Exam Code | 200-301 |
Exam Name | Cisco Certified Network Associate |
Questions | 970 Questions Answers With Explanation |
Update Date | November 08,2024 |
Price |
Was : |
Which interface enables communication between a program on the controller and a program on the networking devices?
A. northbound interface
B. software virtual interface
C. southbound interface
D. tunnel Interface
What is a reason to configure a trunk port that connects to a WLC distribution port?
A. Eliminate redundancy with a link failure in the data path.
B. Allow multiple VLAN to be used in the data path.
C. Provide redundancy if there is a link failure for out-of-band management.
D. Permit multiple VLANs to provide out-of-band management.
Refer lo the exhibit. What is the next-hop P address for R2 so that PC2 reaches the application server via ElGRP?
A. 192.168.30.1
B. 10.10 105
C. 10.10.10.6
D. 192.168.201
Refer to the exhibit. Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?
A. SW2, because its MAC address is the highest
B. SW3, because its priority is the highest
C. SW4, because its priority is highest and its MAC address is lower
D. SW1, because its priority is the lowest and its MAC address is higher
What is a benefit for external users who consume public cloud resources?
A. implemented over a dedicated WAN
B. located in the same data center as the users
C. all hosted on physical servers
D. accessed over the Internet
What is a function of the core and distribution layers in a collapsed-core architecture?
A. The router must use IPv4 and IPv6 addresses at Layer 3.
B. The core and distribution layers are deployed on two different devices to enable failover.
C. The router can support HSRP for Layer 2 redundancy in an IPv6 network.
D. The router operates on a single device or a redundant pair.
Which remote access protocol provides unsecured remote CLI access?
A. console
B. Telnet
C. Bash
D. SSH
Refer to the exhibit. How many objects are present in the given JSON-encoded data?
A. one
B. four
C. seven
D. nine
How does encryption project the wireless network?
A. via integrity checks to identify wireless forgery attacks in the frame
B. via specific ciphers to detect and prevent zero-day network attacks
C. via an algorithm to change wireless data so that only the access point and client understand it
D. via a policy to prevent unauthorized users from communicating on the wireless network
Which signal frequency appears 60 times per minute?
A. 1 Hz signal
B. 1 GHz signal
C. 60 Hz signal
D. 60 GHz signal