Get Full Version of the Exam
http://www.EnsurePass.com/200-301.html
Question No.71
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)
A. |
management interface settings |
B. |
QoS settings |
C. |
Ip address of one or more access points |
D. |
SSID |
E. |
Profile name |
Correct Answer: DE
Question No.72
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
A. |
Enable NTP authentication. |
B. |
Verify the time zone. |
C. |
Disable NTP broadcasts |
D. |
Specify the IP address of the NTP server |
E. |
Set the NTP server private key |
Correct Answer: DE
Question No.73
Which IPv6 address block sends packets to a group address rather than a single address?
A. |
2000::/3 |
B. |
FC00::/7 |
C. |
FE80::/10 |
D. |
FF00::/8 |
Correct Answer: C
Question No.74
In which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?
A. |
A spine switch and a leaf switch can be added with redundant connections between them |
B. |
A spine switch can be added with at least 40 GB uplinks |
C. |
A leaf switch can be added with a single connection to a core spine switch. |
D. |
A leaf switch can be added with connections to every spine switch |
Correct Answer: D
Question No.75
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A. |
IKEv2 |
B. |
IKEv1 |
C. |
IPsec |
D. |
MD5 |
Correct Answer: C
Question No.76
What is the primary different between AAA authentication and authorization?
A. |
Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database. |
B. |
Authentication identifies a user who is attempting to access a system, and authorization validates the users password. |
C. |
Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform. |
D. |
Authentication controls the system processes a user can access and authorization logs the activities the user initiates. |
Correct Answer: C
Question No.77
Which set of action satisfy the requirement for multifactor authentication?
A. |
The user swipes a key fob, then clicks through an email link |
B. |
The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device |
C. |
The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen |
D. |
The user enters a user name and password and then re-enters the credentials on a second screen |
Correct Answer: A
Question No.78
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
A. |
ipv6 address dhcp |
B. |
ipv6 address 2001:DB8:5:112::/64 eui-64 |
C. |
ipv6 address autoconfig |
D. |
ipv6 address 2001:DB8:5:112::2/64 link-local |
Correct Answer: C
Question No.79
DRAG DROP
Drag and drop the AAA functions from the left onto the correct AAA services on the right.
Correct Answer:
Question No.80
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
A. |
CPUACL |
B. |
TACACS |
C. |
Flex ACL |
D. |
RADIUS |
Correct Answer: B
Get Full Version of 200-301 Dumps