DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Master Microsoft MS-200 Exams with Exam Questions & Study Materials, Microsoft 365 Certified | SPOTO

Master the Microsoft MS-200 exams with SPOTO's comprehensive exam questions and study materials. Our latest practice tests provide a realistic exam experience, featuring online exam questions, sample questions, and accurate exam dumps. Gain access to a wealth of resources, including free tests for exam practice, mock exams that simulate the real test environment, and exam questions and answers covering all essential topics. Whether you're focusing on messaging infrastructure deployment, cloud enterprise environments, permissions, client access, mail protection, or mail flow, our MS-200 study materials ensure you're fully prepared for the Microsoft 365 Certified certification exams. Unlock your potential and succeed with SPOTO's top-notch exam preparation resources.
Take other online exams

Question #1
Which metric does the Open Shortest Path First (OSPF) routing protocol use for optimal path calculation?
A. MTU
B. Cost
C. Delay
D. Hop count
View answer
Correct Answer: B
Question #2
Which of the following is NOT true of APIC-EM?
A. It supports greenfield but not brownfield deployments
B. It provides a single point for network automation
C. It saves time and cost
D. It is open and programmable
View answer
Correct Answer: A
Question #3
Which is the valid IP address range that can be assigned to hosts on the subnet that includes the address 172.16.4.6/23?
A. 172
B. 172
C. 172
D. 172
View answer
Correct Answer: C
Question #4
Which Cisco IOS command will display the following partial output?
A. show ip
B. show ip route
C. show ip route summary
D. show route summary
View answer
Correct Answer: B
Question #5
Your company's network must make the most efficient use of the IP address space. In the following diagram, the circles define separate network segments. The requirements of each network segment are given in the diagram. (Click the Exhibit(s) button.) Users complain of connectivity issues. You need to discover the problems with the network configuration. What are the three problems with the network diagram? (Choose three.)
A. The 172
B. The 172
C. The 172
D. The 172
E. Interface fa0/2 has an IP address that belongs to the 172
F. Interface fa0/4 has an IP address that belongs to the 172
G. Interface fa0/3 has an IP address outside the 172
View answer
Correct Answer: AFG
Question #6
Which service is denoted by TCP/UDP port number 53?
A. Domain Name Service (DNS)
B. File Transfer Protocol (FTP)
C. Telnet
D. HTTP
View answer
Correct Answer: A
Question #7
What command disables 802.1x authentication on a port and permits traffic without authentication?
A. dot1x port-control disable
B. dot1x port-control force-unauthorized
C. dot1x port-control auto
D. dot1x port-control force-authorized
View answer
Correct Answer: D
Question #8
What switch security configuration requires AAA to be configured on the switch?
A. VACL
B. 802
C. Private VLAN
D. port security
View answer
Correct Answer: B
Question #9
Given the following output, which statements can be determined to be true? (Choose three.) RouterA2# show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 192.168.23.2 1 FULL/BDR 00:00:29 10.24.4.2 FastEthernet1/0 192.168.45.2 2 FULL/BDR 00:00:24 10.1.0.5 FastEthernet0/0 192.168.85.1 1 FULL/- 00:00:33 10.6.4.10 Serial0/1 192.168.90.3 1 FULL/DR 00:00:32 10.5.5.2 FastEthernet0/1 192.168.67.3 1 FULL/DR 00:00:20 10.4.9.20 FastEthernet0/2 192.168.90.1 1 FULL/BDR 00:00:23 10.5.5.4 FastEthernet0
A. This router is the DR for subnet 10
B. The DR for the network connected to Fa0/0 has an interface priority greater than 2
C. The DR for the network connected to Fa0/1 has a router ID of 10
D. The DR for the serial subnet is 192
E. This router is neither the DR nor the BDR for the Fa0/1 subnet
F. RouterA2 is connected to more than one multi-access network
View answer
Correct Answer: BEF
Question #10
Which Cisco Internetwork Operating System (IOS) command is used to encrypt passwords on Cisco routers?
A. password secure
B. service encryption-password
C. service password-encryption
D. enable password
View answer
Correct Answer: C
Question #11
As part of a new initiative to tighten the security of your Cisco devices, you have configured the firewall to restrict access to the devices from the outside. What would be other recommended ways of protecting the integrity of the device configuration files on the devices while ensuring your continued ability to manage the devices remotely? (Choose all that apply.)
A. encrypt the configuration files
B. use SSH to connect to the devices for management
C. prevent the loss of administrator passwords by disabling their encryption
D. disable the VTY ports on the devices
E. use an encrypted password for VTY access
View answer
Correct Answer: BE
Question #12
Host A is configured for DHCP, but it is not receiving an IP address when it powers up. What is the most likely cause? (Click the Exhibit(s) button to view the network diagram.)
A. The DHCP server is on the wrong subnet
B. Routers do not forward broadcast traffic
C. The DHCP server is misconfigured
D. Port security is enabled on the switch
View answer
Correct Answer: B
Question #13
What will be the effect of executing the following command on port F0/1? switch(config-if)# switchport port-security mac-address 00C0.35F0.8301
A. The command statically defines the MAC address of 00c0
B. The command expressly prohibits the MAC address of 00c0
C. The command configures an inbound access control list on port F0/1 limiting traffic to the IP address of the host
D. The command encrypts all traffic on the port from the MAC address of 00c0
View answer
Correct Answer: A
Question #14
Which of the following cables would be used to connect a router to a switch?
A. v
B. crossover
C. rollover
D. straight-through
View answer
Correct Answer: D
Question #15
You are configuring a Cisco router. Which command would you use to convey a message regarding the remote access security policy of your organization to a user logging into the router?
A. hostname
B. banner motd
C. description
D. boot system
E. terminal monitor
View answer
Correct Answer: B
Question #16
Which of the following technologies should be used to prevent a switching loop if a switch is connected to a port configured for PortFast?
A. RSTP
B. BPDU Guard
C. Root Guard
D. PVST
View answer
Correct Answer: B
Question #17
Which of the following are Wide Area Network (WAN) protocols? (Choose three.)
A. PPP
B. AAA
C. WEP
D. STP
E. HDLC
F. Frame Relay
View answer
Correct Answer: AEF
Question #18
Examine the partial output of the show ip interface command below. What is the subnet broadcast address of the LAN connected to the router from which the command was executed?
A. 192
B. 192
C. 1
D. 1
View answer
Correct Answer: A
Question #19
You are implementing IP SLA and would like to use it to measure hop-by-hop response time between a Cisco router and any IP device on the network. Which of the following IP SLA operations would you use for this?
A. ICMP path echo operation
B. Internet Control Message Protocol Echo Operation
C. UDP Jitter Operation for VoIP
D. UDP Jitter Operation
View answer
Correct Answer: A
Question #20
Which of the following are classless routing protocols? (Choose four.)
A. Open Shortest Path First (OSPF)
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Interior Gateway Routing Protocol (IGRP)
D. Routing Information Protocol version 1 (RIPv1)
E. Border Gateway Protocol (BGP)
F. Routing Information Protocol version 2 (RIPv2)
View answer
Correct Answer: ABEF
Question #21
You have been asked to examine the following output to identify any security problems with the router. Its configuration is shown: What problems exist? (Choose all that apply.)
A. unencrypted privileged mode password
B. inappropriate wording in the banner message
C. weak password on the VTY line
D. Telnet users will not be prompted for a password
View answer
Correct Answer: BD
Question #22
Which Cisco command will display the version and configuration data for Secure Shell (SSH)?
A. show ssh
B. show ip ssh
C. debug ssh
D. debug ip ssh
View answer
Correct Answer: B
Question #23
You are configuring a serial link between a Cisco router and a router produced by another vendor. What would be the advantages of using Point to Point Protocol (PPP) over High Level Data Link Control (HDLC) in this scenario?
A. HDLC has a proprietary "type" field that may be incompatible with equipment from other vendors
B. HDLC is not available on non-Cisco routers
C. PPP is faster
D. PPP performs error checking
View answer
Correct Answer: A
Question #24
Which two features do Cisco routers offer to mitigate distributed denial-of-service (DDoS) attacks? (Choose two.)
A. Anti-DDoS guard
B. Scatter tracing
C. Access control lists (ACLs)
D. Flow control
E. Rate limiting
View answer
Correct Answer: CE
Question #25
Which command is used on a Catalyst 2950 series switch to enable basic port security on the interface?
A. set port-security
B. switchport port-security
C. set port-security enable
D. switchport port-security enable
View answer
Correct Answer: B
Question #26
You have implemented the following IP SLA configuration, as shown in the following partial output of the show run command: ip sla 1 dns cow.cisco.com name-server 10.52.128.30 ip sla schedule 1 start-time now Which of the following statements is true of this configuration?
A. It will find the response time to resolve the DNS name cow
B. It will find the response time to connect to the DNS server at 10
C. It will start in one minute
D. It will gather data from one minute
View answer
Correct Answer: A
Question #27
Which statement is supported by the following output? router# show ip protocols Routing Protocol is "eigrp 3" Sending updates every 90 seconds, next due in 24 seconds <> EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 3 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 172.160.72.0 192.168.14.0 <>
A. EIGRP supports load-balancing over three equal-cost paths
B. EIGRP supports load-balancing over three unequal-cost paths
C. EIGRP supports load-balancing over four equal-cost paths
D. EIGRP supports load-balancing over four unequal-cost paths
View answer
Correct Answer: C
Question #28
Which Cisco Internetwork Operating System (IOS) command can be used to configure the location of the configuration file?
A. boot buffersize
B. configure
C. boot config
D. service config
View answer
Correct Answer: C
Question #29
You are the network administrator for your company. You want to use both IPv6 and IPv4 applications in the network. You also want to ensure that routers can route both IPv6 and IPv4 packets. Which deployment model should be implemented to accomplish the task?
A. IPv6 over IPv4 tunnels
B. IPv6 over dedicated Wide Area Network (WAN) links
C. Dual-Stack Backbones
D. Protocol translation
View answer
Correct Answer: C
Question #30
Which type of Dynamic Host Configuration Protocol (DHCP) transmission is used by a host to forward a DHCPDISCOVER packet to locate a DHCP server on the network?
A. unicast
B. broadcast
C. multicast
D. anycast
View answer
Correct Answer: B
Question #31
Which type of switching process requires a switch to wait for the entire frame to be received before forwarding it to a destination port?
A. store and forward
B. cut-through
C. fragment free
D. frame-forward
View answer
Correct Answer: A
Question #32
Which of the following are NOT valid IPv6 addresses? (Choose all that apply.)
A. 225
B. ::FFFF:10
C. ::
D. 2001:0:42:3:ff::1
E. fe80:2030:31:24
F. 2001:42:4:0:0:1:34:0
G. 2003:dead:bef:4dad:ab33:46:abab:62
View answer
Correct Answer: AE
Question #33
Router 5 has four interfaces. The networks hosted on each interface are as follows: Fa0/1 192.168.5.4/29 Fa0/2 192.168.6.0/24 Fa0/3 192.168.7.0/24 S0/0 172.16.5.0/24 You execute the following commands on the router: Router5(config)# router bgp 20 Router5(config-router)# network 192.168.5.0 Router5(config-router)# network 192.168.6.0 Router5(config-router)# network 192.168.7.0 Router5(config-router)# network 172.16.5.0 Router5(config-router)# neighbor 172.16.5.2 remote-as 50 Router5(config-router)# aggregate
A. 192
B. 172
C. 192
D. 192
E. none of these will be present
F. only network addresses beginning with 192 will be present
View answer
Correct Answer: ABCD
Question #34
Refer to the following configuration on a Cisco router to allow Telnet access to remote users: Router(config)#line vty 0 2 Router(config-line)#login Router(config-line)#password guest How many users can Telnet into this router at the same time?
A. 0
B. 1
C. 2
D. 3
E. 5
View answer
Correct Answer: D
Question #35
Which commands would be used to enable Enhanced Interior Gateway Routing Protocol (EIGRP) on a router, and configure the IP addresses 10.2.2.2 and 192.168.1.1 as a part of complete EIGRP configuration? (Choose three.)
A. router eigrp 10
B. router eigrp
C. network 10
D. network 10
E. network 192
F. network 192
View answer
Correct Answer: ADE
Question #36
Your assistant has been assigned the task of configuring one end of a WAN link between two offices. The link is a serial connection and the router on the other end is a non-Cisco router. The router in the other office has an IP address of 192.168.8.6/24. The connection will not come up, so you ask your assistant to show you the commands he configured on the Cisco router. The commands he executed are shown below. Ciscorouter(config)# interface serial0/0 Ciscorouter(config-if)# ip address 192.168.8.5 255.255.
A. Ciscorouter(config-if)# no ip address 192
B. Ciscorouter(config-if)# encapsulation ppp
C. Ciscorouter(config-if)# encapsulation ansi
D. Ciscorouter(config-if)# authentication chap
View answer
Correct Answer: B
Question #37
Which Internet Control Message Protocol (ICMP) message is sent by a host in the network to test connectivity with another host?
A. ICMP redirect message
B. ICMP echo-request message
C. ICMP time-exceeded message
D. ICMP destination-unreachable message
View answer
Correct Answer: B
Question #38
You have implemented SNMP v3 in your network. After making the configuration changes, you find that technicians in the TECHS group cannot access the MIB. You execute the show run command and receive the following output that relates to SNMP: What is preventing the TECHS group from viewing the MIB?
A. The presence of the keyword priv in the command creating the RESTRICTED group
B. A mismatch between the authentication mechanism and the encryption type in the command creating the TECHS user
C. The absence of an access list defining the stations that can used by the TECHS group
D. The presence of the keyword auth in the command creating the TECHS user
View answer
Correct Answer: C
Question #39
You are working with an Internet Service Provider (ISP) as network manager. A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet. What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client?
A. 255
B. 255
C. 255
D. 255
View answer
Correct Answer: A
Question #40
Which of the following are characteristics of Enhanced Interior Gateway Routing Protocol (EIGRP)? (Choose all that apply.)
A. Requires a hierarchical physical topology
B. Does not require a hierarchical physical topology
C. Uses Diffusing Update Algorithm (DUAL) to provide loop prevention
D. Uses Bellman-Ford algorithm to provide loop prevention
E. Supports Message-Digest Algorithm 5 (MD5) authentication
F. Does not support Message-Digest Algorithm 5 (MD5) authentication
G. Can differentiate between internal and external routes
H. Uses a 32-bit metric
View answer
Correct Answer: BCEG

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: