Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

200-301 Exam Dumps - Cisco CCNA Questions and Answers

Question # 24

Which command must be entered when a device is configured as an NTP server?

Options:

A.

ntp authenticate

B.

ntp server

C.

ntp peer

D.

ntp master

Buy Now
Question # 25

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

Options:

A.

ipv6 address 2001:0db8::5: a: 4F 583B

B.

ipv6 address 2001:db8::500:a:400F:583B

C.

ipv6 address 2001 db8:0::500:a:4F:583B

D.

ipv6 address 2001::db8:0000::500:a:400F:583B

Buy Now
Question # 26

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

Options:

A.

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

B.

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

C.

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

D.

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

Buy Now
Question # 27

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

Options:

A.

Exchange

B.

2-way

C.

Full

D.

Init

Buy Now
Question # 28

Which statement correctly compares traditional networks and controller-based networks?

Options:

A.

Only traditional networks offer a centralized control plane

B.

Only traditional networks natively support centralized management

C.

Traditional and controller-based networks abstract policies from device configurations

D.

Only controller-based networks decouple the control plane and the data plane

Buy Now
Question # 29

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

Options:

A.

IKEv2

B.

IKEv1

C.

IPsec

D.

MD5

Buy Now
Question # 30

What are two benefits of FHRPs? (Choose two.)

Options:

A.

They prevent (oops in the Layer 2 network.

B.

They allow encrypted traffic.

C.

They are able to bundle muftlple ports to increase bandwidth

D.

They enable automatic failover of the default gateway.

E.

They allow multiple devices lo serve as a single virtual gateway for clients in the network

Buy Now
Question # 31

Refer to the exhibit.

If R1 receives a packet destined to 172.161.1, to which IP address does it send the packet?

Options:

A.

192.168.12.2

B.

192.168.13.3

C.

192.168.14.4

D.

192.168.15.5

Buy Now
Question # 32

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

Options:

A.

To pass client traffic two or more ports must be configured.

B.

The EtherChannel must be configured in "mode active"

C.

When enabled the WLC bandwidth drops to 500 Mbps

D.

One functional physical port is needed to pass client traffic

Buy Now
Question # 33

What is a capability of FTP in network management operations?

Options:

A.

encrypts data before sending between data resources

B.

devices are directly connected and use UDP to pass file information

C.

uses separate control and data connections to move files between server and client

D.

offers proprietary support at the session layer when transferring data

Buy Now
Question # 34

Why does a switch flood a frame to all ports?

Options:

A.

The frame has zero destination MAC addresses.

B.

The source MAC address of the frame is unknown

C.

The source and destination MAC addresses of the frame are the same

D.

The destination MAC address of the frame is unknown.

Buy Now
Question # 35

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which configuration should be used?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 36

Refer to the exhibit.

For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 37

What is the primary different between AAA authentication and authorization?

Options:

A.

Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.

B.

Authentication identifies a user who is attempting to access a system, and authorization validates the users password

C.

Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform.

D.

Authentication controls the system processes a user can access and authorization logs the activities the user initiates

Buy Now
Question # 38

Refer to the exhibit.

Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?

Options:

A.

switchport mode trunk

B.

switchport mode dot1-tunnel

C.

switchport mode dynamic auto

D.

switchport mode dynamic desirable

Buy Now
Question # 39

Refer to the exhibit.

To which device does Router1 send packets that are destined to host 10.10.13.165?

Options:

A.

Router2

B.

Router3

C.

Router4

D.

Router5

Buy Now
Question # 40

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

Options:

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Buy Now
Question # 41

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?

Options:

A.

modify hello interval

B.

modify process ID

C.

modify priority

D.

modify network type

Buy Now
Question # 42

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

Options:

A.

Enable Security Association Teardown Protection and set the SA Query timeout to 10

B.

Enable MAC filtering and set the SA Query timeout to 10

C.

Enable 802.1x Layer 2 security and set me Comeback timer to 10

D.

Enable the Protected Management Frame service and set the Comeback timer to 10

Buy Now
Question # 43

How does WPA3 improve security?

Options:

A.

It uses SAE for authentication.

B.

It uses a 4-way handshake for authentication.

C.

It uses RC4 for encryption.

D.

It uses TKIP for encryption.

Buy Now
Exam Code: 200-301
Exam Name: Cisco Certified Network Associate
Last Update: Aug 17, 2025
Questions: 1153
200-301 pdf

200-301 PDF

$33.25  $94.99
200-301 Engine

200-301 Testing Engine

$38.5  $109.99
200-301 PDF + Engine

200-301 PDF + Testing Engine

$50.75  $144.99