Get Full Version of the Exam
http://www.EnsurePass.com/200-301.html
Question No.11
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
A. |
enable secret |
B. |
service password-encryption |
C. |
username Cisco password encrypt |
D. |
enable password |
Correct Answer: B
Question No.12
What are two characteristics of a controller-based network? (Choose two)
A. |
The administrator can make configuration updates from the CLI |
B. |
It uses northbound and southbound APIs to communicate between architectural layers |
C. |
It moves the control plane to a central point. |
D. |
It decentralizes the control plane, which allows each device to make its own forwarding decisions |
E. |
It uses Telnet to report system issues. |
Correct Answer: AC
Question No.13
Refer to the exhibit. What is the effect of this configuration?
A. |
All ARP packets are dropped by the switch |
B. |
Egress traffic is passed only if the destination is a DHCP server. |
C. |
All ingress and egress traffic is dropped because the interface is untrusted |
D. |
The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings. |
Correct Answer: D
Question No.14
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.
A. |
dual algorithm |
B. |
metric |
C. |
administrative distance |
D. |
hop count |
Correct Answer: D
Question No.15
Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?
A. |
sniffer |
B. |
mesh |
C. |
flexconnect |
D. |
local |
Correct Answer: B
Question No.16
Which type of address is the public IP address of a NAT device?
A. |
outside global |
B. |
outsdwde local |
C. |
inside global |
D. |
insride local |
E. |
outside public |
F. |
inside public |
Correct Answer: C
Question No.17
Refer to the exhibit. Which route does R1 select for traffic that is destined to 192 168.16.2?
A. |
192.168.16.0/21 |
B. |
192.168.16.0/24 |
C. |
192.168 26.0/26 |
D. |
192.168.16.0/27 |
Correct Answer: B
Question No.18
Which two actions influence the EIGRP route selection process? (Choose two)
A. |
The router calculates the reported distance by multiplying the delay on the exiting Interface by 256. |
B. |
The router calculates the best backup path to the destination route and assigns it as the feasible successor. |
C. |
The router calculates the feasible distance of all paths to the destination route |
D. |
The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link |
E. |
The router must use the advertised distance as the metric for any given route |
Correct Answer: AD
Question No.19
An email user has been lured into clicking a link in an email sent by their company#39;s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
A. |
Physical access control |
B. |
Social engineering attack |
C. |
brute force attack |
D. |
user awareness |
Correct Answer: B
Question No.20
What is the primary effect of the spanning-tree portfast command?
A. |
it enables BPDU messages |
B. |
It minimizes spanning-tree convergence time |
C. |
It immediately puts the port into the forwarding state when the switch is reloaded |
D. |
It immediately enables the port in the listening state |
Correct Answer: A
Get Full Version of 200-301 Dumps