Win IT Exam with Last Dumps 2024


Cisco 200-301 Exam

Page 71/112
Viewing Questions 701 710 out of 1114 Questions
63.39%

Question 701
Refer to the exhibit. Which configuration for RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?
Image 200-301_701Q.png related to the Cisco 200-301 Exam
A.
Image 200-301_701QA.png related to the Cisco 200-301 Exam
B.
Image 200-301_701QB.png related to the Cisco 200-301 Exam
C.
Image 200-301_701QC.png related to the Cisco 200-301 Exam
D.
Image 200-301_701QD.png related to the Cisco 200-301 Exam

Question 702
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two.)
A. The ACL is empty
B. A matching permit statement is too broadly defined
C. The packets fail to match any permit statement
D. A matching deny statement is too high in the access list
E. A matching permit statement is too high in the access list

Question 703
The service password-encryption command is entered on a router. What is the effect of this configuration?
A. restricts unauthorized users from viewing clear-text passwords in the running configuration
B. prevents network administrators from configuring clear-text passwords
C. protects the VLAN database from unauthorized PC connections on the switch
D. encrypts the password exchange when a VPN tunnel is established

Question 704
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. SAE encryption
B. TKIP encryption
C. scrambled encryption key
D. AES encryption

Question 705
Refer to the exhibit. If the network environment is operating normally, which type of device must be connected to interface fastethernet 0/1?
Image 200-301_705Q.png related to the Cisco 200-301 Exam
A. DHCP client
B. access point
C. router
D. PC


Question 706
Refer to the exhibit. An administrator configures four switches for local authentication using passwords that are stored as a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?
Image 200-301_706Q.png related to the Cisco 200-301 Exam
A. SW1
B. SW2
C. SW3
D. SW4

Question 707
Refer to the exhibit. What is the effect of this configuration?
Image 200-301_707Q.png related to the Cisco 200-301 Exam
A. The switch discards all ingress ARP traffic with invalid MAC-to-IP address bindings.
B. All ARP packets are dropped by the switch.
C. Egress traffic is passed only if the destination is a DHCP server.
D. All ingress and egress traffic is dropped because the interface is untrusted.

Question 708
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A. IPsec
B. IKEv1
C. MD5
D. IKEv2

Question 709
Which type of wireless encryption is used for WPA2 in preshared key mode?
A. AES-128
B. TKIP with RC4
C. AES-256
D. RC4

Question 710
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
A. enable secret
B. enable password
C. service password-encryption
D. username cisco password encrypt



Premium Version