Cisco (200-301) Exam Questions And Answers page 52
You are the network administrator for your company. The Chief Technical Officer of the company is looking for a routing solution that satisfies the following requirements:
• No routing protocol advertisements
• Increased network security
• No routing protocol overhead
• Not concerned about fault tolerance
Which of the following routing techniques matches the criteria?
• No routing protocol advertisements
• Increased network security
• No routing protocol overhead
• Not concerned about fault tolerance
Which of the following routing techniques matches the criteria?
Hybrid routing
Static routing
Public routing
Network Access
Security Fundamentals
How does a Cisco Unified Wireless Network respond to Wi-Fi channel overlap?
It allows the administrator to assign the channels on a per-device or per-interface basis.
It segregates devices from different manufactures onto different channels.
It analyzes client load and background noise and dynamically assigns a channel.
It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points.
Network Access
IP Connectivity
Refer to the exhibit. Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?
router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1
router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2
router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2
IP Connectivity
Security Fundamentals
What command produced the following as a part of its output?
1 14.0.0.2 4 msec 4 msec 4 msec
2 63.0.0.3 20 msec 16 msec 16 msec
3 33.0.0.4 16 msec * 16 msec
1 14.0.0.2 4 msec 4 msec 4 msec
2 63.0.0.3 20 msec 16 msec 16 msec
3 33.0.0.4 16 msec * 16 msec
Ping
Traceroute
Tracert
Extended ping
IP Connectivity
IP Services
Limitations of service password-encryption command?
Multiple Choice
Which two are the limitations of the service password-encryption command? (Choose two.)
It uses the MD5 algorithm for password hashing.
It uses the Vigenere cipher algorithm.
An observer cannot read the password when looking at the administrator's screen.
The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers.
Security Fundamentals
Automation and Programmability
Which plane is centralized by an SDN controller?
management-plane
data-plane
services-plane
control-plane
IP Connectivity
Automation and Programmability
Which two goals reasons to implement private IPv4 addressing on your network? (Choose two.)
Reduce the risk of a network security breach
Comply with PCI regulations
Conserve IPv4 address
Reduce the size of the forwarding table on network routers
Comply with local law
IP Connectivity
Security Fundamentals
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?
R1#Aonfig t
R1(config)#ip routing
R1(config)#ip route default-route 192.168.1.1
R1(config)#ip routing
R1(config)#ip route default-route 192.168.1.1
R1#Aonfig t
R1(config)#ip routing
R1(config)#ip route 192.168.1.1 0.0.0.0 0.0.0.0
R1(config)#ip routing
R1(config)#ip route 192.168.1.1 0.0.0.0 0.0.0.0
R1#Aonfig t
R1(config)#ip routing
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1
R1(config)#ip routing
R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1
R1#Aonfig t
R1(config)#ip routing
R1(config)#ip default-gateway 192.168.1.1
R1(config)#ip routing
R1(config)#ip default-gateway 192.168.1.1
Network Access
Security Fundamentals
What is a difference between local AP mode and FlexConnect AP mode?
Local AP mode creates two CAPWAP tunnels per AP to the WLC
Local AP mode causes the AP to behave as if it were an autonomous AP
FlexConnect AP mode fails to function if the AP loses connectivity with the WLC
FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured
Network Access
Security Fundamentals
Drag and drop the networking parameters from the left on to the correct values on the right.
Network Fundamentals
IP Connectivity
Comments