Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CCNA 200-301 Exam Questions and Answers: Networking Fundamentals, Exams of Computer Networks

A comprehensive list of ccna 200-301 exam questions and answers, covering fundamental networking concepts. It includes definitions and explanations of key terms and technologies, such as aaa, acl, arp, and vpn. Useful for students preparing for the ccna 200-301 exam, offering a quick reference guide to essential networking concepts.

Typology: Exams

2024/2025

Available from 02/11/2025

BetaTutors
BetaTutors 🇺🇸

4.5

(4)

1.5K documents

1 / 44

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CCNA 200-301 EXAM QUESTIONS WITH THE LATEST
SCORES
1) AAA -- Answer ✔✔ Authentication, authorization and accounting
2) AAA Server -- Answer ✔✔ Server providing authentication, authorization and
accounting services
3) Access Control Entry (ACE) -- Answer ✔✔ One line in an access control list (ACL)
4) access interface -- Answer ✔✔ A LAN network design term that refers to a switch
interface connected to end-user devices
5) access layer -- Answer ✔✔ In a Campus LAN design, the switches that connect
directly to end-point devices
6) access link (WAN) -- Answer ✔✔ A physical link between a service provider and its
customer
7) access rate -- Answer ✔✔ The speed at which bits are sent over an access link
8) accounting -- Answer ✔✔ In security, the recording of access attempts
9) ACI -- Answer ✔✔ Application Centric Infrastructure
10) ACL -- Answer ✔✔ Access Control List
11) Active Directory -- Answer ✔✔ A popular set of identity and directory services
from Microsoft, used in part to authenticate users
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c

Partial preview of the text

Download CCNA 200-301 Exam Questions and Answers: Networking Fundamentals and more Exams Computer Networks in PDF only on Docsity!

CCNA 200-301 EXAM QUESTIONS WITH THE LATEST

SCORES

  1. AAA -- Answer ✔✔ Authentication, authorization and accounting
  2. AAA Server -- Answer ✔✔ Server providing authentication, authorization and accounting services
  3. Access Control Entry (ACE) -- Answer ✔✔ One line in an access control list (ACL)
  4. access interface -- Answer ✔✔ A LAN network design term that refers to a switch interface connected to end-user devices
  5. access layer -- Answer ✔✔ In a Campus LAN design, the switches that connect directly to end-point devices
  6. access link (WAN) -- Answer ✔✔ A physical link between a service provider and its customer
  7. access rate -- Answer ✔✔ The speed at which bits are sent over an access link
  8. accounting -- Answer ✔✔ In security, the recording of access attempts
  9. ACI -- Answer ✔✔ Application Centric Infrastructure
  10. ACL -- Answer ✔✔ Access Control List
  11. Active Directory -- Answer ✔✔ A popular set of identity and directory services from Microsoft, used in part to authenticate users
  1. administrative distance -- Answer ✔✔ In Cisco routers, a means for one router to choose between multiple routes to reach the same subnet when those routes are learned by different routing protocols.
  2. agent -- Answer ✔✔ Generally, an additional software process or component running in a computing device for some specific purpose
  3. agent-based architecture -- Answer ✔✔ An architecture that uses a software agent inside the device being managed
  4. agentless architecture -- Answer ✔✔ An architecture that does not need a software agent
  5. amplification attack -- Answer ✔✔ A reflection attack that leverages a service on the reflector to generate and reflect huge volumes of reply traffic to the victim
  6. Ansible -- Answer ✔✔ A popular configuration management application
  7. Ansible inventory -- Answer ✔✔ Device host names along with information about each device
  8. Ansible playbook -- Answer ✔✔ Files with actions and logic about what Ansible should do
  9. anti-replay -- Answer ✔✔ Preventing a man in the middle from copying and later replaying the packets sent by a legitimate user, for the purpose of appearing to be a legitimate user
  10. antivirus -- Answer ✔✔ Software that monitors files transferred by any means, to look for content that can be used to place a virus into the computer
  11. APIC -- Answer ✔✔ Application Policy Infrastructure Controller
  12. APIC-EM -- Answer ✔✔ Application Policy Infrastructure Controller - Enterprise Module
  1. ARP Table -- Answer ✔✔ A list of IP addresses of neighbors on the same VLAN, along with their MAC addresses
  2. ASAv -- Answer ✔✔ A Cisco ASA firewall software image that runs as a virtual machine rather than on hardware
  3. ASIC -- Answer ✔✔ Application Specific Integrated Circuit
  4. authentication -- Answer ✔✔ In security, the verification of the identity of a person, device or process
  5. Authoritative DNS server -- Answer ✔✔ The DNS server with the record that lists the address that corresponds to a domain name (A Record) for that domain
  6. authorization -- Answer ✔✔ In security, the determination of the rights allowed for a particular user or device
  7. autonomous system (AS) -- Answer ✔✔ An internetwork that is managed by one organization
  8. autonomous system number (ASN) -- Answer ✔✔ A number used by BGP to identify a routing domain, often a single enterprise or organization.
  9. AutoQoS -- Answer ✔✔ In Cisco switches and routers, an IOS feature that configures a variety of QoS features with useful settings as defined by design guides
  10. bandwidth -- Answer ✔✔ The speed at which bits can be sent and received over a link
  11. bandwidth profile -- Answer ✔✔ In MetroEthernet, a contractual definition of the amount of traffic that the customer can send into the service and receive out of the service
  1. Brownfield -- Answer ✔✔ A term that refers to the choice to add new configuration to hardware and software that are already in use, rather than adding new hardware and software specifically for a new project
  2. brute-force attack -- Answer ✔✔ An attack where a malicious user runs software that tries every possible combination of letters, numbers and special characters to guess a user's password
  3. buffer overflow attack -- Answer ✔✔ An attack meant to exploit a vulnerability in processing inbound traffic such that the target system's buffers overflow, the target system can end up crashing or inadvertently running malicious code injected by the attacker
  4. cable internet -- Answer ✔✔ An internet access technology that uses a cable TV (CATV), normally used for video, to send and receive data
  5. cacheable -- Answer ✔✔ For resources that might be repeatedly requested over time, an attribute that means that the requesting host can keep in storage (cache) a copy of the resource for a specified amount of time
  6. carrier Ethernet -- Answer ✔✔ A WAN service that uses Ethernet links as the access link between the customer and the service provider
  7. CDP -- Answer ✔✔ Cisco Discovery Protocol. A media- and protocol-independent device-discovery protocol that runs on most Cisco-manufactured equipment, including routers, access servers, and switches. Using CDP, a device can advertise its existence to other devices and receive information about other devices on the same LAN or on the remote side of a WAN
  8. CDP neighbor -- Answer ✔✔ A device on the other end of some communications cable that is advertising CDP updates
  9. central office (CO) -- Answer ✔✔ A term used by telcos to refer to a building that holds switching equipment, into which the telco's cable plant runs so that the telco has cabling from each home and business into the building
  1. Class of Service (CoS) -- Answer ✔✔ The informal term for the 3-bit field in the 802.1Q header intended for marking and classifying Ethernet frames for the purpose of applying QoS actions. Another term for Priority Code Point (PCP)
  2. classification -- Answer ✔✔ The process of examining various fields in networking messages in an effort to identify which messages fit into certain predetermined groups (classes)
  3. classless addressing -- Answer ✔✔ A concept in IPv4 addressing that defines a subnetted IP address as having two parts: a prefix (or subnet) and a host
  4. client VPN -- Answer ✔✔ A VPN for which one endpoint is a user device, like a phone, tablet, or PC. Also called a remote access VPN
  5. clock rate -- Answer ✔✔ The speed at which a serial link encodes bits on the transmission medium
  6. clock source -- Answer ✔✔ On serial links, the device to which the other devices on the link adjust their speed when using synchronous links. With NTP, the external device or NTP server on which a device bases its time
  7. clocking -- Answer ✔✔ The process of supplying a signal over a cable, either on a separate pin on a serial cable or as part of the signal transitions in the transmitted signal, so that the receiving device can keep synchronization with the sending device
  8. Clos network -- Answer ✔✔ A term for network topology that represents an ideal for a switch fabric and named after Charles Clos, who formalized the definition. Also called a spine-leaf network
  9. cloud service catalog -- Answer ✔✔ A listing of the services available in a cloud computing service
  10. Cloud Services Router (CSR) -- Answer ✔✔ A Cisco router software image that runs as a virtual machine rather than on Cisco hardware, intended to be used as a consumer-controlled router in a cloud service or in other virtualized environments
  1. code integrity -- Answer ✔✔ A software security term that refers to how likely that the software (code) being used is the software supplied by the vendor, unchanged, with no viruses or other changes made to the software
  2. collapsed core design -- Answer ✔✔ A campus LAN design in which the design does not use a separate set of core switches in addition to the distribution switches- in effect collapsing the core into the distribution switches
  3. confidentiality (privacy) -- Answer ✔✔ Preventing anyone in the middle of the Internet from being able to read the data
  4. configuration drift -- Answer ✔✔ A phenomenon that begins with the idea that devices with similar roles can and should have a similar standard configuration, so when one device's configuration is changed, the configuration is considered to have moved away (drifted) from the standard configuration for a device in that role
  5. configuration enforcement -- Answer ✔✔ Another term for configuration monitoring
  6. configuration management -- Answer ✔✔ A component of network management focused on creating, changing, removing and monitoring device configuration
  7. configuration management tool -- Answer ✔✔ A class of application that manages data about configurations
  8. configuration monitoring -- Answer ✔✔ With configuration management tools like Ansible, Puppet and Chef, a process of comparing over time a device's on-device configuration (running-config) versus the text file showing the ideal device configuration
  9. configuration provisioning -- Answer ✔✔ With configuration management tools like Ansible, Puppet and Chef, the process of configuring a device to match the configuration as held in the configuration management tool
  1. customer premises equipment (CPE) -- Answer ✔✔ A telco term that refers to equipment on site at the telco customer site (the enterprise's site) that connects to a WAN service provider by the telco
  2. data integrity -- Answer ✔✔ Verifying that the packet was not changed as the packet transited the network
  3. data model -- Answer ✔✔ A set of variables and their structures, like lists and dictionaries
  4. date modeling language -- Answer ✔✔ Another term for data serialization language
  5. data plane -- Answer ✔✔ Function in networking devices that are part of the process of receiving a message, processing the message, and forwarding the message
  6. data serialization language -- Answer ✔✔ A language that includes syntax and rules that provides a means to describe the variables inside applications in a text format
  7. declarative policy model -- Answer ✔✔ A term that describes the approach in an intent-based network in which the engineer chooses settings that describe the intended network behavior (the declared policy) but does not command the network with specific configuration commands for each protocol (as would be the case with an imperative policy model)
  8. decrypt/decryption -- Answer ✔✔ The ability to receive encrypted data and process it to derive the original unencrypted data
  9. default gateway/default router -- Answer ✔✔ On an IP host, the IP address of some router to which the host sends packets when the packet's destination is on a different subnet
  10. delay -- Answer ✔✔ In QoS, the amount of time it takes for a message to cross a network
  1. demilitarized zone (DMZ) -- Answer ✔✔ In an internet edge design at an enterprise, one or more subnets set aside as a place to locate servers that should allow users in the internet to initiate connections to those servers
  2. denial-of-service attack (DOS) -- Answer ✔✔ An attack that tries to deplete a system resource so that systems and services crash or become unavailable
  3. deny -- Answer ✔✔ An action taken with an ACL that implies that the packet is to be discarded
  4. DevNet -- Answer ✔✔ Cisco's community and resource site for software developers, open to all. www.developer.cisco.com
  5. DHCP -- Answer ✔✔ Dynamic Host Configuration Protocol. A protocol used by hosts to dynamically discover and lease an IP address, and learn the correct parameters for connectivity
  6. DHCP relay agent -- Answer ✔✔ The name of the router IOS feature that forwards DHCP messages from client to servers by changing the destination IP address from 255.255.255.255 to the IP address of the DHCP server
  7. DHCP server -- Answer ✔✔ Software that waits for DHCP clients to request to lease IP addresses , with the server assigning a lease of an IP address as well as listing other important IP settings
  8. dictionary attack -- Answer ✔✔ An attack where a malicious user runs software that attempts to guess a user's password by trying words from a dictionary or word list
  9. Differentiated Services (DiffServ) -- Answer ✔✔ An approach to QoS, originally defined in RFC 2475, that uses a model of applying QoS per classification, with planning of which applications and other traffic types are assigned to each class, with each class given different QoS per-hop behaviors at each networking device along the path
  1. DNS Server -- Answer ✔✔ An application acting as a server for the purpose of providing name resolution services per the Domain Name System (DNS) protocol
  2. enable mode -- Answer ✔✔ A part of the Cisco IOS CLI in which the user has full possibility for configuration of every aspect of the device
  3. enable password -- Answer ✔✔ Password required to access enable mode. This is used in the absence of enable secret password and it is stored in clear text format
  4. enable secret -- Answer ✔✔ Password required to access enable mode. This password prevails over enable password when present. It is stored in encrypted format
  5. encrypt/encryption -- Answer ✔✔ The ability to take data and send the data in a form that is not readable by someone who intercepts this data
  6. encryption key -- Answer ✔✔ A secret value used as input to the formulas used by the encryption process
  7. End of Row (EoR) Switch -- Answer ✔✔ In a traditional data center design with servers in multiple racks and the racks in multiple rows, a switch placed in a rack at the end of the row, intented to be cable to all the Top of Rack (ToR) switches in the same row, to act as a distribution layer switch for the switches in that row
  8. endpoint group -- Answer ✔✔ In ACI, a set (group) of VMs, containers, physical servers, or other endpoints in an ACI data center that should receive the same policy treatment
  9. err-disable recovery -- Answer ✔✔ Settings to direct the switch to automatically revert away from err-disabled state, back to a working state after an period of time and once the cause for the error is removed or solved
  10. error detection -- Answer ✔✔ The process of discovering whether a data-link level frame was changed during transmission
  1. error disable (err-disable) -- Answer ✔✔ An interface state on LAN switches that be the result of one of many security violations
  2. error recovery -- Answer ✔✔ The process of noticing when some transmitted data was not successfully received and resending the data until it is successfully received
  3. Ethernet access link -- Answer ✔✔ A WAN access link that uses Ethernet
  4. Ethernet WAN -- Answer ✔✔ A general and informal term for any WAN service that uses Ethernet links as the access link between the customer and the service provider
  5. Expedited Forwarding (EF) -- Answer ✔✔ The name of a particular DSCP value, as well as the term for one per-hop behavior as defined by DiffServ. The value, decimal 46, is marked for packets to be assigned priority
  6. exploit -- Answer ✔✔ A means of taking advantage of a vulnerability to compromise a system
  7. extended access-list -- Answer ✔✔ A type of access-list that provides filtering of packets based on source and destination addresses, protocol and port
  8. fabric -- Answer ✔✔ In SDA, the combination of overlay and underlay that together provide all features to deliver data across the network
  9. fiber internet -- Answer ✔✔ A general term for any Internet access technology that happens to use fiber optic cabling
  10. filter -- Answer ✔✔ A process that determines either to forward of discard
  11. firewall -- Answer ✔✔ A device that forwards packets between the less secure and more secure parts of the network. Provide segmentation based on security and levels of trust
  1. FTP over TLS -- Answer ✔✔ Secure FTP. Adds a variety of security features to the original protocol. Includes encryption and user authentication
  2. FTP passive mode -- Answer ✔✔ One of the two modes of operation for FTP connections that dictates how the FTP data connection is established. In passive mode, the FTP client declares the use of passive mode, causing the server to choose and identify a new listening port, with the client establishing a TCP connection to that port
  3. FTP server -- Answer ✔✔ An application that runs and waits for FTP clients to connect to it over TCP port 21 to support the client's commands to transfer files
  4. FTPS -- Answer ✔✔ FTP Secure. Common term for FTP over TLS
  5. full mesh -- Answer ✔✔ From a topology perspective, any topology that has two or more devices, with each device being able to send frames to very other device
  6. Gateway Load Balancing Protocol (GLBP) -- Answer ✔✔ A Cisco - proprietary protocol that allows two (or more) routers to share the duties of being the default router on a subnet, with an active/active model, with all routers actively forwarding
  7. Generic Routing Encapsulation (GRE) -- Answer ✔✔ A protocol that defines headers used to encapsulate traffic originally not allowed to be forwarded by VPNs (broadcast and multicast traffic specifically)
  8. gratuitous ARP -- Answer ✔✔ An ARP reply no sent as a reaction to an ARP request message, but rather as a general unsolicited announcement
  9. greenfield -- Answer ✔✔ A term that refers to the installation of new equipment for a project rather than adding configuration to the existing hardware and software
  10. host (context: DC) -- Answer ✔✔ In a virtualized server environment, the term used to refer to one physical server that is running a hypervisor to create multiple virtual machines
  1. Hot Standby Router Protocol (HSRP) -- Answer ✔✔ A Cisco-proprietary protocol that allows two (or more) routes to share forwarding in an active/standby model
  2. HSRP Active -- Answer ✔✔ An HSRP router actively forwarding traffic
  3. HSRP standby -- Answer ✔✔ An HSRP router not currently forwarding but monitoring hello packets in standby mode
  4. HTML -- Answer ✔✔ Hypertext Markup Language. A simple document- forwarding language that uses tags to indicate how a given part of a document should be interpreted by a viewing application, such as a web browser
  5. HTTP -- Answer ✔✔ Hypertext Transfer Protocol. The protocol used by web browsers and web servers to transfer files, such as text and graphic files
  6. hub and spoke -- Answer ✔✔ From a topology perspective, any topology that has a device that can send messages to all other devices (the hub), with one or more spoke devices that can send messages only to the hub
  7. hyperthreading -- Answer ✔✔ The name of Intel's multithreading technology
  8. hypervisor -- Answer ✔✔ Software that runs on server hardware to create the foundations of a virtualized server environment primarily by allocating server hardware components like CPU core/threads, RAM, disks, and network to the VMs running on the server
  9. IANA -- Answer ✔✔ The Internet Assigned Numbers Authority. An organization that owns the rights to assign many operating numbers and facts about how the global Internet works, including public IPv4 and IPv6 addresses
  10. ICANN -- Answer ✔✔ The Internet Corporation for Assigned Names and Numbers. An organization appointed by IANA to oversee the distributed process of assigning public IPv4 and IPv6 addresses across the globe
  1. Internet edge -- Answer ✔✔ The part of the topology of the Internet that sits between an ISP and the ISP's customer
  2. Internet service provider (ISP) -- Answer ✔✔ A company or organization that provides Internet services to customers; the company may have heritage as a telco, WAN service provider, or cable company
  3. Intrusion Detection System (IDS) -- Answer ✔✔ A security function that examines more complex traffic patterns against a list of both known attack signatures and general characteristics of how attacks can be carried out, rating each perceived threat and reporting the threats
  4. Intrusion Prevention System (IPS) -- Answer ✔✔ A security function that examines more complex traffic patterns against a list of both known attack signatures and general characteristics of how attacks can be carried out, rating each perceived threat, and reacting to prevent the more significant threats
  5. IOS -- Answer ✔✔ Cisco operating system software that provides the majority of a router's or switch's features, with the hardware providing the remaining features
  6. IOS feature set -- Answer ✔✔ A set of related features that allow functionalities on a Cisco device.
  7. IOS file system (IFS) -- Answer ✔✔ A file system created by a Cisco device that uses IOS
  8. IOS image -- Answer ✔✔ A file that contains the IOS
  9. IP Precedence (IPP) -- Answer ✔✔ In the original definition of the IP header's Type of Service (ToS) byte, the first 3 bits of the ToS byte, used for marking IP packets for the purpose of applying QoS actions
  10. IPS -- Answer ✔✔ Intrusion Prevention System
  1. IPSec -- Answer ✔✔ IP Security Protocols. A framework to provide encryption and authentication
  2. ISDN -- Answer ✔✔ Integrated Services Digital Network. A communication protocol offered by telephone companies that permits telephone networks to carry data, voice and video
  3. Iterative DNS server -- Answer ✔✔ A DNS Server that will answer DNS requests directly but will not take on the extra work to recursively send other DNS messages to find the answer
  4. JavaScript -- Answer ✔✔ A programming language popular for building dynamic web pages, commonly used to run scripts on a web server
  5. Jinja2 -- Answer ✔✔ A text-based language used to define templates, with text plus variables
  6. jitter -- Answer ✔✔ The variation in delay experienced by successive packets in a single application flow
  7. JSON (JavaScript Object Notation) -- Answer ✔✔ A popular data serialization language, originally used with the JavaScript programming language, and popular for use with REST APIs
  8. JSON array -- Answer ✔✔ A part of a set of JSON text that begins and ends with a matched set of square brackets that contain a list of values
  9. JSON object -- Answer ✔✔ A part of a set of JSON text that begins and ends with a matched set of curly brackets that contain a set of key: value pairs
  10. key:value pair -- Answer ✔✔ In software, one variable name (key) and its value, separated by a colon in some languages and data serialization languages