200-301 Practice Questions
Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update 2 days ago
Total Questions : 1240
Dive into our fully updated and stable 200-301 practice test platform, featuring all the latest CCNA exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.
Our free CCNA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 200-301. Use this test to pinpoint which areas you need to focus your study on.
What is the advantage of separating the control plane from the data plane within an SDN network?
Which IP header field is changed by a Cisco device when QoS marking is enabled?
Which command creates a static NAT binding for a PC address of 10.1.1.1 to the public routable address 209.165.200.225 assigned to the PC?
What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)
Refer to the exhibit.
How does the router manage traffic to 192.168.12.16?
Refer to the exhibit.
How must router A be configured so that it only sends Cisco Discovery Protocol Information to router C?
What software defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?
Refer to the exhibit.
Which outcome is expected when PC_A sends data to PC_B?
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
Refer to the exhibit.
Which switch in this configuration will be elected as the root bridge?
What is the purpose of a southbound API in a control based networking architecture?
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?
A network administrator is asked to configure VLANS 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused remaining. Which action should be taken for the unused ports?
How do TCP and UDP differ in the way they provide reliability for delivery of packets?
Refer to Exhibit.
The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)
Refer to the exhibit.
If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?
Refer to the exhibit.
Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?
Which access layer threat-mitigation technique provides security based on identity?
Refer to the exhibit.
What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Refer to the exhibit Router R1 Fa0/0 is unable to ping router R3 Fa0'1. Which action must be taken in router R1 to help resolve the configuration issue?
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
Which implementation provides the strongest encryption combination for the wireless environment?
Refer to the exhibit.
If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?
Drag and drop the statement about networking from the left into the Corresponding networking types on the right. Not all statements are used.
What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?
After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?
Refer to the exhibit.
What two conclusions should be made about this configuration? (Choose two )
When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?
What are two improvements provided by automation for network management in an SDN environment? (Choose two)
A network engineer is configuring an OSPFv2 neighbor adjacency Drag and drop the parameters from the left onto their required categories on the right. Not all parameters are used
Refer to the exhibit.
Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?
In QoS, which prioritization method is appropriate for interactive voice and video?
Drag drop the descriptions from the left onto the correct configuration-management technologies on the right.

In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk port (VLAN 10 in this case), and the second matches the VLAN of a host it wants to attack (VLAN 20).



