Download Cisco Certified Network Associate (200-301 CCNA).200-301.ITExamAnswers.2022-08-12.669q.vcex

Vendor: Cisco
Exam Code: 200-301
Exam Name: Cisco Certified Network Associate (200-301 CCNA)
Date: Aug 12, 2022
File Size: 39 MB
Downloads: 25

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What are two benefits of network automation? (Choose two)
  1. reduced operational costs
  2. reduced hardware footprint
  3. faster changes with more reliable results
  4. fewer network failures
  5. increased network security
Correct answer: AC
Question 2
Which command enables a router to become a DHCP client?
  1. ip address dhcp
  2. ip helper-address
  3. ip dhcp pool
  4. ip dhcp client
Correct answer: A
Explanation:
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command "ip address dhcp".Note: The command "ip helper-address" enables a router to become a DHCP Relay Agent.Reference:  https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/12-4/dhcp-12-4-book/config-dhcp-client.html
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command "ip address dhcp".
Note: The command "ip helper-address" enables a router to become a DHCP Relay Agent.
Reference:  
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/12-4/dhcp-12-4-book/config-dhcp-client.html
Question 3
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
  1. disabling TPC so that access points can negotiate signal levels with their attached wireless devices
  2. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
  3. allocating nonoverlapping channels to access points that are in close physical proximity to one another
  4. configuring access points to provide clients with a maximum of 5 Mbps
Correct answer: C
Question 4
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)
  1. 2000::/3
  2. 2002::5
  3. FC00::/7
  4. FF02::1
  5. FF02::2
Correct answer: DE
Explanation:
When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2).Reference:https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2).
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
Question 5
Which option about JSON is true?
  1. uses predefined tags or angle brackets (<>) to delimit markup text
  2. used to describe structured data that includes arrays
  3. used for storing information
  4. similar to HTML, it is more verbose than XML
Correct answer: B
Explanation:
JSON data is written as name/value pairs.A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:"name":"Mark"JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..For example:{"name":"John","age":30,"cars":[ "Ford", "BMW", "Fiat" ]}
JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:
"name":"Mark"
JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..
For example:
{
"name":"John",
"age":30,
"cars":[ "Ford", "BMW", "Fiat" ]
}
Question 6
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
  1. global unicast
  2. unique local
  3. link-local
  4. multicast
Correct answer: B
Explanation:
A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the global Internet.Note: In the past, Site-local addresses (FEC0::/10) are equivalent to private IP addresses in IPv4 but now they are deprecated.Link-local addresses only used for communications within the local subnet. It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the global Internet.
Note: In the past, Site-local addresses (FEC0::/10) are equivalent to private IP addresses in IPv4 but now they are deprecated.
Link-local addresses only used for communications within the local subnet. It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
Question 7
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
  1. enable secret
  2. service password-encryption
  3. username Cisco password encrypt
  4. enable password
Correct answer: B
Question 8
What are two southbound APIs? (Choose two)
  1. OpenFlow
  2. NETCONF
  3. Thrift
  4. CORBA
  5. DSC
Correct answer: AB
Explanation:
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.Other southbound APIs are:onePK: a Cisco proprietary SBI to inspect or modify the network element configuration without hardware upgrades.OpFlex: an open-standard, distributed control system. It send "summary policy" to network elements.
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.
The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.
Other southbound APIs are:
  • onePK: a Cisco proprietary SBI to inspect or modify the network element configuration without hardware upgrades.
  • OpFlex: an open-standard, distributed control system. It send "summary policy" to network elements.
Question 9
Which set of action satisfy the requirement for multi-factor authentication?
  1. The user swipes a key fob, then clicks through an email link.
  2. The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.
  3. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen.
  4. The user enters a user name and password and then re-enters the credentials on a second screen.
Correct answer: B
Explanation:
This is an example of how two-factor authentication (2FA) works:The user logs in to the website or service with their username and password.The password is validated by an authentication server and, if correct, the user becomes eligible for the second factor.The authentication server sends a unique code to the user's second-factor method (such as a smartphone app).The user confirms their identity by providing the additional authentication for their second-factor method.
This is an example of how two-factor authentication (2FA) works:
  1. The user logs in to the website or service with their username and password.
  2. The password is validated by an authentication server and, if correct, the user becomes eligible for the second factor.
  3. The authentication server sends a unique code to the user's second-factor method (such as a smartphone app).
  4. The user confirms their identity by providing the additional authentication for their second-factor method.
Question 10
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
  1. adapters that support all families of Cisco IOS software
  2. SDKs that support interaction with third-party network equipment
  3. customized versions for small, medium, and large enterprises
  4. REST APIs that allow for external applications to interact natively with Cisco DNA Center
  5. modular design that is upgradable as needed
Correct answer: BD
Explanation:
Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities:Intent-based APIs leverage the controller and enable business and IT applications to deliver intent to the network and to reap network analytics and insights for IT and business innovation.Process adapters, built on integration APIs, allow integration with other IT and network systems to streamline IT operations and processes.Domain adapters, built on integration APIs, allow integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent intent-based infrastructure across the entire IT environment.SDKs allow management to be extended to third-party vendor's network devices to offer support for diverse environments.
Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities:
  • Intent-based APIs leverage the controller and enable business and IT applications to deliver intent to the network and to reap network analytics and insights for IT and business innovation.
  • Process adapters, built on integration APIs, allow integration with other IT and network systems to streamline IT operations and processes.
  • Domain adapters, built on integration APIs, allow integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent intent-based infrastructure across the entire IT environment.
  • SDKs allow management to be extended to third-party vendor's network devices to offer support for diverse environments.
Question 11
What are two benefits of network automation? (Choose two)
  1. reduced operational costs
  2. reduced hardware footprint
  3. faster changes with more reliable results
  4. fewer network failures
  5. increased network security
Correct answer: AC
Question 12
Which command enables a router to become a DHCP client?
  1. ip address dhcp
  2. ip helper-address
  3. ip dhcp pool
  4. ip dhcp client
Correct answer: A
Explanation:
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command "ip address dhcp".Note: The command "ip helper-address" enables a router to become a DHCP Relay Agent.Reference:  https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/12-4/dhcp-12-4-book/config-dhcp-client.html
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command "ip address dhcp".
Note: The command "ip helper-address" enables a router to become a DHCP Relay Agent.
Reference:  
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/12-4/dhcp-12-4-book/config-dhcp-client.html
Question 13
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
  1. disabling TPC so that access points can negotiate signal levels with their attached wireless devices
  2. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
  3. allocating nonoverlapping channels to access points that are in close physical proximity to one another
  4. configuring access points to provide clients with a maximum of 5 Mbps
Correct answer: C
Question 14
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)
  1. 2000::/3
  2. 2002::5
  3. FC00::/7
  4. FF02::1
  5. FF02::2
Correct answer: DE
Explanation:
When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2).Reference:https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2).
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
Question 15
Which option about JSON is true?
  1. uses predefined tags or angle brackets (<>) to delimit markup text
  2. used to describe structured data that includes arrays
  3. used for storing information
  4. similar to HTML, it is more verbose than XML
Correct answer: B
Explanation:
JSON data is written as name/value pairs.A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:"name":"Mark"JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..For example:{"name":"John","age":30,"cars":[ "Ford", "BMW", "Fiat" ]}
JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:
"name":"Mark"
JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..
For example:
{
"name":"John",
"age":30,
"cars":[ "Ford", "BMW", "Fiat" ]
}
Question 16
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
  1. global unicast
  2. unique local
  3. link-local
  4. multicast
Correct answer: B
Explanation:
A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the global Internet.Note: In the past, Site-local addresses (FEC0::/10) are equivalent to private IP addresses in IPv4 but now they are deprecated.Link-local addresses only used for communications within the local subnet. It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the global Internet.
Note: In the past, Site-local addresses (FEC0::/10) are equivalent to private IP addresses in IPv4 but now they are deprecated.
Link-local addresses only used for communications within the local subnet. It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
Question 17
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
  1. enable secret
  2. service password-encryption
  3. username Cisco password encrypt
  4. enable password
Correct answer: B
Question 18
What are two southbound APIs? (Choose two)
  1. OpenFlow
  2. NETCONF
  3. Thrift
  4. CORBA
  5. DSC
Correct answer: AB
Explanation:
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.Other southbound APIs are:onePK: a Cisco proprietary SBI to inspect or modify the network element configuration without hardware upgrades.OpFlex: an open-standard, distributed control system. It send "summary policy" to network elements.
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.
The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.
Other southbound APIs are:
  • onePK: a Cisco proprietary SBI to inspect or modify the network element configuration without hardware upgrades.
  • OpFlex: an open-standard, distributed control system. It send "summary policy" to network elements.
Question 19
Which set of action satisfy the requirement for multi-factor authentication?
  1. The user swipes a key fob, then clicks through an email link.
  2. The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.
  3. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen.
  4. The user enters a user name and password and then re-enters the credentials on a second screen.
Correct answer: B
Explanation:
This is an example of how two-factor authentication (2FA) works:The user logs in to the website or service with their username and password.The password is validated by an authentication server and, if correct, the user becomes eligible for the second factor.The authentication server sends a unique code to the user's second-factor method (such as a smartphone app).The user confirms their identity by providing the additional authentication for their second-factor method.
This is an example of how two-factor authentication (2FA) works:
  1. The user logs in to the website or service with their username and password.
  2. The password is validated by an authentication server and, if correct, the user becomes eligible for the second factor.
  3. The authentication server sends a unique code to the user's second-factor method (such as a smartphone app).
  4. The user confirms their identity by providing the additional authentication for their second-factor method.
Question 20
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
  1. adapters that support all families of Cisco IOS software
  2. SDKs that support interaction with third-party network equipment
  3. customized versions for small, medium, and large enterprises
  4. REST APIs that allow for external applications to interact natively with Cisco DNA Center
  5. modular design that is upgradable as needed
Correct answer: BD
Explanation:
Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities:Intent-based APIs leverage the controller and enable business and IT applications to deliver intent to the network and to reap network analytics and insights for IT and business innovation.Process adapters, built on integration APIs, allow integration with other IT and network systems to streamline IT operations and processes.Domain adapters, built on integration APIs, allow integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent intent-based infrastructure across the entire IT environment.SDKs allow management to be extended to third-party vendor's network devices to offer support for diverse environments.
Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities:
  • Intent-based APIs leverage the controller and enable business and IT applications to deliver intent to the network and to reap network analytics and insights for IT and business innovation.
  • Process adapters, built on integration APIs, allow integration with other IT and network systems to streamline IT operations and processes.
  • Domain adapters, built on integration APIs, allow integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent intent-based infrastructure across the entire IT environment.
  • SDKs allow management to be extended to third-party vendor's network devices to offer support for diverse environments.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!