title: CCNA 200-301 题库_51-100
date: 2022-07-13 16:24:16
permalink: /pages/503a31/
categories:
How do AAA operations compare regarding user identification, user services, and access control?
A. Authorization provides access control, and authentication tracks user services
B. Accounting tracks user services, and authentication provides access control.
C. Authorization identifies users, and authentication provides access control
D. Authentication identifies users, and accounting tracks user services
Correct Answer DExplanation:
What is the difference between local AP mode and FlexConnect AP mode?
A. FlexConnect AP mode fails to function if the AP loses connectivity with the WLC.
B. FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured.
C. Local AP mode creates two CAPWAP tunnels per AP to the WLC.
D. Local AP mode causes the AP to behave as if it were an autonomous AP.
Correct Answer CExplanation:
which function does the range of private IPv4 addresses perform?
A. allow multiple companies to each use the same address without conflicts
B. provides a direct connection for hosts from outside of the enterprise network
C. ensures that NAT is not required to reach the internet with a private range
addressing
D. enable secure communications to the internet for all external hosts
Correct Answer AExplanation:
Refer to the exhibit. Which prefix does Router 1 use to Host A?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-sBtqdiTT-1661764332257)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/0000300001.png)]
A. 10.10.10.0/28
B. 10.10.13.0/25
C. 10.10.13.144/28
D. 10.10.13.208/29
Correct Answer DExplanation:
A frame that enters a switch fails the Frame Check Sequence(FCS). Which two interface counters are incremented?
A. input errors
B. frame
C. giants
D. CRC
E. runts
Correct Answer A, DExplanation:
what event has occurred if a router sends a notice level message to a Syslog server?
A. An interface line has changed status
B. An ICMP connection has been built
C. A certificate has expired
D. A TCP connection has been torn down
Correct Answer A Explanation:An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?
A. platform-as-a-service
B. software-as-a-service
C. network-as-a-service
D. infrastructure-as-a-service
Correct Answer DExplanation:
Refer to the exhibit. Which route does R1 select for traffic that is destined to 192 168.16.2?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-Z70yy0L9-1661764332258)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/0004400001.png)]
A. 192.168.16.0/21
B. 192.168.16.0/24
C. 192.168 26.0/26
D. 192.168.16.0/27
Correct Answer DExplanation:
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
A. The switch must be running a k9 (crypto) IOS image
B. The IP domain-name command must be configured on the switch
C. IP routing must be enabled on the switch
D. A console password must be configured on the switch
E. Telnet must be disabled on the switch
Correct Answer A,BExplanation:
Refer to the exhibit. An engineer configured NAT translations and has verified that the configuration is correct. Which IP address is the source IP after the NAT has taken place?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-RKdjsFuQ-1661764332258)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/image-20220703000423209.png)]
A. 10.4.4.4
B. 10.4.4.5
C. 172.23.103.10
D. 172.23.104.4
Correct Answer DExplanation:
Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?
A. lldp timer
B. lldp holdtime
C. lldp reinit
D. lldp tlv-select
Correct Answer CExplanation:
(config)#lldp ? holdtime Specify the holdtime (in sec) to be sent in packets reinit Delay (in sec) for LLDP initialization on any interface run Enable LLDP timer Specify the rate at which LLDP packets are sent (in sec) tlv-select Selection of LLDP TLVs to sendReference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_55_se/configuration/guide/3560_scg/swlldp.html
Refer to the exhibit. An administrator configures four switches for local authentication using passwords that are stored as a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?
A. SW1
B. SW2
C. SW3
D. SW4
Correct Answer CExplanation:
which statement identifies the functionality of virtual machines?
A. The hypervisor communicates on Layer 3 without the need for additional resources
B. Each hypervisor can support a single virtual machine and a single software switch
C. The hypervisor can virtualize physical components including CPU, memory, and storage.
D. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor.
Correct Answer CExplanation:
when configuring IPv6 on an interface, which two IPv6 multicast groups are joined?
(Choose two)
A. 2000::/3
B. 2000::5
C. FC00::/7
D. FF02::1
E. FF02::2
Correct Answer D,EExplanation:
Which option about JSON is true?
A. uses predefined tags or angle brackets () to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML
Correct Answer BExplanation:
Which statement correctly compares traditional networks and controller-based networks?
A. Only traditional networks offer a centralized control plane
B. Only traditional networks natively support centralized management
C. Traditional and controller-based networks abstract policies from device configurations
D. Only controller-based networks decouple the control plane and the data plane
Correct Answer DExplanation:
What are the two fundamentals of virtualization? (Choose two)
A. It allows multiple operating systems and applications to run independently on one physical server.
B. It allows a physical router to directly connect NICs from each virtual machine into the network.
C. The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic.
D. It allows logical network devices to move traffic between virtual machines and the rest of the physical network.
E. It requires that some servers, virtual machines, and network gear reside on the Internet.
Correct Answer A, DExplanation:
Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two)
A. The root port is FastEthernet 2/1
B. The spanning-tree mode is Rapid PVST+
C. The designated port is FastEthernet 2/1
D. The spanning-tree mode is PVST+
E. This is a root bridge
Correct Answer A, BExplanation:
Which command enables a router to become a DHCP client?
A. ip address dhcp
B. ip helper-address
C. ip dhcp pool
D. ip dhcp client
Explanation:
Refer to the exhibit. A router received these five routes from different routing information sources. Which two routes does the router install in the routing table? (Choose two)
A. iBGP route 10.0.0.0/30
B. RIP route 10.0.0.0/30
C. EIGRP route 10.0.0.1/32
D. OSPF route 10.0.0.0/30
E. OSPF route 10.0.0.0/16
Correct Answer C, D, EExplanation:
what is the default behavior of a layer 2 switch when a frame with an unknown destination MAC address is received?
A. The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table
B. The Layer 2 switch sends a copy of a packet to the CPU for destination MAC address learning
C. The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN
D. The Layer 2 switch dorps the received frame
Correct Answer CExplanation:
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration started to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two)
A. Add a “permit ip any any” statement to the beginning of ACL 101 for allowed traffic.
B. Add a “permit ip any any” statement at the end of ACL 101 for allowed traffic
C. The source and destination IPs must be swapped in ACL 101
D. The ACL must be configured with the Gi0/2 interface inbound on R1
E. The ACL must be moved to the Gi0/1 interface outbound on R2
Correct Answer B, CExplanation:
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
A. Enable NTP authentication
B. Verify the time zone
C. Disable NTP broadcasts
D. Specify the IP address of the NTP server
E. Set the NTP server private key
Correct Answer A, DExplanation:
A user configured OSPF in a single area between two routers. A serial interface connecting R1 and R2 is running encapsulation PPP. By default which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?
A. port-to-multipoint
B. broadcast
C. point-to-point
D. non-broadcast
Correct Answer CExplanation:
Refer to Exhibit. An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)
A. ipv6 router 2000::1/128 2012::1
B. ipv6 router 2000::1/128 2012::1 5
C. ipv6 router 2000::1/128 2012::2
D. ipv6 router 2000::1/128 2023::2 5
E. ipv6 router 2000::1/128 2023::3 5
Correct Answer A, EExplanation:
The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged. Which command accomplishes this task?
A. switchport access vlan 67
B. switchport trunk allowed vlan 67
C. switchport private-vlan association host 67
D. switchport trunk native vlan 67
Correct Answer DExplanation:
What are the two differences between optical-fiber cabling and copper cabling? (Choose two.)
A. Fiber connects to physical interfaces using RJ-45 connections.
B. The data can pass through the cladding.
C. Light is transmitted through the core of the fiber.
D. The glass core component is encased in a cladding.
E. A BNC connector is used for fiber connections.
Correct Answer C, DExplanation:
which IPv6 address type provides communication between subnets and cannot route on the internet?
A. link-local
B. unique local
C. multicast
D. global unicast
Correct Answer BExplanation:
Which 802.11 frame type is Association Response?
A. management
B. protected frame
C. action
D. control
Correct AnswerExplanation:
which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)
A. IPv6 address
B. OSPF process ID
C. OSPF MD5 authentication key
D. OSPF stub flag
E. OSPF area
Correct Answer B, EExplanation:
Refer to the Exhibit. After the switch configuration, the ping test fails between PC A and PC B Based on the output for switch 1. Which error must be corrected?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-xQzcmO7J-1661764332260)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131515646.png)]
A. There is a native VLAN mismatch
B. Access mode is configured on the switch ports.
C. The PCs are m the incorrect VLAN
D. All VLANs are not enabled on the trunk
Correct Answer AExplanation:
Which action is taken by a switch port enabled for PoE power classification override?
A. When a powered device begins drawing power from a PoE switch port a Syslog message is generated
B. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
C. If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects
D. If a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled
Correct Answer DExplanation:
What are the two characteristics of a controller-based network? (Choose two)
A. The administrator can make configuration updates from the CLI
B. It uses northbound and southbound APIs to communicate between architectural layers
C. It moves the control plane to a central point
D. It decentralizes the control plane, which allows each device to make its own forwarding decisions
E. It uses Telnet to report system issues
Correct Answer B, CExplanation:
Refer to the exhibit. Which password must an engineer use to enter the enable mode?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-7yt0iPvP-1661764332260)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131524029.png)]
A. adminadmin123
B. default
C. testing 1234
D. cisco123
Correct Answer CExplanation:
Which QoS Profile is selected in the GUI when configuring a voice-over WLAN deployment?
A. Bronze
B. Platinum
C. Silver
D. Gold
Correct Answer BExplanation:
A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?
A. cost
B. administrative distance
C. metric
D. as-path
Correct Answer CExplanation:
Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?
A. The OSPF router IDs are mismatched.
B. Router2 is using the default hello timer.
C. The network statement on Router1 is misconfigured.
D. The OSPF process IDs are mismatched
Correct Answer BExplanation:
How do TCP and UDP differ in the way they provide reliability for the delivery of packets?
A. TCP does not guarantee delivery or error checking to ensure that there is no data corruption; UDP provides message acknowledgment and retransmits data if lost.
B. TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once; UDP sends packets to the receiver in a continuous stream without checking for sequencing.
C. TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake
D. TCP is a connectionless protocol that does not provide reliable delivery of data; UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.
Correct Answer BExplanation:
Which output displays a JSON data representation?
A. [外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-MgIZPaxx-1661764332261)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131538690.png)]
B. [外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-9ItsGLm9-1661764332261)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131539617.png)]
D.[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-vUyz8DF8-1661764332262)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131539928.png)]
Correct Answer CExplanation:
Refer to the exhibit. With which metric was the route to host 172.16.0.202 learned?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-FOS2MeZP-1661764332262)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131543286.png)]
A. 0
B. 110
C. 38443
D. 3184439
Correct Answer CExplanation:
A packet is destined for 10.10.1.22. which static route does the router choose to forward the packet?
A. ip route 10.10.1.0 255.255.255.240 10.10.255.1
B. ip route 10.10.1.20 255.255.255.252 10.10.255.1
C. ip route 10.10.1.20 255.255.255.254 10.10.255.1
D. ip route 10.10.1.16 255.255.255.252 10.10.255.1
Correct Answer BExplanation:
An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
A. Physical access control
B. Social engineering attack
C. brute force attack
D. user awareness
Correct Answer DExplanation:
Refer to the exhibit. Router R1 Fa0/0 cannot ping router R3 Fa0/1. Which action must be taken in router R1 to help resolve the configuration issue?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-wrlOgPfc-1661764332263)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131553791.png)]
A. set the default network as 20.20.20.0/24
B. configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network
C. set the default gateway as 20.20.20.2
D. configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network
Correct Answer DExplanation:
Refer to Exhibit. Which action do the switches take on the trunk link?
A. The trunk does not form and the ports go into an err-disabled status.
B. The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.
C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.
Correct Answer BExplanation:
which IPv6 address block sends packets to a group address rather than a single address
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8
Correct Answer DExplanation:
Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to Dynamic Auto and SW2 is set to Dynamic Desirable. What is the result of this configuration?
A. The link is downstate.
B. The link is in an error disables state
C. The link becomes an access port.
D. The link becomes a trunk port.
Correct Answer DExplanation:
Refer to the exhibit. Which command provides this output?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-d4QbJ0L4-1661764332263)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131615576.png)]
A. show ip route
B. show ip interface
C. show interface
D. show cdp neighbor
Correct Answer DExplanation:
Refer to the exhibit. If configuring a static default route on the router with the ip route 0.0.0.0 0.0.0.0 10.13.0.1 120
command, how does the router respond?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-NpPwrGOK-1661764332264)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131617617.png)]
A. It ignores the new static route until the existing OSPF default route is removed
B. It immediately replaces the existing OSPF route in the routing table with the newly configured static route
C. It starts load-balancing traffic between the two default routes
D. It starts sending traffic without a specific matching entry in the routing table to Gigabit Ethernet0/1
Correct Answer AExplanation:
R1(config)#ip route 192.168.1.0 255.255.255.0 10.1.1.1 ? 1-255 Distance metric for this route multicast multicast route name Specify name of the next hop permanent permanent route tag Set tag for this route track Install route depending on tracked item
Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-uX46xf2a-1661764332264)(https://cdn.jsdelivr.net/gh/Wolfxin/MyPicGo/img/202207131620021.png)]
A. 10.10.225.48 255.255.255.240
B. 10.10.225.32 255.255.255.240
C. 10.10.225.48 255.255.255.224
D. 10.10.225.32 255.255.255.224
Correct Answer DExplanation:
An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?
A. WEP
B. RC4
C. AES
D. TKIP
Explanation:
mary>Correct Answer
D
Explanation:
An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?
A. WEP
B. RC4
C. AES
D. TKIP
Explanation: