Exams > Cisco > 200-301: Cisco Certified Network Associate (CCNA)
200-301: Cisco Certified Network Associate (CCNA)
Page 5 out of 80 pages Questions 41-50 out of 791 questions
Question#41

What is the role of disaggregation in controller-based networking?

  • A. It divides the control-plane and data-plane functions.
  • B. It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions
  • C. It summarizes the routes between the core and distribution layers of the network topology
  • D. It enables a network topology to quickly adjust from a ring network to a star network
Discover Answer Hide Answer

A

Question#42

What is a function performed by a web server?

  • A. send and retrieve email from client devices
  • B. securely store files for FTP access
  • C. authenticate and authorize a user's identity
  • D. provide an application that is transmitted over HTTP
Discover Answer Hide Answer

D

Question#43


Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with applications hosted at site B. What is the reason for the problem?

  • A. Physical network errors are being transmitted between the two sites.
  • B. Heavy usage is causing high latency.
  • C. The wrong cable type was used to make the connection.
  • D. An incorrect type of transceiver has been inserted into a device on the link
Discover Answer Hide Answer

D

Question#44

Which protocol uses the SSL?

  • A. SSH
  • B. HTTPS
  • C. HTTP
  • D. Telnet
Discover Answer Hide Answer

B

Question#45

Why is UDP more suitable than TCP for applications that require low latency such as VoIP?

  • A. UDP reliably guarantees delivery of all packets: TCP drops packets under heavy load
  • B. UDP uses sequencing data for packets to arrive in order TCP offers the capability to receive packets in random order
  • C. TCP uses congestion control for efficient packet delivery: UDP uses flow control mechanisms for the delivery of packets
  • D. TCP sends an acknowledgement for every packet received: UDP operates without acknowledgments
Discover Answer Hide Answer

D

Question#46

What are the two functions of SSIDs? (Choose two.)

  • A. uses the maximum of 32 alphanumeric characters
  • B. controls the speed of the Wi-Fi network
  • C. used exclusively with controller-based Wi-Fi networks
  • D. supports a single access point
  • E. broadcasts by default
Discover Answer Hide Answer

AD
The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. The SSID can consist of up to 32 alphanumeric, case-sensitive, characters. Wireless clients connect using the SSID for secure communications. The SSID is a unique token that identifies an
802.11 wireless network. It is used by wireless devices to identify a network and to establish and maintain wireless connectivity. An SSID must be configured and assigned to a wireless client device interface before the device can associate with an access point.

Question#47

Which two characteristics describe the access layer in a three-tier network architecture? (Choose two.)

  • A. serves as the network aggregation point
  • B. physical connection point for a LAN printer
  • C. designed to meet continuous redundant uptime requirements
  • D. layer at which a wireless access point connects to the wired network
  • E. provides a boundary between Layer 2 and Layer 3 communications
Discover Answer Hide Answer

BD
The Access Layer is the one closer to the users. In fact, at this layer, we find the users themselves and the access-layer switches. The main purpose of this layer is to physically connect users to the network. In other words, there is just a cable between end-user PCs, printers, and wireless access points and access-layer switches.

Question#48

Which PoE mode enables powered-devices detection and guarantees power when the device detected?

  • A. auto
  • B. static
  • C. dynamic
  • D. active
Discover Answer Hide Answer

A

Question#49


Refer to the exhibit. The router has been configured with a super net to accommodate the requirements for 380 users on a Subnet. The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

  • A. Subnet: 10.7.54.0 Subnet mask: 255.255.128.0 Broadcast address: 10.5.55.255 Usable IP address range: 10.7.54.1 ג€" 10.7.55.254
  • B. Subnet: 10.7.54.0 Subnet mask: 255.255.255.0 Broadcast address: 10.7.54.255 Usable IP address range: 10.7.54.1 ג€" 10.7.55.254
  • C. Subnet: 10.7.54.0 Subnet mask: 255.255.254.0 Broadcast address: 10.7.54.255 Usable IP address range: 10.7.54.1 ג€" 10.7.55.254
  • D. Subnet: 10.7.54.0 Subnet mask: 255.255.254.0 Broadcast address: 10.7.55.255 Usable IP address range: 10.7.54.1 ג€" 10.7.55.254
Discover Answer Hide Answer

D

Question#50


Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?

  • A. interface GigabitEthernet0/0 ip address 10.10.2.10 255.255.252.0
  • B. interface GigabitEthernet0/0.10 encapsulation dot1Q 3 ip address 10.10.2.10 255.255.254.0
  • C. interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip address 10.10.2.10 255.255.252.0
  • D. interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip address 10.10.2.10 255.255.255.252
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right