200-301
Number: 200-301
Passing Score: 800
Time Limit: 120 min
File Version: 0
200-301
Cisco Certified Network Associate (200-301 CCNA)
More dumps and materials -> https://t.me/ciscoCat
Exam A
QUESTION 1
All 30 users on a single floor of a building are complaining about network slowness. After investigating the
access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all
traffic is being flooded out of every port. Which action can the administrator take to prevent this from occurring?
A. Configure port-security to limit the number of mac-addresses allowed on each port
B. Upgrade the switch to one that can handle 20,000 entries
C. Configure private-vlans to prevent hosts from communicating with one another
D. Enable storm-control to limit the traffic rate
E. Configure a VACL to block all IP traffic except traffic to and from that subnet
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which two keying mechanisms are available within MACsec? (Choose two.)
A. IKE
B. GDOI
C. SAP
D. MKA
E. Diffie-Hellman
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/
how_to_intro_macsec_ndac_guide.pdf
QUESTION 3
Which two features are supported on the Cisco Adaptive Security Virtual Appliance? (Choose two.)
A. high availability
B. EtherChannel
C. site-to-site VPN
D. PAK-based licensing
E. multiple contexts
F. clustering
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-virtual-appliance-asav/
datasheet-c78-733399.html
More dumps and materials -> https://t.me/ciscoCat
QUESTION 4
Which type of authentication and encryption does SNMPv3 use at the authPriv security level?
A. username authentication with MD5 or SHA encryption
B. MD5 or SHA authentication with DES encryption
C. username authentication with DES encryption
D. DES authentication with MD5 or SHA encryption
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-
3850-book/nm-snmp-snmpv3.pdf
QUESTION 5
Which identity store option allows you to modify the directory services that run on TCP/IP?
A. Lightweight Directory Access Protocol
B. RSA SecurID server
C. RADIUS
D. Active Directory
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which statement about system time and NTP server configuration with Cisco ISE is true?
A. The system time and NTP server settings can be configured centrally on the Cisco ISE.
B. The system time can be configured centrally on the Cisco ISE, but NTP server settings must be configured
individually on each ISE node.
C. NTP server settings can be configured centrally on the Cisco ISE, but the system time must be configured
individually on each ISE node.
D. The system time and NTP server settings must be configured individually on each ISE node.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which option is required for inline security group tag propagation?
A. Cisco Secure Access Control System
B. hardware support
C. Security Group Tag Exchange Protocol (SXP) v4
More dumps and materials -> https://t.me/ciscoCat
D. Cisco Identity Services Engine
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which protocol sends authentication and accounting in different requests?
A. RADIUS
B. TACACS+
C. EAP-Chaining
D. PEAP
E. EAP-TLS
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Your company network security policy requires that all network traffic be tunneled to the corporate office. End
users must be able to access local LAN resources when they connect to the corporate network. Which two
configurations do you implement in Cisco AnyConnect? (Choose two.)
A. split-exclude tunneling
B. local LAN access
C. static routes
D. Client Bypass Protocol
E. tunnel all
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
Refer to the exhibit. Which type of VPN is used in the configuration?
More dumps and materials -> https://t.me/ciscoCat
A. DMVPN
B. FlexVPN
C. SSL VPN
D. Cisco GET VPN
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
What advantage does elliptic curve cryptography have over RSA cryptography?
A. ECC compresses the enciphered data
B. ECC has wider industry adoption
C. ECC utilizes symmetric encryption for greater performance
D. ECC provides greater security with a smaller key size
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.leaderssl.com/articles/345-what-is-ecc-and-why-you-should-use-it
QUESTION 12
Which description of the Layer 4 traffic Monitor on a Cisco WSA is true?
A. monitors suspicious traffic across all the TCP/UDP ports
B. decrypts SSL traffic to monitor for malicious content
C. prevents data exfiltration by searching all the network traffic for specified sensitive information
D. blocks traffic from URL categories that are known to contain malicious content
Correct Answer: A
Section: (none)
More dumps and materials -> https://t.me/ciscoCat
Explanation
Explanation/Reference:
QUESTION 13
Which command do you run to reset a Firepower module on a Cisco ASA 5585-X firewall?
A. sw-module module sfr recover boot
B. sw-module module sfr reload
C. hw-module module 1 reload
D. hw-module module 1 recover boot
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/
modules-sfr.html
QUESTION 14
Which deployment model on a Cisco ASA Firepower module in multiple-context mode allows you to evaluate
the contents of the traffic without affecting the network?
A. inline mode
B. passive monitor-only mode
C. inline tap monitor-only mode
D. passive tap monitor-only mode
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa912/configuration/firewall/asa-912-firewall-
config/access-sfr.html
QUESTION 15
Which API uses HTTP messages to transfer data to applications residing on different hosts?
A. OpenStack
B. REST
C. OpenFlow
D. OpFlex
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: CCNA ICND2 Study Guide: Exam 200-105 By Todd Lammle page 375
QUESTION 16
Refer to the exhibit.
More dumps and materials -> https://t.me/ciscoCat
All of the routers in the network are configured with the ip subnet-zero command. Which network addresses
should be used for Link A and Network A? (Choose two.)
A. Link A – 172.16.3.0/30
B. Link A – 172.16.3.112/30
C. Network A – 172.16.3.48/26
D. Network A – 172.16.3.128/25
E. Link A – 172.16.3.40/30
F. Network A –172.16.3.192/26
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Which configuration register value can you set on a Cisco device so that it ignores the NVRAM when it boots?
A. 0x2124
B. 0x2120
C. 0x2142
D. 0x2102
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which two characteristics are representative of a link-state routing protocol? (Choose two.)
More dumps and materials -> https://t.me/ciscoCat
A. provides common view of entire topology
B. exchanges routing tables for its own routes with neighbor
C. calculates feasible path
D. utilizes event-triggered updates
E. utilizes frequent periodic updates
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)
A. SNMPv3 enhanced SNMPv2 security features
B. SNMPv3 added the Inform protocol message to SNMP.
C. SNMPv2 added the Inform protocol message to SNMP
D. SNMPv3 added the GetBulk protocol messages to SNMP
E. SNMPv2 added the GetBulk protocol message to SNMP.
F. SNMPv2 added the GetNext protocol message to SNMP.
Correct Answer: ACE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which technology could be used on top of an MPLS VPN to add confidentiality?
A. IPsec
B. AES
C. SSL
D. 3DES
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?
A. authPriv
B. authNoPriv
C. NoauthPriv
D. noAuthNoPriv
Correct Answer: B
More dumps and materials -> https://t.me/ciscoCat
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However,
the blacklist contains several approved connections that users must access for business purposes.
Which action can you take to retain the blacklist while allowing users to access the approved sites?
A. Create a whitelist and manually add the approved addresses
B. Edit the dynamic blacklist to remove the approved addresses
C. Disable the dynamic blacklist and deny the specific address on a whitelist while permitting the others
D. Disable the dynamic blacklist and create a static blacklist in its place
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
What tab contains access point configuration in the WCS?
A. Controller > Access Points
B. Configure > Access Points
C. General > Configure > Access Points
D. System > Configure > Access Points
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 24
A network engineer in the GUI of WCS version 7 wants to add an access point to a map. Where can this
command be found within the drop-down menu?
A. Monitor > Maps
B. Reports > Maps
C. Monitor > Network Summary
D. Configure > Maps
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The physical location of the client (such as building, floor, and so on). Clicking the map location displays
information in the Monitor > Maps page.
http://www.cisco.com/c/en/us/td/docs/wireless/wcs/7-0/configuration/guide/WCS70cg/7_0clientmgmt.html
More dumps and materials -> https://t.me/ciscoCat
QUESTION 25
You are configuring SNMPv1/v2c on a WLC. What should you do for improved security?
A. Remove the default SNMPv1 community.
B. Remove the default SNMPv1 and SNMPv2 communities.
C. Remove the default SNMPv2 community.
D. Remove the default SNMPv3 users.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The controller has commonly known default values of "public" and "private" for the read-only and read-write
SNMP community strings. Using these standard values presents a security risk. If you use the default
community names, and since these are known, the community names could be used to communicate to the
controller using SNMP. Therefore, we strongly advise that you change these values.
Step 1
Choose Management and then Communities under SNMP. The SNMP v1 / v2c Community page appears.
Step 2
If "public" or "private" appears in the Community Name column, hover your cursor over the blue drop-down
arrow for the desired community and choose Remove to delete this community.
Step 3
Click New to create a new community. The SNMP v1 / v2c Community > New page appears.
Step 4
In the Community Name text box, enter a unique name containing up to 16 alphanumeric characters. Do not
enter "public" or "private."
Step 5
In the next two text boxes, enter the IPv4/IPv6 address and IP Mask/Prefix Length from which this device
accepts SNMP packets with the associated community and the IP mask.
Step 6
Choose Read Only or Read/Write from the Access Mode drop-down list to specify the access level for this
community.
Step 7
Choose Enable or Disable from the Status drop-down list to specify the status of this community.
Step 8
Click Apply to commit your changes.
Step 9
Click Save Configuration to save your settings.
Step 10
Repeat this procedure if a "public" or "private" community still appears on the SNMP v1 / v2c Community page.
QUESTION 26
A customer needs wireless access points on a different VLAN from the controller to join via broadcast. Which
two commands are required on the Layer 3 switch? (Choose two.)
A. ip forward-protocol tcp 5246
B. ip helper-address <WLC-Multicast-Address>
C. ip helper-address <WLC-Virtual-Address>
D. ip forward-protocol udp 5246
E. ip helper-address <WLC-Management-Address>
More dumps and materials -> https://t.me/ciscoCat
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://community.cisco.com/t5/other-wireless-mobility-subjects/capwap-discovery-using-
broadcasts-only/td-p/2377189
QUESTION 27
An engineer has been asked to upgrade the code on a WLC that is running Cisco AireOS 8.0. Which two
protocols can be used to download the code file to the controller? (Choose two.)
A. SNMPv2c
B. FTP
C. SNMPv3
D. SFTP
E. HTTPS
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
More dumps and materials -> https://t.me/ciscoCat