CCNA exam Flashcards
Which of the following DTP modes actively negotiates a trunk connection with a neighboring
interface?
A.
desirable
B.
off
C.
auto
D.
on
Answer: A
Explanation:
Dynamic Trunking Protocol (DTP) desirable mode actively negotiates a trunk connection with a
neighboring interface. There are two dynamic modes of operation for a switch port:
You want to create a user account named oson with the password eX$1mM©x on a router. The
password should be converted to an MD5 hash and stored on the router.
Which of the following commands should you issue on the router?
A.
username oson secret 5 eX$1mM@x
B.
username oson secret eX$1mM@x
C.
username oson eX$1mM@x
D.
username oson password eX$1mM@x
Answer: B
Explanation:
To create a user account named oson with a Message Digest 5 (MD5)-hashed password of
eX$1mM©x, you should issue the username oson secret eX$1mM@x command on the router.
The username command creates a new user and adds the user to the local user database on a
router. The local user database on a router contains a list of users that have been added to the
router; these users can access the router. When using the username command to create a new
user on a router, you can configure the user’s password to be stored as plain text or as an MD5
hash. To configure a user name with a plain-text password, you should use the username username password password command. Using the secret keyword instead of the password
keyword ensures that the password is stored as an MD5 hash. Thus the command username
oson secret eX$1mM@x creates a user named oson and stores the password as an MD5 hash
value. In the output of the show running-config command, the hash value of the password rather
than the actual password would be displayed, similar to the following:
Which of the following combinations represents a single-factor authentication method?
A.
a password and a PIN
B.
a smart card, a password, and a PIN
C.
a password, a fingerprint, and a smart card
D.
a fingerprint, a retina scan, and a password
Answer: A
Explanation:
Of the available options, the combination of a password and a personal identification number (PIN)
represents a single-factor authentication method. A single-factor authentication method refers to
the use of only one of the three common methods to verify a user’s identity. The three
authentication factors are something you know, something you have, and something you are. A
password and a PIN are knowledge factor access control methods, which are pieces of
information that you know. Because a password and a PIN are both something you know, when
the two are used in combination with each other they represent a single-factor authentication
method.
Two-factor, or dual-factor, authentication refers to th
Which of the following APIs are typically used to enable communication between an SDN
controller and the application plane? (Choose two.)
A.
OpenFlow
B.
OnePK
C.
OpFlex
D.
OSGi
E.
NETCONF
F.
REST
Answer: D,F
Explanation:
Of the available choices, only Representational State Transfer (REST) and Java Open Services
Gateway initiative (OSGi) are the Application Programming Interfaces (APIs) typically used to
enable communication between a Software-Defined Networking (SDN) controller and the
application plane. SDN is an intelligent network architecture in which a software controller
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 9
assumes the control plane functionality for all network devices. A northbound API, which is
sometimes called a northbound interface (NBI), enables an SDN controller to communicate with
applications in the application plane.
REST is a northbound API architecture that uses Hypertext Transfer Protocol (HTTP) or HTTP
Secure (HTTPS) to enable external resources to access and make use of programmatic methods
that are exposed by the API. REST APIs typically return data in either Extensible Markup
Language (XML) or JavaScript Object Notation (JSON) format.
OSGi is a Java-based northbound API framework that is intended to enable the development of
modular programs. OSGi also allows the use of the Python programming language as a means of
extended controller functions. For transport, OSGi deployments often rely on HTTP.
A southbound API, which is sometimes called a southbound interface (SBI), enables an SDN
controller to communicate with devices on the network data plane. NETCONF, OnePK, OpenFlow,
and OpFlex are all examples of southbound APIs.
NETCONF uses Extensible Markup Language (XML) and Remote Procedure Calls (RPCs) to
configure network devices. XML is used for both data encoding and protocol messages.
NETCONF typically relies on Secure Shell (SSH) for transport.
OpFlex uses a declarative SDN model in which the instructions that are sent to the controller are
not so detailed. The controller allows the devices in the data plane to make more network
decisions about how to implement the policy.
OpenFlow uses an imperative SDN model in which detailed instructions are sent to the SDN
controller when a new policy is to be configured. The SDN controller manages both the network
and the policies applied to the devices.
The OnePK API is a Cisco-proprietary API. It uses Java, C, or Python to configure network
devices. It can use either Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to
encrypt data in transit.
Reference: https://www.cisco.com/c/en/us/td/do
You are configuring security on a new WLAN by using the WLC GUI.
Which of the following security settings are you most likely to configure by using the Layer 3
Security drop-down list box on the Layer 3 tab?
A.
VPN Pass-Through
B.
Web Passthrough
C.
WPA+WPA2
D.
Web Authentication
Answer: A
Explanation:
When you are configuring a new wireless local area network (WLAN), you are most likely to
configure the VPN Pass-Through setting by using the Layer 3 Security drop-down list box on the
Layer 3 tab of the Cisco Wireless LAN Controller (WLC) graphical user interface (GUI). There are
two types of WLANs that you can configure by using the WLC GUI: a WLAN and a Guest LAN.
The VPN Pass-Through setting is only available when you are configuring a WLAN.
When you configure a new WLAN by using the WLC GUI, you can configure security settings by
clicking the new WLAN’s Security tab. By default, the Layer 2 tab is selected when you click the
Security tab. However, it is not possible to configure Layer 2 security on a Guest LAN.
On the Layer 2 tab of the Security tab, you can select one of the following Layer 2 wireless
security features from the Layer 2 Security drop-down list box:
* None, which disables Layer 2 security and allows open authentication to the WLAN
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 11
* WPA+WPA2, which enables Layer 2 security by using Wi-Fi Protected Access (WPA) or the
more secure WPA2
* 802.1X, which enables Layer 2 security by using Extensible Authentication Protocol (EAP)
authentication combined with a dynamic Wired Equivalent Privacy (WEP) key
* Static WEP, which enables Layer 2 security by using a static shared WEP key
* Static WEP + 802.1X, which enables Layer 2 security by using either a static shared WEP key or
EAP authentication
* CKIP, which enables Layer 2 security by using the Cisco Key Integrity Protocol (CKIP)
* None + EAP Passthrough, which enables Layer 2 security by using open authentication
combined with remote EAP authentication
There are two different sets of Layer 3 security features that you can configure on a Cisco WLC:
one set for a WLAN and one set for a Guest LAN. Depending on which type of WLAN you create
and which Layer 2 security options you have selected, you can select one of the following Layer 3
wireless security features from the Layer 3 Security drop-down list box on the Layer 3 tab of the
Security tab in the WLC GUI:
* None, which disables Layer 3 security no matter which Layer 2 security option is configured and
regardless of whether you are configuring
* IPSec, which enables Layer 3 security for WLANs by using Internet Protocol Security (IPSec)
* VPN Pass-Through, which enables Layer 3 security for WLANs by allowing a client to establish a
connection with a specific virtual private
* Web Authentication, which enables Layer 3 security for Guest LANs by prompting for a user
name and password when a client connects
* Web Passthrough, which enables direct access to the network for Guest LANs without prompting
for a user name and password
Not every Layer 3 security mechanism is compatible with every Layer 2 security mechanism. It is
therefore important to first configure Layer 2 security options before you attempt to configure Layer
3 security options.
QUESTION NO: 8
You issue the ip ospf network non-broadcast command on an interface.
Which of the following statements is correct regarding how OSPF operates on the interface?
A.
Multicast updates are sent.
B.
DR and BDR elections are not performed.
C.
The Hello timer is set to 10 seconds, and the dead timer is set to 40 seconds.
D.
The neighbor command is required to establish adjacencies.
Answer: D
Explanation:
The neighbor command is required to establish adjacencies on Open Shortest Path First (OSPF)
nonbroadcast networks. There are five OSPF network types:
* Broadcast
* Nonbroadcast
* Point-to-point
* Point-to-multipoint broadcast
* Point-to-multipoint nonbroadcast
Nonbroadcast and point-to-multipoint nonbroadcast networks do not allow multicast packets. To
configure OSPF to send unicast updates, you must configure neighbor routers with the neighbor
command. Broadcast, point-to-point, and point-to-multipoint broadcast networks allow multicast
packets, so manual configuration of neighbor routers with the neighbor command is not required.
On broadcast networks, designated router (DR) and backup designated router (BDR) elections are
performed. By default, the Hello timer is set to 10 seconds and the dead timer is set to 40
seconds. To configure an OSPF broadcast network, you should issue the ip ospf network
broadcast command. The OSPF broadcast network type is enabled by default on Fiber
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 13
Distributed Data Interface (FDDI) and Ethernet interfaces, including Fast Ethernet and Gigabit
Ethernet interfaces.
On nonbroadcast networks, DR and BDR elections are performed. By default, the Hello timer is
set to 30 seconds and the dead timer is set to 120 seconds. To configure an OSPF nonbroadcast
network, which is also called a nonbroadcast multiaccess (NBMA) network, you should issue the
ip ospf network non-broadcast command.
On point-to-point networks, DR and BDR elections are not performed. By default, the Hello timer is
set to 10 seconds and the dead timer is set to 40 seconds. To configure an OSPF point-to-point
network, you should issue the ip ospf network point-to-point command. The OSPF point-topoint network type is enabled by default on High-Level Data Link Control (HDLC) and Point-toPoint Protocol (PPP) serial interfaces.
OSPF point-to-multipoint broadcast networks operate just like OSPF point-to-point networks
except the Hello timer is set to 30 seconds and the dead timer is set to 120 seconds by default. To
configure an OSPF point-to-multipoint broadcast network, you should issue the ip ospf network
point-to-multipoint command.
OSPF point-to-multipoint nonbroadcast networks operate just like OSPF point-to-multipoint
broadcast networks except that multicasts cannot be sent; therefore, manual configuration of
neighbor routers with the neighbor command is required so that OSPF sends unicast updates. To
configure an OSPF point-to-multipoint nonbroadcast network, you should issue the ip ospf
network point-to-multipoint non-broadcast command
An administrator has generated the following MD5 hash from a plain-text password:
$1$cf6N$Ugo.y0CXMLffTfQtyO/Xt.
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 16
Answer: D
Explanation:
The administrator should issue the enable secret 5 $1$cf6N$Ugo.y0CXMLffTfQtyO/Xt.
command to configure the Message Digest 5 (MD5) hash generated from a plain-text password so
that it will be used to access enable mode on a Cisco router in this scenario. The no service
password-encryption command has been issued in this scenario. This command disables the
automatic encryption of new passwords when they are created by an administrator. If the service
password-encryption command had been issued in this scenario, all current and future
passwords in the running configuration would be encrypted automatically. Thus, of the available
choices, the enable secret 5 $1$cf6N$Ugo.y0CXMLffTfQtyO/Xt. command is the only option in
this scenario that enables the administrator to store a previously encrypted password that allows
access to enable mode on a Cisco router.
In some Cisco IOS versions prior to 15.3(3), the enable secret command by default stores an
encrypted password in the device’s configuration file by using a Secure Hash Algorithm (SHA)
256-bit hash. As of Cisco IOS 15.3(3), Type 4 passwords have been deprecated because of a
security flaw in their implementation. The syntax for the enable secret command is enable secret
[level level] {password | [encryption-type] encrypted-password}, where password is a string of
characters that represents the clear-text password. Instead of supplying a clear-text password,
you can specify an encryption-type value of 0, 4, or 5 and an encrypted-password value of either a
clear-text password, a SHA-256 hash, or an MD5 hash, respectively. Supplying a hash value
requires that you have previously encrypted the value by using a hashing algorithm in the same
fashion that IOS uses the algorithm. This command configures a password that is required in order
to place the device into enable mode, which is also known as privileged EXEC mode. The device
must, at a minimum, be placed into enable mode for the user to be able to display the running
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 17
configuration.
The administrator should not issue the enable secret 0 $1$cf6N$Ugo.y0CXMLffTfQtyO/Xt.
command in this scenario. Specifying an encryption-type value of 0 when you issue the enable
secret command indicates that the string following the command is in clear-text format, not
encrypted format. Because the router assumes the string is a clear-text password and the length
of the hash is greater than 25 characters, issuing the enable secret 0
$1$cf6N$Ugo.y0CXMLffTfQtyO/Xt. command would cause the router to generate an error similar
to the following:
% Invalid Password length - must contain 1 to 25 characters. Password configuration failed
If the already encrypted 1$cf6N$Ugo.y0CXMLffTfQtyO/Xt. string was shorter than 25 characters,
the command would encrypt that string and require anyone who is attempting to access enable
mode to issue 1$cf6N$Ugo.y0CXMLffTfQtyO/Xt. as the password instead of the original
unencrypted value that the MD5 hash 1$cf6N$Ugo.y0CXMLffTfQtyO/Xt. represents.
The administrator should not issue the enable password 5 $1$cf6N$Ugo.y0CXMLffTfQtyO/Xt.
command in this scenario. You can issue the enable password command to create a password
that must be used to gain access to enable mode. The syntax of the enable password command
is enable password [level level] {password | [encryption-type] encrypted-password}. The enable
password command supports the encryption-type values of 0 and 7, not 5. The encryption-level
value of 0 indicates that a clear-text password of 1 to 25 characters will follow. The MD5 hash in
this scenario is longer than 25 characters. An encryption-level value of 7 indicates that a hidden
password consisting of a Cisco-proprietary form of encryption will follow. Issuing the enable
password 5 $1$cf6N$Ugo.y0CXMLffTfQtyO/Xt. command would result in the following error:
You issue the following commands on SwitchA:
SwitchA(config)#interface port-channel 1
SwitchA(config-if)#interface range fastethernet 0/5 - 6
SwitchA(config-if-range)#channel-protocol lacp
SwitchA(config-if-range)#channel-group 1 mode on
You then issue the following commands on SwitchB:
SwitchB(config)#interface port-channel 1
SwitchB(config-if)#interface range fastethernet 0/5 - 6
SwitchB(config-if-range)#channel-protocol pagp
SwitchB(config-if-range)#channel-group 1 mode on
Which of the following statements is true about the resulting EtherChannel link between SwitchA
and SwitchB?
A.
No link is formed.
B.
A link is formed using LACP because it was configured first and has priority.
C.
A link is formed without an aggregation protocol.
D.
A link is formed using PAgP because it was configured last and has priority
Answer: A
Explanation:
An EtherChannel link is not formed in this scenario. EtherChannel is used to bundle two or more
identical, physical interfaces into a single logical link between switches. An EtherChannel can be
permanently established between switches, or it can be negotiated by using one of two
aggregation protocols: the Cisco-proprietary Port Aggregation Protocol (PAgP) or the openstandard Institute of Electrical and Electronics Engineers (IEEE) 802.3ad protocol, which is also
known as Link Aggregation Control Protocol (LACP). An EtherChannel can have up to eight active
switch ports in the bundle that forms the logical link between switches. Every switch port in the
bundle, which is also referred to as a channel group, must be configured with the same speed and
duplex settings.
To configure a switch port to use an aggregation protocol, you should use the channel-protocol {
lacp | pagp} command. The EtherChannel aggregation protocol must match on each switch, or
they will be unable to dynamically establish an EtherChannel link between them. In addition, if a
channel protocol is explicitly configured, each local switch port in the EtherChannel bundle must
be configured to operate in a mode that is compatible with the channel protocol or the switch will
display an error message and refuse to bundle the offending interface. In this scenario, the
channel protocol command on SwitchA specifies that LACP should be used to dynamically
establish an EtherChannel; however, the channel-group command attempts to configure an
incompatible operating mode. Because the channel-group command cannot override the
configuration specified by the channel-protocol command, the channel-group command issued
on SwitchA will produce an error message similar to the following sample output:
Command rejected (Channel protocol mismatch for interface Fa0/5 in group 1): the interface can
not be added to the channel group
% Range command terminated because it failed on FastEthernet0/5
To configure a switch port to be a member of a particular channel group, you should issue the
channel-group number mode {on | active | passive | {auto | desirable} [non-silent]} command.
This command uses a number parameter to specify a particular channel group; the number value
should correspond to the PortChannel interface being configured. The supported values for the
number parameter vary depending on hardware platform and IOS revision.
The following table displays the channel-group configurations that will establish an EtherChannel:
You are connecting two Catalyst 6500 switches with fiber-optic cable. When you boot SwitchA,
you receive a SYS-3-TRANSCEIVER_NOTAPPROVED error.
Which of the following is most likely the cause of the problem?
A.
There is a physical problem with the fiber cable.
B.
You have installed the SFP module upside down.
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 23
C.
You have connected a cable to an incorrect port.
D.
You have installed a third-party SFP module.
Answer: D
Explanation:
You have most likely installed a third-party Small Form-Factor Pluggable (SFP) transceiver
module in SwitchA if you receive a SYS-3-TRANSCEIVER_NOTAPPROVED error when you boot
SwitchA. An SFP module is a hot-pluggable device that enables a switch, router, or other device to
accept connections from Fibre Channel (FC) or Gigabit Ethernet cables. Cisco devices do not
support the use of third-party SFP modules.
An SFP module that is installed in a Cisco device stores identifying information, such as the
module serial number, vendor name, and security code. When a switch detects the insertion of an
SFP module, the switch software attempts to read the identifying information stored on the SFP
module. If the information is not valid or not present, the switch software will report the SYS-3-
TRANSCEIVER_NOTAPPROVED error.
The switch would not report a SYS-3-TRANSCEIVER_NOTAPPROVED error if you had
connected a cable to an incorrect port. If you connected a cable to the wrong SFP module port,
you would most likely notice that the ports on the switches are up, but the line protocol is down.
The switch would not report a SYS-3-TRANSCEIVER_NOTAPPROVED error if there were a
physical problem with the fiber cable. If the fiber cable were broken, you would notice that the port
status light-emitting diodes (LEDs) on the SFP modules are not lit.
The switch would not report a SYS-3-TRANSCEIVER_NOTAPPROVED error if you had installed
the SFP module upside down. Instead, the switch would not recognize the SFP module, and the
output from show commands would contain no information about the module.
QUESTION NO: 14
Which of the following best describes an AP deployment that connects APs to a WLC that is
housed within a switch stack?
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 24
Answer: A
Explanation:
Of the available choices, an embedded access point (AP) deployment typically connects APs to a
Cisco wireless LAN controller (WLC) that is housed within a switch stack. An AP is a device that
connects a wireless client to a wired network. The primary difference between this deployment and
others is that the WLC is embedded within a stack of switching hardware instead of existing as a
separate entity. APs can connect to the WLC by connecting to switches that are directly hosting
the WLC or switch ports that are operating on the same virtual local area network (VLAN) as the
WLC.
A lightweight AP deployment can be an embedded AP deployment. However, a lightweight AP
deployment does not always connect APs to a WLC that is housed within a switch stack. A
lightweight AP deployment requires a separate wireless controller. Wireless clients connect to
lightweight APs, which are capable of performing real-time wireless network functions but rely on a
WLC for management functions. The connection between a lightweight AP and a WLC is created
by using two tunnels established by the Control and Provisioning of Wireless Access Points
(CAPWAP) tunneling protocol. Information sent between lightweight APs and the WLC is
encapsulated in Internet Protocol (IP) packets. This process enables a lightweight AP and WLC to
manage connectivity to the same wireless local area network (WLAN) yet be separated by both
physical and logical means. This type of deployment is also known as a split-MAC architecture
because the lightweight AP handles the frames while the WLC handles the management
functions.
An autonomous AP deployment does not connect APs to a WLC that is housed within a switch
stack. An autonomous AP contains network interfaces for both wireless and wired networks; it is
typically deployed as part of an autonomous AP architecture in which APs are connected directly
to the access layer of the three-tier hierarchical network model.
A cloud-based AP deployment does not connect APs to a WLC that is housed within a switch
stack. Instead cloud-based APs connect to and are automatically configured by a WLC that is
housed in a cloud-based system. For example, a Cisco Meraki AP provides wireless access by
connecting to a centralized management system known as the Cisco Meraki Cloud. APs deployed
at the access layer of the three-tier hierarchical network model contact the cloud in order to
You are implementing common Layer 2 security measures on a Cisco switch. You create a new
VLAN with an ID of 4. No devices operate on VLAN 4. Next, you issue the following commands on
a switch interface:
switchport access vlan 4
switchport nonegotiate
Which of the following Layer 2 security measures are you implementing? (Choose two.)
A.
configuring the port mode manually
B.
disabling DTP on a port
C.
enabling port security on an access port
D.
moving the port to an unused VLAN
E.
disabling an unused port
Answer: B,D
Explanation:
You are disabling Dynamic Trunking Protocol (DTP) on a port when you issue the switchport
nonegotiate command while you are implementing common Layer 2 security measures on a
Cisco switch. In addition, you are moving the port to an unused virtual local area network (VLAN)
by issuing the switchport access vlan 4 command. By default, every network interface on a
Cisco switch is an active port. Before you deploy a switch on a network, you should take steps to
ensure that every trunk port and access port on the switch is secured and that every unused port
on the switch is disabled.
By default, all interfaces on a Cisco switch will use DTP to automatically negotiate whether an
interface should be a trunk port or an access port. The transmission of DTP packets over an
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 26
interface can be exploited by a malicious user to obtain information about the network or to
convert an interface that should be an access port into a trunked port. You should issue the
switchport nonegotiate command on a manually configured port to prevent any attempts by the
switch to negotiate by using DTP.
Moving an unused port to an unused VLAN creates a logical barrier that prevents rogue devices
from communicating on the network should such a device connect to the port. To move an access
port to an unused VLAN, you should issue the switchport access vlan vlan-id command on the
port, where vlan-id is the ID of the unused VLAN. When you move an unused port to an unused
VLAN, you should also manually configure the port as an access port by issuing the switchport
mode access command and shut down the port by issuing the shutdown command.
You are not configuring the port mode manually by issuing the commands in this scenario. To
manually configure a trunk port, you should first issue the switchport trunk encapsulation
protocol command in interface configuration mode, where protocol is the trunk encapsulation
protocol you want to use, and then issue the switchport mode trunk command in interface
configuration mode. To manually configure an access port, you should issue the switchport
mode access command in interface configuration mode. Manually configuring interfaces to use
either trunk mode or access mode effectively disables DTP and ensures that the traffic on those
ports is restricted to the intended purpose. Even so, you should issue the switchport nonegotiate
command on a manually configured trunk port to prevent any attempts by the switch to negotiate
by using DTP, because a manually configured trunk port will continue to send DTP frames.
You are not disabling an unused port by issuing the commands in this scenario. Disabling an
unused port creates a barrier that prevents rogue devices from communicating on the network
should such a device connect to the port. To disable an unused port on a switch, you should issue
the shutdown command on that port. To verify that a port is in the shutdown state, you should
issue the show interfaces type number command, where type and number specify the interface
you want to show. A port that has been shut down will be reported as administratively down by the
show interfaces type number command.
You are not enabling port security on an access port by issuing the commands in this scenario. To
protect switch interfaces against Media Access Control (MAC) flooding attacks, you should enable
port security on all access mode interfaces on the switch. Issuing the switchport port-security
command in interface configuration mode enables port security with default settings. You can
modify port security settings before you enable port security by issuing the switchport portsecurity mac-address mac-address command, the switchport port-security maximum
maximum-number-of-mac-addresses command, and the switchport port-security violation [
protect | restrict | shutdown] command.
When enabled with its default settings, port security will shut down a port on which a violation
occurs. In addition, port security will allow only the first MAC address to connect to the port to
access the port.
QUESTION NO: 16
You have enabled LAG on a WLC that contains eight distribution system ports.
How many ports will be included in the LAG bundle by default?
A.
eight
B.
one
C.
four
D.
none
Answer: A
Explanation:
By default, all eight ports will be included in the link aggregation (LAG) bundle if you have enabled
LAG on a Cisco wireless LAN controller (WLC) that contains eight distribution system ports. A
distribution system port is a data port that typically connects to a switch in Institute of Electrical
and Electronics Engineers (IEEE) 802.1Q trunk mode. Similar to EtherChannel on switches, LAG
enables multiple physical ports on a WLC to operate as one logical group. Thus, LAG enables
load balancing across links between devices and redundancy. If one link fails, the other links in the
LAG bundle will continue to function.
LAG will bundle all eight ports in this scenario. However, LAG requires only one functional physical
port in order to pass client traffic. Similar to EtherChannel, LAG enables redundancy. If one
physical port fails in a LAG bundle, the other ports are capable of passing client traffic in that port’s
place. If all but one port in a LAG bundle fails, that port will pass client traffic for all of the failed
ports.
Distribution system ports can be configured to work in pairs or independently of each other if LAG
is disabled. By default, a Cisco WLCs distribution system ports operate in 802.1Q trunk mode,
forming a trunk link between each WLC distribution system port and the switch to which it is
connected. When enabled, LAG modifies this configuration so that the ports are bundled and no
QUESTION NO: 17
Which of the following tables is used by a switch to discover the relationship between the Layer 2
address of a device and the physical port used to reach the device?
A.
the adjacency table
B.
the ARP table
C.
the VLAN table
D.
the FIB table
E.
the CAM table
Answer: E
Explanation:
The Content Addressable Memory (CAM) table is used by a switch to discover the relationship
between the Open Systems Interconnection (050 Layer 2 address of a device and the physical
port used to reach the device. Switches make forwarding decisions based on the destination MAC
address contained in a frame’s header. The switch first searches the CAM table for an entry that
matches the frame’s destination MAC address. If the frame’s destination MAC address is not
found in the table, the switch forwards the frame to all its ports, except the port from which it
received the frame. If the destination MAC address is found in the table, the switch forwards the
frame to the appropriate port. The source MAC address is also recorded if it did not previously
exist in the CAM table.
The Forwarding Information Base (FIB) is a table that contains all the prefixes from the Internet
Protocol (IP) routing table and is structured in a way that is optimized for forwarding. The FIB and
the adjacency table are the two main components of Cisco Express Forwarding (CEF), which is a
hardware-based switching method that is implemented in all OSI Layer 3-capable Catalyst
switches. The FIB is synchronized with the IP routing table and therefore contains an entry for
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 29
every IP prefix in the routing table. The IP prefixes are ordered so that when a Layer 3 address is
compared against the FIB, the longest, most specific match will be found first; therefore, prefix
lookup times are minimized.
The adjacency table maintains the Layer 2 addressing information for the FIB. Each network prefix
in the FIB is associated with a next-hop address and an outbound interface. The adjacency table
contains the Layer 2 addressing information for each next-hop address listed in the FIB and is
used to rewrite the Layer 2 header of each forwarded IP packet. You can issue the show
adjacency command to display the contents of the adjacency table.
The Address Resolution Protocol (ARP) table contains Layer 3 to Layer 2 address translations.
Whenever the switch encounters a packet destined for a Layer 3 address that does not have an
entry in the ARP table, the switch broadcasts an ARP request to query the network for the Layer 2
address. When the ARP reply is received, the switch enters the address pair into the ARP table for
future reference. You can issue the show ip arp command to display the contents of the ARP
table.
The virtual local area network (VLAN) table contains a record of the VLAN definitions on the switch
and a list of the interfaces associated with each VLAN. The VLAN table does not contain any
Layer 3 information. You can issue the show vlan command to display the contents of the VLAN
table.
Reference: https://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-seriesswitches/71079-arp-cam-tableissues.html#backinfo CCNA 200-301 Official Cert Guide, Volume 1,
Chapter 5: Analyzing Ethernet LAN Switching, Learning MAC Addresse
QUESTION NO: 18
Which of the following statements is true regarding a floating static route?
A.
A floating static route is used to provide link redundancy.
B.
A floating static route is used to provide link load balancing.
C.
A router always prefers a floating static route to a dynamically learned route.
D.
A floating static route has a lower AD than a normal static route.
Answer: A
Explanation:
A floating static route is used to provide link redundancy. When multiple routes to a network exist
and a more specific route is not available, a router will choose the route with the lowest
administrative distance (AD). Because a normal static route has a default AD of 1, a router will
always prefer a normal static route over any other type of route. You can manually assign a static
route a higher AD than 1 to prevent a router from always choosing the normal static route as the
best path to a destination network. By assigning a floating static route a higher AD than another
route, you are able to create a static route that will be used only when routes with a lower AD are
no longer available. For example, if a router’s primary path to a remote office is a dynamically
learned route and a floating static route with a higher AD is configured to use a specified exit
interface as a backup path, the router will use only the primary route to reach the remote office.
The dynamically learned route is preferred over the floating static route because the floating static
route has a higher AD than the dynamically learned route. However, if the dynamically learned
route becomes unavailable, the router will search its routing table for an available path with the
lowest AD. In this example, the router will use the floating static route to forward packets destined
to the remote office to the exit interface specified in the floating static route when the dynamically
learned route becomes unavailable.
A router will not always prefer a floating static route to a dynamically learned route. Because an
administrator can arbitrarily assign an AD to a floating static route, a router will prefer a floating
static route only if it has a lower AD than a dynamically learned route to the same destination
network. Likewise, a router will not always prefer a dynamically learned route to a floating static
route unless the dynamically learned route has an AD lower than a floating static route to the
same destination network.
A floating static route is not used for link load balancing. Load balancing is possible if multiple
paths to a destination network exist with equal ADs and if cost values exist. Because a floating
static route has a higher AD than the primary path to a destination network, a router will not use a
floating static route unless the primary path becomes unavailable.
Which of the ports on SwitchA will use PortFast?
A.
all access ports
B.
all ports
C.
no ports, because PortFast cannot be enabled globally
D.
all trunk ports
Answer: A
Explanation:
All access ports on SwitchA will use PortFast. PortFast enables faster connectivity for hosts
connected to an access-layer switch port. If PortFast is not enabled, a switch port transitions
through the Spanning Tree Protocol (STP) listening and learning states before it enters the
forwarding state. This process can take as long as 30 seconds if the default STP timers are used.
In addition, port initialization could take as long as 50 seconds if Port Aggregation Protocol (PAgP)
is enabled. PortFast transitions the port into the STP forwarding state without going through the
STP listening and learning states.
PortFast is a feature that should be used only on switch ports that are connected to end devices,
such as user workstations or print devices. Because PortFast immediately transitions a port to the
STP forwarding state, skipping over the listening and learning states, steps should be taken to
ensure that a switch that is inadvertently or intentionally connected to the port cannot influence the
STP topology or cause switching loops. Cisco recommends that switches should not be connected
to access ports that are configured with PortFast; switches should always be connected by trunk
ports.
You can enable PortFast for specific ports by issuing the spanning-tree portfast command in
interface configuration mode. However, you can also enable PortFast for all access ports on the
switch by issuing the spanning-tree portfast default command in global configuration mode;
trunk ports are not affected by the spanning-tree portfast default command.
Which of the following VLANs is used by DTP to negotiate a trunk link when 802.1Q encapsulation
is configured on the interface?
A.
the native VLAN
B.
1
C.
0
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 34
D.
4094
Answer: A
Explanation:
Dynamic Trunking Protocol (DTP) uses the native virtual local area network (VLAN) to negotiate a
trunk link when Institute of Electrical and Electronics Engineers (IEEE) 802.1Q encapsulation is
configured on the interface. Because DTP frames are always transmitted on the native VLAN,
changing the native VLAN can have unexpected consequences. For example, if the native VLAN
is not configured identically on both ends of a link, a trunk will not dynamically form.
By default, all interfaces on a Cisco switch will use DTP to automatically negotiate whether an
interface should be an IEEE 802.1Q trunk port or an access port. There are two dynamic modes of
operation for a switch port:
* auto – operates in access mode unless the neighboring interface actively negotiates to operate
as a trunk
* desirable – operates in access mode unless it can actively negotiate a trunk connection with a
neighboring interface
The default dynamic mode is dependent on the hardware platform. In general, departmental-level
or wiring closet-level switches default to auto mode, whereas backbone-level switches default to
desirable mode. Because a switch port in auto mode does not actively negotiate to operate in
trunk mode, it will form a trunk link only if negotiations are initiated by the neighboring interface. A
neighboring interface will initiate negotiations only if it is configured to operate in trunk mode or
desirable mode. By contrast, a switch port in desirable mode will actively negotiate to operate in
trunk mode and will form a trunk link with a neighboring port that is configured to operate in trunk,
desirable, or auto mode.
Although VLAN 1 is the default native VLAN on a Cisco switch, the native VLAN can be changed
by issuing the switchport trunk native vlan vlan-id command from interface configuration mode.
Because the configuration of the native VLAN in this scenario is not specified, you cannot be
certain that VLAN 1 is still configured as the native VLAN.
VLAN 0 is a special VLAN used by Internet Protocol (IP) phones to indicate to an upstream switch
that it is sending frames that have a configured 802.1p priority but that should reside in the native
VLAN. This VLAN is used if voice traffic and data traffic should be separated but do not require
that a unique voice virtual VLAN be created.
VLAN 4094 is an extended VLAN and is not used for DTP frames unless it has been configured as
the native VLAN. VLAN IDs in the number range from 1006 through 4094 are available only on
extended IOS images. A VLAN ID can be a value from 1 through 1005 or from 1 through 4094,
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 35
depending on the IOS image and switch model. VLANs 1002 through 1005 are reserved for Token
Ring and Fiber Distributed Data Interface (FDDI) VLANs. VLANs in this reserved range, as well as
the switch’s native VLAN, can be modified but not deleted.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/
Which of the following statements best describe why WRED is useful for networks where the
majority of traffic uses TCP? (Choose two.)
A.
TCP sources reduce traffic flow when congestion occurs.
B.
TCP packets that are dropped must be retransmitted.
C.
TCP packets cannot arrive out of sequence
E.
TCP packets must have priority over UDP packets.
Answer: A,B
Explanation:
Weighted random early detection (WRED) is useful for networks where the majority of traffic uses
Transmission Control Protocol (TCP) because TCP packets that are dropped must be
retransmitted. Additionally, TCP sources reduce traffic flow when congestion occurs, thereby
further slowing down the network.
WRED is a congestion avoidance mechanism that addresses packet loss caused by tail drop,
which occurs when new incoming packets are dropped because a router’s queues are too full to
accept them. Tail drop causes a problem called global TCP synchronization, whereby all of the
TCP sources on a network reduce traffic flow during periods of congestion and then the TCP
sources increase traffic flow when the congestion is reduced, which again causes congestion and
dropped packets. When WRED is implemented, you can configure different tail drop thresholds for
each IP precedence or Differentiated Services Code Point (DSCP) value so that lower-priority
traffic is more likely to be dropped than higher-priority traffic, thereby avoiding global TCP
synchronization.
WRED does not address header size. To compress the header of TCP packets, you should
implement TCP header compression. Because TCP header compression compresses only the
header, not the entire packet, TCP header compression works best for packets with small
payloads, such as those carrying interactive data.
WRED does not address the order in which TCP packets arrive. TCP packets can arrive in any
order because each packet is numbered with a sequence number. When the TCP packets arrive
at their destination, TCP rearranges the packets into the correct order.
Although it is possible for TCP packets to require a higher priority than User Datagram Protocol
(UDP) packets, it is also possible for UDP packets to require a higher priority than TCP packets.
UDP traffic that requires a high priority includes Voice over IP (VoIP) traffic and real-time
multimedia traffic. You should avoid placing TCP and UDP traffic in the same traffic class,
because doing so can cause TCP starvation. UDP traffic is not aware of packet loss due to
congestion control mechanisms, so devices sending UDP traffic might not reduce their
transmission rates. This behavior causes the UDP traffic to dominate the queue and prevent TCP
traffic from resuming a normal flow.
Which of the following devices cannot be connected to leaf nodes in the Cisco ACI architecture?
A.
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 48
leaf nodes
B.
spine nodes
C.
EPGs
D.
application servers
E.
APICs
Answer: A
Explanation:
In the Cisco Application Centric Infrastructure (ACI), leaf nodes cannot connect to each other.
Cisco ACI is a data center technology that uses switches, categorized as spine and leaf nodes, to
dynamically implement network application policies in response to application-level requirements.
Network application policies are defined on a Cisco Application Policy Infrastructure Controller
(APIC) and are implemented by the spine and leaf nodes.
The spine and leaf nodes create a scalable network fabric that is optimized for east-west data
transfer, which in a data center is typically traffic between an application server and its supporting
data services, such as database or file servers. Each spine node requires a connection to each
leaf node; however, spine nodes do not interconnect nor do leaf nodes interconnect. Despite its
lack of fully meshed connections between spine nodes or between leaf nodes, this physical
topology enables nonlocal traffic to pass from any ingress leaf interface to any egress leaf
interface through a single, dynamically selected spine node. By contrast, local traffic is passed
directly from an ingress interface on a leaf node to the appropriate egress interface on the same
leaf node.
Because a spine node has a connection to every leaf node, the scalability of the fabric is limited by
the number of ports on the spine node, not by the number of ports on the leaf node. For example,
if additional access ports are needed, a new leaf node can be added to the infrastructure as long
as there is a sufficient number of ports remaining on the existing spine nodes to support the new
leaf node. In addition, redundant connections between a spine and leaf pair are unnecessary
because the nature of the topology ensures that each leaf has multiple connections to the network
fabric. Therefore, each spine node requires only a single connection to each leaf node.
Redundancy is also provided by the presence of multiple APICs, which are typically deployed as a
cluster of three controllers. APICs are not directly involved in forwarding traffic and are therefore
not required to connect to every spine or leaf node. Instead, the APIC cluster is connected to one
or more leaf nodes in much the same manner that other endpoint groups (EPGs), such as
application servers, are connected. Because APICs are not directly involved in forwarding traffic,
the failure of an APIC does not affect the ability of the fabric to forward traffic.
What percentage of wireless coverage overlap is considered appropriate to ensure that wireless
clients do not lose connectivity when roaming from one AP to another?
A.
10 to 15 percent
B.
40 to 50 percent
C.
0 to 5 percent
D.
more than 50 percent
E.
20 to 35 percent
Answer: A
Explanation:
A wireless coverage overlap area of 10 to 15 percent is considered appropriate to ensure that
wireless clients do not lose connectivity when roaming from one access point (AP) to another. Too
little wireless coverage overlap often causes gaps in wireless coverage, which prevents roaming
clients from being able to seamlessly transition from one AP to another. Providing more than 10 to
15 percent wireless coverage overlap would require you to purchase more APs than are
necessary for adequate wireless coverage. In addition, too much wireless coverage overlap could
introduce radio interference from neighboring APs. You should ensure that the APs on the network
use nonoverlapping channels to avoid radio interference from neighboring APs. For example,
although 802.11b can be configured to use 11 different channels in the United States and Canada,
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 52
only three nonoverlapping channels can be used: 1, 6, and 11.
Which of the following are used by WPA2 to provide MICs and encryption? (Choose two.)
A.
CCMP
B.
TKIP
C.
GCMP
D.
AES
E.
RC4
Answer: A,D
Explanation:
Advanced Encryption Standard (AES) and Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol (CCMP) are used by Wi-Fi Protected Access 2 (WPA2) to provide
message integrity checks (MICs) and encryption. Wireless security protocols use MICs to prevent
data tampering. Encryption is used to protect confidentiality.
WPA2, which implements the 802.11i wireless standard, was developed to address the security
vulnerabilities in the original WPA standard. One enhancement over WPA included in WPA2 is the
encryption algorithm. AES is a stronger encryption algorithm than the RC4 algorithm used by
earlier wireless standards. When AES is implemented, a 128-bit block cipher is used to encrypt
data and a security key of 128, 192, or 256 bits can be used. This is a processor-intensive
operation, and implementing WPA2 and AES often requires new hardware, such as new wireless
access points (WAPs) and new client wireless network adapters.
In addition to AES, WPA2 also uses CCMP to provide encryption. CCMP is an encryption
mechanism that uses block ciphers. In WPA2, CCMP is used by AES during the encryption
process. The WPA2 encryption process is thus sometimes known as AES-CCMP.
RC4 is a stream cipher encryption algorithm used in the Wired Equivalent Privacy (WEP) protocol.
Unlike AES, which supports an encryption key length of 256 bits, RC4 supports an encryption key
length of up to 128 bits. Consequently, RC4 is not as secure as AES. Furthermore, RC4 uses a
stream cipher, which is a less secure encryption method. RC4 is not used with WPA2.
QUESTION NO: 32
Which of the following examples best describes the SaaS service model?
A.
A company licenses an office suite, including email service, that is delivered to the end user
through a web browser.
B.
A company hires a service provider to deliver cloud-based processing and storage that will house
multiple virtual hosts configured in a variety of ways.
C.
A company obtains a subscription to use a service provider’s infrastructure, programming tools,
and programming languages to develop and serve cloud-based applications.
D.
A company moves all company-wide policy documents to an Internet-based virtual file system
hosted by a service provider
Answer: A
Explanation:
A company that licenses an office suite, including email service, that is delivered to the end user
through a web browser is an example of the Software as a Service (SaaS) service model. The
National Institute of Standards and Technology (NIST) defines three service models in its
definition of cloud computing: SaaS, Infrastructure as a Service (IaaS), and Platform as a Service
(PaaS).
The SaaS service model enables its consumer to access applications running in the cloud
infrastructure but does not enable the consumer to manage the cloud infrastructure or the
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 56
configuration of the provided applications. Of the three service models, SaaS exposes the least
amount of the consumer’s network to the cloud and is the least likely to require changes to the
consumer’s network design. A company that licenses a service provider’s office suite and email
service that is delivered to end users through a web browser is using SaaS. SaaS providers use
an Internet-enabled licensing function, a streaming service, or a web application to provide end
users with software that they might otherwise install and activate locally. Web-based email clients,
such as Gmail and Outlook.com, are examples of SaaS.
The PaaS service model provides its consumer with slightly more freedom than the SaaS model
by enabling the consumer to install and possibly configure provider-supported applications in the
cloud infrastructure. A company that uses a service provider’s infrastructure, programming tools,
and programming languages to develop and serve cloud-based applications is using PaaS. PaaS
enables a consumer to use the service provider’s development tools or Application Programming
Interface (API) to develop and deploy specific cloud-based applications or services. Another
example of PaaS might be using a third party’s MySQL database and Apache services to build a
cloud-based customer relationship management (CRM) platform.
The IaaS service model provides the greatest degree of freedom by enabling its consumer to
provision processing, memory, storage, and network resources within the cloud infrastructure. The
IaaS service model also enables its consumer to install applications, including operating systems
(OSs) and custom applications. However, with IaaS, the cloud infrastructure remains in control of
the service provider. A company that hires a service provider to deliver cloud-based processing
and storage that will house multiple physical or virtual hosts configured in a variety of ways is
using IaaS. For example, a company that wanted to establish a web server farm by configuring
multiple Linux Apache MySQL PHP (LAMP) servers could save hardware costs by virtualizing the
farm and using a provider’s cloud service to deliver the physical infrastructure and bandwidth for
the virtual farm. Control over the OS, software, and server configuration would remain the
responsibility of the organization, whereas the physical infrastructure and bandwidth would be the
responsibility of the service provider. Using a third party’s infrastructure to host corporate Domain
Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) servers is another
example of IaaS.
A company that moves all company-wide policy documents to an Internet-based virtual file system
hosted by a third party is using cloud storage. Cloud storage is a term used to describe the use of
a service provider’s virtual file system as a document or file repository. Cloud storage enables an
organization to conserve storage space on a local network. However, cloud storage is also a
security risk in that the organization might not have ultimate control over who can access the files.
You are configuring a normal WLAN by using the WLC GUI. You want to configure the WLAN with
the SSID of MyCompanyLAN. You click Create New on the WLANs page.
Which action are you most likely to perform first?
A.
Assign a profile name of up to 32 characters in the Profile Name field.
B.
Select Guest LAN from the Type drop-down list box.
C.
Assign the SSID of MyCompanyLAN in the WLAN SSID field.
D.
Assign a unique ID of 1 in the ID field
Answer: A
Explanation:
Most likely, you will assign a profile name of up to 32 characters in the Profile Name field first if
you want to configure a wireless local area network (WLAN) by using the Cisco wireless LAN
controller (WLC) graphical user interface (GUI). The Cisco WLC GUI is a browser-based interface
that enables you to configure various wireless network settings. In this scenario, you want to
create a normal WLAN named MyCompanyLAN. To create a new normal WLAN, you should
complete four steps on the WLANs > New page of the WLC GUI:
1. Select the type of WLAN you are creating from the Type drop-down list box; by default, this
value is configured to WLAN.
2. Enter a 32-character or less profile name in the Profile Name field.
3. Enter a 32-character or less Service Set Identifier (SSID) in the SSID field.
4. Choose a WLAN ID from the ID drop-down list box.
There are three types of WLANs you can create by using the WLC GUI:
1. A normal WLAN, which is the WLAN to which wireless clients inside your company’s walls will
connect
2. A Guest LAN, which is the WLAN to which guest wireless clients inside your company’s walls
will connect
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 58
3. A Remote LAN, which is the WLAN configuration for wired ports on the WLC
In this scenario, you are configuring a normal WLAN with an SSID of MyCompanyLAN.
Therefore, you do not need to select WLAN from the Type drop-down list box, because WLAN is
the default value for this drop-down list box. The Type drop-down list box should be configured to
WLAN in order to create a normal WLAN by using the WLC GUI.
After you configure the type of WLAN, you should configure a profile name for the WLAN in the
Profile Name field. The profile name can be up to 32 characters in length and should uniquely
identify the WLAN that you are configuring. The value that you enter in the Profile Name field will
be used by the WLC to identify the WLAN on other configuration pages. For simplicity, many
administrators choose to use the same value for the Profile Name field as they plan to configure
in the SSID field, although this is not required.
After you configure the Profile Name field, you should configure a value of up to 32 characters in
the SSID field. The SSID is the WLAN network name that will be broadcast to wireless clients. In
general, an SSID is the name for the collection of wireless clients that are all operating with the
same Institute of Electrical and Electronics Engineers (IEEE) 802.11 configuration.
Finally, you should configure the WLAN ID on which the WLAN will operate. By default, the ID
drop-down list box on the WLANs > New page will be configured to a value of 1. You can choose
to configure a WLAN on any WLAN ID in the range from 1 through 512. Although Cisco controllers
support a maximum of 512 WLANs, only 16 can be actively configured.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/configguide/b_cg85/wlans.html#ID72 CCNA 200-301 Official Cert Guide, Volume 1, Chapter 29: Building
a Wireless LAN, Configuring a WLAN
Which of the following Application layer protocols use UDP for unsynchronized, connectionless
data transfer? (Choose two.)
A.
SMTP
B.
HTTP
C.
FTP
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 59
D.
TFTP
E.
SNMP
Answer: D,E
Explanation:
Simple Network Management Protocol (SNMP) and Trivial File Transfer Protocol (TFTP) use User
Datagram Protocol (UDP) for unsynchronized, connectionless data transfer. UDP is a Transport
layer protocol that does not use sequence numbers or establish synchronized connections.
Because of UDP’s connectionless nature, transmitted datagrams can appear out of sequence or
can be dropped without notice; thus it is the responsibility of the Application layer protocol to
reorder packets or request the transmission of lost datagrams. SNMP is used to monitor and
manage network devices. TFTP uses UDP port 69 to transfer files unreliably and without
authentication over a network. Other common Application layer protocols that use UDP include
Dynamic Host Configuration Protocol (DHCP), which is used to assign Internet Protocol (IP)
addressing information to clients, Network Time Protocol (NTP), which is used to coordinate time
on a network, and Remote Authentication Dial-In User Service (RADIUS), which is used to
authenticate users.
Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP) use Transmission Control
Protocol (TCP) for reliable, connection-oriented data transfer. TCP is a Transport layer protocol
that uses sequencing and error-checking to ensure that transmitted data can be easily reordered if
packets arrive out of sequence and can be retransmitted if any packets are lost. Because TCP
handles data sequencing and the retransmission of lost data, the Application layer protocols that
rely on TCP do not need to handle those tasks and can rely on receiving reliable, ordered data.
FTP, which is used to transfer files over a network, uses TCP ports 20 and 21. Cisco devices can
reliably transfer IOS images by using FTP. FTP requires the transmission of authentication
credentials, even if anonymous FTP is in use, but those credentials are transmitted in plain text.
Other common TCP protocols are HTTP, which is used to transfer webpages over the Internet,
Simple Mail Transfer Protocol (SMTP), which is used to send email messages, Post Office
Protocol 3 (POP3), which is used to retrieve email messages, and Telnet, which is used to
manage network devices.
Reference: https://www.iana.org/protoco
QUESTION NO: 35
Which of the following is a valid HSRP version 2 virtual MAC address?
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 60
A.
0007.6400.0102
B.
0000.5E00.0101
C.
0000.0C9F.F00A
D.
0000.0C07.AC0B
E.
0005.73A0.0FFF
Answer: C
Explanation:
Of the available choices, only 0000.0C9F.F00A is a valid Hot Standby Router Protocol (HSRP)
version 2 virtual Media Access Control (MAC) address. HSRP is a Cisco-proprietary protocol that
enables multiple routers to function as a single gateway for the network. HSRP configures two or
more routers to share a virtual Internet Protocol (IP) address and a virtual MAC address so that
the group of routers appears as a single device to other hosts on the network.
Based on priority value, HSRP elects a single active router and a standby router. The active router
is the router with the highest priority; it forwards packets, responds to Address Resolution Protocol
(ARP) requests with a virtual MAC address, and can be the only router that is explicitly configured
with the virtual IP address. The standby router is the router with the second-highest priority. If
multiple HSRP routers have the same priority, the router with the highest IP address is elected as
the active router. The router with the second-highest IP address is elected as the standby router,
which will assume the role of the active router if the active router fails. To participate in the active
and standby router election process, each HSRP router must be a member of the same group.
There are two versions of HSRP for IP version 4 (IPv4) networks: HSRP version 1 and HSRP
version 2. An HSRP version 1 group is identified by a group number from 0 through 255. An HSRP
version 2 group is identified by a group number from 0 through 4095. The default HSRP group
value for both versions is 0.
To differentiate the virtual MAC addresses of the various groups, HSRP version 1 uses a special
format based on the well-known virtual MAC address 0000.0007.ACxx, where xx is the group
number in hexadecimal format. HSRP version 2, on the other hand, uses a virtual MAC address of
0000.0C9F.Fxxx, where xxx is the group number in hexadecimal format. In this scenario, the
virtual MAC address for the HSRP group is 0000.0C9F.F00A; the group number is identified by
the final three digits, OOA, in the virtual MAC address. Thus, because 00A is the hexadecimal
equivalent of 10 in decimal notation, the virtual MAC address 0000.0C9F.F00A indicates that the
HSRP group number for this scenario is 10.
Cisco 200-301 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 61
The virtual MAC address 0000.5E00.0101 is not an HSRP version 2 virtual MAC address. This
MAC address is a Virtual Router Redundancy Protocol (VRRP) MAC address. VRRP is an Internet
Engineering Task Force (IETF)-standard First-Hop Redundancy Protocol (FHRP) that is supported
by both Cisco and non-Cisco devices. However, if only Cisco devices are used in the topology and
a choice between HSRP and VRRP is available, Cisco recommends using HSRP. A VRRP virtual
MAC address typically uses the 0000.5E00.01xx format, where xx is the VRRP group number.
The virtual MAC address 0007.B400.0102 is not an HSRP version 2 virtual MAC address. This
MAC address is a Gateway Load Balancing Protocol (GLBP) virtual MAC address. The GLBP
active virtual gateway (AVG) assigns a virtual MAC address to a maximum of four primary active
virtual forwarders (AVFs); all other routers in the group are considered secondary AVFs and are
placed in the listen state. GLBP virtual MAC addresses typically use the 0007.B400.xxyy format,
where xx represents the GLBP group number and yy represents the AVF number.
The virtual MAC address 0005.73A0.0FFF is not an HSRP version 2 virtual MAC address. There
is a version of HSRP for IPv6 that uses a range of virtual MAC addresses from 0005.73A0.0000
through 0005.73A0.0FFF. However, configuring HSRP for IPv6 is beyond the scope of CCNA.