Exam 200-301 - section 6 Flashcards

(30 cards)

1
Q

A network engineer must configure an interface with IP address 10.10.10.145 and a subnet mask equivalent to 11111111.11111111.11111111.11111000. Which
subnet mask must the engineer use?
A. /29
B. /30
C. /27
D. /28

A

A. /29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refer to the exhibit. The switches are connected via a Cat5 Ethernet cable that is tested successfully. The interfaces are configured as access ports and are both
in a down status. What is the cause of the issue?

A. The speed settings on the switches are mismatched
B. The distance between the two switches is not supported by Cat5
C. The switches are configured with incompatible duplex settings
D. The portfast command is missing from the configuration

A

A. The speed settings on the switches are mismatched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two IP addressing schemes provide internet access to users on the network while preserving the public IPv4 address space? (Choose two.)

A. IPv6 addressing
B. PAT with private internal addressing
C. single public Class A network
D. private networks only
E. custom addresses from ARIN

A

A. IPv6 addressing
B. PAT with private internal addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:
✑ Create 8 new subnets.
✑ Each subnet must accommodate 30 hosts.
✑ Interface VLAN 10 must use the last usable IP in the first new subnet.
✑ A Layer 3 interface is used.
Which configuration must be applied to the interface?
A. no switchport mode trunk ip address 192.168.32.97 255.255.255.224
B. switchport ip address 192.168.32.65 255.255.255.240
C. no switchport ip address 192.168.32.30 255.255.255.224
D. no switchport mode access ip address 192.168.32.62 255.255.255.240

A

C. no switchport ip address 192.168.32.30 255.255.255.224

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two reasons to deploy private addressing on a network? (Choose two.)
A. to subnet addresses in an organized hierarchy
B. to reduce network maintenance costs
C. to segment local IP addresses from the global routing table
D. to hide sensitive data from access users within an enterprise
E. to route protected data securely via an Internet service provider

A

B. to reduce network maintenance costs
C. to segment local IP addresses from the global routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Drag and drop the IPv6 DNS record types from the left onto the description on the right.
Select and Place:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which property is shared by 10GBase-SR and 10GBase-LR interfaces?
A. Both use the single-mode fiber type.
B. Both require UTP cable media for transmission.
C. Both require fiber cable media for transmission.
D. Both use the multimode fiber type.

A

C. Both require fiber cable media for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
Select and Place:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which device permits or denies network traffic based on a set of rules?
A. switch
B. firewall
C. wireless controller
D. access point

A

B. firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of a firewall in an enterprise network?
A. determines which packets are allowed to cross from unsecured to secured networks
B. processes unauthorized packets and allows passage to less secure segments of the network
C. forwards packets based on stateless packet inspection
D. explicitly denies all packets from entering an administrative domain

A

A. determines which packets are allowed to cross from unsecured to secured networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers
from the left onto the network parameters on the right.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Drag and drop the DNS lookup components from the left onto the functions on the right.
Select and Place:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which action is taken by a switch port enabled for PoE power classification override?

A. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
B. When a powered device begins drawing power from a PoE switch port, a syslog message is generated
C. If a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it
D. Should a monitored port exceed the maximum administrative value for power, the port is shut down and err-disabled

A

D. Should a monitored port exceed the maximum administrative value for power, the port is shut down and err-disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a function spine-and-leaf architecture?
A. Offers predictable latency of the traffic path between end devices.
B. Exclusively sends multicast traffic between servers that are directly connected to the spine.
C. Mitigates oversubscription by adding a layer of leaf switches.
D. Limits payload size of traffic within the leaf layer.

A

A. Offers predictable latency of the traffic path between end devices.

17
Q

Which action is taken by the data plane within a network device?
A. Constructs a routing table based on a routing protocol.
B. Forwards traffic to the next hop.
C. Looks up an egress interface in the forwarding information base.
D. Provides CLI access to the network device.

A

B. Forwards traffic to the next hop.

18
Q

What is the function of the control plane?
A. It exchanges routing table information.
B. It provides CLI access to the network device.
C. It looks up an egress interface in the forwarding information base.
D. It forwards traffic to the next hop.

A

A. It exchanges routing table information

19
Q

Which two cable types must be used to connect an access point to the WLC when 2.5-Gbps and 5-Gbps upload speeds are required? (Choose two.)
A. 10GBASE-T
B. 1000BASE-LX/LH
C. Cat 5e
D. Cat 5
E. Cat 3

A

A. 10GBASE-T
C. Cat 5e

20
Q

What is a benefit for external users who consume public cloud resources?
A. Implemented over a dedicated WAN
B. All hosted on physical servers
C. Accessed over the Internet
D. Located in the same data center as the users

A

C. Accessed over the Internet

21
Q

An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address
192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?
A. 255.255.255.248
B. 255.255.255.224
C. 255.255.255.0
D. 255.255.255.252

A

C. 255.255.255.0

22
Q

Which key function is provided by the data plane?
A. Originating packets
B. Exchanging routing table data
C. Making routing decisions
D. Forwarding traffic to the next hop

A

D. Forwarding traffic to the next hop

23
Q

When should an engineer implement a collapsed-core architecture?

A. Only when using VSS technology
B. For small networks with minimal need for growth
C. For large networks that are connected to multiple remote sites
D. The access and distribution layers must be on the same device

A

B. For small networks with minimal need for growth

24
Q

Refer to the exhibit. An engineer assigns IP addressing to the current VLAN with three PCs. The configuration must also account for the expansion of 30 additional
VLANS using the same Class C subnet for subnetting and host count. Which command set fulfills the request while reserving address space for the expected
growth?
A. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 265 255.255.252
B. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255 255.255.248
C. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255 255.255.0
D. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255.255.255.128

A

B. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255 255.255.248

25
A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue? A. a physical cable fault B. a speed mismatch C. high bandwidth usage D. a cable that is too long
A. a physical cable fault
26
What is the difference between 1000BASE-LX/LH and 1000BASE-ZX interfaces? A. 1000BASE-LX/LH interoperates with multimode and single-mode fiber, and 1000BASE-ZX needs a conditioning patch cable with multimode. B. 1000BASE-ZX interoperates with dual-rate 100M/1G 10Km SFP over multimode fiber, and 1000BASE-LX/LH supports only single-rate C. 1000BASE-ZX is supported on links up to 1000km, and 1000BASE-LX/LH operates over links up to 70 km D. 1000BASE- LX/LH is supported on links up to 10km, and 1000Base-ZX operates over links up to 70 km
D. 1000BASE- LX/LH is supported on links up to 10km, and 1000Base-ZX operates over links up to 70 km
27
What are two reasons to implement IPv4 private addressing on a network? (Choose two.) A. To enable internal applications to treat the private IPv4 addresses as unique B. To facilitate renumbering when merging networks C. To expand the routing table on the router D. To provide protection from external denial-of-service attacks E. To conserve global unique IPv4 addresses
A. To enable internal applications to treat the private IPv4 addresses as unique E. To conserve global unique IPv4 addresses
28
Which concern is addressed with the use of private IPv4 addressing? A. Lack of routing protocol support for CIDR and VLSM B. Lack of security protocols at the network perimeter C. Lack of available TCP/UDP ports per IPv5 address D. Lack of available publicly routable unique IPv4 address
D. Lack of available publicly routable unique IPv4 address
29
What is the path for traffic sent from one user workstation to another workstation on a separate switch in a three-tier architecture model? A. access ג€" core ג€" access B. access ג€" distribution ג€" distribution ג€" access C. access ג€" core ג€" distribution ג€" access D. access ג€" distribution ג€" core ג€" distribution ג€" access
D. access " distribution " core " distribution " access
30
What is the difference between IPv6 unicast and anycast addressing? A. An individual IPv6 unicast address is supported on a single interface on one node, but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes. B. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration. C. IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration. D. Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes.
A. An individual IPv6 unicast address is supported on a single interface on one node, but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.