Go Back on 200-301 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

200-301 Practice Test


Page 2 out of 173 Pages

Topic 1: Exam Pool A

   

desc about topic

In software defined architectures, which plane is distributed and responsible for traffic forwarding?


A.

management plane


B.

control plane


C.

policy plane


D.

data plane





D.
  

data plane



Refer to the exhibit.

Which password must an engineer use to enter the enable mode?


A.

adminadmin123


B.

default


C.

testing 1234


D.

cisco123





C.
  

testing 1234



Explanation: If neither the enable password command nor the enable secret command is
configured, and if there is a line password configured for the console, the console line
password serves as the enable password for all VTY sessions -> The “enable secret” will
be used first if available, then “enable password” and line password.

What is the purpose of using First Hop Redundancy Protocol in a specific subnet?


A.

Filter traffic based on destination IP addressing


B.

Sends the default route to the hosts on a network


C.

ensures a loop-free physical topology


D.

forwards multicast hello messages between routers





D.
  

forwards multicast hello messages between routers



Explanation: FHRP is layer 3 protocol whose purpose is to protect the default gateway by
offering redundancy of the gateway in a subnet. This is achieved by allowing two or more
routers to provide a backup for the first-hop IP router address. If a failure of an active router
occurs, the backup router will take over the address. The routers negotiate their roles
(Active/Standby) with each other by multicast hello messages to share the VIP (virtual IPaddress) between the FHRP routers. The terms Active/Standby vary between the different
types of FHRP. The active router will act as the default gateway and the standby router
acts as a backup the active router

A port security violation has occurred on a switch port due to the maximum MAC address
count being exceeded. Which command must be configured to increment the securityviolation
count and forward an SNMP trap?


A.

switchport port-security violation access


B.

switchport port-security violation protect


C.

switchport port-security violation restrict


D.

switchport port-security violation shutdown





C.
  

switchport port-security violation restrict



Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-
2/25ew/configuration/guide/conf/port_sec.html

What is the function of a controller in controller-based networking?


A.

It serves as the centralized management point of an SDN architecture.


B.

It centralizes the data plane for the network.


C.

It is the card on a core router that maintains all routing decisions for a campus.


D.

It is a pair of core routers that maintain all routing decisions for a campus





A.
  

It serves as the centralized management point of an SDN architecture.




Page 2 out of 173 Pages
Previous