Category Archives: 200-301 Cisco Certified Network Associate (CCNA)

200-301 Cisco Certified Network Associate (CCNA) Question and Answers

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

Refer to the exhibit. A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task? A. access-list 2699 permit udp 10.20.1.0 0.0.0.255 B. no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22 C. access-list 2699 permit tcp any 10.20.1.0 0.0.0.255… Read More »

A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?

A. switchport port-security violation access B. switchport port-security violation protect C. switchport port-security violation restrict D. switchport port-security violation shutdown Answer: Option C. Explanation:  Section: Security Fundamentals Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html Show AnswerDiscussion The post A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to… Read More »

What is a practice that protects a network from VLAN hopping attacks?

A. Enable dynamic ARP inspection B. Configure an ACL to prevent traffic from changing VLANs C. Change native VLAN to an unused VLAN ID D. Implement port security on internet-facing VLANs Answer: Option C. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What is a practice that protects a network from VLAN hopping attacks?… Read More »

A network administrator must configure SSH for remote access to router R1. The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client. Which configuration, when applied, meets the requirements?

A. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key generate ec keysize 1024 B. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key generate ec keysize 2048 C. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key encrypt rsa name myKey D. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key generate rsa modulus 1024 Answer: Option D. Explanation:  No answer… Read More »

When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which format is available to select?

A. decimal B. ASCII C. unicode D. base64 Answer: Option B. Explanation:  No answer description available for this question. Show AnswerDiscussion The post When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which format is available to select? appeared first on Majanto.

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two.)

A. HTTPS B. SSH C. HTTP D. Telnet E. TFTP Answer: Option C, D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two.) appeared first on Majanto.

Which implementation provides the strongest encryption combination for the wireless environment?

A. WEP B. WPA + TKIP C. WPA + AES D. WPA2 + AES Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Which implementation provides the strongest encryption combination for the wireless environment? appeared first on Majanto/a>.

What does physical access control regulate?

A. access to networking equipment and facilities B. access to servers to prevent malicious activity C. access to specific networks based on business function D. access to computer networks and file systems Answer: Option A. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What does physical access control regulate? appeared first on Majanto.