Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

200-301 Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

200-301 Practice Questions

Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1

Last Update 2 days ago
Total Questions : 1240

Dive into our fully updated and stable 200-301 practice test platform, featuring all the latest CCNA exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.

Our free CCNA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 200-301. Use this test to pinpoint which areas you need to focus your study on.

200-301 PDF

200-301 PDF (Printable)
$48.3
$137.99

200-301 Testing Engine

200-301 PDF (Printable)
$52.5
$149.99

200-301 PDF + Testing Engine

200-301 PDF (Printable)
$65.45
$186.99
Question # 251

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Options:

A.  

disabling TPC so that access points can negotiate signal levels with their attached wireless devices.

B.  

setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller

C.  

allocating nonoverlapping channels to access points that are in close physical proximity to one another

D.  

configuring access points to provide clients with a maximum of 5 Mbps

Discussion 0
Question # 252

What is a role of access points in an enterprise network?

Options:

A.  

connect wireless devices to a wired network

B.  

support secure user logins to devices or the network

C.  

integrate with SNMP in preventing DDoS attacks

D.  

serve as a first line of defense in an enterprise network

Discussion 0
Question # 253

A network architect is deciding whether to implement Cisco autonomous access points or lightweight access points. Which fact about firmware updates must the architect consider? Unlike lightweight access points, which require

Options:

A.  

Unlike lightweight access points, which require redundant WLCs to support firmware upgrades, autonomous access points require only one WL

C.  

B.  

Unlike autonomous access points, lightweight access points store a complete copy of the current firmware for backup.

C.  

Unlike lightweight access points, autonomous access points can recover automatically from a corrupt firmware update.

D.  

Unlike autonomous access points, lightweight access points require a WLC to implement remote firmware updates.

Discussion 0
Question # 254

Refer to the exhibit.

Question # 254

Which configuration for RTR-1 deniess SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A)

Question # 254

B)

Question # 254

C)

Question # 254

D)

Question # 254

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 255

Refer to the exhibit.

Question # 255

When router R1 is sending traffic to IP address 10.56.192 1, which interface or next hop address does it use to route the packet?

Options:

A.  

0.0.0.0.0/0

B.  

10.56.0.1

C.  

10.56.128.19

D.  

Vlan57

Discussion 0
Question # 256

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?

Options:

A.  

crypto key Import rsa pem

B.  

crypto key pubkey-chain rsa

C.  

crypto key generate rsa

D.  

crypto key zeroize rsa

Discussion 0
Question # 257

What is the purpose of using First Hop Redundancy Protocol on a specific subnet?

Options:

A.  

ensures a loop-free physical topology

B.  

filters traffic based on destination IP addressing

C.  

sends the default route to the hosts on a network

D.  

forwards multicast hello messages between routers

Discussion 0
Question # 258

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two.)

Options:

A.  

Telnet

B.  

SSH

C.  

HTTP

D.  

HTTPS

E.  

TFTP

Discussion 0
Question # 259

Drag and drop the descriptions from the left onto the configuration-management technologies on the right.

Question # 259

Options:

Discussion 0
Question # 260

Refer to the exhibit.

Question # 260

Which two prefixes are included in this routing table entry? (Choose two.)

Options:

A.  

192.168.1.17

B.  

192.168.1.61

C.  

192.168.1.64

D.  

192.168.1.127

E.  

192.168.1.254

Discussion 0
Question # 261

Refer to the exhibit.

Question # 261

The nip server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that it operates in server-only mode and relies only on its internal clock?

Options:

A.  

Router2(config)#ntp passive

B.  

Router2(config)#ntp server 172.17.0.1

C.  

Router2(config)#ntp master 4

D.  

Router2(config)#ntp server 192.168.0.2

Discussion 0
Question # 262

What are two reasons for an engineer to configure a floating state route? (Choose two)

Options:

A.  

to automatically route traffic on a secondary path when the primary path goes down

B.  

to route traffic differently based on the source IP of the packet

C.  

to enable fallback static routing when the dynamic routing protocol fails

D.  

to support load balancing via static routing

E.  

to control the return path of traffic that is sent from the router

Discussion 0
Question # 263

Refer to the exhibit.

Question # 263

If R1 receives a packet destined to 172.161.1, to which IP address does it send the packet?

Options:

A.  

192.168.12.2

B.  

192.168.13.3

C.  

192.168.14.4

D.  

192.168.15.5

Discussion 0
Question # 264

How does the dynamically-learned MAC address feature function?

Options:

A.  

The CAM table is empty until ingress traffic arrives at each port

B.  

Switches dynamically learn MAC addresses of each connecting CAM table.

C.  

The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses

D.  

It requires a minimum number of secure MAC addresses to be filled dynamically

Discussion 0
Question # 265

Question # 265

Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?

Options:

A.  

10.10.225.48 255.255.255.240

B.  

10.10.225.32 255.255.255.240

C.  

10.10.225.48 255.255.255.224

D.  

10.10.225.32 255.255.255.224

Discussion 0
Question # 266

Which action is taken by a switch port enabled for PoE power classification override?

Options:

A.  

When a powered device begins drawing power from a PoE switch port a syslog message is generated

B.  

As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused

C.  

If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects

D.  

Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled

Discussion 0
Question # 267

R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?

Options:

A.  

route with the lowest cost

B.  

route with the next hop that has the highest IP

C.  

route with the shortest prefix length

D.  

route with the lowest administrative distance

Discussion 0
Question # 268

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)

Options:

A.  

enable the PortFast feature on ports

B.  

implement port-based authentication

C.  

configure static ARP entries

D.  

configure ports to a fixed speed

E.  

shut down unused ports

Discussion 0
Question # 269

The service password-encryption command is entered on a router. What is the effect of this configuration?

Options:

A.  

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.  

encrypts the password exchange when a VPN tunnel is established

C.  

prevents network administrators from configuring clear-text passwords

D.  

protects the VLAN database from unauthorized PC connections on the switch

Discussion 0
Question # 270

Which statement correctly compares traditional networks and controller-based networks?

Options:

A.  

Only traditional networks offer a centralized control plane

B.  

Only traditional networks natively support centralized management

C.  

Traditional and controller-based networks abstract policies from device configurations

D.  

Only controller-based networks decouple the control plane and the data plane

Discussion 0
Question # 271

Refer to the exhibit.

Question # 271

Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?

Options:

A.  

longest prefix

B.  

metric

C.  

cost

D.  

administrative distance

Discussion 0
Question # 272

Question # 272

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

Options:

A.  

The OSPF router IDs are mismatched.

B.  

Router2 is using the default hello timer.

C.  

The network statement on Router1 is misconfigured.

D.  

The OSPF process IDs are mismatched.

Discussion 0
Question # 273

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which configuration should be used?

Question # 273

Question # 273

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 274

Refer to the exhibit.

Question # 274

Which route type does the routing protocol Code D represent in the output?

Options:

A.  

internal BGP route

B.  

/24 route of a locally configured IP

C.  

statically assigned route

D.  

route learned through EIGRP

Discussion 0
Question # 275

An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GH2 access points?

Options:

A.  

Re- Anchor Roamed Clients

B.  

11ac MU-MIMO

C.  

OEAP Split Tunnel

D.  

Client Band Select

Discussion 0
Question # 276

Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?

Options:

A.  

configure a stateful DHCPv6 server on the network

B.  

enable SLAAC on an interface

C.  

disable the EUI-64 bit process

D.  

explicitly assign a link-local address

Discussion 0
Question # 277

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

Options:

A.  

Enable Security Association Teardown Protection and set the SA Query timeout to 10

B.  

Enable MAC filtering and set the SA Query timeout to 10

C.  

Enable 802.1x Layer 2 security and set me Comeback timer to 10

D.  

Enable the Protected Management Frame service and set the Comeback timer to 10

Discussion 0
Question # 278

Refer to the exhibit.

Question # 278

The default-information originate command is configured under the R1 OSPF configuration After testing workstations on VLAN 20 at Site B cannot reach a DNS server on the Internet Which action corrects the configuration issue?

Options:

A.  

Add the default-information originate command onR2

B.  

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1

C.  

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2

D.  

Add the always keyword to the default-information originate command on R1

Discussion 0
Question # 279

How does CAPWAP communicate between an access point in local mode and a WLC?

Options:

A.  

The access point must directly connect to the WLC using a copper cable

B.  

The access point must not be connected to the wired network, as it would create a loop

C.  

The access point must be connected to the same switch as the WLC

D.  

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

Discussion 0
Question # 280

Refer to the exhibit.

Question # 280

Question # 280

A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with VLAN 10, 11, 12, and 13. What is the next step in the configuration?

Options:

A.  

Add PC A to VLAN 10 and the File Server to VLAN 11 fa VLAN segmentation

B.  

Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation

C.  

Add a router on a stick between Switch A and Switch B allowing for Inter-VLAN routing.

D.  

Add PC A to the same subnet as the Fie Server allowing for intra-VLAN communication.

Discussion 0
Question # 281

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

Options:

A.  

Ansible

B.  

Python

C.  

Puppet

D.  

Chef

Discussion 0
Question # 282

Which IPv6 address type provides communication between subnets and is unable to route on the Internet?

Options:

A.  

global unicast

B.  

unique local

C.  

link-local

D.  

multicast

Discussion 0
Question # 283

Which function does an SNMP agent perform?

Options:

A.  

it sends information about MIB variables in response to requests from the NMS

B.  

it requests information from remote network nodes about catastrophic system events.

C.  

it manages routing between Layer 3 devices in a network

D.  

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

Discussion 0
Question # 284

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

Options:

A.  

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

B.  

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

C.  

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

D.  

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

Discussion 0
Question # 285

Refer to the exhibit.

Question # 285

What does router R1 use as its OSPF router-ID?

Options:

A.  

10.10.1.10

B.  

10.10.10.20

C.  

172.16.15.10

D.  

192.168.0.1

Discussion 0
Question # 286

What is the benefit of configuring PortFast on an interface?

Options:

A.  

After the cable is connected, the interface uses the fastest speed setting available for that cable type

B.  

After the cable is connected, the interface is available faster to send and receive user data

C.  

The frames entering the interface are marked with higher priority and then processed faster by a switch.

D.  

Real-time voice and video frames entering the interface are processed faster

Discussion 0
Question # 287

Refer to the exhibit.

Question # 287

Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?

Options:

A.  

ip route 0.0.0.0 0.0.0.0 g0/1 1

B.  

ip route 0.0.0.0 0.0.0.0 209.165.201.5 10

C.  

ip route 0.0.0.0 0.0.0.0 209.165.200.226 1

D.  

ip route 0,0.0.0 0.0.0.0 g0/1 6

Discussion 0
Question # 288

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.  

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.  

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.  

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.  

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Discussion 0
Question # 289

Refer to the exhibit.

Question # 289

An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?

Options:

A.  

Change the channel-group mode on SW2 to auto

B.  

Change the channel-group mode on SW1 to desirable.

C.  

Configure the interface port-channel 1 command on both switches.

D.  

Change the channel-group mode on SW1 to active or passive.

Discussion 0
Question # 290

Refer to the exhibit.

Question # 290

Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?

Options:

A.  

F0/4

B.  

F0/0

C.  

F0/1

D.  

F0/3

Discussion 0
Question # 291

How does Rapid PVST+ create a fast loop-free network topology?

Options:

A.  

lt requires multiple links between core switches

B.  

It generates one spanning-tree instance for each VLAN

C.  

It maps multiple VLANs into the same spanning-tree instance

D.  

It uses multiple active paths between end stations.

Discussion 0
Question # 292

Refer to the exhibit.

Question # 292

Which switch becomes the root of a spanning tree for VLAN 20 if all li links are of equal speed?

Question # 292

Options:

A.  

SW1

B.  

SW2

C.  

SW3

D.  

SW4

Discussion 0
Question # 293

Refer to the exhibit.

Question # 293

Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?

A)

Question # 293

B)

Question # 293

C)

Question # 293

D)

Question # 293

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 294

Refer to the exhibit.

Question # 294

An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?

A)

Question # 294

B)

Question # 294

C)

Question # 294

D)

Question # 294

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 295

Which field within the access-request packet is encrypted by RADIUS?

Options:

A.  

authorized services

B.  

authenticator

C.  

username

D.  

password

Discussion 0
Question # 296

What is one reason to implement LAG on a Cisco WLC?

Options:

A.  

to increase security and encrypt management frames

B.  

to provide link redundancy and load balancing

C.  

to allow for stateful and link-state failover

D.  

to enable connected switch ports to failover and use different VLANs

Discussion 0
Question # 297

What is a requirement when configuring or removing LAG on a WLC?

Options:

A.  

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.  

The controller must be rebooted after enabling or reconfiguring LA

G.  

C.  

The management interface must be reassigned if LAG disabled.

D.  

Multiple untagged interfaces on the same port must be supported.

Discussion 0
Question # 298

Refer to the exhibit.

Question # 298

What is a reason for poor performance on the network interface?

Options:

A.  

The interface is receiving excessive broadcast traffic.

B.  

The cable connection between the two devices is faulty.

C.  

The interface is operating at a different speed than the connected device.

D.  

The bandwidth setting of the interface is misconfigured

Discussion 0
Question # 299

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.  

password password

B.  

crypto key generate rsa modulus 1024

C.  

ip domain-name domain

D.  

ip ssh authentication-retries 2

Discussion 0
Question # 300

Refer to the exhibit.

Question # 300

An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?

Options:

A.  

Configure router A to use the same MTU size as router

B.  

B.  

Set the router B OSPF ID to a nonhost address.

C.  

Configure a point-to-point link between router A and router

B.  

D.  

Set the router B OSPF ID to the same value as its IP address

Discussion 0
Get 200-301 dumps and pass your exam in 24 hours!

Free Exams Sample Questions