Go Back on 200-301 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

200-301 Practice Test


Page 19 out of 173 Pages

Topic 1: Exam Pool A

   

desc about topic

Drag and drop the WLAN components from the left onto the correct descriptions on the right.







Refer to the exhibit.

An extended ACL has been configured and applied to router R2 The configuration
failed to work as intended Which two
changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20 0 26 from the
10.0.10 0/26 subnet while still allowing all other traffic? (Choose
two )


A.

Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.


B.

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic


C.

The source and destination IPs must be swapped in ACL 101


D.

The ACL must be configured the Gi0/2 interface inbound on R1


E.

The ACL must be moved to the Gi0/1 interface outbound on R2





B.
  

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic



C.
  

The source and destination IPs must be swapped in ACL 101



How does HSRP provide first hop redundancy?


A.

It load-balances traffic by assigning the same metric value to more than one route to the
same destination m the IP routing table.


B.

It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces
configured with the same VLAN.


C.

It forwards multiple packets to the same destination over different routed links n the data
path


D.

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as
the default gateway for hosts on a LAN





D.
  

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as
the default gateway for hosts on a LAN



What is a function of a remote access VPN?


A.

used cryptographic tunneling to protect the privacy of data for multiple users
simultaneously


B.

used exclusively when a user is connected to a company's internal network


C.

establishes a secure tunnel between two branch sites


D.

allows the users to access company internal network resources through a secure tunnel





D.
  

allows the users to access company internal network resources through a secure tunnel



An engineer is asked to protect unused ports that are configured in the default VLAN on a
switch.
Which two steps will fulfill the request? (Choose two)


A.

Configure the ports in an EtherChannel.


B.

Administratively shut down the ports


C.

Configure the port type as access and place in VLAN 99


D.

Configure the ports as trunk ports


E.

Enable the Cisco Discovery Protocol





B.
  

Administratively shut down the ports



C.
  

Configure the port type as access and place in VLAN 99




Page 19 out of 173 Pages
Previous