200-301 VOL3 Flashcards

1
Q

You want to implement RFC 3021 to assign an IP address to router R1 on a point-to-point link.
Which of the following is a viable option for this?

A

C. 10.1.0.1/31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPv6 addressing is being implemented in a new network. Which of the following is NOT a valid
IPv6 address type that can be implemented on this network?

A

D. Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator has configured the same IPv6 address to a set of servers that are
geographically dispersed in order to enhance the uptime of the application and to provide a
better response time for end users. What is this an example of?

A

B. IPv6 Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to implement and manage a wireless network consisting of approximately 150 access
points and thousands of clients. Which of the following would be the most helpful in the
configuration and management of the access points in this network?

A

B. WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With NTP, A stratum 2 device synchronizes its time to what other type of NTP device?

A

C. Stratum 2 Time Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have booted a new IPV6 capable device on the network and discovered that this device has
an IPv6 address configured on it by choosing its own IPv6 address based on the IPv6 prefix that
is advertised by the connected IPV6 enabled router. What is this an example of?

A

A. SLAAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following are used to terminate Cat6e cabling in a computer network?

A

C. RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The IPV6 address of FE80::1144:aa11 is an example of which type of address?

A

D. Link local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which component of a virtual architecture is often referred to as a Virtual Machine Manager
(VMM) and can manage the virtualization of memory, storage, CPU, and other processes while
being hidden from the guest machine?

A

D. Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of address will gert generated from this?

A

A. Automatic generation of link-local address using modified EUI-64 interface ID on the MAC
address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSPF is being implemented in a new network. Which of the following events happens before
routing information can be exchanged when OSPF is initiated on a network? (Select two)

A

A. An adjacency building process is optimized by electing a DR and BDR for every multiaccess
network
D. Multicast hello packets are used to discover OSPF neighbors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A router has three routing processes running: OSPF, RIP, and EIGRP. All three processes have
learned various routes to 10.100.10.0/24. Which path will be chosen by the router, assuming
default values?

A

A. The EIGRP Route, with an Administrative Distance of 90.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which command in a Cisco router encrypts a password with strong encryption and is
recommended according to Cisco’s best practices?

A

A. enable secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following choices correctly display the default hello and dead timers for a Cisco
device running OSPF on an ethernet link?

A

D. Hello: 10 seconds, Dead 40 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are required to configure NAT on an Internet-facing router. Which of the following is NOT a
valid NAT address type? (Choose two)

A

E. Inside Public
F. Inside Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have configured NTP on router R1 and wish to verify the configuration by issuing the “show
ntp status” command on R1. What can be determined by using this command? (Choose three).

A

B. clock synchronization status
C. the clock offset
D. The NTP stratum level

17
Q

You need to configure syslog on router R1 to send log messages to a centralized server. You want
to send all log messages with a severity level of notifications and greater to the server. Which
syslog severity level should be chose to do this?

A

C. Severity 5

18
Q

You want to backup your router configuration files to a central server without having to login
using a username and password. Which protocol should be enabled in order to do this?

A

A. TFTP

19
Q

When you boot up your Microsoft Windows based PC on the corporate LAN, you are able to
access the Internet without having to manually enter any information at all in your PC. Which
protocol was used to enable this functionality?

A

B. DHCP