What is the purpose of an ESSID?
A. It allows multiple access points to provide a common network for client connections.
B. It supports fast roaming features such as 802.11 r, 802.11k, and 802.11v.
C. It serves as the wireless MAC address of the access point.
D. It provides greater security than a standard SSID.
What is a characteristic of an SSID in wireless networks?
A. allows easy file sharing between endpoints
B. provides protection against spyware
C. associates a name to a wireless network
D. eliminates network piggybacking
Which capability does TFTP provide?
A. loads configuration files on systems without data storage devices
B. provides authentication for data communications over a private data network
C. provides encryption mechanisms for file transfer across a WAN
D. provides secure file access within the LAN
Which selections must be used on the WLC when implementing a RADIUS server for wireless authentication?
A. Client Exclusion and SSH
B. Network Access Control State and SSH
C. AAA Override and the IP address of the server
D. 802.1x and the MAC address of the server
What is a characteristic of a Layer 2 switch?
A. responsible for sending data in a particular sequence
B. uses routers to create collision domains
C. avoids MAC address storage for faster transmission
D. uses the data link layer for communications
Which protocol does a REST API use to communicate?
A. SSH
B. STP
C. SNMP
D. HTTP
How does MAC learning function?
A. restricts ports to a maximum of 10 dynamically-learned addresses
B. increases security on the management VLAN
C. drops received MAC addresses not listed in the address table
D. associates the MAC address with the port on which it is received
What is a characteristic of a Layer 2 switch?
A. transfers all frames received to every connected device
B. offers one collision domain for all connected devices
C. transmits exclusively at half duplex
D. supports segmentation using tagging protocols
What is a characteristic of frame switching?
A. populates the ARP table with the egress port
B. drops received MAC addresses not listed in the address table
C. stores and forwards frames in a buffer and uses error checking
D. rewrites the source and destination MAC address
How does IPsec provide secure networking for applications within an organization?
A. It takes advantage of FTP to secure file transfers between nodes on the network.
B. It provides GRE tunnels to transmit traffic securely between network nodes.
C. It enables sets of security associations between peers.
D. It leverages TFTP providing secure file transfers among peers on the network.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 200-301 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.