Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CCNA 200-301 Practice Exam Questions with Solutions, Exams of Computer Networks

A comprehensive set of practice exam questions for the ccna 200-301 certification exam. It covers a wide range of topics, including networking fundamentals, network security, and wireless networking. Each question is accompanied by a detailed explanation of the correct answer, making it an excellent resource for preparing for the exam.

Typology: Exams

2024/2025

Available from 02/11/2025

BetaTutors
BetaTutors ๐Ÿ‡บ๐Ÿ‡ธ

4.5

(4)

1.5K documents

1 / 16

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CCNA 200-301 PRACTICE EXAM QUESTIONS WITH 100%
ACCURATE SOLUTIONS.
1) Which data format is the following snippet in?
<root>
<message>success</message>
<timestamp>1560789260</timestamp><iss_position>
<latitude>25.9990</latitude>
<longitude>-132.6992</longitude> </iss_position>
</root> -- Answer โœ”โœ” XML
2) A virus has replicated itself throughout systems it has infected and is executing its
payload. Which of the following phases of the virus life cycle is this virus in? --
Answer โœ”โœ” Launch
3) Which switching network type allows data connections that can be initiated when
needed and terminated when communication is complete? -- Answer โœ”โœ” Circuit
4) JSON is an easy to read data format that is used by applications for storing and
reading data. Which of the following describes the syntax for a JSON object?
(Select two.) -- Answer โœ”โœ” Keys and values are separated by a colon.
Keys must be strings within double quotation marks (" ").
5) Your network has been assigned 168.11.0.0 as the network address. You have
determined that you need 70 subnets.
Which subnet mask value should you select to provide 70 subnets? -- Answer
โœ”โœ” 255.255.254.0
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download CCNA 200-301 Practice Exam Questions with Solutions and more Exams Computer Networks in PDF only on Docsity!

CCNA 200-301 PRACTICE EXAM QUESTIONS WITH 100%

ACCURATE SOLUTIONS.

  1. Which data format is the following snippet in? success 1560789260<iss_position> 25.9990 -132.6992 </iss_position> -- Answer โœ”โœ” XML
  2. A virus has replicated itself throughout systems it has infected and is executing its payload. Which of the following phases of the virus life cycle is this virus in? -- Answer โœ”โœ” Launch
  3. Which switching network type allows data connections that can be initiated when needed and terminated when communication is complete? -- Answer โœ”โœ” Circuit
  4. JSON is an easy to read data format that is used by applications for storing and reading data. Which of the following describes the syntax for a JSON object? (Select two.) -- Answer โœ”โœ” Keys and values are separated by a colon. Keys must be strings within double quotation marks (" ").
  5. Your network has been assigned 168.11.0.0 as the network address. You have determined that you need 70 subnets. Which subnet mask value should you select to provide 70 subnets? -- Answer โœ”โœ” 255.255.254.
  1. Jaden is the network engineer at a branch office. There are non-Cisco devices on the network that Jaden would like to make sure are discovered by the Cisco router. Jaden has just enabled the Link Layer Discovery Protocol (LLDP) on the router. Which of the following is true about LLDP? -- Answer โœ”โœ” Configured on a per-interface basis.
  2. Which two of the following statements accurately describe half-duplex Ethernet? (Select two.) -- Answer โœ”โœ” It sends both signals along the same wire. It uses collision detection and recovery.
  3. What is the backoff on an Ethernet network? -- Answer โœ”โœ” The random amount of time a device waits before retransmitting after a collision.
  4. Queue schedulers are used for congestion management and define how a device will work through its queue. Match the names of the most commonly used queue schedulers on the left with the appropriate description on the right. (Each name can only be used once.) -- Answer โœ”โœ” Weighted Round Robin - Labels one queue as priority. Round Robin - Rotates through... Class-Based Weighted Fair Queuing - Mini bandwidth
  5. You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do? -- Answer โœ”โœ” Configure port security on the switch.
  6. Which wireless networking component is used to connect multiple APs together? -
  • Answer โœ”โœ” DS

active router. If the preempted active router regains service, it sends a coup message. The current active router sends the resign message after receiving the coup message.

  1. You have three switches configured as shown. For each port, identify the port role and status after spanning tree convergence by matching the port states on the left with the ports on the graphic. (Port states on the left can be used once, more than once, or not at all.) -- Answer โœ”โœ” A Gi0/1 - Root and Forwarding A Gi0/2 - Designated and Forwarding B Gi0/1 - Root and Forwarding B Gi0/2 - Backup and Blocked C Gi0/1 - Designated and Forwarding C Gi0/2 - Designated and Forwarding
  2. You have a small network as shown. You have configured RIP on both RouterA and RouterB. The show ip route command on RouterA shows the following information: Codes: C - connected, S - static, R - RIP, M - mobile, P - periodic downloaded static route - Gateway of last resort is not set R 10.0.0.0/8 [120/1] via 192.168.4.14, 00:00:02, Serial0/1/ C 192.168.1.0/24 is directly connected, FastEthernet0/ 192.168.4.0/30 is subnetted, 1 subnets C 192.168.4.12 is directly connected, Serial0/1/ You want to configure a default route so that all packets for unknown networks are sent to RouterB. Which command should you use? -- Answer โœ”โœ” ip default- network 10.0.0.
  3. One of the interfaces in a router with OSPF enabled is connected to a network link where no other routers reside. You want to prevent this interface from sending OSPF Hello messages, as there are no other routers on that network to respond. Which command should you use? -- Answer โœ”โœ” passive-interface
  4. Computers A and B are on the same VLAN and are separated by two switches as shown. Computer A sends a frame to Computer B.

Which of the following best describes the composition of the frame as it travels from A to B? -- Answer โœ”โœ” Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

  1. As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as? -- Answer โœ”โœ” Roaming
  2. You want to create an ACL statement that allows traffic from any network. Which network address and wildcard mask value should you use? -- Answer โœ”โœ” 0.0.0. 255.255.255.
  3. Which of the following are configuration management tools? (Select two.) -- Answer โœ”โœ” SaltStack Ansible
  4. You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but you cannot see your network. What should you do? -- Answer โœ”โœ” Configure a profile on the wireless client.
  5. Which of the following laws regulates emails? -- Answer โœ”โœ” CAN-SPAM Act
  6. A fully automated network that focuses on using software to maintain the network is known as what? -- Answer โœ”โœ” Intent-based network
  7. Which of the following should you include in your site survey test equipment? ( Select two.) -- Answer โœ”โœ” A tall ladder A spectrum analyzer
  8. The default amount of time that a device will hold information about its neighbors using LLDP is 120 seconds. Which of the following command allows you to change the value? -- Answer โœ”โœ” Router(config)#lldp holdtime [number of seconds]

It can deliver other configuration information in addition to IP addresses.

  1. You are reviewing the configuration of a router that uses EIGRP for its routing protocol. The output from the show ip eigrp topology all-links command is as follows: Router# show ip eigrp topology all-linksIP-EIGRP Topology Table for process 77Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,r - Reply statusP 172.16.90.0 255.255.255.0, 2 successors, FD is 46251776via 172.16.80. (46251776/46226176), Ethernet0via 172.16.81.28 (46251776/46226176), Ethernet1via 172.16.80.31 (46277376/46251000), Serial0via 172.16.81. (46277400/46251800), Serial Based on the output, which of the following are true? (Select two.) -- Answer โœ”โœ” Serial0 is a feasible successor route. Ethernet0 and Ethernet1 are successor routes.
  2. An internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server? -- Answer โœ”โœ” Port or socket number
  3. What is the least secure place to locate an omnidirectional access point when creating a wireless network? -- Answer โœ”โœ” Near a window
  4. Which of the following features is supplied by WPA2 on a wireless network? (Select two.) -- Answer โœ”โœ” Encryption Authentication
  5. Which of the following statements about routers are true? (Select two.) -- Answer โœ”โœ” They use logical network and device addresses to route data between networks. They examine the destination device address contained in packets to make routing decisions.
  1. Kathy executed the show interfaces command on a router and reviewed the output. Which output indicates a Layer 1 problem with the Serial0/1/1 interface? -- Answer โœ”โœ” Serial0/1/1 is down, line protocol is down.
  2. Which of the following would cause a TCP/IP connectivity issue between two routers? -- Answer โœ”โœ” Both routers have an IP address of 192.168.1.100.
  3. You have a small network connected to the internet as shown. Which of the following statements is true? (Select two.) -- Answer โœ”โœ” Internet hosts can reach Srv2 without NAT. The router must be configured for NAT for Srv1 to communicate on the internet.
  4. Match the common threat mitigation techniques that are used to protect against attacks, listed on the left, with the appropriate descriptions on the right. (Each technique may be used once, more than once, or not at all.) -- Answer โœ”โœ” Port authentication (802.1x) - Authentication Port authentication (802.1x) - Authentication DHCP snooping - Protects against... Port authentication (802.1x) - Authentication DHCP snooping - Protects against...
  5. You have five routers running OSPF on a single subnet. RouterB has been elected as the DR. You remove RouterB from the network for a hardware upgrade. The next day, you add the router back onto the network. What will happen when you add RouterB back onto the network? -- Answer โœ”โœ” RouterB will become the DR only if a new election occurs.
  6. Which of the following protocols enables Cisco devices to discover non-Cisco devices? -- Answer โœ”โœ” LLDP
  7. In which of the following situations would you use port security? -- Answer โœ”โœ” You want to restrict the devices that can connect through a switch port.

several session IDs that have been used before and then analyze them to determine a pattern.

  1. Which data format is the following snippet in? message: success timestamp: 1560789260 iss_position: latitude: '25.9990' longitude: '-132.6992' -- Answer โœ”โœ” YAML
  2. The administrative distance determines the trustworthiness of the route source. Assuming that two separate routes are available to the same location, the router will use the following criteria for choosing between these routes. Put the criteria in order. -- Answer โœ”โœ” If a static route is available, it is selected. If a router has learned of two routes to a single network through different routing protocols, it chooses the route with the lowest administrative distance. If a router has learned of two routes through the same protocol, the router will choose the route that has the best cost as defined by the routing metric.
  3. Which is the primary role of a firewall? -- Answer โœ”โœ” To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.
  4. You need to view the type of serial cable that has been used on the s0/0/1 interface and which end of the cable is connected to the DCE or DTE. Which command should you use to do this? -- Answer โœ”โœ” show controllers s0/0/
  5. You are designing a new network that will support 6,000 computers. You only have eight registered IP addresses that can be allocated to the employees for external network communication, so you decide to implement NAT and share the addresses. You want all of these computers to be able to access the internet at the same time if necessary. Which method of NAT translation should you implement? -- Answer โœ”โœ” Overloading
  1. Which of the following are true about Gigabit Ethernet? (Select two.) -- Answer โœ”โœ” Can use both copper and fiber optic Uses CSMA/CD
  2. You need to verify that time is synchronized on a router. Which commands could you use to do this? (Select two. Each response is a complete solution.) -- Answer โœ”โœ” show ntp associations show ntp status
  3. Which of the following are true regarding using multiple VLANs on a single switch? (Select two.) -- Answer โœ”โœ” The number of broadcast domains increases. The number of collision domains remains the same.
  4. For each operation on the right, match the appropriate command from the list on the left. -- Answer โœ”โœ” ip name-server - Configure DNS server addresses ip host - Create static entries for hosts no ip domain-lookup - Prevent router from using DNS hostname - Set the DNS name
  5. A programmer wants to communicate with a software application on a controller. Which of the following would the programmer use? -- Answer โœ”โœ” Northbound API
  6. You have configured DHCP on your router. A partial configuration is shown below: hostname RouterA!interface FastEthernet0/0ip address 192.168.11. 255.255.255.0speed autoduplex autoip access-group 1 in!interface FastEthernet0/1no ip addressspeed autoduplex auto! Srv2 is a host connected to the Fa0/1 interface of RouterA. Its MAC address is 02c7.f800.0422 and is configured to use DHCP to request an IP address. Which of the following addresses will most likely be assigned to Srv2 when it boots? -- Answer โœ”โœ” It will not be assigned an IP address.

Application - Integrates network functionality into OS Application - Provides the capability for services Transport - Uses ports to enable app-to-app comms

  1. What happens when an HSRP active router fails? (Select two.) -- Answer โœ”โœ” Additional HSRP member routers transition from the listen state after the holdtime expires on the hello message. The HSRP standby router becomes the active router after the holdtime expires on the hello message.
  2. To show all non-Cisco devices using LLDP, which of the following commands would you execute on a Cisco router? -- Answer โœ”โœ” Router#show lldp neighbors
  3. In traditional networking models, the date plane, control plane, and management plane are all contained within the firmware of networking devices. This is known as what kind of architecture? -- Answer โœ”โœ” Distributed
  4. Match each route type on the left with its default administrative distance on the right. -- Answer โœ”โœ” 0 - Connected 1 - Static 20 - BGP 90 - EIGRP 110 - OSPF 120 - RIP
  5. Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which of the following cryptographic keys would Mary use to create the digital signature? -- Answer โœ”โœ” Mary's private key
  6. You have a switch connected to a small network as shown. A hub connects Wrk and Wrk5 to the switch. The switch has the following information in its CAM table: Wrk1 sends a frame addressed to Wrk5. What will the switch do with the frame? (Select two.) -- Answer โœ”โœ” Not record the location of any device.

Drop the frame.

  1. During which state in the OSPF communication process are link-state databases exchanged? -- Answer โœ”โœ” 2 - way
  2. What are DRs and BDRs used for when using the OSPF routing protocol? -- Answer โœ”โœ” Reduce routing table updates in a broadcast network.
  3. The Stuxnet worm was discovered in 2010 and was used to gain sensitive information about Iran's industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target. Which type of attack was Stuxnet? -- Answer โœ”โœ” APT
  4. Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? -- Answer โœ”โœ” WEP, WPA Personal, and WPA2 Personal
  5. An attacker may use compromised websites and emails to distribute specially designed malware to poorly secured devices. This malware provides an access point to the attacker, which he can use to control the device. Which of the following devices can the attacker use? -- Answer โœ”โœ” Any device that can communicate over the intranet can be hacked.
  6. Based on the address prefix for each IPv6 address on the right, identify the address type from the list on the left. (Addresses used might not represent actual addresses used in production.) -- Answer โœ”โœ” Global unicast - 2001:6789:9078::ABCE:AFFF:FE98: Unique local - FD00::8907:FF:FE76:ABC Link-local - FEA0::AB89:9FF:FE77: Multicast - FF00:98BD:6532:: Multicast - FF02::1:
  7. You have configured two routers (LondonA and LondonB) for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below:

The virtual IP address is 172.16.0.1.