Download Cisco.200-301.Lead2Pass.2023-10-18.439q.vcex

Download Exam

File Info

Exam Cisco Certified Network Associate (200-301 CCNA)
Number 200-301
File Name Cisco.200-301.Lead2Pass.2023-10-18.439q.vcex
Size 25 MB
Posted Oct 18, 2023
Download Cisco.200-301.Lead2Pass.2023-10-18.439q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which statement correctly compares traditional networks and controller-based networks?


  1. Only traditional networks offer a centralized control plane
  2. Only traditional networks natively support centralized management
  3. Traditional and controller-based networks abstract policies from device configurations
  4. Only controller-based networks decouple the control plane and the data plane
Correct answer: D
Explanation:
Most traditional devices use a distributed architecture, in which each control plane is resided in a networking device. Therefore they need to communicate with each other via messages to work correctly.In contrast to distributed architecture, centralized (or controller-based) architectures centralizes the control of networking devices into one device, called SDN controller -> Answer D is correct.
Most traditional devices use a distributed architecture, in which each control plane is resided in a networking device. Therefore they need to communicate with each other via messages to work correctly.
In contrast to distributed architecture, centralized (or controller-based) architectures centralizes the control of networking devices into one device, called SDN controller -> Answer D is correct.



Question 2

How does HSRP provide first hop redundancy?


  1. It load-balances traffic by assigning the same metric value to more than one route to the samedestination in the IP routing table.
  2. It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured withthe same VLAN.
  3. It forwards multiple packets to the same destination over different routed links in the data path
  4. It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as thedefault gateway for hosts on a LAN
Correct answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-16/fhp-xe-16-book/fhp-hsrp-mgo.html
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-16/fhp-xe-16-book/fhp-hsrp-mgo.html



Question 3

Which two actions influence the EIGRP route selection process? (Choose two)


  1. The router calculates the reported distance by multiplying the delay on the exiting Interface by256.
  2. The router calculates the best backup path to the destination route and assigns it as the feasiblesuccessor.
  3. The router calculates the feasible distance of all paths to the destination route
  4. The advertised distance is calculated by a downstream neighbor to inform the local router of thebandwidth on the link
  5. The router must use the advertised distance as the metric for any given route
Correct answer: BC
Explanation:
The reported distance (or advertised distance) is the cost from the neighbor to the destination. It is calculated from the router advertising the route to the network. For example in the topology below, suppose router A & B are exchanging their routing tables for the first time. Router B says "Hey, the best metric (cost) from me to IOWA is 50 and the metric from you to IOWA is 90" and advertises it to router A.Router A considers the first metric (50) as the Advertised distance. The second metric (90), which is from NEVADA to IOWA (through IDAHO), is called the Feasible distance.       The reported distance is calculated in the same way of calculating the metric. By default (K1 = 1, K2 = 0, K3 = 1, K4 = 0, K5 = 0), the metric is calculated as follows:       -> Answer A is not correct.Feasible successor is the backup route. To be a feasible successor, the route must have an Advertised distance (AD) less than the Feasible distance (FD) of the current successor route -> Answer B is correct.Feasible distance (FD): The sum of the AD plus the cost between the local router and the next-hop router.The router must calculate the FD of all paths to choose the best path to put into the routing table.Note: Although the new CCNA exam does not have EIGRP topic but you should learn the basic knowledge of this routing protocol.
The reported distance (or advertised distance) is the cost from the neighbor to the destination. It is calculated from the router advertising the route to the network. For example in the topology below, suppose router A & B are exchanging their routing tables for the first time. Router B says "Hey, the best metric (cost) from me to IOWA is 50 and the metric from you to IOWA is 90" and advertises it to router A.
Router A considers the first metric (50) as the Advertised distance. The second metric (90), which is from NEVADA to IOWA (through IDAHO), is called the Feasible distance.
     
The reported distance is calculated in the same way of calculating the metric. By default (K1 = 1, K2 = 0, K3 = 1, K4 = 0, K5 = 0), the metric is calculated as follows:
     
-> Answer A is not correct.
Feasible successor is the backup route. To be a feasible successor, the route must have an Advertised distance (AD) less than the Feasible distance (FD) of the current successor route -> Answer B is correct.
Feasible distance (FD): The sum of the AD plus the cost between the local router and the next-hop router.
The router must calculate the FD of all paths to choose the best path to put into the routing table.
Note: Although the new CCNA exam does not have EIGRP topic but you should learn the basic knowledge of this routing protocol.



Question 4

Refer to the exhibit. What does router R1 use as its OSPF router-ID?
     


  1. 10.10.1.10
  2. 10.10.10.20
  3. 172.16.15.10
  4. 192.168.0.1
Correct answer: C
Explanation:
OSPF uses the following criteria to select the router ID:Manual configuration of the router ID (via the "router-id x.x.x.x" command under OSPF router configuration mode).Highest IP address on a loopback interface.Highest IP address on a non-loopback and active (no shutdown) interface.
OSPF uses the following criteria to select the router ID:
  1. Manual configuration of the router ID (via the "router-id x.x.x.x" command under OSPF router configuration mode).
  2. Highest IP address on a loopback interface.
  3. Highest IP address on a non-loopback and active (no shutdown) interface.



Question 5

Which API is used in controller-based architectures to interact with edge devices?


  1. overlay
  2. northbound
  3. underlay
  4. southbound
Correct answer: D



Question 6

Which statement identifies the functionality of virtual machines?


  1. Virtualized servers run most efficiently when they are physically connected to a switch that isseparate from the hypervisor
  2. The hypervisor can virtualize physical components including CPU. memory, and storage
  3. Each hypervisor can support a single virtual machine and a single software switch
  4. The hypervisor communicates on Layer 3 without the need for additional resources
Correct answer: B



Question 7

Which option about JSON is true?


  1. uses predefined tags or angle brackets () to delimit markup text
  2. used to describe structured data that includes arrays
  3. used for storing information
  4. similar to HTML, it is more verbose than XML
Correct answer: B
Explanation:
JSON data is written as name/value pairs.A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:"name":"Mark"JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..For example:{"name":"John","age":30,"cars":[ "Ford", "BMW", "Fiat" ]}
JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:
"name":"Mark"
JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..
For example:
{
"name":"John",
"age":30,
"cars":[ "Ford", "BMW", "Fiat" ]
}



Question 8

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?


  1. dual algorithm
  2. metric
  3. administrative distance
  4. hop count
Correct answer: C
Explanation:
Administrative distance is the feature used by routers to select the best path when there are two or more different routes to the same destination from different routing protocols. Administrative distance defines the reliability of a routing protocol.
Administrative distance is the feature used by routers to select the best path when there are two or more different routes to the same destination from different routing protocols. Administrative distance defines the reliability of a routing protocol.



Question 9

What are two benefits of network automation? (Choose two)


  1. reduced operational costs
  2. reduced hardware footprint
  3. faster changes with more reliable results
  4. fewer network failures
  5. increased network security
Correct answer: AC



Question 10

Drag and drop the WLAN components from the left onto the correct descriptions on the right.


Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
The service port can be used management purposes, primarily for out-of-band management.However, AP management traffic is not possible across the service port. In most cases, the service port is used as a "last resort" means of accessing the controller GUI for management purposes. For example, in the case where the system distribution ports on the controller are down or their communication to the wired network is otherwise degraded.A dynamic interface with the Dynamic AP Management option enabled is used as the tunnel source for packets from the controller to the access point and as the destination for CAPWAP packets from the access point to the controller.The virtual interface is used to support mobility management, Dynamic Host Configuration Protocol (DHCP) relay, and embedded Layer 3 security such as guest web authentication. It also maintains the DNS gateway host name used by Layer 3 security and mobility managers to verify the source of certificates when Layer 3 web authorization is enabled.Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ports_and_interfaces.html
The service port can be used management purposes, primarily for out-of-band management.
However, AP management traffic is not possible across the service port. In most cases, the service port is used as a "last resort" means of accessing the controller GUI for management purposes. For example, in the case where the system distribution ports on the controller are down or their communication to the wired network is otherwise degraded.
A dynamic interface with the Dynamic AP Management option enabled is used as the tunnel source for packets from the controller to the access point and as the destination for CAPWAP packets from the access point to the controller.
The virtual interface is used to support mobility management, Dynamic Host Configuration Protocol (DHCP) relay, and embedded Layer 3 security such as guest web authentication. It also maintains the DNS gateway host name used by Layer 3 security and mobility managers to verify the source of certificates when Layer 3 web authorization is enabled.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ports_and_interfaces.html









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files