Skip to Content

Cisco Certified Network Associate 200-301 CCNA Exam Questions and Answers – Page 7

The latest Cisco Certified Network Associate 200-301 CCNA certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco Certified Network Associate 200-301 CCNA exam and earn Cisco Certified Network Associate 200-301 CCNA certification.

Exam Question 621

Which command can you enter to determine the addresses that have been assigned on a DHCP Server?

A. Show ip DHCP database.
B. Show ip DHCP pool.
C. Show ip DHCP binding.
D. Show ip DHCP server statistic.
Correct Answer:
C. Show ip DHCP binding.

Exam Question 622

Which command is used to verify the DHCP relay agent address that has been set up on your Cisco IOS router?

A. show ip interface brief
B. show ip dhcp bindings
C. show ip route
D. show ip interface
E. show interface
F. show ip dhcp pool
Correct Answer:
D. show ip interface

Exam Question 623

Which type of information resides on a DHCP server?

A. a list of the available IP addresses in a pool
B. a list of public IP addresses and their corresponding names
C. usernames and passwords for the end users in a domain
D. a list of statically assigned MAC addresses
Correct Answer:
A. a list of the available IP addresses in a pool

Exam Question 624

A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)

A. informational
B. emergency
C. warning
D. critical
E. debug
F. error
Correct Answer:
B. emergency
D. critical
F. error

Exam Question 625

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two.)

A. Enable NTP authentication.
B. Verify the time zone.
C. Specify the IP address of the NTP server.
D. Set the NTP server private key.
E. Disable NTP broadcasts.
Correct Answer:
A. Enable NTP authentication.
C. Specify the IP address of the NTP server.
Answer Description:
To configure authentication, perform this task in privileged mode:
Step 1: Configure an authentication key pair for NTP and specify whether the key will be trusted or untrusted.
Step 2: Set the IP address of the NTP server and the public key.
Step 3: Enable NTP client mode.
Step 4: Enable NTP authentication.
Step 5: Verify the NTP configuration.

Exam Question 626

Which two pieces of information can you determine from the output of the show ntp status command? (Choose two.)

A. whether the NTP peer is statically configured
B. the IP address of the peer to which the clock is synchronized
C. the configured NTP servers
D. whether the clock is synchronized
E. the NTP version number of the peer
Correct Answer:
B. the IP address of the peer to which the clock is synchronized
D. whether the clock is synchronized
Answer Description:
Below is the output of the “show ntp status” command. From this output we learn that R1 has a stratum of
10 and it is getting clock from 10.1.2.1.
From this output we learn that R1 has a stratum of 10 and it is getting clock from 10.1.2.1.

Exam Question 627

Which feature or protocol determines whether the QOS on the network is sufficient to support IP services?

A. LLDP
B. CDP
C. IP SLA
D. EEM
Correct Answer:
C. IP SLA
Answer Description:
IP SLA allows an IT professional to collect information about network performance in real time. Therefore it helps determine whether the QoS on the network is sufficient for IP services or not.

Cisco IOS Embedded Event Manager (EEM) is a powerful and flexible subsystem that provides real-time network event detection and onboard automation. It gives you the ability to adapt the behavior of your network devices to align with your business needs.

Exam Question 628

In QoS, which prioritization method is appropriate for interactive voice and video?

A. traffic policing
B. round-robin scheduling
C. low-latency queuing
D. expedited forwarding
Correct Answer:
D. expedited forwarding

Exam Question 629

What is the purpose of traffic shaping?

A. to be a marking mechanism that identifies different flows
B. to provide fair queuing for buffered flows
C. to mitigate delays over slow links
D. to limit the bandwidth that a flow can use
Correct Answer:
D. to limit the bandwidth that a flow can use
Answer Description:
The primary reasons you would use traffic shaping are to control access to available bandwidth, to ensure that traffic conforms to the policies established for it, and to regulate the flow of traffic in order to avoid congestion that can occur when the sent traffic exceeds the access speed of its remote, target interface.

Exam Question 630

What is a function of TFTP in network operations?

A. transfers IOS images from a server to a router for firmware upgrades
B. transfers a backup configuration file from a server to a switch using a username and password
C. transfers a configuration files from a server to a router on a congested link
D. transfers files between file systems on a router
Correct Answer:
D. transfers files between file systems on a router