frame tags.  It allows ports to be assigned to VLANs automatically.  It maintains VLAN consistency across a switched network.  It allows frames from multiple VLANs to use a single interface.  It allows VLAN information to be automatically propagated throughout the switching environment. Q358. All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.3. Configure the connection between the switches using access ports.4. Configure Ethernet0/1 on SW1 using data and voice VLANs.5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only. Answer as below configuration:on sw1enableconf tvlan 100name Computevlan 200name Telephonyint e0/1switchport voice vlan 200switchport access vlan 100int e0/0switchport mode accessdo wron sw2Vlan 99Name AvailableInt e0/1Switchport access vlan 99do wrQ359. A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link.The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?  The OSPF area is not configured properly.  The priority on R1 should be set higher.  The cost on R1 should be set higher.  The hello and dead timers are not configured properly.  A backup designated router needs to be added to the network.  The OSPF process ID numbers must match. Section: IP ConnectivityExplanation:In OSPF, the hello and dead intervals must match and here we can see the hello interval is set to 5 on R1 and10 on R2. The dead interval is also set to 20 on R1 but it is 40 on R2.Q360. Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)  Enable NTP authentication.  Disable NTP broadcasts  Set the NTP server private key  Specify the IP address of the NTP server  Verify the time zone. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/ntp.html To configure authentication, perform this task in privileged mode: Step 1: Configure an authentication key pair for NTP and specify whether the key will be trusted or untrusted. Step 2: Set the IP address of the NTP server and the public key. Step 3: Enable NTP client mode. Step 4: Enable NTP authentication. Step 5: Verify the NTP configuration.Q361. Which three statements about Syslog utilization are true? (Choose three.)  Utilizing Syslog improves network performance  The Syslog server automatically notifies the network administrator of network problems  A Syslog server provides the storage space necessary to store log files without using router disk space  There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.  Enabling Syslog on a router automatically enables NTP for accurate time stamping  A Syslog server helps in aggregation of logs and alerts. Q362. Which type of address is the public IP address of a NAT device?  outside global  outsdwde local  inside global  insride local  outside public  inside public ExplanationNAT use four types of addresses:* Inside local address – The IP address assigned to a host on the inside network. The address is usually not an IP address assigned by the Internet Network Information Center (InterNIC) or service provider.This address is likely to be an RFC 1918 private address.* Inside global address – A legitimate IP address assigned by the InterNIC or service provider that represents one or more inside local IP addresses to the outside world.* Outside local address – The IP address of an outside host as it is known to the hosts on the inside network.* Outside global address – The IP address assigned to a host on the outside network. The owner of the host assigns this address.Q363. What causes a port to be placed in the err-disabled state?  nothing plugged into the port  link flapping  shutdown command issued on the port  latency Q364. R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?  IS-IS  RIP  Internal EIGRP  OSPF ExplanationWith the same route (prefix), the router will choose the routing protocol with lowest Administrative Distance (AD) to install into the routing table. The AD of Internal EIGRP (90) is lowest so it would be chosen. The table below lists the ADs of popular routing protocols.CCNA 200-301 Dumps Full Questions – Exam Study Guide & Free 203Note: The AD of IS-IS is 115. The “EIGRP” in the table above is “Internal EIGRP”. The AD of “External EIGRP” is 170. An EIGRP external route is a route that was redistributed into EIGRP.Q365. Which type of wireless encryption is used for WPA2 in preshared key mode?  TKIP with RC4  RC4  AES-128  AES-256 We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the encryption is AES-256, not AES-128.https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134-wpa2-config.htmlQ366. Drag drop the descriptions from the left onto the correct configuration-management technologies on the right.The focus of Ansible is to be streamlined and fast, and to require no node agent installation.Thus, Ansible performs all functions over SSH. Ansible is built on Python, in contrast to the Ruby foundation of Puppet and Chef.TCP port 10002 is the command port. It may be configured in the Chef Push Jobs configuration file .This port allows Chef Push Jobs clients to communicate with the Chef Push Jobs server.Puppet is an open-source configuration management solution, which is built with Ruby and offers custom Domain Specific Language (DSL) and Embedded Ruby (ERB) templates to create custom Puppet language files, offering a declarative-paradigm programming approach.A Puppet piece of code is called a manifest, and is a file with .pp extension. Q367. How will Link Aggregation be implemented on a Cisco Wireless LAN Controller?  To pass client traffic two or more ports must be configured.  The EtherChannel must be configured in “mode active”  When enabled the WLC bandwidth drops to 500 Mbps  One functional physical port is needed to pass client traffic Link aggregation (LAG) is a partial implementation of the 802.3ad port aggregation standard. It bundles all of the controller’s distribution system ports into a single 802.3ad port channel.Restriction for Link aggregation:– LAG requires the EtherChannel to be configured for `mode on’ on both the controller and the Catalyst switch -> Answer B is not correct.– If the recommended load-balancing method cannot be configured on the Catalyst switch, then configure the LAG connection as a single member link or disable LAG on the controller -> Answer A is not correct while answer D is correct.Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-5/configuration- guide/b_cg75/ b_cg75_chapter_0100010.htmlQ368. Refer to the exhibit.After configuring a new static route on the CPE. the engineer entered this series of commands to verify that the new configuration is operating normally When is the static default route installed into the routing table?  when 203 0 113.1 is no longer reachable as a next hop  when the default route learned over external BGP becomes invalid  when a route to 203.0 113 1 is learned via BGP  when the default route over external BGP changes its next hop Q369. What is the function of northbound API?  It upgrades software and restores files.  It relies on global provisioning and configuration.  It supports distributed processing for configuration.  It provides a path between an SDN controller and network applications. Q370. Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. Q371. Refer to the exhibit. How should the configuration be updated to allow PC1 and PC2 access to the Internet?  Modify the configured number of the second access list.  Add either the ip nat {inside|outside} command under both interfaces.  Remove the overload keyword from the ip nat inside source command.  Change the ip nat inside source command to use interface GigabitEthernet0/0. Q372. Which command you enter on a switch to display the ip address associated with connected devices?  Show cdp neighbors detail  Show cdp neighbor  Show cdp interface  Show cdp traffic Q373. Refer to the exhibit.To which device does Router1 send packets that are destined to host 10.10.13.165?  Router2  Router3  Router4  Router5 Q374. A network administrator is asked to configure VLANS 2, 3, and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused ports remaining. Which action should be taken for the unused ports?  configure port in the native VLAN  configure ports in a black hole VLAN  configure in a nondefault native VLAN  configure ports as access ports Q375. A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?  crypto key generate rsa modulus 1024  ip ssh authentication-retries 2  password password  ip domain-name domain https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/how-to-setup-network-switch.htmlQ376. While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two.)  The ACL is empty  A matching permit statement is too broadly defined  The packets fail to match any permit statement  A matching deny statement is too high in the access list  A matching permit statement is too high in the access list Q377. Refer to the exhibit.An engineer configured NAT translations and has verified that the configuration is correct.Which IP address is the source IP?  10.4.4.4  10.4.4.5  172.23.103.10  172.23.104.4 Q378. Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. Q379. Refer to exhibitWhich route type is configured to reach the internet?  host route  default route  floating static route  network route  Loading … Get Latest [Jun-2023] Conduct effective penetration tests using DumpsMaterials 200-301: https://www.dumpsmaterials.com/200-301-real-torrent.html --------------------------------------------------- Images: https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-06-19 10:30:00 Post date GMT: 2023-06-19 10:30:00 Post modified date: 2023-06-19 10:30:00 Post modified date GMT: 2023-06-19 10:30:00