Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

200-301 Exam Dumps - Cisco CCNA Questions and Answers

Question # 154

When is the PUT method used within HTTP?

Options:

A.

when a nonidempotent operation is needed

B.

to update a DNS server

C.

to display a web site

D.

when a read-only operation it required

Buy Now
Question # 155

Which command do you enter so that a switch configured with Rapid PVST + listens and learns for a specific time period?

Options:

A.

switch(config)#spanning-tree vlan 1 max-age 6

B.

switch(config)#spanning-tree vlan 1 hello-time 10

C.

switch(config)#spanning-tree vlan 1 priority 4096

D.

switch(config)#spanning-tree vlan 1 forward-time 20

Buy Now
Question # 156

Refer to the exhibit.

A network engineer must configure R1 so that it sends all packets destined to the 10.0.0.0/24 network to R3, and all packets destined to PCI to R2. Which configuration must the engineer implement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 157

Refer to the exhibit. What is the next-hop IP address for R2 so that PC2 reaches the application server via EIGRP?

Options:

A.

192.168.20.1

B.

10.10.10.5

C.

192.168.30.1

D.

10.10.10.6

Buy Now
Question # 158

An on-site service desk technician must verify the IP address and DNS server information on a users Windows computer. Which command must the technician enter at the command prompt on the user's computer?

Options:

A.

ipconfig /all

B.

ifconfig -a

C.

show interface

D.

netstat -r

Buy Now
Question # 159

Refer to the exhibit.

Routers R1 and R2 are configured with RIP as the dynamic routing protocol. A network engineer must configure R1 with a floating static route to serve as a backup route to network 192.168.23.0. Which command must the engineer configure on R1?

Options:

A.

ip route 192.168.23.0 255.255.255.255 192.168.13.3 121

B.

ip route 192.168.23.0 255.255.255.0 192.168.13.3 100

C.

ip route 192.168.23.0 265.255.255.0 192.168.13.3 121

D.

ip route 192.168.23.0 255.255.255.0 192.168.13.3

Buy Now
Question # 160

What is a characteristic of an SSID in wireless networks?

Options:

A.

provides protection against spyware

B.

eliminates network piggybacking

C.

associates a name to a wireless network

D.

allows easy file sharing between endpoints

Buy Now
Question # 161

Which role does AI play in monitoring network data flow?

Options:

A.

It analyzes patterns for anomaly detection.

B.

It exclusively predicts device malfunctions.

C.

It simplifies traffic route mapping.

D.

It enhances data packet delivery speeds.

Buy Now
Question # 162

What is an advantage of using SDN versus traditional networking when it comes to security?

Options:

A.

SDN security is managed near the perimeter of the network with firewalls, VPNs, and IPS, and traditional networking security policies are created based on telemetry data.

B.

SDN exposes an API to configure locally per device for security policies, and traditional networking uses northbound API for network admin interface for configuring security policies.

C.

SDN creates a unified control point making security policies consistent across all devices, and traditional networking must be configured device by device, leaving room for error.

D.

SDN devices communicate with each other to establish a security policy, and in traditional networking, devices communicate upstream to a central location to establish a security policy.

Buy Now
Question # 163

Which fact must the engineer consider when implementing syslog on a new network?

Options:

A.

Syslog defines the software or hardware component that triggered the message.

B.

There are 16 different logging levels (0-15).

C.

By default, all message levels are sent to the syslog server.

D.

The logging level defines the severity of a particular message.

Buy Now
Question # 164

Which security element uses a combination of one-time passwords, a login name, and a personal smartphone?

Options:

A.

software-defined segmentation

B.

multifactor authentication

C.

attribute-based access control

D.

rule-based access control

Buy Now
Question # 165

A Cisco engineer must configure a single switch interface to meet these requirements

• accept untagged frames and place them in VLAN 20

• accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone

Which command set must the engineer apply?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 166

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Options:

Buy Now
Question # 167

Why would a network administrator choose to implement RFC 1918 address space?

Options:

A.

to route traffic on the internet

B.

to provide flexibility in the IP network design

C.

to provide overlapping address space with another network

D.

to limit the number of hosts on the network

Buy Now
Question # 168

Refer to the exhibit.

Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?

Options:

A.

Define a NAT pool on the router.

B.

Configure static NAT translations for VLAN 200.

C.

Configure the ip nat outside command on another interface for VLAN 200.

D.

Update the NAT INSIDF RANGFS ACL

Buy Now
Question # 169

Refer to the exhibit.

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 170

What is the purpose of the ip address dhcp command?

Options:

A.

to configure an Interface as a DHCP server

B.

to configure an interface as a DHCP helper

C.

to configure an interface as a DHCP relay

D.

to configure an interface as a DHCP client

Buy Now
Question # 171

What is a function of an endpoint on a network?

Options:

A.

forwards traffic between VLANs on a network

B.

connects server and client devices to a network

C.

allows users to record data and transmit to a tile server

D.

provides wireless services to users in a building

Buy Now
Question # 172

How does Rapid PVST+ create a fast loop-free network topology?

Options:

A.

lt requires multiple links between core switches

B.

It generates one spanning-tree instance for each VLAN

C.

It maps multiple VLANs into the same spanning-tree instance

D.

It uses multiple active paths between end stations.

Buy Now
Question # 173

Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

Options:

A.

SYIM flood

B.

reflection

C.

teardrop

D.

amplification

Buy Now
Question # 174

Which protocol uses the SSL?

Options:

A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Buy Now
Question # 175

Refer to the exhibit.

A company is configuring a failover plan and must implement the default routes in such a way that a floating static route will assume traffic forwarding when the primary link goes down. Which primary route configuration must be used?

Options:

A.

ip route 0.0.0.0 0.0.0.0 192.168.0.2 GigabitEthernetl/0

B.

ip route 0.0.0.0 0.0.0.0 192.168.0.2 tracked

C.

ip route 0.0.0.0 0.0.0.0 192.168.0.2 floating

D.

ip route 0.0.0.0 0.0.0.0 192.168.0.2

Buy Now
Question # 176

Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?

Options:

A.

shaping

B.

classification

C.

policing

D.

marking

Buy Now
Question # 177

Which two components comprise part of a PKI? (Choose two.)

Options:

A.

preshared key that authenticates connections

B.

RSA token

C.

CA that grants certificates

D.

clear-text password that authenticates connections

E.

one or more CRLs

Buy Now
Question # 178

Which field within the access-request packet is encrypted by RADIUS?

Options:

A.

authorized services

B.

authenticator

C.

username

D.

password

Buy Now
Question # 179

Refer to the exhibit.

An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?

Options:

A.

Change the channel-group mode on SW2 to auto

B.

Change the channel-group mode on SW1 to desirable.

C.

Configure the interface port-channel 1 command on both switches.

D.

Change the channel-group mode on SW1 to active or passive.

Buy Now
Question # 180

A Cisco engineer is configuring a factory-default router with these three passwords:

• The user EXEC password for console access is p4ssw0rd1

• The user EXEC password for Telnet access is s3cr3t2

• The password for privileged EXEC mode is pnv4t3p4ss Which command sequence must the engineer configured

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 181

How do TCP and UDP fit into a query-response model?

Options:

A.

TCP establishes a connection prior to sending data, and UDP sends immediately.

B.

TCP uses error detection for packets, and UDP uses error recovery.

C.

TCP avoids using sequencing, and UDP avoids using acknowledgments.

D.

TCP encourages out-of-order packet delivery, and UDP prevents re-ordering.

Buy Now
Question # 182

Which protocol is used in Software Defined Access (SDA) to provide a tunnel between two edge nodes in different fabrics?

Options:

A.

Generic Router Encapsulation (GRE)

B.

Virtual Local Area Network (VLAN)

C.

Virtual Extensible LAN (VXLAN)

D.

Point-to-Point Protocol

Buy Now
Question # 183

What are two protocols within the IPsec suite? (Choose two)

Options:

A.

AH

B.

3DES

C.

ESP

D.

TLS

E.

AES

Buy Now
Question # 184

Drag and drop the TCP and UDP characteristics from the lett onto the corresponding protocols on the right.

Options:

Buy Now
Question # 185

Refer to the exhibit.

Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 186

A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network. Which type of IPv6 address must the engineer assign?

Options:

A.

unique local address

B.

link-local address

C.

aggregatable global address

D.

IPv4-compatible IPv6 address

Buy Now
Question # 187

How do AAA operations compare regarding user identification, user services and access control?

Options:

A.

Authorization provides access control and authentication tracks user services

B.

Authentication identifies users and accounting tracks user services

C.

Accounting tracks user services, and authentication provides access control

D.

Authorization identifies users and authentication provides access control

Buy Now
Question # 188

What is the role of nonoverlapping channels in a wireless environment?

Options:

A.

to reduce interference

B.

to allow for channel bonding

C.

to stabilize the RF environment

D.

to increase bandwidth

Buy Now
Question # 189

Refer to the exhibit. An engineer just installed network 10.120.10.0/24. Which configuration must be applied to the R14 router to add the new network to its OSPF routing table?

Options:

A.

router ospf 100network 10.120.10.0 255.255.255.0 area 0

B.

router ospf 120network 10.120.10.0 255.255.255.0 area 0ip route 10.120.10.0 255.255.255.0 fa0/1

C.

router ospf 100 area 0network 10.120.10.0 0.0.0.255

Buy Now
Question # 190

Refer to the exhibit.

What is the subnet mask of the route to the 10.10.13.160 prefix?

Options:

A.

255.255.255.240

B.

255.255.255.128

C.

255.255.255.248

D.

255.255.248.0

Buy Now
Question # 191

Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatical togged out?

Options:

A.

config sessions maxsessions 0

B.

config sessions timeout 0

C.

config serial timeout 0

D.

config serial timeout 9600

Buy Now
Question # 192

Refer to the exhibit. Router-WAN1 has a new connection via Gi0/0 to the ISP. Users running the web applications indicate that connectivity is unstable to the internet. What is causing the interface issue?

Options:

A.

Small frames less than 64 bytes are rejected due to size.

B.

The receive buffer is full due to a broadcast storm.

C.

Frames are discarded due to a half-duplex negotiation.

D.

Broadcast packets are rejected because ARP timeout is enabled.

Buy Now
Question # 193

Drag and drop the IPv6 address types from the left onto their description on the right.

Options:

Buy Now
Question # 194

Drag and drop the statements about AAA services firm the left onto the corresponding AAA services on the right Not all options are used.

Options:

Buy Now
Question # 195

Drag and drop the IPv6 address details from the left onto the corresponding types on the right.

Options:

Buy Now
Question # 196

What must be considered before deploying virtual machines?

Options:

A.

location of the virtual machines within the data center environment

B.

whether to leverage VSM to map multiple virtual processors to two or more virtual machines

C.

resource limitations, such as the number of CPU cores and the amount of memory

D.

support for physical peripherals, such as monitors, keyboards, and mice

Buy Now
Question # 197

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Options:

Buy Now
Question # 198

A network architect planning a new Wi-Fi network must decide between autonomous, cloud-based, and split MAC architectures. Which two facts should the architect consider? (Choose two.)

Options:

A.

Lightweight access points are solely used by split MAC architectures.

B.

Cloud-based architectures uniquely use the CAPWAP protocol to communicate between access points and clients.

C.

Each of the three architectures must use WLCs to manage their access points.

D.

All three architectures use access points to manage the wireless devices connected to the wired infrastructure.

E.

Autonomous architectures exclusively use tunneling protocols to manage access points remotely.

Buy Now
Question # 199

Refer to the exhibit.

Wireless LAN access must be set up to force all clients from the NA WLAN to authenticate against the local database. The WLAN is configured for local EAP authentication. The time that users access the network must not be limited. Which action completes this configuration?

Options:

A.

Uncheck the Guest User check box

B.

Check the Guest User Role check box

C.

Set the Lifetime (seconds) value to 0

D.

Clear the Lifetime (seconds) value

Buy Now
Question # 200

What are two functions of DHCP servers? (Choose two.)

Options:

A.

prevent users from assigning their own IP addresses to hosts

B.

assign dynamic IP configurations to hosts in a network

C.

support centralized IP management

D.

issue DHCPDISCOVER messages when added to the network

E.

respond to client DHCPOFFER requests by issuing an IP address

Buy Now
Question # 201

Which WAN topology has the highest degree of reliability?

Options:

A.

full mesh

B.

Point-to-point

C.

hub-and-spoke

D.

router-on-a-stick

Buy Now
Question # 202

Which type of IPv4 address must be assigned to a server to protect it from external access and allow only internal users access while restricting internet access?

Options:

A.

global unicast

B.

public

C.

private

D.

multicast

Buy Now
Question # 203

Which (unction generally performed by a traditional network device is replaced by a software-defined controller?

Options:

A.

encryption and decryption for VPN link processing

B.

building route tables and updating the forwarding table

C.

changing the source or destination address during NAT operations

D.

encapsulation and decapsulation of packets in a data-link frame

Buy Now
Exam Code: 200-301
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: Nov 18, 2025
Questions: 1197
200-301 pdf

200-301 PDF

$33.25  $94.99
200-301 Engine

200-301 Testing Engine

$38.5  $109.99
200-301 PDF + Engine

200-301 PDF + Testing Engine

$50.75  $144.99