A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?
A. ipv6 address 21:EB8:C1:2200:1::331/64
B. ipv6 address 2001:EB8:C1:22:1::331/64
C. ipv6 address 2001 :EB8:C 1:2200.1 ::331-64
D. ipv6 address 2001:EB8:C1:2200:1:0000:331/64
A network engineer must configure two new subnets using the address block 10.70.128.0/19 to meet these requirements:
1.
The first subnet must support 24 hosts
2.
The second subnet must support 472 hosts
3.
Both subnets must use the longest subnet mask possible from the address block.
Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two)
A. interface vlan 1234 ip address 10.70.159.1 255.255.254.0
B. interface vlan 1148 ip address 10.70.148.1 255.255.254.0
C. interface vlan 4722 ip address 10.70.133.17 255.255.255.192
D. interface vlan 3002 ip address 10.70.147.17 255.255.255.224
E. interface vlan 155 ip address 10.70.155.65 255.255.255.224
How does Rapid PVST+ create a fast loop-free network topology?
A. lt requires multiple links between core switches
B. It generates one spanning-tree instance for each VLAN
C. It maps multiple VLANs into the same spanning-tree instance
D. It uses multiple active paths between end stations.
What is a function of Opportunistic Wireless Encryption in an environment?
A. offer compression
B. increase security by using a WEP connection
C. provide authentication
D. protect traffic on open networks
Which WLC management connection type is vulnerable to man-in-the-middle attacks?
A. SSH
B. HTTPS
C. Telnet
D. console
Which characteristic differentiates the concept of authentication from authorization and accounting?
A. user-activity logging
B. service limitations
C. consumption-based billing
D. identity verification
Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
A. SYIM flood
B. reflection
C. teardrop
D. amplification
Which interface mode must be configured to connect the lightweight APs in a centralized architecture?
A. WLAN dynamic
B. management
C. trunk
D. access
Which two components comprise part of a PKI? (Choose two.)
A. preshared key that authenticates connections
B. RSA token
C. CA that grants certificates
D. clear-text password that authenticates connections
E. one or more CRLs
What is a function of an endpoint on a network?
A. forwards traffic between VLANs on a network
B. connects server and client devices to a network
C. allows users to record data and transmit to a tile server
D. provides wireless services to users in a building
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 200-301 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.