Cisco 200-301 Questions and Answers Contents Question 001 ........................................................................................................................................3 Question 002 ........................................................................................................................................6 Question 003 ......................................................................................................................................11 Question 004 ......................................................................................................................................15 Question 005 ......................................................................................................................................18 Question 006 ......................................................................................................................................24 Question 007 ......................................................................................................................................28 Question 008 ......................................................................................................................................33 Question 009 ......................................................................................................................................40 Question 010 ......................................................................................................................................41 Question 011 ......................................................................................................................................42 Question 012 ......................................................................................................................................43 Question 013 ......................................................................................................................................44 Question 014 ......................................................................................................................................46 Question 015 ......................................................................................................................................47 Question 016 ......................................................................................................................................47 Question 017 ......................................................................................................................................47 Question 018 ......................................................................................................................................48 Question 019 ......................................................................................................................................49 Question 020 ......................................................................................................................................50 Question 021 ......................................................................................................................................53 Question 022 ......................................................................................................................................54 Question 023 ......................................................................................................................................54 Question 024 ......................................................................................................................................55 Question 025 ......................................................................................................................................57 Question 026 ......................................................................................................................................58 Question 027 ......................................................................................................................................59 Question 028 ......................................................................................................................................60 Question 029 ......................................................................................................................................61 Question 030 ......................................................................................................................................62 Question 021 ......................................................................................................................................64 Question 022 ......................................................................................................................................65 Question 023 ......................................................................................................................................66 Page 1 of 112 Question 024 ......................................................................................................................................67 Question 025 ......................................................................................................................................68 Question 026 ......................................................................................................................................70 Question 027 ......................................................................................................................................71 Question 028 ......................................................................................................................................72 Question 029 ......................................................................................................................................73 Question 030 ......................................................................................................................................74 Page 2 of 112 Question 001 IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet, and the LAN at 192.168.0.0/24 connected to SW1. 1. 2. 3. 4. Configure reachability to the switch SW1 LAN subnet in router R2. Configure default reachability to the Internet subnet in router R1. Configure a single static route in router R2 to reach the Internet subnet considering both redundant links between routers R1 and R2. Ad default route is NOT allowed on router R2. Configure a static route in router R1 towards the switch SW1 LAN subnet where the primary link must be through Gi 0/0/1 and the backup link must be through GI 0/0/2 using a floating route. Use the minimal administrative distance value when required. Page 3 of 112 Answer 001: 1. Configure reachability to the switch SW1 LAN subnet in router R2. enable configure terminal ! ip route 192.168.0.0 255.255.255.0 10.10.31.1 end copy running-config startup-config R2# ping 192.168.0.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.0.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms 2. Configure default reachability to the Internet subnet in router R1. enable configure terminal ! ip route 0.0.0.0 0.0.0.0 10.10.13.3 end copy running-config startup-config R1#ping 172.20.20.129 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.20.20.129, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms 3. Configure a single static route in router R2 to reach the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed on router R2. enable configure terminal ! ip route 172.20.20.128 255.255.255.128 Gi 0/0/1 ip route 172.20.20.128 255.255.255.128 Gi 0/0/2 end copy running-config startup-config <asymmetrical routing occurs – misses alternate pings> Page 4 of 112 4. Configure a static route in router R1 towards the switch SW1 LAN subnet where the primary link must be through Gi 0/0/1 and the backup link must be through GI 0/0/2 using a floating route. Use the minimal administrative distance value when required. enable configure terminal ! ip route 192.168.0.0 255.255.255.0 Gi 0/0/1 (default AD = 1 ) ip route 192.168.0.0 255.255.255.0 Gi 0/0/1 2 (AD = 2 ) end copy running-config startup-config R1# ping 192.168.0.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.0.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms Note: At R1, here is the routing table with Gi 0/0/1 up: R1# show ip route Gateway of last resort is 10.10.13.3 to network 0.0.0.0 C C L C L C L S S* 10.0.0.0/8 is variably subnetted, 7 subnets, 3 masks 10.10.1.1/32 is directly connected, Loopback0 10.10.12.0/25 is directly connected, GigabitEthernet0/0/1 10.10.12.1/32 is directly connected, GigabitEthernet0/0/1 10.10.12.128/25 is directly connected, GigabitEthernet0/0/2 10.10.12.129/32 is directly connected, GigabitEthernet0/0/2 10.10.13.0/24 is directly connected, GigabitEthernet0/0/0 10.10.13.1/32 is directly connected, GigabitEthernet0/0/0 192.168.0.0/24 is directly connected, GigabitEthernet0/0/1 0.0.0.0/0 [1/0] via 10.10.13.3 R1# show ip route 192.168.0.1 Routing entry for 192.168.0.0/24 Known via "static", distance 1, metric 0 (connected) Routing Descriptor Blocks: * directly connected, via GigabitEthernet0/0/1 Route metric is 0, traffic share count is 1 - And at R1, here is the routing table with Gi 0/0/1 down: R1# show ip route Gateway of last resort is 10.10.13.3 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 5 subnets, 3 masks C 10.10.1.1/32 is directly connected, Loopback0 C 10.10.12.128/25 is directly connected, GigabitEthernet0/0/2 L 10.10.12.129/32 is directly connected, GigabitEthernet0/0/2 C 10.10.13.0/24 is directly connected, GigabitEthernet0/0/0 L 10.10.13.1/32 is directly connected, GigabitEthernet0/0/0 S 192.168.0.0/24 is directly connected, GigabitEthernet0/0/2 S* 0.0.0.0/0 [1/0] via 10.10.13.3 R1# show ip route 192.168.0.1 Routing entry for 192.168.0.0/24 Known via "static", distance 2, metric 0 (connected) Routing Descriptor Blocks: * directly connected, via GigabitEthernet0/0/2 Route metric is 0, traffic share count is 1 Page 5 of 112 Question 002 Connectivity between three routers has been established an IP services must be configured in the order presented to complete the implementation Tasks assigned including the configuration of NAT, NTP, DHCP, and SSH services. 1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the Ip address of Gi 0/0/0 on R2, while using only a standard access list named NAT. To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do Not use NVI NAT configuration. 2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Gi 0/0/1 interface. Set the clock on the NTP server for midnight on January 1, 2019. 3. Configure R1 as a DHCP server for the network 10.1.3.0 /24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Gi 0/0/0 on R3 must be issued the IP address of 10.1.3.11 via DHCP. 4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task. Page 6 of 112 Answer 002: 1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Gi 0/0/0 on R2, while using only a standard access list named NAT. To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do Not use NVI NAT configuration. - Implement NAT at R2. All traffic from R3 to R1’s Loopback (192.168.1.1) is translated. The outside address is R2’s Gi 0/0/0 (10.1.2.2) R2 enable configure terminal ! ip nat inside source list NAT interface GigabitEthernet 0/0/0 overload ! ip access-list standard NAT remark <<< IP Addresses to be changed by NAT = R3 addresses >>> permit 10.2.3.3 0.0.0.0 permit 192.168.3.1 0.0.0.0 permit 192.168.3.1 0.0.0.0 ! interface GigabitEthernet 0/0/0 ip nat outside ! interface GigabitEthernet 0/0/1 ip nat inside ! end copy running-config startup-config At R3: R3# ping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !!!!! At R1: R1# debug ip icmp ICMP packet debugging is on R1# ICMP: echo reply sent, src 192.168.1.1, ICMP: echo reply sent, src 192.168.1.1, ICMP: echo reply sent, src 192.168.1.1, ICMP: echo reply sent, src 192.168.1.1, ICMP: echo reply sent, src 192.168.1.1, dst dst dst dst dst Page 7 of 112 10.1.2.2 10.1.2.2 10.1.2.2 10.1.2.2 10.1.2.2 2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Gi 0/0/1 interface. Set the clock on the NTP server for midnight on January 1, 2019. At R1, Set the clock for 00:00:00 on 1st January, 2019. Make R1 the NTP “master” Set R2 as an NTP “client”, using R1’s Gi 0/0/1 as a reference (10.1.3.1). - R1 and R2 R1# clock set 00:00:00 01 JAN 2019 config t ! ntp master 1 ! end copy running-config startup-config R2# config t ntp server 10.1.3.1 ! end copy running-config startup-config R1# show clock 0:0:3.453 UTC Tue Jan 1 2019 R2# show ntp status Clock is synchronized, stratum 1, reference is 127.127.1.1 nominal freq is 250.0000 Hz, actual freq is 249.9990 Hz, precision is 2**24 reference time is DFAEF209.00000016 (0:6:33.022 UTC Tue Jan 1 2019) clock offset is 0.00 msec, root delay is 0.00 msec root dispersion is 0.00 msec, peer dispersion is 0.24 msec. loopfilter state is 'CTRL' (Normal Controlled Loop), drift is - 0.000001193 s/s system poll interval is 5, last update was 28 sec ago. R2# show ntp associations address ref clock st when poll reach delay offset disp *~127.127.1.1 .LOCL. 0 14 64 377 0.00 0.00 0.24 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured R1# show clock 0:8:8.941 UTC Tue Jan 1 2019 Page 8 of 112 3. Configure R1 as a DHCP server for the network 10.1.3.0 /24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Gi 0/0/0 on R3 must be issued the IP address of 10.1.3.11 via DHCP. - R1 is a DHCP server with a pool of 10.1.3.0 /24 called TEST. Exclude 10.1.3.1 – 10.1.3.10 R3’s Gi 0/0/0 should get its IP address from the pool. R1 and R3 R1: service dhcp ip dhcp pool TEST network 10.1.3.0 255.255.255.0 default-router 10.1.3.1 domain-name cisco.com lease 2 ! exit ip dhcp excluded-address 10.1.3.1 10.1.3.10 ! end copy running-config startup-config R3: enable configure terminal interface GigabitEthernet 0/0/0 ip address dhcp ! end copy running-config startup-config R3# show ip int brief Interface GigabitEthernet0/0/0 GigabitEthernet0/0/1 Loopback0 Vlan1 IP-Address 10.1.3.11 10.2.3.3 192.168.3.1 unassigned OK? YES YES YES YES Method DHCP manual manual unset Page 9 of 112 Status up up up administratively down Protocol up up up down 4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task. - SSH from R1 to R3 Exclude other protocols (TELNET) Account: Username: root Password: Cisco Use RSA and 1024-bit key Check by SSH from R1 to 10.1.3.11 (R3’s Gi 0/0/0 interface). R3 ip domain-name cisco.com crypto key generate rsa general-keys modulus 1024 ! ip ssh version 2 ip ssh time-out 120 ip ssh authentication-retries 4 ! username root secret Cisco ! line vty 0 15 no transport input transport input ssh login local ! end copy running-config startup-config R1# ssh -l root 10.1.3.11 Password: <Cisco> R3> Page 10 of 112 Question 003 All the physical cabling between the two switches have been installed. Configure the network connectivity between the switches using the designated VLANs and interfaces. Configure the following network as follows: 1. VLAN 110 = MARKETING VLAN 220 = FINANCE 2. Sw1 has an access link (Fa 0/1) in VLAN 210 to PC5 Sw1 has a trunk link (Fa 0/2) to Sw2 – Native VLAN 1 3. Sw2 has an access link (Fa 0/1) in VLAN 110 to PC3 Sw2 has a trunk link (Fa 0/2) to Sw1 – Native VLAN 1 Sw2 has a trunk link (Fa 0/3) to Sw3 – Native VLAN 1 4. Sw3 has an access link (Fa 0/1) in VLAN 110 to PC4 Sw3 has an access link (Fa 0/2) in VLAN 210 to PC6 Sw3 has a trunk link (Fa 0/3) to Sw2 – Native VLAN 1 5. Sw1, Fa 0/2 Trunk can only carry VLAN 210 Traffic Sw2, Fa 0/2 Trunk can only carry VLAN 210 Traffic Sw2, Fa 0/3 Trunk can only carry VLANs 110 and 210 Traffic Sw3, Fa 0/3 Trunk can only carry VLANs 110 and 210 Traffic Page 11 of 112 Answer 003 S1 enable config t ! hostname Sw1 no ip domain lookup ! vlan 110 name MARKETING vlan 210 name FINANCE ! interface FastEthernet 0/1 description <<< VLAN 210 down to PC5 >>> switchport mode access switchport access vlan 210 no shutdown ! interface FastEthernet 0/2 description <<< Trunk across to S2’s Fa 0/2 >>> switchport mode trunk ! switchport trunk encapsulation dot1q (Not required as switch only does 802.1Q switchport trunk native vlan 1 switchport trunk allowed vlan 210 no shutdown ! line con 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Sw1# show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6 Fa0/7, Fa0/8, Fa0/9, Fa0/10 Fa0/11, Fa0/12, Fa0/13, Fa0/14 Fa0/15, Fa0/16, Fa0/17, Fa0/18 Fa0/19, Fa0/20, Fa0/21, Fa0/22 Fa0/23, Fa0/24, Gig0/1, Gig0/2 110 MARKETING active 210 FINANCE active Fa0/1 Sw1# show int trunk Port Mode Fa0/2 on Encapsulation 802.1q Status trunking Native vlan 1 Port Fa0/2 Vlans allowed on trunk 210 Port Fa0/2 Vlans allowed and active in management domain 210 Port Fa0/2 Vlans in spanning tree forwarding state and not pruned 210 Page 12 of 112 S2 enable config t ! hostname Sw2 no ip domain lookup ! vlan 110 name MARKETING vlan 210 name FINANCE ! interface FastEthernet 0/1 description <<< VLAN 110 down to PC3 >>> switchport mode access switchport access vlan 110 no shutdown ! interface FastEthernet 0/2 description <<< Trunk across to S1’s Fa 0/2 >>> switchport mode trunk ! switchport trunk encapsulation dot1q (Not required as switch only does 802.1Q switchport trunk native vlan 1 switchport trunk allowed vlan 210 no shutdown ! interface FastEthernet 0/3 description <<< Trunk across to S3’s Fa 0/3 >>> switchport mode trunk ! switchport trunk encapsulation dot1q (Not required as switch only does 802.1Q switchport trunk native vlan 1 switchport trunk allowed vlan 110,210 no shutdown ! line con 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Sw2# show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------1 default active Fa0/4, Fa0/5, Fa0/6, Fa0/7 Fa0/8, Fa0/9, Fa0/10, Fa0/11 Fa0/12, Fa0/13, Fa0/14, Fa0/15 Fa0/16, Fa0/17, Fa0/18, Fa0/19 Fa0/20, Fa0/21, Fa0/22, Fa0/23 Fa0/24, Gig0/1, Gig0/2 110 MARKETING active Fa0/1 210 FINANCE active … Sw2# show int trunk Port Mode Encapsulation Status Native vlan Fa0/2 on 802.1q trunking 1 Fa0/3 on 802.1q trunking 1 Port Fa0/2 Fa0/3 Vlans allowed on trunk 210 110,210 Port Fa0/2 Fa0/3 Vlans allowed and active in management domain 210 110,210 Port Fa0/2 Fa0/3 Vlans in spanning tree forwarding state and not pruned 210 110,210 Page 13 of 112 S3 enable config t ! hostname Sw3 no ip domain lookup ! vlan 110 name MARKETING vlan 210 name FINANCE ! interface FastEthernet 0/1 description <<< VLAN 110 down to PC4 >>> switchport mode access switchport access vlan 110 no shutdown ! interface FastEthernet 0/2 description <<< VLAN 210 down to PC6 >>> switchport mode access switchport access vlan 210 no shutdown ! interface FastEthernet 0/3 description <<< Trunk across to S2’s Fa 0/3 >>> switchport mode trunk ! switchport trunk encapsulation dot1q (Not required as switch only does 802.1Q switchport trunk native vlan 1 switchport trunk allowed vlan 110,210 no shutdown ! line con 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Sw3# show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------1 default active Fa0/4, Fa0/5, Fa0/6, Fa0/7 Fa0/8, Fa0/9, Fa0/10, Fa0/11 Fa0/12, Fa0/13, Fa0/14, Fa0/15 Fa0/16, Fa0/17, Fa0/18, Fa0/19 Fa0/20, Fa0/21, Fa0/22, Fa0/23 Fa0/24, Gig0/1, Gig0/2 110 MARKETING active Fa0/1 210 FINANCE active Fa0/2 … Sw3# show int trunk Port Mode Fa0/3 on Encapsulation 802.1q Status trunking Native vlan 1 Port Fa0/3 Vlans allowed on trunk 110,210 Port Fa0/3 Vlans allowed and active in management domain 110,210 Port Fa0/3 Vlans in spanning tree forwarding state and not pruned 110,210 Page 14 of 112 Question 004 All the physical cabling between the two switches have been installed. Configure the network connectivity between the switches using the designated VLANs and interfaces. 1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task. 2. Configure FastEthernet 0/1 on SW2 to use the existing VLAN named Available. 3. Configure the connection between the switches using access ports. 4. Configure FastEthernet 0/1 on SW1 using data and voice VLANs 5. Configure FastEthernet 0/1 on SW2 so that the Cisco proprietary neighbour discovery protocol is turned off for the designated interface only. Page 15 of 112 Answer 004 1. Configure VLAN 100 named “Compute” and VLAN 200 named “Telephony” where required for each task. 2. Configure FastEthernet 0/1 on SW2 to use the existing VLAN named “Available” on VLAN 99. 3. Configure the connection between the switches using access ports. 4. Configure FastEthernet 0/1 on SW1 using data and voice VLANs 5. Configure FastEthernet 0/1 on SW2 so that the Cisco proprietary neighbour discovery protocol is turned off for the designated interface only. - SW1 has a standard “cookie-cutter” configuration. Add the two VLANs for VLAN 100 and 200. Configure the link between switches (Fa 0/2) as an access link (VLAN 1 by default) Configure FastEthernet 0/1 on SW1 using data and voice VLANs SW1 enable configure terminal ! no ip domain lookup hostname SW1 ! vlan 100 name Compute vlan 200 name Telephony ! interface FastEthernet 0/1 description <<< Access Link to Phone and PC using two VLANs >>> switchport mode access switchport access vlan 100 switchport voice vlan 200 no shutdown ! interface FastEthernet 0/2 description <<< Access Link to SW2 on VLAN 1 >>> switchport mode access switchport access vlan 1 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 16 of 112 - SW2 has a standard “cookie-cutter” configuration. Add the one VLAN 99 called “Available”. Configure the link between switches (Fa 0/2) as an access link (VLAN 1 by default) Configure FastEthernet 0/1 on SW2 using VLAN “Available” (VLAN 99) Configure FastEthernet 0/1 on SW2 so that the Cisco proprietary neighbour discovery protocol is turned off for the designated interface only. SW2 enable configure terminal ! no ip domain lookup hostname SW1 ! vlan 99 name Available ! interface FastEthernet 0/1 description <<< Access Link down to PC on VLAN 1 >>> switchport mode access switchport access vlan 99 no shutdown ! interface FastEthernet 0/2 description <<< Access Link to SW1 on VLAN 1 >>> switchport mode access switchport access vlan 1 no shutdown no cdp enable ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 17 of 112 Question 005 Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included. 1. Configure static routing using host routes to establish connectivity from router R3 to router R1’s Loopback address using the source IP of 209.165.200.230 2. Configure an IPv4 default route on Router R2 destined for Router R4. 3. Configure an IPv6 default route on Router R2 destined for Router R4. Page 18 of 112 Answer 005 Configuration Setup - Start with a generic “Cookie-cutter” script. Loopback 1 required. Add IPv4 addressing No IPv6 addressing, so no IPv6 routing required. R1 enable configure terminal ! no ip domain lookup hostname R1 ! interface Loopback 1 description <<< Destination Pinging Address >>> ip address 192.168.1.1 255.255.255.255 no shutdown ! interface GigabitEthernet 0/0/0 description <<< Link to R2 >>> ip address 209.165.200.225 255.255.255.252 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 19 of 112 - Start with a generic “Cookie-cutter” script. Loopback 1 required. Add IPv4 addressing Add IPv6 addressing Add IPv6 routing required. R2 enable configure terminal ! no ip domain lookup ipv6 unicast-routing hostname R2 ! interface Loopback 1 description <<< Not used, but available >>> ip address 192.168.2.1 255.255.255.255 no shutdown ! interface GigabitEthernet 0/0/0 description <<< Link to R1 >>> ip address 209.165.200.226 255.255.255.252 no shutdown ! interface GigabitEthernet 0/0/1 description <<< Link to R3 >>> ip address 209.165.200.229 255.255.255.252 no shutdown ! interface GigabitEthernet 0/0/2 description <<< Link to R4 >>> ip address 209.165.202.129 255.255.255.224 ipv6 address 2001:DB8:ACAD::1/64 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 20 of 112 - Start with a generic “Cookie-cutter” script. Loopback 1 required. Add IPv4 addressing No IPv6 addressing, so no IPv6 routing required. R3 enable configure terminal ! no ip domain lookup hostname R3 ! interface Loopback 1 description <<< Not used, but available >>> ip address 192.168.3.1 255.255.255.255 no shutdown ! interface GigabitEthernet 0/0/1 description <<< Link to R2 >>> ip address 209.165.200.230 255.255.255.252 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config - Start with a generic “Cookie-cutter” script. Loopback 1 not required. Add IPv4 addressing Add IPv6 addressing Add IPv6 routing required. R4 enable configure terminal ! no ip domain lookup ipv6 unicast-routing hostname R4 ! interface GigabitEthernet 0/0/2 description <<< Link to R2 >>> ip address 209.165.202.130 255.255.255.224 ipv6 address 2001:DB8:ACAD::2/64 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 21 of 112 Custom Configuration: 1. Configure static routing using host routes to establish connectivity from router R3 to router R1’s Loopback address using the source IP of 209.165.200.230 - This requires static routes at: R3 out to R1 (via R2). R2 out to R1. R1 back to R3 (via R2) <Don’t need R2 to R3, as R3’s address is connected to R2’s Gi 0/0/1> R1 / R2 / R3 R3: ip route 192.168.1.1 255.255.255.255 209.165.200.229 ! end copy running-config startup-config R2: ip route 192.168.1.1 255.255.255.255 209.165.200.225 ! end copy running-config startup-config R1: ip route 209.165.200.230 255.255.255.255 209.165.200.226 ! end copy running-config startup-config R3# ping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms R1# ping Protocol [ip]: Target IP address: 209.165.200.230 Repeat count [5]: Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: y Source address or interface: 192.168.1.1 Type of service [0]: Set DF bit in IP header? [no]: Validate reply data? [no]: Data pattern [0xABCD]: Loose, Strict, Record, Timestamp, Verbose[none]: Sweep range of sizes [n]: Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.200.230, timeout is 2 seconds: Packet sent with a source address of 192.168.1.1 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms Page 22 of 112 2. Configure an IPv4 default route on Router R2 destined for Router R4. R2 ip route 0.0.0.0 0.0.0.0 209.165.202.130 ! end copy running-config startup-config R2# show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is 209.165.202.130 to network 0.0.0.0 S C C L C L C L S* 3. 192.168.1.0/32 is subnetted, 1 subnets 192.168.1.1/32 [1/0] via 209.165.200.225 192.168.2.0/32 is subnetted, 1 subnets 192.168.2.1/32 is directly connected, Loopback1 209.165.200.0/24 is variably subnetted, 4 subnets, 2 masks 209.165.200.224/30 is directly connected, GigabitEthernet0/0/0 209.165.200.226/32 is directly connected, GigabitEthernet0/0/0 209.165.200.228/30 is directly connected, GigabitEthernet0/0/1 209.165.200.229/32 is directly connected, GigabitEthernet0/0/1 209.165.202.0/24 is variably subnetted, 2 subnets, 2 masks 209.165.202.128/27 is directly connected, GigabitEthernet0/0/2 209.165.202.129/32 is directly connected, GigabitEthernet0/0/2 0.0.0.0/0 [1/0] via 209.165.202.130 Configure an IPv6 default route on Router R2 destined for Router R4. R2 ipv6 route ::/0 2001:DB8:ABCD::2 ! end copy running-config startup-config R2# show ipv6 route static < Not supported by Packet Tracker, however this is a valid command > Page 23 of 112 Question 006 Configure IPv6 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0DB8:AAAA::/48 subnet. 1. Using GigabitEthernet 0/0/1 on Routers R1 and R2, configure the next usable /28 from the 192.168.1.0 /24 range. The network 192.168.1.0 /28 is unavailable. 2. For the IPv4 /28 subnet, Router R1 must be configured with the first usable host address. 3. For the IPv4 /28 subnet, Router R2 must be configured with the last usable host address. 4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology. 5. A ping must work between the routers on the IPv4 and IPv6 address ranges. Page 24 of 112 Answer 006 - Initial Configuration R1: The IPv4 subnet is held within the 192.168.1.0 /24 subnet. A /28 subnet has a Subnet Mask of 255.255.255.240 The first 192.168.1.0 /28 subnet is unavailable. This spans 16 hosts (as 32-bits – 28-bits = 4-bits for hosts, and 24 = 16 hosts). Range is 192.168.1.0 192.168.1.15 (broadcast). Therefore, the next /28 subnet is 192.168.1.16 /28 This range is 192.168.1.16 (N/W) 192.168.1.31 (B/C). First usable address is 192.168.1.17 (R1’s Gi 0/0/1) Last usable address is 192.168.1.30 (R2’s Gi 0/0/1) - For IPv6, add IPv6 unicast-routing The IPv6 addresses are shown on the diagram. R1 enable configure terminal ! no ip domain lookup ipv6 unicast-routing hostname R1 ! interface GigabitEthernet 0/0/1 description <<< Link across to R2’s Gi 0/0/1 >>> ip address 192.168.1.17 255.255.255.240 ipv6 address 2001:DB8:AAAA::1/64 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config R1# show ip int brief Interface GigabitEthernet0/0/0 GigabitEthernet0/0/1 Vlan1 IP-Address unassigned 192.168.1.17 unassigned OK? YES YES YES Method unset manual unset Page 25 of 112 Status Protocol administratively down down up up administratively down down R2: As calculated above, the last usable address is 192.168.1.30 (R2’s Gi 0/0/1) For IPv6, add IPv6 unicast-routing The IPv6 addresses are shown on the diagram. R2 enable configure terminal ! no ip domain lookup ipv6 unicast-routing hostname R2 ! interface GigabitEthernet 0/0/1 description <<< Link across to R2’s Gi 0/0/1 >>> ip address 192.168.1.30 255.255.255.240 ipv6 address 2001:DB8:AAAA::2/64 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config R2# show ip int brief Interface GigabitEthernet0/0/0 GigabitEthernet0/0/1 Vlan1 IP-Address unassigned 192.168.1.30 unassigned OK? YES YES YES Method unset manual unset Page 26 of 112 Status Protocol administratively down down up up administratively down down - Test Connectivity: R1: R1 R1# ping 192.168.1.30 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.30, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms R1# ping ipv6 2001:DB8:AAAA::2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2001:DB8:AAAA::2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms R2: R2 R2# ping 192.168.1.17 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.17, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms R2# ping ipv6 2001:DB8:AAAA::1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2001:DB8:AAAA::1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms Page 27 of 112 Question 007 Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured. The PCs have the addresses provided, and are connected to FastEthernet 0/3 of each switch. The PCs are in VLAN 1. 1. Configure an LACP EtherChannel (number 1) between Switches SW1 and SW2. This is performed using Fa 0/0/0 and Fai 0/0/1 on both switches. 2. Configure the EtherChannel as a trunk link. 3. Configure the Trunk link with IEEE 802.1Q tags. 4. Configure the Native VLAN of the EtherChannel links to VLAN 15. Page 28 of 112 Answer 007 Part 1 – Basic Configuration SW1: Start with a basic configuration on the Switches. Add VLAN 15 (no name) as this is the native VLAN for the EtherChannel links No default-gateway required, as there’s no router, so no “off-net” available. SW1 enable configure terminal ! no ip domain lookup hostname SW1 ! vlan 15 ! interface FastEthernet 0/1 description <<< Link to SW2’s Fa 0/1 >>> no shutdown ! interface FastEthernet 0/2 description <<< Link to SW2’s Fa 0/2 >>> no shutdown ! interface FastEthernet 0/3 description <<< To PC1 on VLAN 1 >>> switchport mode access switchport access vlan 1 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 29 of 112 SW2: Basic setup, much the same as SW1 SW2 enable configure terminal ! no ip domain lookup hostname SW2 ! vlan 15 ! interface FastEthernet 0/1 description <<< Link to SW1’s Fa 0/1 >>> no shutdown ! interface FastEthernet 0/2 description <<< Link to SW1’s Fa 0/2 >>> no shutdown ! interface FastEthernet 0/3 description <<< To PC2 on VLAN 1 >>> switchport mode access switchport access vlan 1 no shutdown ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 30 of 112 Part 2 – EtherChannel Configuration SW1: Link Aggregation Protocol (LACP) is an IEEE open standard. LACP uses “active” and “passive” settings at the interface. - This is often used instead of Cisco’s proprietary PAgP. PAgP uses “auto” and “desirable” settings at the interface. - At the physical interfaces, nominate the channel-protocol as LACP. Next, define the channel-protocol as LACP. Then define the channel-group number and “LACP mode” - This channel-group is then accessed as a port-channel. The port-channel is where the trunk, native VLAN (15), and allowed VLANs are set: SW1 enable configure terminal ! interface range FastEthernet 0/1 – 2 description <<< Physical EtherChannel Ports >>> channel-protocol lacp channel-group 1 mode active ! interface port-channel 1 description <<< Logical Channel using the two physical ports >>> switchport mode trunk ! switchport trunk encapsulation dot1q (only supports 802.1Q, so not required). switchport trunk native vlan 15 switchport trunk allowed vlan all no shutdown ! end copy running-config startup-config SW1# show int trunk Port Mode Po1 on Encapsulation 802.1q Status trunking Native vlan 15 Port Po1 Vlans allowed on trunk 1-1005 Port Po1 Vlans allowed and active in management domain 1,15 Port Po1 Vlans in spanning tree forwarding state and not pruned 1,15 Page 31 of 112 SW2: Same as above. SW2 enable configure terminal ! interface range FastEthernet 0/1 - 2 description <<< Physical EtherChannel Ports >>> channel-protocol lacp channel-group 1 mode active ! interface port-channel 1 description <<< Logical Channel using the two physical ports >>> switchport mode trunk ! switchport trunk encapsulation dot1q (only supports 802.1Q, so not required). switchport trunk native vlan 15 switchport trunk allowed vlan all no shutdown ! end copy running-config startup-config SW2# show int trunk Port Mode Po1 on Encapsulation 802.1q Status trunking Native vlan 15 Port Po1 Vlans allowed on trunk 1-1005 Port Po1 Vlans allowed and active in management domain 1,15 Port Po1 Vlans in spanning tree forwarding state and not pruned 1,15 Page 32 of 112 Question 008 IP connectivity between the three routers has been configured. OSPF adjacencies must be established. 1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them. 2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process. 3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback 0 networks. 4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers. Page 33 of 112 Answer 008 - Basic Configuration of Devices: R1 enable configure terminal ! no ip domain lookup hostname R1 ! interface Loopback 0 description <<< Host Route to Represent Device for OSPF >>> ip address 10.10.1.1 255.255.255.255 no shutdown ! interface Loopback 1 description <<< Network Route to Represent a non-existent subnet >>> ip address 192.168.1.1 255.255.255.0 no shutdown ! interface GigabitEthernet 0/0/0 description <<< Link Down to R2 >>> ip address 10.10.12.1 255.255.255.0 no shutdown ! interface GigabitEthernet 0/0/1 description <<< Link Down to R3 >>> ip address 10.10.13.1 255.255.255.0 no shutdown ! router ospf 1 network 10.10.12.0 0.0.0.255 area 0 network 10.10.13.0 0.0.0.255 area 0 network 192.168.1.0 0.0.0.255 area 0 ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 34 of 112 R2 enable configure terminal ! no ip domain lookup hostname R2 ! interface Loopback 0 description <<< Host Route to Represent Device for OSPF >>> ip address 10.10.2.2 255.255.255.255 no shutdown ! interface Loopback 1 description <<< Network Route to Represent a non-existent subnet >>> ip address 192.168.2.2 255.255.255.0 no shutdown ! interface GigabitEthernet 0/0/0 description <<< Link Up to R1 >>> ip address 10.10.12.2 255.255.255.0 no shutdown ! interface GigabitEthernet 0/0/2 description <<< Link Across to R3 >>> ip address 10.10.23.2 255.255.255.0 no shutdown ! router ospf 1 network 10.10.12.0 0.0.0.255 area 0 network 10.10.23.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 35 of 112 R3 enable configure terminal ! no ip domain lookup hostname R3 ! interface Loopback 0 description <<< Host Route to Represent Device for OSPF >>> ip address 10.10.3.3 255.255.255.255 no shutdown ! interface Loopback 1 description <<< Network Route to Represent a non-existent subnet >>> ip address 192.168.3.3 255.255.255.0 no shutdown ! interface GigabitEthernet 0/0/1 description <<< Link Up to R1 >>> ip address 10.10.13.3 255.255.255.0 no shutdown ! interface GigabitEthernet 0/0/2 description <<< Link Across to R2 >>> ip address 10.10.23.3 255.255.255.0 no shutdown ! router ospf 1 network 10.10.13.0 0.0.0.255 area 0 network 10.10.23.0 0.0.0.255 area 0 network 192.168.3.0 0.0.0.255 area 0 ! line console 0 logging synchronous exec-timeout 0 0 ! end copy running-config startup-config Page 36 of 112 - Configuration Additions: 1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them. - The “Router-ID” values are used to identify each router in the network. It is selected as follows: - The IP address configured with the router-id command. - If not configured, then the highest IP address of any loopback interface. - If no loopbacks, then the highest IP address of any interface that is “up”. R1 router ospf 1 router-id 10.10.12.1 ! end clear ip ospf process R2 router ospf 1 router-id 10.10.12.2 ! end clear ip ospf process Page 37 of 112 2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process. - Here, the question is talking about the OSPF priority value. This is a value between 0 and 255, configured on the interface in question. 0 = do not participate in the election process. 255 = maximum value (most likely to become the DR). - The default OSPF priority value is 1. If all routers have the same priority, then the one with the highest Router-ID wins. - Verify by issuing the command: show ip ospf neighbor on R1 and R3. R2 interface GigabitEthernet 0/0/0 ip ospf priority 255 ! interface GigabitEthernet 0/0/2 ip ospf priority 255 ! end clear ip ospf process copy running-config startup-config R1# show ip ospf neighbor Neighbor ID 10.10.12.2 192.168.3.3 Pri 255 1 State FULL/DR FULL/BDR Dead Time 00:00:33 00:00:36 Address 10.10.12.2 10.10.13.3 Interface Gi0/0/0 Gi0/0/1 Dead Time 00:00:37 00:00:32 Address 10.10.13.1 10.10.23.2 Interface Gi0/0/1 Gi0/0/2 R3# show ip ospf neighbor Neighbor ID 10.10.12.1 10.10.12.2 Pri 1 255 State FULL/DR FULL/DR Page 38 of 112 3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback 0 networks. R1 router ospf 1 network 10.10.1.1 0.0.0.0 area 0 ! end copy running-config startup-config R2 router ospf 1 network 10.10.2.2 0.0.0.0 area 0 ! end copy running-config startup-config R3 router ospf 1 network 10.10.3.3 0.0.0.0 area 0 ! end copy running-config startup-config 4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers. - This is performed using the following router-config command: adjacency stagger {initial-limit | none} {maximum-limit | disable} - This command isn’t supported on Packet Tracer. R1 router ospf 1 adjacency stagger 0 2 ! end copy running-config startup-config R3 router ospf 1 adjacency stagger 0 2 ! end copy running-config startup-config Page 39 of 112 Question 009 Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right. 1. 2. 3. 4. 2001:DB8:6004:CAFE::123 FCBA:925A:CBC:7C25:B2:C640:1174:8658 FE80::A00:22FF:FEDC:CB01 FF04::1:3 a. b. c. d. Global Unicast Link-Local Unicast Multicast Unique Local Answer 009 - Global Unicast Link-Local Unicast Multicast Unique Local = = = = 2000::/3 FE80::/10 FF00::/8 FC00::/7 2001:DB8:6004:CAFE::123 FEBA:925A:CBC:7C25:B2:C640:1174:8658 FE80::A00:22FF:FEDC:CB01 FF04::1:3 = Global Unicast [Address] (GUA) = Unique Local [Address] (ULA) = Link-Local Unicast [Address] (LLA) = Multicast [Address] Page 40 of 112 Question 010 What is the MAC address used with VRRP as a virtual address? a. b. c. d. 00-00-0C-07-AC-89 00-00-5E-00-01-0A 00-07-B4-00-AB-01 00-C6-41-93-90-91 Answer 010 b. 00-00-0C-07-AC-xx is HSRP virtual MAC address (Ans. ‘a’ with xx=89) 00-00-5E-00-01xx is VRRP virtual MAC (Ans. ‘b’ with xx=0A group) 00-07-b4-00-xxyy is GLBP virtual MAC xx is group and yy is AVF Note: Just remember the solution order (HSRP VRRP GLBP). Then, notice that the MAC address “size” is in this order. Specifically, HSRP has the lowest MAC address of 00-00-0C-07-AC-xx Next, VRRP has the next lowest MAC address of 00-00-5E-00-01-xx Finally, GLBP has the highest MAC address of 00-07-B4-00—xx-yy Page 41 of 112 Question 011 Drag and Drop the HTT methods used with REST-Based APIs from the left onto the descriptions on the right: REST-BASED API DELETE GET POST PATCH PUT Description Creates a resource and returns its RUI in the response header Creates or replaces a previously modified resource using information in the request body Removes a resource Retrieves a list of a resource’s URIs Updates a resource using instructions included in the request body Answer 011 REST-BASED API POST PUT DELTE GET PATCH Description Creates a resource and returns its URI in the response header Creates or replaces a previously modified resource using information in the request body Removes a resource Retrieves a list of a resource’s URIs Updates a resource using instructions included in the request body Note: For a full explanation, see “Rest-based APIs” MS-Word document in G:\Professional Development\39. CCNAv7 Recertification\01. Cisco Requirements\02. Study Documents\06. Automation and Programmability\02. Additional Material\6.5 – REST-based APIs POST: Used to submit data to a resource for processing. Creates and defines a new resource Returns a URL for later reference Creates a resource and returns its URI in the response header. PUT: Used to update an existing resource with new data. Used to replace the ENTIRE resource (unlike PATCH). PATCH: Used to update a portion of an existing resource with new data. Only replaces SOME of the resource content (unlike PUT). GET: Used to retrieve data from a resource. Use in “read-only” mode to return a resource’s contents and data. DELETE: Used to delete a resource entirely. Removes a resource HEAD: Similar to GET, but only returns the headers and not the body of the response. OPTIONS: Used to retrieve information about the communication options available for a resource. Page 42 of 112 Question 012 Drag and drop the functions of AAA supporting protocols from the Left onto the protocols on the right: a. b. c. d. e. f. Encrypts only the password when it sends an access request Encrypts the entire body of the access-request packet Separates all three AAA operations Combines authentication and authorisation Uses TCP Uses UDP RADIUS TACACS+ Answer 012 RADIUS Encrypts only the password when it sends an access request Combines authentication and authorisation Uses UDP TACACS+ Encrypts the entire body of the access-request packet Separates all three AAA operations Uses TCP Page 43 of 112 Question 013 Each router must be configured with the last usable IP address in the subnet. Which configuration fulfils this requirement? a. R7# interface FastEthernet 1/0 ip address 10.88.31.126 255.255.255.240 R8# interface FastEthernet 0/0 ip address 10.19.63.94 255.255.255.192 R9# interface FastEthernet 1/1 ip address 10.23.98.158 255.255.255.248 b. R7# interface FastEthernet 1/0 ip address 10.88.31.127 255.255.255.240 R8# interface FastEthernet 0/0 ip address 10.19.63.95 255.255.255.192 R9# interface FastEthernet 1/1 ip address 10.23.98.159 255.255.255.248 Page 44 of 112 c. R7# interface FastEthernet 1/0 ip address 10.88.31.126 255.255.255.192 R8# interface FastEthernet 0/0 ip address 10.19.63.94 255.255.255.240 R9# interface FastEthernet 1/1 ip address 10.23.98.158 255.255.255.224 d. R7# interface FastEthernet 1/0 ip address 10.88.31.127 255.255.255.192 R8# interface FastEthernet 0/0 ip address 10.19.63.95 255.255.255.240 R9# interface FastEthernet 1/1 ip address 10.23.98.159 255.255.255.224 Answer 013 c Working: 1. Check the subnet masks – do they match? R7’s Fa 0/1 is /26 = 255.255.255.192 R8’s Fa 0/0 is /28 = 255.255.255.240 R9’s Fa 1/1 is /27 = 255.255.255.224 - Only ‘c’ and ‘d’ have the correct subnet masks. 2. Check the 4th octet IP addresses – the last usable address must be even as the last address is the broadcast, which is an odd number (all 1’s). - The last octet of each address in ‘c’ is even The last octet of each address in ‘d’ is odd - Only ‘c’ has the correct subnet masks, and even IPv4 addresses in the last octet. As such, only ‘c’ can be correct. Page 45 of 112 Question 014 An engineer is installing a new wireless printer with a static IP address on the Wi-Fi network. Which feature must be enabled and configured to prevent connection issues with the printer? a. b. c. d. Client exclusion Passive client DHCP address assignment Static IP tunnelling Answer 014 b. Explanation: Passive clients are wireless devices, such as scales and printers that are configured with a static IP address. These clients do not transmit any IP information such as IP address, subnet mask, and gateway information when they associate with an access point. As a result, when passive clients are used, the controller never knows the IP address unless they use the DHCP. https://www.examtopics.com/discussions/cisco/view/60680-exam-200-301-topic-1-question555-discussion/ Page 46 of 112 Question 015 Which set of 2.4 GHz non-overlapping wireless channels is standard in the United States? a. b. c. d. Channels 2, 7, 9, and 11. Channels 1, 6, 11, and 14. Channels 2, 7, and 11. Channels 1, 6, and 11. Answer 015 d. Question 016 What is the collapsed layer in collapsed core architectures? a. b. c. d. Core and WAN Access and WAN Distribution and Access Core and Distribution Answer 016 d. Question 017 What is a function performed by a web server? a. b. c. d. Provide an application that is transmitted over HTTP Send and retrieve email from client devices Authentication and authorise a user’s identity securely store files for FTP access Answer 017 a. Page 47 of 112 Question 018 Reger to the exhibit: An engineer is asked to configure router R1 so that it forms an OSPF single-area neighbour relationship with R2. Which command sequence must be implemented to configure the router? a. router ospf 10 network 10.0.0.0 0.0.0.3 area 0 network 10.0.2.0 0.0.0.255 area 0 b. router ospf 10 network 10.0.0.0 0.0.0.3 area 0 network 10.0.1.0 0.0.0.255 area 0 c. router ospf 100 network 10.0.0.0 0.0.0.3 area 0 network 10.0.2.0 255.255.255.0 area 0 d. router ospf 100 network 10.0.0.0 0.0.0.252 area 0 network 10.0.1.0 0.0.0.255 area 0 Answer 018 b. Explanation: - The OSPF area has no significance. The /30 link is 10.0.0.0 0.0.0.3 The LAN link is 10.0.1.0 0.0.0.255 Only option b satisfies these requirements. Page 48 of 112 Question 019 Drag and drop the statements about networking from the left onto the corresponding networking types on the right. a. b. c. d. This type implements changes individually at each device This type leverages controllers to handle network management Maintenance costs are higher than with other networking options This type provides a centralised view of the network Traditional Networking Controller-Based Networking Answer 019 Traditional Networking This type implements changes individually at each device Maintenance costs are higher than with other networking options Controller-Based Networking This type leverages controllers to handle network management This type provides a centralised view of the network Page 49 of 112 Question 020 Refer to the exhibit: All interfaces are configured with duplex auto and ip ospf network broadcast. Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency and act as a central point for exchanging OSPF information between routers? a. R14# interface FastEthernet0/0 ip address 10.73.65.65 255.255.255.252 ip ospf priority 255 ip mtu 1500 ! router ospf 10 router-id 10.10.1.14 network 10.10.1.14 0.0.0.0 area 0 network 10.73.65.64 0.0.0.3 area 0 ! R86# interface FastEthernet0/0 ip address 10.73.65.66 255.255.255.252 ip mtu 1400 ! router ospf 10 router-id 10.10.1.86 network 10.10.1.86 0.0.0.0 area 0 network 10.73.65.64 0.0.0.3 area 0 ! b. R14# interface Loopback0 ip ospf 10 area 0 ! interface FastEthernet0/0 ip address 10.73.65.65 255.255.255.252 ip ospf 10 area 0 ip mtu 1500 ! router ospf 10 ip ospf priority 255 router-id 10.10.1.14 ! Page 50 of 112 R86# interface Loopback0 ip ospf 10 area 0 ! interface FastEthernet0/0 ip address 10.73.65.66 255.255.255.252 ip ospf 10 area 0 ip mtu 1500 ! router ospf 10 router-id 10.10.1.86 ! c. R14# interface FastEthernet0/0 ip address 10.73.65.65 255.255.255.252 ip ospf priority 0 ip mtu 1500 ! router ospf 10 router-id 10.10.1.14 network 10.10.1.14 0.0.0.0 area 0 network 10.73.65.64 0.0.0.3 area 0 ! R86# interface FastEthernet0/0 ip address 10.73.65.66 255.255.255.252 ip mtu 1500 ! router ospf 10 router-id 10.10.1.86 network 10.10.1.86 0.0.0.0 area 0 network 10.73.65.64 0.0.0.3 area 0 ! d. R14# interface Loopback0 ip ospf 10 area 0 ! interface FastEthernet0/0 ip address 10.73.65.65 255.255.255.252 ip ospf priority 255 ip ospf 10 area 0 ip mtu 1500 ! router ospf 10 router-id 10.10.1.14 ! Page 51 of 112 R86# interface Loopback0 ip ospf 10 area 0 ! interface FastEthernet0/0 ip address 10.73.65.66 255.255.255.252 ip ospf 10 area 0 ip mtu 1500 ! router ospf 10 router-id 10.10.1.86 ! Answer 020 Explanation: The following command manually sets the OSPF network type to broadcast, this is a default for ethernet links. The Broadcast network type has a DR election. Syntax: Router(config-if)# ip ospf network broadcast Option ‘a’ looks OK, however the MTU sizes differ. Ergo – this won’t work. Option ‘b’ has no IP address on R14’s Loopback 0, nor R86’s Loopback 0. Also, the ip ospf priority 255 has been configured at router-config, it should be on an interface. Option ‘c’ is great – R14 won’t participate in the DR election, however R86 will. This means that R14 can’t even be the BDR. Further, the loopbacks haven’t been defined! Option ‘d’, the loopbacks’ IPv4 addresses haven’t been defined, but that’s OK. We are just advertising networks we don’t own. This actually works – I tested it on Packet Tracer! An OPSF adjacency forms, however you cannot ping the Loopback addresses! Very poor question. https://www.examtopics.com/discussions/cisco/view/79755-exam-200-301-topic-1-question-484discussion/ Page 52 of 112 Question 021 Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two.) a. The root port is FastEthernet 2/1 b. The designated port is FastEthernet 2/1 c. The spanning-tree mode is PVST+ d. This is a root bridge e. The spanning-tree mode is Rapid PVST+ Answer 021 a, and e Explanation: The output says that it is running the RSTP protocol. Rapid PVST+ definition: This is a Cisco enhancement of RSTP that uses PVST+ and provides a separate instance of 802.1w per VLAN. Each separate instance supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard. (Source: Netacad). Since there is no selection for RSTP then Rapid PVST + is the closest answer. The cost to the root is 19. That means this switch isn’t the root. It also means that to get to the root, go out port Fa 2/1. Therefore, if the other end is a designated port (connected to the root bridge), then this is the root port. Further, it doesn’t say “This bridge is the root”, so it’s not the root (‘d’) https://www.examtopics.com/discussions/cisco/view/41634-exam-200-301-topic-1-question-229discussion/ Page 53 of 112 Question 022 Question 023 Answer 023 Page 54 of 112 Question 024 Refer to the Exhibit: What are the two steps an engineer must take to provide the highest encryption and authentication using domain credentials from LDAP? (Choose two.) a. b. c. d. e. Select PSK under Authentication Key Management. Select Static-WEP + 802.1X on Layer 2 Security. Select WPA+WPA2 on Layer 2 Security. Select 802.1X from under Authentication Key Management. Select WPA Policy with TKIP Encryption. Answer 024 c, and d. Explanation: Select WPA+WPA2 on Layer 2 Security: This step ensures the use of Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) protocols for securing the wireless network. WPA and WPA2 provide robust encryption and authentication mechanisms to protect network communications. By selecting WPA+WPA2, the network supports both protocols, allowing compatibility with a wide range of client devices. https://www.examtopics.com/discussions/cisco/view/84991-exam-200-301-topic-1-question-699discussion/ Page 55 of 112 https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/211277-WLCwith-LDAP-AuthenticationConfigurati.html#:~:text=Step%206.%20Set%20the%20L2%20security%20method%20to%20WPA2 %20%2B%20802.1x%20and%20set%20L3%20security%20to%20noneas%20shown%20in%20the% 20image. Cisco.com support document Page 56 of 112 Question 025 Refer to the exhibit: The network administrator must prevent the switch Cat9K-2 IP address from being visible in LLDP without disabling the protocol. Which action must be taken to complete the task? a. b. c. d. Configure the no Configure the no Configure the no Configure the no lldp lldp lldp lldp mac-phy-cfg command globally on Cat9K-2. receive command on interface G1/0/21 on Cat9K-1. transmit command on interface G1/0/21 on Cat9K-1. tlv-select management-address command globally on Cat9K-2. Answer 025 d. Explanation: Step 6 - (Optional) [no] lldp tlv-select <tlv> Specifies the TLVs to send and receive in LLDP packets. The available TLVs are management-address port-description port-vlan system-capabilities, system-description system-name All available TLVs are enabled by default. https://www.examtopics.com/discussions/cisco/view/79747-exam-200-301-topic-1-question-275discussion/ Page 57 of 112 Question 026 What is a feature of WPA? a. b. c. d. TKIP/MIC encryption Small Wi-Fi application Preshared key 802.1x authentication Answer 026 a. Explanation: The question should ask “What is an exclusive feature of WPA?” a. Yes, WPA does TKIP and MIC. b. Small Wi-Fi application is just wrong. c. Preshared key is wrong, many protocols use this. d. WPA doesn’t do 802.1x authentication - WPA used a “Temporal Key Integrity Protocol” (TKIP). The TKIP dynamically generated a new 128-bit key for each packet. This value is changed every 10,000 packets (or so). This, along with the client MAC address provides much stronger encryption. This overcame the weaknesses found in WEP. - WPA also included a “Message Integrity Check” (MIC). This prevented an attacker from changing and resending data packets. It replaced the CRC-32 found in WEP, which was rather weak. Unfortunately, MIC re quired a large amount of computational power. As such, many older wireless NICs couldn’t support this protocol. https://www.examtopics.com/discussions/cisco/view/91179-exam-200-301-topic-1-question-684discussion/ Page 58 of 112 Question 027 Refer to the exhibit. R1 has taken the DROTHER role in the OSPF DR/BDR election process. Which configuration must an engineer implement so that R1 is elected as the DR? a. R1(config)# interface FastEthernet 0/0 R1(config-if)# ip ospf priority 1 R1# clear ip ospf process b. R3(config)# interface FastEthernet 0/1 R3(config-if)# ip ospf priority 200 R3# clear ip ospf process c. R2(config)# interface FastEthernet 0/2 R2(config-if)# ip ospf priority 1 R2# clear ip ospf process d. R1(config)# interface FastEthernet 0/0 R1(config-if)# ip ospf priority 200 R1# clear ip ospf process Answer 027 d. Explanation: Obvious. https://www.examtopics.com/discussions/cisco/view/99351-exam-200-301-topic-1-question-474discussion/ Page 59 of 112 Question 028 Refer to the exhibit. Load-balanced traffic is coming in from the WAN destined to a host at 172.16.1.190. Which nexthop is used by the router to forward the request? a. 192.168.7.4 b. 192.168.7.7 c. 192.168.7.35 d. 192.168.7.40 Answer 028 c. Explanation: /29 = 8 IPs, 4th octet starts at a multiple of 8. 184 is the N/W address. 184 – 191 is the range. 190 is the last IPv4 address in the 172.16.1.184/29 subnet. The next hop for this address is 192.168.7.35 – the answer. This is the answer as it is the longest match (better than 172.16.1.0/24. https://www.examtopics.com/discussions/cisco/view/75947-exam-200-301-topic-1-question-440discussion/ Page 60 of 112 Question 029 Which command entered on a switch configured with Rapid PVST+ listens and learns for a specific time period? a. switch(config)# spanning-tree b. switch(config)# spanning-tree c. switch(config)# spanning-tree d. switch(config)# spanning-tree vlan vlan vlan vlan 1 1 1 1 priority 4096 hello-time 10 max-age 6 forward-time 20 Answer 029 d. Explanation: Answer ‘d’ explanation, it is a backup configuration but it still valid... "Determines how long each of the listening and learning states last before the port begins forwarding. This timer is generally not used by the protocol but is used as a backup. The default is 15 seconds, and the range is from 4 to 30 seconds." https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3000/sw/layer2/503_U1_1/Cisco _n3k_layer2_config_gd_503_U1_1_chapter7.html#con_1205111 Page 61 of 112 Question 030 Drag and drop the QoS terms from the left onto the descriptions on the right. Answer 030 1. - Cloud-base weighted fair queuing: Guarantees minimum bandwidth to specific traffic classes when an interface is congested. 2. - Classification: Categorises packets based on the value of a traffic descriptor. 3. - Congestion: Outcome of overutilization. 4. - Policing: Uses defined criteria to limit the transmission of one or more classes of traffic 5. - Shaping: Prevents congestion by reducing the flow of outbound traffic. Page 62 of 112 Explanation: 1. **classification**: Categorizes packets based on the value of a traffic descriptor. 2. **class-based weighted fair queueing**: Guarantees minimum bandwidth to specific traffic classes when an interface is congested. 3. **shaping**: Prevents congestion by reducing the flow of outbound traffic. 4. **congestion**: Outcome of overutilization. 5. **policing**: Uses defined criteria to limit the transmission of one or more classes of traffic. https://www.cisco.com/en/US/docs/ios/12_0t/12_0t5/feature/guide/cbwfq.html#wp17641 https://www.examtopics.com/discussions/cisco/view/82761-exam-200-301-topic-1-question-586discussion/ Page 63 of 112 Question 031 What is the function of `off-the-shelf` switches in a controller-based network? a. b. c. d. setting packet-handling policies forwarding packets providing a central view of the deployed network making routing decisions Answer 031 b. Explanation: In a controller-based network, `off-the-shelf` switches primarily function to forward packets. They are controlled by an SDN controller, which takes the computational complexity away from the SDN network devices. This makes the switches more "commoditised", which is a synonym for lower costs. Therefore, the correct answer is B. Note: that the certification guide calls Layer 3 switches “switches”, so they are forwarding packets. https://www.examtopics.com/discussions/cisco/view/81738-exam-200-301-topic-1-question-767discussion/#:~:text=In%20a%20controller%2Dbased%20network%2C%20%60off%2Dthe%2D,from %20the%20SDN%20network%20devices Page 64 of 112 Question 032 Refer to the exhibit: The administrator must configure a floating static default route that points to 2001:db8:1234:2::1 and replaces the current default route only if it fails. Which command must the engineer configure on the CPE? a. b. c. d. ipv6 route ::/0 2001:db8:1234:2::1 3 ipv6 route ::/128 2001:db8:1234:2::1 3 ipv6 route ::/0 2001:db8:1234:2::1 1 ipv6 route ::/0 2001:db8:1234:2::1 2 Answer 032 a. Explanation: Currently (in the routing table), the route to 2001:db8:1234:2::1 is: ::/0 [2/0] via FE80::A8BB:CCFF:FE00:200, Ethernet 0/0 The first number in the braces is the Administrative Distance (AD), the second is the metric. The AD is set to 2, and the metric is 0. To be a floating static, the AD must be greater than 2. The answer has to be either ‘a’, or ‘b’. The route to ‘b’ is wrong (/128), so the answer must be ‘a’. https://www.examtopics.com/discussions/cisco/view/82982-exam-200-301-topic-1-question-478discussion/ Page 65 of 112 Question 033 Drag and drop the IPv6 addresses to the correct description boxes: a. b. c. d. 2001:DB8:600D:CAFÉ::123 FDBA:926A:E8E:7A25:B1:C6D2:1A76:8FDC FE80::A00:27FE:FEEB:B9AA FF05::1:3 IPv6 Address Description Global Unicast Link-Local Unicast Multicast Unique Local Answer 033 IPv6 Address 2001:DB8:600D:CAFÉ::123 FE80::A00:27FE:FEEB:B9AA FF05::1:3 FDBA:926A:E8E:7A25:B1:C6D2:1A76:8FDC Description Global Unicast Address (GUA) Link-Local Unicast Multicast Unique Local Explanation: Unique Local = FC00::/7 Link Local = FE80::/10 Global Unicast = 2000::/3 Multicast = FF00::/8 (but only FD00::/8 defined) (and any unused address) Page 66 of 112 Question 034 Drag and drop the IPv6 address descriptions from the left onto the IPv6 address types on the right. Not all options are used. Select and Place: a. b. c. d. e. f. IPv6 addresses in the format FF02::5 IPv6 addresses that begin with FD May be used by multiple organisations at the same time Private IPv6 addresses Serve as next-hop addresses Unable to serve as destination addresses Unique Local Addresses Link-Local Addresses Answer 034 Unique Local Addresses IPv6 addresses that begin with FD May be used by multiple organisations at the same time Private IPv6 addresses Link-Local Addresses Serve as next-hop addresses Unable to serve as destination addresses* Explanation: Answer ‘a’ is a multicast, so it isn’t used. Answer ‘b’ is a ULA as it is in the range of FC00::/7 Answer ‘c’ is a ULA as this is the definition of the address type. Answer ‘d’ is effectively a ULA Answer ‘e’ is a LLA, as this is what one should use for next-hop addresses Answer ‘f’ is an LLA if and only if we mean global destination address (poor question). https://www.examtopics.com/discussions/cisco/view/94644-exam-200-301-topic-1-question-136discussion/ Page 67 of 112 Question 035 Refer to the exhibit. The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these requirements: DC-1 Gi1/0 must be the last usable address on a /30 DC-1 Gi1/1 must be the first usable address on a /29 DC-1 Gi1/2 must be the last usable address on a /28 HQ-1 Gi1/3 must be the last usable address on a /29 Drag and drop the commands from the left onto the destination interfaces on the right. Not all commands are used. Select and Place: a. b. c. d. e. f. g. ip address 192.168.4.9 255.255.255.248 ip address 192.168.3.14 255.255.255.240 ip address 209.165.202.129 255.255.255.252 ip address 192.168.4.13 255.255.255.240 209.165.202.130 255.255.255.252 209.165.202.131 255.255.255.252 ip address 192.168.3.14 255.255.255.248 DC-1 Interface Gi 1/0 Gi 1/1 Gi 1/2 HQ-1 Interface Gi 1/3 IPv4 Address IPv4 Address Page 68 of 112 Answer 035 DC-1 Interface Gi 1/0 Gi 1/1 Gi 1/2 HQ-1 Interface Gi 1/3 IPv4 Address 209.165.202.130 255.255.255.252 192.168.4.9 255.255.255.248 192.168.3.14 255.255.255.240 IPv4 Address 192.168.3.14 255.255.255.248 Explanation: Note: Both the Network address and the last usable address are always EVEN. Both the Broadcast address and the first usable address are always ODD. DC-1 Gi 1/0 must have the last usable (EVEN) addresses on a /30 (Blocks of 4 addresses/subnet). /30 has a subnet mask of 255.255.255.252 Possible answers include: ‘c’ = 129 (no – this is the first address of a /30) = ODD ‘e’ = 130 (yes – this is a second address of a /30) = EVEN ‘f’ = 131 (no – this is the B/C of a /30) = ODD Answer = ‘e’ = 209.165.202.130 /30 (Last Usable Address = EVEN last Octet) DC-1 Gi 1/1 is the first usable (ODD) address on a /29 (Blocks of 8 addresses/subnet) /29 has a subnet mask of 255.255.255.248 Possible answers include: ‘a’ (192.168.4.9 /29 is the first usable address) = ODD ‘g’ (192.168.3.14 /29 isn’t – it’s the last usable) = EVEN Answer is ‘a’ = 192.168.4.9 /29 (First Usable Address = ODD last Octet) DC-1 Gi 1/2 is the last usable (EVEN) address on a /28 (Blocks of 16 addresses/subnet). /28 has a subnet mask of 255.255.255.240 Possible answers include: ‘b’ = 192.168.3.14 = EVEN, ‘d’ = 192.168.4.13 = ODD Considering blocks of 16: ‘b’ = 3.14 Is the last usable. Considering blocks of 16: ‘d’ = 4.13 is not the last usable. Answer is ‘b’ = 192.168.3.14 255.255.255.240 (Last Usable Address = EVEN last Octet) HQ-1 Gi 1/3 is the last usable address on a /29 (Block of 8 addresses per subnet). /29 has a subnet mask of 255.255.255.248 Possible answers include: ‘a’ = 192.168.4.9, Cannot be ‘a’, as it is already an answer. ‘g’ = 192.168.3.14. Must be ‘g’ – let’s look. Answer ‘g’ = 192.168.3.14 /29 = EVEN Considering blocks of 8: 3.14 is the last usable. Answer is ‘g’ = 192.168.3.14 255.255.255.248 (Last Usable Address = EVEN last Octet) https://www.examtopics.com/discussions/cisco/view/83687-exam-200-301-topic-1-question-132discussion/ Page 69 of 112 Question 036 Refer to the exhibit. Which two statements about the network environment of router R1 must be true? Refer to the exhibit. Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment. Which command must be used to configure the route? a. b. c. d. route add 10.0.3.0 0.255.255.255 10.0.4.2 ip route 10.0.3.0 0.255.255.255 10.0.4.2 route add 10.0.3.0 mask 255.255.255.0 10.0.4.3 ip route 10.0.3.0 255.255.255.0 10.0.4.3 Answer 036 d. Explanation: These are the only two statements that have the next hop of 10.0.4.3. This is the Gi 0/1 interface of R3; then “next-hop” from R1. Only ‘d’ can be applied to a router. https://www.examtopics.com/discussions/cisco/view/93031-exam-200-301-topic-1-question-379discussion/ Page 70 of 112 Question 037 Refer to the exhibit. How many JSON objects are represented? a. b. c. d. 1 2 3 4 Answer 037 1. Explanation: A JSON object is surrounded by curly brackets, { and }, and contains a comma-separated list of name/value pairs. https://www.examtopics.com/discussions/cisco/view/82446-exam-200-301-topic-1-question-769discussion/ Page 71 of 112 Question 038 What is a function of Cisco Advanced Malware Protection for a Next-Generation IPS? a. b. c. d. inspecting specific files and file types for malware authorizing potentially compromised wireless traffic authenticating end users URL filtering Answer 038 a. Explanation: - URL filtering is a feature of NGFW (Next-Generation-Firewalls). - Reputation-Based Filtering is a feature of NGIPS (Next-Generation-IPS). → It means that, it receives information from a Cisco Talos (for example) about the daily security threats. → Part of that data identifies known bad actors, based on IP address, domain, name, or even specific URL, with a reputation "score" for each. → So, the NGIPS can perform reputation-based filtering, taking the "scores" into account. https://www.examtopics.com/discussions/cisco/view/116315-exam-200-301-topic-1-question683-discussion/ Page 72 of 112 Question 039 Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right. a. Used to reliably share files between devices b. Appropriate for streaming operations with minimal latency c. Provides best-effort delivery d. Supports reliable data transmission e. Transmitted based on data contained in the packet without the need for a data channel f. Requires the client and the server to establish a connection before sending the packet g. Provides best-effort service h. Supports reliable data transmission TCP UDP Answer 039 TCP Used to reliably share files between devices Supports reliable data transmission Requires the client and the server to establish a connection before sending the packet Supports reliable data transmission UDP Appropriate for streaming operations with minimal latency Provides best-effort delivery Transmitted based on data contained in the packet without the need for a data channel Provides best-effort service Explanation: Obvious – Two questions were combined here. https://www.examtopics.com/discussions/cisco/view/86808-exam-200-301-topic-1-question-146discussion/ https://www.examtopics.com/discussions/cisco/view/75270-exam-200-301-topic-1-question-95discussion/ Page 73 of 112 Question 040 Drag and drop the Cisco IOS attack mitigation features from the left onto the types of network attack they mitigate on the right. a. b. c. d. DHCP Snooping Dynamic ARP Inspection IP Source Guard Storm Control 1. 2. 3. 4. Rogue server that spoofs IP configuration Cache Poisoning Flood Attacks Rogue Clients on the network Answer 040 IOS Mitigation Feature DHCP Snooping Dynamic ARP Inspection IP Source Guard Storm Control Type of Network Attack to Mitigate Rogue server that spoofs IP configuration Cache Poisoning Rogue Clients on the network Flood Attacks Explanation: Obvious. https://www.examtopics.com/discussions/cisco/view/82777-exam-200-301-topic-1-question-701discussion/ Page 74 of 112 Question 041 Drag and drop the elements of a security program from the left onto the corresponding descriptions on the right. a. b. c. d. e. Awareness Education Security Policy Security Standard Training 1. Document that outlines an organisation’s security goals and practices and the roles and responsibilities of the organisation’s personnel. Tactical document that sets out specific tasks and methods to maintain security. User-awareness learning level that focuses on learning about topics and practices beyond what is typically required by the user’s job. User-awareness learning level that focuses on security practices that all employees must understand and enforce. User-awareness learning level that focuses on teaching employees how to perform tasks specifically required by their jobs. 2. 3. 4. 5. Answer 041 Element Security Policy Security Standard Education Awareness Training Description Document that outlines an organisation’s security goals and practices and the roles and responsibilities of the organisation’s personnel Tactical document that sets out specific tasks and methods to maintain security User-awareness learning level that focuses on learning about topics and practices beyond what is typically required by the user’s job User-awareness learning level that focuses on security practices that all employees must understand and enforce User-awareness learning level that focuses on teaching employees how to perform tasks specifically required by their jobs Explanation: 1 (document) and 2(tactical document) must be c and d (or d and c). A standard is a tactical document, so d = 2. Therefore, a policy outlines the organisation’s security goals, etc. (c = 1). Awareness, Education, and Training = 3, 4, 5 (in some order). Awareness = must understand and enforce = 4. Education = learning = 3 Training = 5; teaching employees. https://www.examtopics.com/discussions/cisco/view/85442-exam-200-301-topic-1-question-689discussion/ Page 75 of 112 Question 042 Refer to the exhibit: A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server. Which task must be performed to complete the process? a. b. c. d. Change the Support for CoA to Enabled Select Enable next to Management Select Enable next to Network User Change the Server Status to Disabled Answer 042 c. Explanation: Network users is for authenticating the people connected to the wireless network. Management is for authentication people who try to login to the WLC. "If you are not authenticating management user via RADIUS then you must disable it" https://mrncciew.com/2013/04/21/configuring-radius-on-wlc/ https://www.examtopics.com/discussions/cisco/view/83956-exam-200-301-topic-1-question-340discussion/ Page 76 of 112 Question 043 Refer to the exhibit: What must be configured to enable 802.11w on the WLAN? a. b. c. d. Set Fast Transition to Enabled. Enable WPA Policy. Set PMF to Required. Enable MAC Filtering. Answer 043 c Explanation: 802.11w, also known as Protected Management Frames (PMF), is a standard within the IEEE 802.11 family of wireless networking standards. It enhances the security of Wi-Fi networks by protecting management frames exchanged between wireless devices and access points. Management frames are used for tasks such as association, authentication, and disassociation in a Wi-Fi network. https://www.examtopics.com/discussions/cisco/view/74589-exam-200-301-topic-1-question-669discussion/ Page 77 of 112 Question 044 An engineer is configuring router R1 with an IPv6 static route for prefix 2019:C15C:0CAF:E001::/64. The next hop must be 2019:C15C:0CAF:E002::1. The route must be reachable via the R1 Gigabit 0/0 interface. Which command configures the designated route? a. b. c. d. R1(config-if)# ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet 0/0 R1(config)# ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet 0/0 R1(config-if)# ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1 R1(config)# ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1 Answer 044 d Explanation: This has to be an ipv6 route command. The command must be from global configuration mode. ‘d’ is the only answer that satisfies these requirements. A better answer would be this one: ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1 GigabitEthernet0/0 https://www.examtopics.com/discussions/cisco/view/85061-exam-200-301-topic-1-question-458discussion/ Page 78 of 112 Question 045 An administrator must use the password complexity not manufacturer-name command to prevent users from adding `Cisco` as a password. Which command must be issued before this command? a. b. c. d. login authentication my-auth-list service password-encryption password complexity enable confreg 0x2142 Answer 045 a Explanation: configure terminal ! passwords complexity enable passwords complexity [min-length <number>] [min-classes <number>] [not-current] [no-repeat <number>] [not-username] [not manufacturer-name] not-manufacturer-name — Specifies that the password cannot repeat or reverse the name of the manufacturer or any variant reached by changing the case of the characters. https://www.examtopics.com/discussions/cisco/view/87168-exam-200-301-topic-1-question-709discussion/ https://www.cisco.com/c/en/us/support/docs/smb/switches/cisco-small-business-300-seriesmanaged-switches/smb5563-configure-password-settings-on-a-switch-through-thecommand.html Page 79 of 112 Question 046 Which two practices are recommended for an acceptable security posture in a network? (Choose two). a. b. c. d. e. Use a cryptographic keychain to authenticate to network devices. Place internal email and file servers in a designated DMZ. Back up device configurations to encrypted USB drives for secure retrieval. Disable unused or unnecessary ports, interfaces, and services. Maintain network equipment in a secure location. Answer 046 d, and e. Explanation: Obvious. https://www.examtopics.com/discussions/cisco/view/87358-exam-200-301-topic-1-question-685discussion/ Page 80 of 112 Question 047 Which REST method updates an object in the Cisco DNA Centre Intent API? a. b. c. d. CHANGE UPDATE POST PUT Answer 047 d Explanation: The RESTful Cisco DNA Centre Intent API uses HTTPS verbs (GET, POST, PUT, and DELETE) with JSON structures to discover and control the network In RESTful APIs, different HTTP methods are used to perform different actions on resources. The PUT method is commonly used to update an existing resource or replace it entirely with a new representation. When using the Cisco DNA Centre Intent API to update an object, you would typically send an HTTP request with the PUT method to the appropriate endpoint, providing the updated representation of the object in the request body. This allows you to modify the attributes or properties of the object and persist those changes in the system. Therefore, the correct answer is D. PUT Note: Create new data structures and variables-> Create = POST Read (retrieve) variable names, structures, and values -> Read = GET Update or replace values of some variable Update -> = PATCH, PUT Delete some variables and data structures Delete -> = DELETE https://www.examtopics.com/discussions/cisco/view/83581-exam-200-301-topic-1-question-768discussion/ https://developer.cisco.com/docs/dna-center/#!overview/cisco-dna-center-platform-overview Page 81 of 112 Question 048 Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right (Cisco DNA Centre vs. Traditional). a. b. c. d. e. f. Orchestrates background device configuration Provides greater flexibility for custom and non-standard configurations Relies on per-device management Supports centralised software management Supports open APIs Uses individual software management Answer 048 Cisco DNA Centre Orchestrates background device configuration Provides greater flexibility for custom and non-standard configurations Supports centralised software management Traditional Supports open APIs (limited) Relies on per-device management Uses individual software management Explanation: A. Cisco DNA Centre (Software-Defined Networking Solution): 1. Orchestrates background device configuration, streamlining the process of applying changes to multiple devices simultaneously and reducing manual configuration efforts. 2. Provides greater flexibility for custom and non-standard configurations, allowing network administrators to tailor settings to specific requirements without being limited by rigid configurations. 3. Supports centralized software management, enabling the deployment and updates of software across the network from a single, unified interface. B. Traditional (Legacy Networking): 1. Relies on per-device management, necessitating manual configuration adjustments for each network device individually. 2. Uses individual software management, requiring separate installations and updates for software on each device, potentially leading to longer deployment times. 3. May have limited support for open APIs, making it challenging to integrate with third-party applications and limiting automation possibilities compared to more modern solutions like Cisco DNA Centre https://www.examtopics.com/discussions/cisco/view/84625-exam-200-301-topic-1-question-766discussion/ Page 82 of 112 Question 049 After a recent security breach and a RADIUS failure, an engineer must secure the console port of each enterprise router with a local username and password. Which configuration must the engineer apply to accomplish this task? a. b. c. d. aaa new-model line con 0 password plaintextpassword privilege level 15 ! aaa new-model aaa authorization exec default local aaa authentication login default radius username localuser privilege 15 secret plaintextpassword ! username localuser secret plaintextpassword line con 0 no login local privilege level 15 ! username localuser secret plaintextpassword line con 0 login authentication default privilege level 15 ! Answer 049 d. Explanation: ‘a’ is wrong because there’s no “login”, and no username! ‘b’ is wrong, because the authentication login order is radius. ‘c’ is wrong, as it says no login local. ‘d’ is possibly right – the most correct answer anyway. Page 83 of 112 Question 050 An engineer is configuring SSH version 2 exclusively on the R1 router. What is the minimum configuration required to permit remote management using the cryptographic protocol? a. b. c. d. hostname R1 service password-encryption crypto key generate rsa general-keys modulus 1024 username cisco privilege 15 password 0 cisco123 ip ssh version 2 line vty 0 15 transport input ssh login local hostname R1 ip domain name cisco crypto key generate rsa general-keys modulus 1024 username cisco privilege 15 password 0 cisco123 ip ssh version 2 line vty 0 15 transport input ssh login local hostname R1 crypto key generate rsa general-keys modulus 1024 username cisco privilege 15 password 0 cisco123 ip ssh version 2 line vty 0 15 transport input ssh login local hostname R1 ip domain name cisco crypto key generate rsa general-keys modulus 1024 username cisco privilege 15 password 0 cisco123 ip ssh version 2 line vty 0 15 transport input all login local ! Answer 050 b Explanation: ‘a’ is wrong as it doesn’t have a domain name ‘b’ looks good. ‘c’ is wrong as it doesn’t have a domain name ‘d’ is wrong, as it allows all protocols, not just SSH. https://www.examtopics.com/discussions/cisco/view/98165-exam-200-301-topic-1-question-584discussion/ Page 84 of 112 Question 051 An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration for a Secure Shell access RSA key? a. b. c. d. crypto key import rsa pem crypto key generate rsa crypto key zeroize rsa crypto key pubkey-chain rsa Answer 051 b. Explanation: The next step to complete the configuration for a Secure Shell (SSH) access RSA key on the local router is to use the "crypto key generate rsa" command. This command generates an RSA key pair that will be used for SSH encryption and authentication purposes. After running this command, the router will prompt for the key modulus size (usually 1024 or 2048 bits) and will generate the RSA key pair. The generated RSA public key will be used for SSH server authentication, and the private key will be stored on the router for secure SSH communication. https://www.examtopics.com/discussions/cisco/view/109728-exam-200-301-topic-1-question673-discussion/ Page 85 of 112 Question 052 Why would VRRP be implemented when configuring a new subnet in a multivendor environment? a. b. c. d. when a gateway protocol is required that supports more than two Cisco devices for redundancy to interoperate normally with all vendors and provide additional security features for Cisco devices to ensure that the spanning-tree forwarding path to the gateway is loop-free to enable normal operations to continue after a member failure without requiring a change in a host ARP cache Answer 052 b. Explanation: VRRP provides vendor interoperability (RFC 2338), although "ALL" vendors is a bit of a stretch. It also provides additional security features for Cisco devices, including: - Object Tracking (track the state of interfaces, altering priority values accordingly. - Enhanced authentication through the support of MD5. https://www.examtopics.com/discussions/cisco/view/85223-exam-200-301-topic-1-question-502discussion/#:~:text=Why%20would%20VRRP%20be%20implemented,subnet%20in%20a%20multi vendor%20environment%3F&text=VRRP%20is%20the%20industry%20standards,is%20supported %20by%20multiple%20vendors. Page 86 of 112 Question 053 Refer to the exhibit The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent? a. 192.168.1.253 b. 192.168.1.100 c. 192.168.1.226 d. 192.168.1.254 Answer 053 a. Explanation: The graphic shows that the DNS Servers is 192.168.1.253. https://www.examtopics.com/discussions/cisco/view/79407-exam-200-301-topic-1-question-103discussion/ Page 87 of 112 Question 054 Refer to the exhibit What is the next hop for traffic entering R1 with a destination of 10.1.2.126? a. b. c. d. 10.165.20.126 10.165.20.146 10.165.20.166 10.165.20.226 Answer 054 a. Explanation: Longest match wins. This is the D (EIGRP) going to 19.1.2.0 /25, next hop is 10.165.20.126 (answer ‘a’). https://www.examtopics.com/discussions/cisco/view/100142-exam-200-301-topic-1-question452-discussion/ Page 88 of 112 Question 055 Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right. a. b. c. d. Transmitted based on data contained in the packet without the need for a data channel Requires the client and the server to establish a connection before sending the packet Provides best-effort service Supports reliable data transmission Answer 055 TCP Requires the client and the server to establish a connection before sending the packet Supports reliable data transmission UDP Transmitted based on data contained in the packet without the need for a data channel Provides best-effort service Explanation: Obvious. https://www.examtopics.com/discussions/cisco/view/75270-exam-200-301-topic-1-question-95discussion/ Page 89 of 112 Question 056 Drag and drop the IPv6 address details from the left onto the corresponding types on the right. a. b. c. d. e. f. Includes Link-Local and Loopback addresses Used exclusively by a non-host device Identifies an interface on an IPv6 device Assigned to more than one interface Derived from the FF00::/8 address range Provides one-to-many communications. 1. 2. 3. Anycast Multicast Unicast Answer 056 x Anycast Used exclusively by a non-host device Assigned to more than one interface Multicast Derived from the FF00::/8 address range Provides one-to-many communications. Unicast Includes Link-Local and Loopback addresses Identifies an interface on an IPv6 device Explanation: Multicast: 1. Derived from the FFOO::/8 address range. Can't argue with that. 2. Provides one-to-many communications. That's what multicast is , one-to-many. Unicast: 1. Includes Link-Local and Loopback addresses. Yip, these are single destinations. 2. Identifies an interface on an IPv6 device. Again, yip - it's a single destination. AnyCast: 1. Used exclusively by a non-host device. I think what they are alluding to here is that this address is associated with a group of servers that share an IP address, not a single host (nonhost). 2. Assigned to more than one interface. Yes - by definition its one-to-closest, so that implies there's more than one instance of it, so it must be assigned to more than one interface. https://www.examtopics.com/discussions/cisco/view/96923-exam-200-301-topic-1-question-118discussion/ Page 90 of 112 Question 057 What is the role of disaggregation in controller-based networking? a. b. c. d. It divides the control-plane and data-plane functions. It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions It summarises the routes between the core and distribution layers of the network topology It enables a network topology to quickly adjust from a ring network to a star network Answer 057 a. Explanation: Taken literally, “network disaggregation” means to separate the network into its component parts. What we’re talking about here is the ability to source switching hardware and network operating systems separately. https://www.examtopics.com/exams/cisco/200-301/view/13/ Question 058 Which QoS queuing method discards or marks packets that exceed the desired bit rate of traffic flow? a. CBWFQ b. policing c. LLQ d. shaping Answer 058 b. Explanation: Use the police command to mark a packet with different quality of service (QoS) values based on conformance to the service-level agreement. Traffic policing allows you to control the maximum rate of traffic transmitted or received on an interface. Reference: https://www.cisco.com/c/en/us/td/docs/ios/qos/configuration/guide/12_2sr/qos_12_2sr_boo k/traffic_policing.html https://www.examtopics.com/discussions/cisco/view/83937-exam-200-301-topic-1-question-594discussion/ Page 91 of 112 Question 059 A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.) a. transport input ssh b. transport input all c. crypto key generate rsa modulus 2048 d. crypto key generate rsa general-keys modulus 1024 e. crypto key generate rsa usage-keys Answer 059 a, and c. Explanation: https://www.examtopics.com/discussions/cisco/view/84821-exam-200-301-topic-1-question-680discussion/ Question 060 What is a zero-day exploit? a. b. c. d. It is when the network is saturated with malicious traffic that overloads resources and bandwidth. It is when an attacker inserts malicious code into a SQL server. It is when a new network vulnerability is discovered before a fix is available. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data. Answer 060 c. Explanation: https://www.examtopics.com/discussions/cisco/view/109096-exam-200-301-topic-1-question679discussion/#:~:text=What%20is%20a%20zero%2Dday,that%20overloads%20resources%20and%20 bandwidth. Page 92 of 112 Question 061 Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. a. b. c. d. Configure BPDU guard. Configure Dynamic ARP inspection Configure Root Guard Configure VACL 1. 2. 3. 4. 802.1q double tagging ARP spoofing Unwanted superior BPDUs Unwanted BPDUs on PortFast-enabled interfaces Answer 061 Technique Configure VACL Configure Dynamic ARP inspection Configure Root Guard Configure BPDU guard Threat / Attack 802.1q double tagging ARP spoofing Unwanted superior BPDUs Unwanted BPDUs on PortFast-enabled interfaces Explanation: Obvious. https://www.examtopics.com/discussions/cisco/view/19860-exam-200-301-topic-1-question-69discussion/ Page 93 of 112 Question 062 Refer to the exhibit. An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally? a. b. c. d. SW1(config)#interface fa0/2 SW1(config-if)#no switchport access vlan 2 SW1(config-if)#no switchport trunk allowed vlan 3 SW1(config-if)#switchport trunk allowed vlan 2 SW1(config)#interface fa0/2 SW1(config-if)#no switchport access vlan 2 SW1(config-if)#switchport trunk native vlan 2 SW1(config-if)#switchport trunk allowed vlan 3 SW1(config)#interface fa0/2 SW1(config-if)#no switchport mode trunk SW1(config-if)#no switchport trunk allowed vlan 3 SW1(config-if)#switchport mode access SW1(config)#interface fa0/1 SW1(config-if)#no switchport access vlan 2 SW1(config-if)#switchport access vlan 3 SW1(config-if)#switchport trunk allowed vlan 2 Answer 062 c. Explanation: First, remove the trunk port on Fa 0/2 Next, remove the associated VLANs allowed on the (now non-existent) trunk> Finally, place the port in switchport access mode (the port is already in VLAN 2 https://www.examtopics.com/discussions/cisco/view/84205-exam-200-301-topic-1-question-276discussion/ Page 94 of 112 Question 063 Refer to the exhibit. Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24? a. b. c. d. F0/10 F0/11 F0/12 F0/1 Answer 063 b. Explanation: All entries go to 10.10.10.24 All have the same longest match – first election process met. EIGRP is chosen over OSPF – lowest AD (EIGRP = 90, OSPF = 110) – 2nd election process met. EIGRP route via F0/11 has the lowest metric, use it – 3rd election process met. Answer is ‘b’. https://www.examtopics.com/discussions/cisco/view/84238-exam-200-301-topic-1-question-465discussion/ Page 95 of 112 Question 064 What is a function of an endpoint on a network? a. b. c. d. provides wireless services to users in a building connects server and client device to a network allows users to record data and transmit to a file server forwards traffic between VLANs on a network Answer 064 c. Explanation: An endpoint is a remote computing device that communicates back and forth with a network to which it is connected. Examples of endpoints include: ✑ Desktops ✑ Laptops ✑ Smartphones ✑ Tablets ✑ Servers ✑ Workstations Internet-of-things (IoT) devices https://www.examtopics.com/discussions/cisco/view/83756-exam-200-301-topic-1-question-107discussion/ Page 96 of 112 Question 065 Which wireless security protocol relies on Perfect Forward Secrecy? A. WEP B. WPA2 C. WPA D. WPA3 Answer 065 d. Explanation: WPA3 is the wireless security protocol that relies on Perfect Forward Secrecy (PFS). It uses the Simultaneous Authentication of Equals (SAE) protocol, also known as Dragonfly, to provide PFS for each Wi-Fi session, making it much more secure than its predecessors (WPA2 and WPA) in terms of key management and encryption. https://www.examtopics.com/discussions/cisco/view/80392-exam-200-301-topic-1-question-706discussion/ Page 97 of 112 Question 066 Refer to the exhibit. An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for new hosts. Which configuration script must be used? a. R7# configure terminal interface FastEthernet 1/0 ip address 10.1.56.1 255.255.192.0 no shutdown R8# configure terminal interface FastEthernet 0/0 ip address 10.9.32.1 255.255.224.0 no shutdown R9# configure terminal interface FastEthernet 1/1 ip address 10.23.96.1 255.255.128.0 no shutdown Page 98 of 112 b. c. d. R7# configure terminal interface FastEthernet 1/0 ip address 10.1.56.1 255.255.240.0 no shutdown R8# configure terminal interface FastEthernet 0/0 ip address 10.9.32.1 255.255.224.0 no shutdown R9# configure terminal interface FastEthernet 1/1 ip address 10.23.96.1 255.255.192.0 no shutdown R7# configure terminal interface FastEthernet 1/0 ip address 10.1.56.1 255.255.252.0 no shutdown R8# configure terminal interface FastEthernet 0/0 ip address 10.9.32.1 255.255.255.0 no shutdown R9# configure terminal interface FastEthernet 1/1 ip address 10.23.96.1 255.255.240.0 no shutdown R7# configure terminal interface FastEthernet 1/0 ip address 10.1.56.1 255.255.192.0 no shutdown R8# configure terminal interface FastEthernet 0/0 ip address 10.9.32.1 255.255.224.0 no shutdown R9# configure terminal interface FastEthernet 1/1 ip address 10.23.96.1 255.255.128.0 no shutdown Page 99 of 112 Answer 066 c. Explanation: R7’s Fa 1/0 has 923 * 1.1 = 1015 host, so go to 1024 = 210 = 22-bits left (255.255.252.0). R8’s Fa 0/0 has 225 * 1.1 = 248 host, so go to 255 = 28 = 24-bits left (255.255.255.0). R9’s Fa 1/1 has 3641 * 1.1 = 4005 host, so go to 4096 = 212 = 20-bits left (255.255.240.0). Only ‘c’ offers these options. https://www.examtopics.com/discussions/cisco/view/83583-exam-200-301-topic-1-question-156discussion/ Page 100 of 112 Question 067 OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR'BDR election? a. router ospf 1 network 192.168.1.1 0.0.0.0 area 0 interface e1/1 ip address 192.168.1.1 255.255.255.252 ip ospf cost 0 b. router ospf 1 network 192.168.1.1 0.0.0.0 area 0 hello interval 15 interface e1/1 ip address 192.168.1.1 255.255.255.252 c. router ospf 1 network 192.168.1.1 0.0.0.0 area 0 interface e1/1 ip address 192.168.1.1 255.255.255.252 ip ospf network broadcast d. router ospf 1 network 192.168.1.1 0.0.0.0 area 0 interface e1/1 ip address 192.168.1.1 255.255.255.252 ip ospf network point-to-point Answer 067 d. Explanation: There is no DR/BDR election process on a point-to-point link. https://www.examtopics.com/discussions/cisco/view/84236-exam-200-301-topic-1-question-461discussion/ Page 101 of 112 Question 068 Refer to the exhibit. Which configuration enables DHCP addressing for hosts connected to interface FastEthernet0/1 on router R4? a. interface FastEthernet0/1 ip helper-address 10.0.1.1 ! access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1 b. interface FastEthernet0/0 ip helper-address 10.0.1.1 ! access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1 c. interface FastEthernet0/0 ip helper-address 10.0.1.1 ! access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps d. interface FastEthernet0/1 ip helper-address 10.0.1.1 ! access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1 Page 102 of 112 Answer 068 d. Explanation: The helper address is on the gateway to the host requesting the DHCP address (Fa 0/1). Therefore, the answer is down to either a, or d. Furthermore, the ACL in ‘c’ is just wrong as there’s no protocol mentioned. The ACL in ‘a’ is using TCP, so that’s out for DHCP (It should be using UDP here). Process of elimination, it must be ‘d’. Notice though, the ACL would appear at the bottom of the list, under the deny ip any any log. As such, this wouldn’t work. https://www.examtopics.com/discussions/cisco/view/82007-exam-200-301-topic-1-question-582discussion/ Page 103 of 112 Question 069 Refer to the exhibit. Router R1 currently is configured to use R3 as the primary route to the internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3? a. b. c. d. ip route 0.0.0.0 0.0.0.0 209.165.201.5.10 ip route 0.0.0.0 0.0.0.0 g0/1 1 ip route 0.0.0.0 0.0.0.0 209.165.200.226 1 ip route 0.0.0.0 0.0.0.0 g0/1 6 Answer 069 d. Explanation: The next hop from R1 is either the next-hop of 209.165.200.230 (not an option), or the exit interface of Gi 0/1, so the answer is either ‘b’ or ‘d’. ‘b’ has an AD of 1 (which is the default), and ‘d’ has and AD of ‘6’. The floating static’s AD (6) must be larger than that of the primary route (AD =1). Therefore, the answer is ‘d’. https://www.examtopics.com/discussions/cisco/view/86505-exam-200-301-topic-1-question-463discussion/ Page 104 of 112 Question 070 What is the purpose of the ip address dhcp command? a. b. c. d. to configure an interface as a DHCP relay to configure an interface as a DHCP client to configure an interface as a DHCP helper to configure an interface as a DHCP server Answer 070 b. Explanation: https://www.examtopics.com/discussions/cisco/view/84667-exam-200-301-topic-1-question-581discussion/ Page 105 of 112 Question 071 Refer to the exhibit. Which minimum configuration items are needed to enable Secure Shell version 2 access to R15? A. Router(config)#hostname R15 R15(config)#ip domain-name cisco.com R15(config)#crypto key generate rsa general-keys modulus 1024 R15(config)#ip ssh version 2 R15(config-line)#line vty 0 15 R15(config-line)# transport input ssh B. Router(config)#crypto key generate rsa general-keys modulus 1024 Router(config)#ip ssh version 2 Router(config-line)#line vty 015 Router(config-line)# transport input ssh Router(contig)#ip ssh logging events R15(config)#ip ssh stricthostkeycheck C. Router(config)#hostname R15 R15(config)#crypto key generate rsa general-keys modulus 1024 R15(config-line)#line vty 0 15 R15(config-line)# transport input ssh R15(config)#ip ssh source-interface Fa0/0 R15(config)#ip ssh stricthostkeycheck D. Router(config)#ip domain-name cisco.com Router(config)#crypto key generate rsa general-keys modulus 1024 Router(contig)#ip ssh version 2 Router(config-line)#line vty 0 15 Router(config-line)# transport input all Router(config)#ip ssh logging events Answer 071 x. Explanation: https://www.examtopics.com/discussions/cisco/view/99830-exam-200-301-topic-1-question-964discussion/ Question 072 Page 106 of 112 Answer 072 x. Explanation: Question 073 Answer 073 x. Explanation: Question 074 Answer 074 x. Explanation: Question 075 Answer 075 x. Page 107 of 112 Explanation: Question 076 Answer 076 x. Explanation: Question 077 Answer 077 x. Explanation: Question 078 Answer 078 x. Explanation: Page 108 of 112 Question 079 Answer 079 x. Explanation: Question 080 Answer 080 x. Explanation: <<< Template for Titles >>> Question 021 Answer 021 x. Explanation: Page 109 of 112 Question 022 Answer 022 x. Explanation: Question 023 Answer 023 x. Explanation: Question 024 Answer 024 x. Explanation: Page 110 of 112 Question 025 Answer 025 x. Explanation: Question 026 Answer 026 x. Explanation: Question 027 Answer 027 x. Explanation: Question 028 Page 111 of 112 Answer 028 x. Explanation: Question 029 Answer 029 x. Explanation: Question 030 Answer 030 x. Explanation: Page 112 of 112