200-301 VOL1 Flashcards
In wireless networking, what are the three main 802.11 frame types?
A. Control
B. Data
D. Management
A Computer at a remote site sends a packet to a server located at a Corporate Data Center with
a destination IP address of 226.1.5.10. What is the most likely type of traffic that is being used
here?
C. Traffic sent to a conferencing server to participate in a companywide video conference.
A network Engineer has just configured a new floating static route on router R1 to be used as a
backup route to a remote router R2. After making this change, traffic begins taking this new
route. What could be a cause for this?
B. The floating static route was incorrectly configured with an administrative distance that
was too low.
In a small EIGRP network, routers R1 and R2 are EIGRP neighbors and have been configured with
default values. R1 and R2 are connected via two different 100 MB links. What must be
configured on these two routers for traffic to load balance over these two links?
D. Nothing needs to be configured, the traffic will load balance automatically.
Which the protocol should the network administrator enable to gain visibility into the physical connections
that are used between these network devices?
A. LLDP
You need to design an IP addressing scheme for a new network that should be routable internally
only, and not be reachable from the Internet. The network consists of one flat network, and
should accommodate up to 150 hosts. Wasting of IP addresses should be avoided. Which of the
following would be the best subnet to use?
C. 172.30.1.0/24
Which of the following are the core components of an 802.1x architecture? (Choose three)
A. Authenticator
B. Supplicant
D. Authentication server
Host PC1 is unable to ping Server 1. Traceroutes show that the packets are load balanced to
Router 3 and Router 4 before timing out. What is the most like reason for this?
C. Server 1 has an incorrect default gateway set.
Regarding traffic between PC1 and Server 1 in this network, between which two devices is a 32-
bit header added to the packet between the layer 2 header and the IP packet?
A. Between Router 1 and Router 2
Based on this, what will be the resulting violation mode when the “show port-security” command
is issued for this interface?
C. Shutdown
The login password for a router has been forgotten and needs to be reset. Which configuration
register value must be set in the router in order to cause the router to boot up without requiring
a password?
D. 0x2142
An engineer needs to configure router R1 to send log messages of severity-level notifications and
lower Syslog server at 10.22.22.55. How can this be achieved?
B. R1(config)# logging 10.22.22.55
R1(config)# logging trap 5
Which of the following describes the valid port states in the operation of the 802.1D protocol?
B. Disabled, Blocking, Listening, Learning, Forwarding
Which of the following are the three components of the Three-tier Hierarchical Networking
The model used in the classical Cisco networks design? (Choose three)
A. Distribution
B. Core
D. Access
Within the Cisco Wireless LAN Controller and lightweight AP QoS configuration profile, which
level should be selected for voice-over wireless?
A. Platinum