Which two practices are recommended for an acceptable security posture in a network? (Choose two.)
A. Backup device configurations to encrypted USB drives for secure retrieval.
B. Maintain network equipment in a secure location.
C. Use a cryptographic keychain to authenticate to network devices.
D. Place internal email and file servers in a designated DMZ.
E. Disable unused or unnecessary ports, interfaces and services.
How does authentication differ from authorization?
A. Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.
B. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network.
C. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.
D. Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access.
Which command do you enter so that a switch configured with Rapid PVST + listens and learns for a specific time period?
A. switch(config)#spanning-tree vlan 1 max-age 6
B. switch(config)#spanning-tree vlan 1 hello-time 10
C. switch(config)#spanning-tree vlan 1 priority 4096
D. switch(config)#spanning-tree vlan 1 forward-time 20
What is a function of Cisco Advanced Malware Protection for a Next-Generation IPS?
A. authorizing potentially compromised wireless traffic
B. inspecting specific files and file types for malware
C. authenticating end users
D. URL filtering
What is the function of "off-the-shell" switches in a controller-based network?
A. providing a central view of the deployed network
B. forwarding packets
C. making routing decisions
D. setting packet-handling policies
What is the purpose of the Cisco DNA Center controller?
A. to securely manage and deploy network devices
B. to provide Layer 3 services to autonomous access points
C. to secure physical access to a data center
D. to scan a network and generate a Layer 2 network diagram
What is the collapsed layer in collapsed core architectures?
A. core and distribution
B. distribution and access
C. core and WAN
D. access and WAN
Why would VRRP be implemented when configuring a new subnet in a multivendor environment?
A. when a gateway protocol is required that support more than two Cisco devices for redundancy
B. to enable normal operations to continue after a member failure without requiring a change In a host ARP cache
C. to ensure that the spanning-tree forwarding path to the gateway is loop-free
D. to interoperate normally with all vendors and provide additional security features for Cisco devices
What provides centralized control of authentication and roaming In an enterprise network?
A. a lightweight access point
B. a firewall
C. a wireless LAN controller
D. a LAN switch
An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?
A. crypto key Import rsa pem
B. crypto key pubkey-chain rsa
C. crypto key generate rsa
D. crypto key zeroize rsa
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 200-301 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.