What is a characteristic of encryption in wireless networks?
A. used to ensure data integrity
B. uses 802.1x as the standard encoding method
C. uses protocols such as TKIP and CCMP to secure data
D. only works with the 5Ghz frequency
Which two tasks support the physical access control element of a security program? (Choose two.)
A. Deploy a video surveillance system
B. Run a workshop on corporate security policies
C. Implement badge access to critical locations
D. Develop slideshows about new security regulations
E. Disperse information about how to protect the organization's confidential data
What is a characteristic of a Layer 2 switch?
A. provides a single broadcast domain for all connected devices
B. tracks the number of active TCP connections
C. offers one collision domain for all connected devices D. makes forwarding decisions based on MAC addresses
Company has decided to require multifactor authentication for all systems. Which set of parameters meets the requirement?
A. personal 10-digit PIN and RSA certificate
B. complex password and personal 10-digit PIN
C. password of 8 to 15 characters and personal 12-digit PIN
D. fingerprint scanning and facial recognition
Network security team noticed that an increasing number of employees are becoming victims of phishing attacks. Which security program should be implemented to mitigate the problem?
A. email system patches
B. physical access control
C. software firewall enabled on all PCs
D. user awareness training
Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?
A. trunk
B. default
C. access
D. LAG
In what way does a network supervisor reduce maintenance costs while maintaining network integrity on a traditionally managed network?
A. They install an automated network-monitoring system to provide early warning of network issues.
B. They employ additional network administrators to proactively manage the network.
C. They use automation to centralize network-management tasks.
D. They automate change-management processes that verify issue resolution.
What is a function of a firewall on an enterprise network?
A. It allows and denies ingress and egress traffic.
B. It serves as a default gateway to hosts on the internet.
C. It processes traffic based on stateless inspection.
D. It acts as the intermediary device between the enterprise and its ISP.
Which standard is required when more than one distribution system port and only one IP address are configured for a Cisco WLC?
A. 802.3ad
B. 802.1q
C. 802.1d
D. 802.1af
Which action protects a network from VLAN hopping attacks?
A. Implement port security on internet-facing VLANs.
B. Change the native VLAN to an unused VLAN ID.
C. Enable dynamic ARP inspection.
D. Configure an ACL to prevent traffic from changing VLANs.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 200-301 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.