Cisco (200-301) Exam Questions And Answers page 56
Which Cisco IOS interface configuration command is used to configure the private VLAN edge ports on a Cisco Catalyst 2950 switch?
switchport port-security
switchport port-vlan-edge
switchport port-security violation
Network Access
Security Fundamentals
Refer to the exhibit. Which VLAN ID is associated with the default VLAN in the given environment?
VLAN 1
VLAN 5
VLAN 10
VLAN 20
Network Fundamentals
IP Connectivity
What will happen if you configure the logging trap debug command on a router?
It causes the router to send messages with lower severity levels to the syslog server
It causes the router to send all messages with the severity levels Warning, Error, Critical, and Emergency to the syslog server
It causes the router to send all messages to the syslog server
It causes the router to stop sending all messages to the syslog server
IP Services
Security Fundamentals
Which function does the range of private IPv4 addresses perform?
allows multiple companies to each use the same addresses without conflicts
provides a direct connection for hosts from outside of the enterprise network
ensures that NAT is not required to reach the Internet with private range addressing
enables secure communications to the Internet for all external hosts
IP Connectivity
Security Fundamentals
Which Enhanced Interior Gateway Routing Protocol (EIGRP) packet is NOT sent reliably over the network?
Update
Query
Reply
Acknowledgement
IP Connectivity
IP Services
A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet?
ip route 10.10.1.0 255.255.255.240 10.10.255.1
ip route 10.10.1.20 255.255.255.252 10.10.255.1
ip route 10.10.1.16 255.255.255.252 10.10.255.1
ip route 10.10.1.20 255.255.255.254 10.10.255.1
Network Fundamentals
IP Connectivity
You wish to configure Secure Shell (SSH) support on your router so that incoming VTY connections are secure.
Which of the following commands must be configured? (Choose all that apply.)
Which of the following commands must be configured? (Choose all that apply.)
ip domain-name
transport input ssh
ip access-group
crypto key generate rsa
service config
Network Access
Security Fundamentals
When the auth keyword is used in the snmp-server host command, which of the following must be configured with an authentication mechanism?
the interface
the host
the user
the group
Network Access
Security Fundamentals
Which protocol is used in Software Defined Access (SDA) to provide a tunnel between two edge nodes in different fabrics?
Generic Router Encapsulation (GRE)
Virtual Local Area Network (VLAN)
Virtual Extensible LAN (VXLAN)
Point-to-Point Protocol (PPP)
IP Connectivity
Automation and Programmability
Which of the following is NOT a benefit of cloud computing to cloud users?
On-demand self-service resources provisioning
Centralized appearance of resources
Highly available, horizontally scaled applications
Cost reduction from standardization and automation
Security Fundamentals
Automation and Programmability
Comments