Cisco Certified Network Associate (200-301 CCNA) – Question611


Refer to the exhibit. What is the effect of this configuration?

A.
The switch port remains administratively down until the interface is connected to another switch.
B. Dynamic ARP Inspection is disabled because the ARP ACL is missing.
C. The switch port interface trust state becomes untrusted.
D. The switch port remains down until it is configured to trust or untrust incoming packets.

Correct Answer: C

Explanation:

Explanation:
Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in-the-middle attacks. After enabling DAI, all ports become untrusted ports.

Cisco Certified Network Associate (200-301 CCNA) – Question610

Refer to the exhibit. Which statement about the interface that generated the output is true?


A.
A syslog message is generated when a violation occurs.
B. One secure MAC address is manually configured on the interface.
C. One secure MAC address is dynamically learned on the interface.
D. Five secure MAC addresses are dynamically learned on the interface.

Correct Answer: B

Cisco Certified Network Associate (200-301 CCNA) – Question609

Refer to the exhibit. Which two statements about the interface that generated the output are true? (Choose two.)


A.
learned MAC addresses are deleted after five minutes of inactivity
B. the interface is error-disabled if packets arrive from a new unknown source address
C. it has dynamically learned two secure MAC addresses
D. it has dynamically learned three secure MAC addresses
E. the security violation counter increments if packets arrive from a new unknown source address

Correct Answer: AC

Cisco Certified Network Associate (200-301 CCNA) – Question607

Refer to the exhibit. Which two events occur on the interface, if packets from an unknown Source address arrive after the interface learns the maximum number of secure MAC address? (Choose two.)


A.
The security violation counter dose not increment
B. The port LED turns off
C. The interface is error-disabled
D. A syslog message is generated
E. The interface drops traffic from unknown MAC address

Correct Answer: AE

Cisco Certified Network Associate (200-301 CCNA) – Question606

Which effect does the aaa new-model configuration command have?

A.
It enables AAA services on the device.
B. It configures the device to connect to a RADIUS server for AAA.
C. It associates a RADIUS server to the group.
D. It configures a local user on the device.

Correct Answer: A

Cisco Certified Network Associate (200-301 CCNA) – Question605


Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

A.
R1(config)#username admin
R1(config-if)#line vty 0 4
R1(config-line)#password p@ss1234
R1(config-line)#transport input telnet
B. R1(config)#username admin privilege 15 secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local
C. R1(config)#username admin secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local
R1(config)#enable secret p@ss1234
D. R1(config)#username admin
R1(config-if)#line vty 0 4
R1(config-line)#password p@ss1234

Correct Answer: B

Cisco Certified Network Associate (200-301 CCNA) – Question604

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A.
enable dynamic MAC address learning
B. implement static MAC addressing
C. enable sticky MAC addressing
D. implement auto MAC address learning

Correct Answer: C

Cisco Certified Network Associate (200-301 CCNA) – Question602

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?

A.
The application requires the user to enter a PIN before it provides the second factor
B. The application requires an administrator password to reactivate after a configured interval
C. The application verifies that the user is in a specific location before it provides the second factor
D. The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted

Correct Answer: A