Cisco (200-301) Exam Questions And Answers page 5
Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two.)
The designated port is FastEthernet 2/1
The spanning-tree mode is PVST+
This is a root bridge
The spanning-tree mode is Rapid PVST+
Network Fundamentals
IP Connectivity
What is the best description of an API?
Single Choice
Which option best describes an API?
a contract that describes how various components communicate and exchange data with each other
an architectural style (versus a protocol) for designing applications
a stateless client-server model
request a certain type of data by specifying the URL path that models the data
Automation and Programmability
Which layer in the OSI model do FTP and SMTP operate at?
Single Choice
File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) work at which layer in the Open Systems Interconnection (OSI) model?
the Session layer
the Presentation layer
the Application layer
the Network layer
IP Connectivity
IP Services
What are the tasks performed by the OSPF Hello protocol?
Multiple Choice
The OSPF Hello protocol performs which of the following tasks? (Choose two.)
It provides dynamic neighbor discovery.
It detects unreachable neighbors in 90 second intervals.
It maintains neighbor relationships.
It negotiates correctness parameters between neighboring interfaces.
It uses timers to elect the router with the fastest links as the designated router.
It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.
IP Connectivity
Security Fundamentals
Which of the following represents the correct method of assigning an IP address and default gateway to a switch?
Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Switch(config-if)# default-gateway 10.0.0.254
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Switch(config-if)# default-gateway 10.0.0.254
Switch(config)# ip default-gateway 10.0.0.254
Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Switch(config)# ip address 10.0.0.1 255.0.0.0
Switch(config)# default-gateway 10.0.0.254
Switch(config)# default-gateway 10.0.0.254
Switch(config)# ip address 10.0.0.1 255.0.0.0
Switch(config)# interface vlan1
Switch(config)# ip default-gateway 10.0.0.254
Switch(config)# interface vlan1
Switch(config)# ip default-gateway 10.0.0.254
IP Connectivity
Security Fundamentals
Which of the following is NOT an advantage of static routes over dynamic routing protocols?
Routing protocol overhead is not generated by the router.
Bandwidth is not consumed by route advertisements between network devices.
Static routes are easier to configure and troubleshoot than dynamic routing protocols.
Static route configuration is more fault tolerant than dynamic routing protocols.
IP Connectivity
IP Services
Refer to the exhibit. What action establishes the OSPF neighbor relationship without forming an adjacency?
modify hello interval
modify process ID
modify priority
modify network type
Network Access
IP Connectivity
You have a Telnet session established with a switch from a router. You would like to maintain that connection while you return to the session with the router, and then easily return to the switch session after connecting to the router.
What command should you use?
What command should you use?
resume
suspend
Network Access
Automation and Programmability
Which type of Category 5 unshielded twisted-pair (UTP) cable is used to work as a trunk between two switches?
RJ-45 straight-through
RJ-41 crossover
RJ-11 straight-through
RJ-45 crossover
Network Access
IP Connectivity
What is the purpose of a remote access VPN?
Single Choice
What is a function of a remote access VPN?
establishes a secure tunnel between two branch sites
uses cryptographic tunneling to protect the privacy of data for multiple users simultaneously
used exclusively when a user is connected to a company s internal network
allows the users to access company internal network resources through a secure tunnel
Network Access
Security Fundamentals
Comments