Category Archives: 200-301 Cisco Certified Network Associate (CCNA)

200-301 Cisco Certified Network Associate (CCNA) Question and Answers

When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?

A. 6 B. 8 C. 12 D. 18 Answer: Option B. Explanation:  No answer description available for this question. Show AnswerDiscussion The post When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format? appeared first on Majanto.

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password? Answer: Option B. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An… Read More »

An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement?

A. WEP B. AES C. RC4 D. TKIP Answer: Option B. Explanation:  Section: Security Fundamentals Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer… Read More »

Which two statements about the interface that generated the output are true? (Choose two.)

Refer to the exhibit. Which two statements about the interface that generated the output are true? (Choose two.) A. learned MAC addresses are deleted after five minutes of inactivity B. the interface is error-disabled if packets arrive from a new unknown source address C. it has dynamically learned two secure MAC addresses D. it has dynamically learned three… Read More »

Which statement about the interface that generated the output is true?

Refer to the exhibit. Which statement about the interface that generated the output is true? A. A syslog message is generated when a violation occurs. B. One secure MAC address is manually configured on the interface. C. One secure MAC address is dynamically learned on the interface. D. Five secure MAC addresses are dynamically learned on the interface.… Read More »

Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.

DRAG DROP Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right. Select and Place: Answer: Explanation:  No answer description available for this question. Show AnswerDiscussion The post Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism… Read More »

What is a function of a remote access VPN?

A. establishes a secure tunnel between two branch sites B. uses cryptographic tunneling to protect the privacy of data for multiple users simultaneously C. uses exclusively when a user is connected to a company’s internal network D. allows the users to access company internal network resources through a secure tunnel Answer: Option D. Explanation:  No answer description available… Read More »

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two.)

A. enable the PortFast feature on ports B. configure static ARP entries C. configure ports to a fixed speed D. implement port-based authentication E. shut down unused ports Answer: Option D, E. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What are two recommendations for protecting network ports from being exploited when located in… Read More »