CCNA 200-301 COMPLETE EXAM STUDY GUIDE QUESTIONS
WITH THE BEST SCORES 2025
AAA stands for authentication, authorization, and accounting. -- Answer ✔✔ True
d. d. d. d. d. d. d. d. d. d.
Which effect does the aaa new-model configuration command have? -- Answer ✔✔ It
d. d. d. d. d. d. d. d. d. d. d. d.
enables AAA services on the device.
d. d. d. d. d. d.
What is the primary difference between AAA authentication and authorization? --
d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Authentication identifies and verifies a user who is attempting to access a
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
system, and authorization controls the tasks the user can perform.
d. d. d. d. d. d. d. d. d. d.
(Exhibit which password must an engineer use to enter the enable mode?) -- Answer ✔✔
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
testing1234
d.
What is a difference between RADIUS and TACACS+? -- Answer ✔✔ TACACS+
d. d. d. d. d. d. d. d. d. d. d.
separates authentication and authorization, and RADIUS merges them
d. d. d. d. d. d. d. d.
How do AAA operations compare regarding user identification, user services and access
d. d. d. d. d. d. d. d. d. d. d.
control? -- Answer ✔✔ Authentication identifies users and accounting tracks user
d. d. d. d. d. d. d. d. d. d. d.
services
d.
An email user has been lured into clicking a link in an email sent by their company's
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
security organization. The webpage that opens reports that it was safe but the link could
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
have contained malicious code. Which type of security program is in place? -- Answer
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
✔✔ user awareness
d. d. d.
An engineer is asked to protect unused ports that are configured in the default VLAN on
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
a switch. Which two steps will fulfill the request? -- Answer ✔✔ Administratively shut
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
down the ports.
d. d. d.
Configure the port type as access and place in VLAN 99. d. d. d. d. d. d. d. d. d. d.
,Which configuration is needed to generate an RSA key for SSH on a router? -- Answer
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
✔✔ Assign a DNS domain name
d. d. d. d. d. d.
Which two conditions must be met before SSH can operate normally on a Cisco IOS
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
switch? -- Answer ✔✔ The switch must be running a k9 (crypto) IOS image.
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
The ip domain-name command must be configured on the switch.
d. d. d. d. d. d. d. d. d.
When a site-to-site VPN is used, which protocol is responsible for the transport of user
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
data? -- Answer ✔✔ IPsec
d. d. d. d. d.
Which set of action satisfy the requirement for multi-factor authentication? -- Answer
d. d. d. d. d. d. d. d. d. d. d.
✔✔ The user enters a user name and password, and then clicks a notification in an
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
authentication app on a mobile device.
d. d. d. d. d. d.
Which two statements about the purpose of the OSI model are accurate? -- Answer ✔✔
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Defines the network functions that occur at each layer.
d. d. d. d. d. d. d. d. d.
Facilitates an understanding of how information travels throughout a network.
d. d. d. d. d. d. d. d. d.
What is the default behavior of a Layer 2 switch when a frame with an unknown
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
destination MAC address is received? -- Answer ✔✔ The Layer 2 switch floods packets
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
to all ports except the receiving port in the given VLAN.
d. d. d. d. d. d. d. d. d. d. d.
What is the destination MAC address of a broadcast frame? -- Answer ✔✔ ff:ff:ff:ff:ff:ff
d. d. d. d. d. d. d. d. d. d. d. d. d.
Which action is taken by a switch port enabled for PoE power classification override? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ If a monitored port exceeds the maximum administrative value for power,
d. d. d. d. d. d. d. d. d. d. d. d. d.
the port is shutdown and err-disabled.
d. d. d. d. d. d.
In which way does a spine and-leaf architecture allow for scalability in a network when
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
additional access ports are required? -- Answer ✔✔ A leaf switch can be added with
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
connections to every spine switch.
d. d. d. d. d.
A frame that enters a switch fails the Frame Check Sequence. Which two interface
d. d. d. d. d. d. d. d. d. d. d. d. d.
counters are incremented? -- Answer ✔✔ CRC, Input Errors
d. d. d. d. d. d. d. d. d.
,What are two reasons that cause late collisions to increment on an Ethernet interface? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ When the cable length limits are exceeded.
d. d. d. d. d. d. d. d. d.
When one side of the connection is configured for half-duplex.
d. d. d. d. d. d. d. d. d.
What is the function of a server? -- Answer ✔✔ It provides shared applications to end
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
users.
d.
What is a function of TFTP in network operations? -- Answer ✔✔ Transfers IOS images
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
from a server to a router for firmware upgrades.
d. d. d. d. d. d. d. d. d.
What are two functions of a server on a network? -- Answer ✔✔ Runs applications that
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
send and retrieve data for workstations that make requests.
d. d. d. d. d. d. d. d. d.
Handles requests from multiple workstations at the same time.
d. d. d. d. d. d. d. d.
What is the primary function of a Layer 3 device? -- Answer ✔✔ To pass traffic between
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
different networks.
d. d.
What is the same for both copper and fiber interfaces when using SFP modules? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ They provide minimal interruption to services by being hot-swappable.
d. d. d. d. d. d. d. d. d. d. d.
What is a characteristic of spine-and-leaf architecture? -- Answer ✔✔ Each device is
d. d. d. d. d. d. d. d. d. d. d. d.
separated by the same number of hops.
d. d. d. d. d. d. d.
What are two descriptions of three-tier network topologies? -- Answer ✔✔ The
d. d. d. d. d. d. d. d. d. d. d.
network core is designed to maintain continuous connectivity when devices fail.
d. d. d. d. d. d. d. d. d. d. d.
The distribution layer runs Layer 2 and Layer 3 technologies.
d. d. d. d. d. d. d. d. d.
What benefit does controller-based networking provide versus traditional networking? --
d. d. d. d. d. d. d. d. d.
Answer ✔✔ Allows configuration and monitoring of the network from one centralized
d. d. d. d. d. d. d. d. d. d. d. d.
port.
d.
Which purpose does a northbound API serve in a controller-based networking
d. d. d. d. d. d. d. d. d. d.
architecture? -- Answer ✔✔ Facilitates communication between the controller and the
d. d. d. d. d. d. d. d. d. d. d.
applications.
d.
, What is the name of the layer in the Cisco borderless switched network design that is
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
considered to be the backbone used for high-speed connectivity and fault isolation? --
d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Core
d. d. d.
A company needs to interconnect several branch offices across a metropolitan area. The
d. d. d. d. d. d. d. d. d. d. d. d.
network engineer is seeking a solution that provides high-speed converged traffic,
d. d. d. d. d. d. d. d. d. d. d.
including voice, video, and data on the same network infrastructure. The company also
d. d. d. d. d. d. d. d. d. d. d. d. d.
wants easy integration to their existing LAN infrastructure in their office locations.
d. d. d. d. d. d. d. d. d. d. d. d.
Which technology should be recommended? -- Answer ✔✔ Ethernet WAN
d. d. d. d. d. d. d. d. d. d.
Which two WAN architecture options help a business improve scalability and reliability
d. d. d. d. d. d. d. d. d. d. d.
for the network? -- Answer ✔✔ Dynamic Routing
d. d. d. d. d. d. d. d.
Dual-homed Branches d.
Which WAN access technology is preferred for a small office / home office architecture?
d. d. d. d. d. d. d. d. d. d. d. d. d.
-- Answer ✔✔ Broadband cable access
d. d. d. d. d. d.
Which two functions are performed by the core layer in a three-tier architecture? --
d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Provide uninterrupted forwarding service.
d. d. d. d. d. d.
Ensure timely data transfer between layers.
d. d. d. d. d.
Which function is performed by the collapsed core layer in a two-tier architecture? --
d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Enforcing routing policies
d. d. d. d. d.
Which statement identifies the functionality of virtual machines? -- Answer ✔✔ The
d. d. d. d. d. d. d. d. d. d. d.
hypervisor can virtualize physical components including CPU, memory, and storage.
d. d. d. d. d. d. d. d. d. d.
An organization has decided to start using cloud-provided services. Which cloud service
d. d. d. d. d. d. d. d. d. d. d.
allows the organization to install its own operating system on a virtual machine? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Infrastructure-as-a-service
d. d. d.
Anycompany has decided to reduce its environmental footprint by reducing energy costs,
d. d. d. d. d. d. d. d. d. d. d.
moving to a smaller facility, and promoting telecommuting. What service or technology
d. d. d. d. d. d. d. d. d. d. d. d.
would support this requirement? -- Answer ✔✔ Cloud services
d. d. d. d. d. d. d. d. d.
WITH THE BEST SCORES 2025
AAA stands for authentication, authorization, and accounting. -- Answer ✔✔ True
d. d. d. d. d. d. d. d. d. d.
Which effect does the aaa new-model configuration command have? -- Answer ✔✔ It
d. d. d. d. d. d. d. d. d. d. d. d.
enables AAA services on the device.
d. d. d. d. d. d.
What is the primary difference between AAA authentication and authorization? --
d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Authentication identifies and verifies a user who is attempting to access a
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
system, and authorization controls the tasks the user can perform.
d. d. d. d. d. d. d. d. d. d.
(Exhibit which password must an engineer use to enter the enable mode?) -- Answer ✔✔
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
testing1234
d.
What is a difference between RADIUS and TACACS+? -- Answer ✔✔ TACACS+
d. d. d. d. d. d. d. d. d. d. d.
separates authentication and authorization, and RADIUS merges them
d. d. d. d. d. d. d. d.
How do AAA operations compare regarding user identification, user services and access
d. d. d. d. d. d. d. d. d. d. d.
control? -- Answer ✔✔ Authentication identifies users and accounting tracks user
d. d. d. d. d. d. d. d. d. d. d.
services
d.
An email user has been lured into clicking a link in an email sent by their company's
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
security organization. The webpage that opens reports that it was safe but the link could
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
have contained malicious code. Which type of security program is in place? -- Answer
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
✔✔ user awareness
d. d. d.
An engineer is asked to protect unused ports that are configured in the default VLAN on
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
a switch. Which two steps will fulfill the request? -- Answer ✔✔ Administratively shut
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
down the ports.
d. d. d.
Configure the port type as access and place in VLAN 99. d. d. d. d. d. d. d. d. d. d.
,Which configuration is needed to generate an RSA key for SSH on a router? -- Answer
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
✔✔ Assign a DNS domain name
d. d. d. d. d. d.
Which two conditions must be met before SSH can operate normally on a Cisco IOS
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
switch? -- Answer ✔✔ The switch must be running a k9 (crypto) IOS image.
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
The ip domain-name command must be configured on the switch.
d. d. d. d. d. d. d. d. d.
When a site-to-site VPN is used, which protocol is responsible for the transport of user
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
data? -- Answer ✔✔ IPsec
d. d. d. d. d.
Which set of action satisfy the requirement for multi-factor authentication? -- Answer
d. d. d. d. d. d. d. d. d. d. d.
✔✔ The user enters a user name and password, and then clicks a notification in an
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
authentication app on a mobile device.
d. d. d. d. d. d.
Which two statements about the purpose of the OSI model are accurate? -- Answer ✔✔
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Defines the network functions that occur at each layer.
d. d. d. d. d. d. d. d. d.
Facilitates an understanding of how information travels throughout a network.
d. d. d. d. d. d. d. d. d.
What is the default behavior of a Layer 2 switch when a frame with an unknown
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
destination MAC address is received? -- Answer ✔✔ The Layer 2 switch floods packets
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
to all ports except the receiving port in the given VLAN.
d. d. d. d. d. d. d. d. d. d. d.
What is the destination MAC address of a broadcast frame? -- Answer ✔✔ ff:ff:ff:ff:ff:ff
d. d. d. d. d. d. d. d. d. d. d. d. d.
Which action is taken by a switch port enabled for PoE power classification override? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ If a monitored port exceeds the maximum administrative value for power,
d. d. d. d. d. d. d. d. d. d. d. d. d.
the port is shutdown and err-disabled.
d. d. d. d. d. d.
In which way does a spine and-leaf architecture allow for scalability in a network when
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
additional access ports are required? -- Answer ✔✔ A leaf switch can be added with
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
connections to every spine switch.
d. d. d. d. d.
A frame that enters a switch fails the Frame Check Sequence. Which two interface
d. d. d. d. d. d. d. d. d. d. d. d. d.
counters are incremented? -- Answer ✔✔ CRC, Input Errors
d. d. d. d. d. d. d. d. d.
,What are two reasons that cause late collisions to increment on an Ethernet interface? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ When the cable length limits are exceeded.
d. d. d. d. d. d. d. d. d.
When one side of the connection is configured for half-duplex.
d. d. d. d. d. d. d. d. d.
What is the function of a server? -- Answer ✔✔ It provides shared applications to end
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
users.
d.
What is a function of TFTP in network operations? -- Answer ✔✔ Transfers IOS images
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
from a server to a router for firmware upgrades.
d. d. d. d. d. d. d. d. d.
What are two functions of a server on a network? -- Answer ✔✔ Runs applications that
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
send and retrieve data for workstations that make requests.
d. d. d. d. d. d. d. d. d.
Handles requests from multiple workstations at the same time.
d. d. d. d. d. d. d. d.
What is the primary function of a Layer 3 device? -- Answer ✔✔ To pass traffic between
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
different networks.
d. d.
What is the same for both copper and fiber interfaces when using SFP modules? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ They provide minimal interruption to services by being hot-swappable.
d. d. d. d. d. d. d. d. d. d. d.
What is a characteristic of spine-and-leaf architecture? -- Answer ✔✔ Each device is
d. d. d. d. d. d. d. d. d. d. d. d.
separated by the same number of hops.
d. d. d. d. d. d. d.
What are two descriptions of three-tier network topologies? -- Answer ✔✔ The
d. d. d. d. d. d. d. d. d. d. d.
network core is designed to maintain continuous connectivity when devices fail.
d. d. d. d. d. d. d. d. d. d. d.
The distribution layer runs Layer 2 and Layer 3 technologies.
d. d. d. d. d. d. d. d. d.
What benefit does controller-based networking provide versus traditional networking? --
d. d. d. d. d. d. d. d. d.
Answer ✔✔ Allows configuration and monitoring of the network from one centralized
d. d. d. d. d. d. d. d. d. d. d. d.
port.
d.
Which purpose does a northbound API serve in a controller-based networking
d. d. d. d. d. d. d. d. d. d.
architecture? -- Answer ✔✔ Facilitates communication between the controller and the
d. d. d. d. d. d. d. d. d. d. d.
applications.
d.
, What is the name of the layer in the Cisco borderless switched network design that is
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
considered to be the backbone used for high-speed connectivity and fault isolation? --
d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Core
d. d. d.
A company needs to interconnect several branch offices across a metropolitan area. The
d. d. d. d. d. d. d. d. d. d. d. d.
network engineer is seeking a solution that provides high-speed converged traffic,
d. d. d. d. d. d. d. d. d. d. d.
including voice, video, and data on the same network infrastructure. The company also
d. d. d. d. d. d. d. d. d. d. d. d. d.
wants easy integration to their existing LAN infrastructure in their office locations.
d. d. d. d. d. d. d. d. d. d. d. d.
Which technology should be recommended? -- Answer ✔✔ Ethernet WAN
d. d. d. d. d. d. d. d. d. d.
Which two WAN architecture options help a business improve scalability and reliability
d. d. d. d. d. d. d. d. d. d. d.
for the network? -- Answer ✔✔ Dynamic Routing
d. d. d. d. d. d. d. d.
Dual-homed Branches d.
Which WAN access technology is preferred for a small office / home office architecture?
d. d. d. d. d. d. d. d. d. d. d. d. d.
-- Answer ✔✔ Broadband cable access
d. d. d. d. d. d.
Which two functions are performed by the core layer in a three-tier architecture? --
d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Provide uninterrupted forwarding service.
d. d. d. d. d. d.
Ensure timely data transfer between layers.
d. d. d. d. d.
Which function is performed by the collapsed core layer in a two-tier architecture? --
d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Enforcing routing policies
d. d. d. d. d.
Which statement identifies the functionality of virtual machines? -- Answer ✔✔ The
d. d. d. d. d. d. d. d. d. d. d.
hypervisor can virtualize physical components including CPU, memory, and storage.
d. d. d. d. d. d. d. d. d. d.
An organization has decided to start using cloud-provided services. Which cloud service
d. d. d. d. d. d. d. d. d. d. d.
allows the organization to install its own operating system on a virtual machine? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Infrastructure-as-a-service
d. d. d.
Anycompany has decided to reduce its environmental footprint by reducing energy costs,
d. d. d. d. d. d. d. d. d. d. d.
moving to a smaller facility, and promoting telecommuting. What service or technology
d. d. d. d. d. d. d. d. d. d. d. d.
would support this requirement? -- Answer ✔✔ Cloud services
d. d. d. d. d. d. d. d. d.