Exam Logo

Cisco (200-301) Exam Questions And Answers page 34

Refer to the exhibit. Which feature is enabled by this configuration?

Network Access IP Connectivity
If a notice-level message is sent to a syslog server, which event has occurred?
Network Access Security Fundamentals
An email user has been lured into clicking a link in an email sent by their company s security organization. The webpage that opens reports that it was safe, but the link may have contained malicious code.

Which type of security program is in place?
IP Services Security Fundamentals
Refer to the exhibit. Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?

IP Connectivity Security Fundamentals
Drag and drop the characteristics of networking from the left onto the correct networking types on the right.

Network Fundamentals Network Access
You recently implemented SNMPv3 to increase the security of your network management system. A partial output of the show run command displays the following output that relates to SNMP:



snmp-server group TECHS v3 noauth read TECHS write TECHS

Which of the following statements is true of this configuration?
Network Access Security Fundamentals
Which of the following is a frame tagging method for identifying Virtual LAN (VLAN) memberships over trunk links?
Network Access IP Connectivity
You have executed the following commands on a switch:

Switch64(config)# interface range gigabitethernet2/0/1 -2
Switch64(config-if-range)# switchport mode access
Switch64(config-if-range)# switchport access vlan 10
Switch64(config-if-range)# channel-group 5 mode auto

In which of the following situations will Switch64 create an Etherchannel?
Network Access Automation and Programmability
Assume that all ports on Layer 2 devices are in the same Virtual LAN (VLAN). View the given network topology. (Click the Exhibit(s) button.)


Which network device should be placed at the highlighted box to produce a total of two broadcast domains and seven collision domains in the network?
Network Fundamentals Network Access
Which of the following statements are true with regard to the network shown in the exhibit? (Click the Exhibit(s) button.)

Network Fundamentals Network Access