Free Cisco® 200-301 Exam Braindumps (page: 65)

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

  1. Enable MAC filtering and set the SA Query timeout to 10.
  2. Enable 802.1x Layer 2 security and set the Comeback timer to 10.
  3. Enable Security Association Teardown Protection and set the SA Query timeout to 10.
  4. Enable the Protected Management Frame service and set the Comeback timer to 10.

Answer(s): D



Refer to the exhibit. Only four switches are participating in the VLAN spanning-tree process.


Branch-1: priority 614440
Branch-2: priority 39391170
Branch-3: priority 0
Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

  1. Branch-1
  2. Branch-2
  3. Branch-3
  4. Branch-4

Answer(s): C



An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

  1. switchport trunk encapsulation dot1q
  2. switchport trunk allowed vlan 10
  3. switchport mode trunk
  4. switchport trunk native vlan 10

Answer(s): D



What are two benefits of using the PortFast feature? (Choose two.)

  1. Enabled interfaces are automatically placed in listening state.
  2. Enabled interfaces wait 50 seconds before they move to the forwarding state.
  3. Enabled interfaces never generate topology change notifications.
  4. Enabled interfaces come up and move to the forwarding state immediately.
  5. Enabled interfaces that move to the learning state generate switch topology change notifications.

Answer(s): C,D



Viewing page 65 of 350
Viewing questions 257 - 260 out of 1395 questions



Post your Comments and Discuss Cisco® 200-301 exam prep with other Community members:

200-301 Exam Discussions & Posts