CISCO CCNA 200-301 Q57

Which of the following statements are NOT part of the guidelines for configuring VLAN Trunking Protocol (VTP) to ensure that VLAN information is distributed to all Cisco switches in the network?.

A. The VTP version must be the same on all switches in a VTP domain.
B. The configuration revision number must be configured identically on all switches in a VTP domain.
C. The VTP password must be the same on all switches in a VTP domain.
D. The VTP domain name must be the same on all switches in a VTP domain.
E. VLANs configured on clients should exist on the server switch.
F. The switch(s) that will share VLAN information is(are) operating in VTP server mode
G. The switches must be configured to use the same method of VLAN tagging
H. The switches must be connected with trunk links

Correct Answer: B, E

Explanation:
For all switches in a VTP domain, the VTP version, VTP password, and VTP domain name must be the same. Moreover, switches that will share VLAN information must be operating in VTP server mode, must be using the same VLAN tagging method (either 802.1q or ISL), and must be connected with trunk links.

Many of these settings can be verified by using the show vtp status command. By viewing the output of the command on two switches that are not sharing information, inconsistencies that prevent the sharing of VLAN information can be identified.

CISCO CCNA 200-301 Q56

You are configuring all your devices for IPv6. Which of the following is the only device that requires the ipv6 unicast-routing command?

A. Layer 2 switch
B. Router
C. Adaptive security appliance
D. Wireless AP

Correct Answers: B

Explanation:
Only the router requires the ipv6 unicast-routing command. The command ipv6 unicast-routing enables the routing of IPv6 packets on a router. It is not required when you are simply configuring interfaces on devices that participate in IPv6.

A Layer 2 switch can have an IPv6 address applied to its management interface and to any VLAN interfaces. However, because the switch does no routing, it does not require the ipv6 unicast-routing command.

An adaptive security appliance (ASA) can also have IPv6 addresses applied to its interfaces and can route both IPv6 and IPv4 traffic. However, it does not require the ipv6 unicast-routing command.
A wireless access point differs from a wireless router in that it operates as a switch or hub and does no routing. Therefore, it does not require this command.

CISCO CCNA 200-301 Q55

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

A. TCP uses synchronization packets, and UDP uses acknowledgment packets.
B. UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits
C. UDP provides reliable message transfer and TCP is a connectionless protocol
D. TCP uses the three-way handshake and UDP does not guarantee message delivery

Correct Answers: D

CISCO CCNA 200-301 Q54

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

A. when the sending device waits 15 seconds before sending the frame again
B. when the cable length limits are exceeded
C. when one side of the connection is configured for half-duplex
D. when Carrier Sense Multiple Access/Collision Detection is used
E. when a collision occurs after the 32nd byte of a frame has been transmitted

Correct Answers: B, C

Explanation:
A late collision is defined as any collision that occurs after the first 512 bits (or 64th byte) of the frame have been transmitted. The usual possible causes are full-duplex/half-duplex mismatch, exceeded Ethernet cable length limits, or defective hardware such as incorrect cabling, non-compliant number of hubs in the network, or a bad NIC. Late collisions should never occur in a properly designed Ethernet network. They usually occur when Ethernet cables are too long or when there are too many repeaters in the network.

CISCO CCNA 200-301 Q53

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)

A. runts
B. giants
C. frame
D. CRC
E. input errors

Correct Answers: D, E

Explanation:
Indicates that the cyclic redundancy checksum generated by the originating LAN station or far-end device does not match the checksum calculated from the data received. On a LAN, this usually indicates noise or transmission problems on the LAN interface or the LAN bus itself. A high number of CRCs is usually the result of collisions or a station transmitting bad data.

CISCO CCNA 200-301 Q52

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?

A. The Layer 2 switch drops the received frame
B. The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.
C. The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.
D. The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table

Correct Answers: B

Explanation:
If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.

CISCO CCNA 200-301 Q51

Which network allows devices to communicate without the need to access the Internet?

A. 172.9.0.0/16
B. 172.28.0.0/16
C. 192.0.0.0/8
D. 209.165.201.0/24

Correct Answers: B

Explanation:
172.28.0.0/16 is a private IP address range.

CISCO CCNA 200-301 Q50

An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

A.
interface e/0
description to HQ-A371:10975
ip address 172.16.1.4 255.255.255.248

B.
interface e/0
description to HQ-A371:10975
ip address 10.2.1.3 255.255.255.252

C.
interface e/0
description to HQ-A371:10975
ip address 192.168.1.1 255.255.255.248

D.
interface e/0
description to HQ-A371:10975
ip address 209.165.201.2 255.255.255.252

Correct Answers: D

Explanation:
/30 subnet means subnet mask of 255.255.255.252. But 10.2.1.3 255.255.255.252 is a broadcast IP address; only 209.165.201.2/30 is the usable IP address.

CISCO CCNA 200-301 Q49

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

A. The floating static route must have a higher administrative distance than the primary route so it is used as a backup
B. The administrative distance must be higher on the primary route so that the backup route becomes secondary.
C. The floating static route must have a lower administrative distance than the primary route so it is used as a backup
D. The default-information originate command must be configured for the route to be installed into the routing table

Correct Answers: A

CISCO CCNA 200-301 Q48

Which IPv6 address block sends packets to a group address rather than a single address?

A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8

Correct Answers: D