CCNA 200-301 PRACTICE EXAM QUESTIONS WITH
100% CORRECT ANSWERS.
1) When configuring a wireless LAN, to which category does a home wireless router
d. d. d. d. d. d. d. d. d. d. d. d.
belong?
d.
A) controller-based AP d.
B) LWAPP-protocol based d.
C) autonomous AP d.
D) CAPWAP-protocol based -- Correct Answer ✔✔ autonomous AP d. d. d. d. d. d. d.
2) Which feature or function does an AP provide in a wireless LAN?
d. d. d. d. d. d. d. d. d. d. d.
A) A wireless client can connect to more than one AP at a time.
d. d. d. d. d. d. d. d. d. d. d. d.
B) Each AP advertises one or more SSIDs and a user can choose to connect to
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
the closest SSID.
d. d. d.
C) An AP is easier to configure and to set up than Wi-Fi range extenders.
d. d. d. d. d. d. d. d. d. d. d. d. d.
D) A wireless device has to be associated to an AP in order to have access to
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
network resources. -- Correct Answer ✔✔ A wireless device has to be
d. d. d. d. d. d. d. d. d. d. d. d.
associated to an AP in order to have access to network resources.
d. d. d. d. d. d. d. d. d. d. d. d.
3) A network engineer is designing a borderless switched network in a hierarchical
d. d. d. d. d. d. d. d. d. d. d.
fashion. Why might the engineer consider using a two-tier layer model?
d. d. d. d. d. d. d. d. d. d. d.
A) The access layer in this model has different functions from the access layer
d. d. d. d. d. d. d. d. d. d. d. d.
in the three-tier layer model.
d. d. d. d. d.
B) It is recommended in smaller campus locations where there are fewer users
d. d. d. d. d. d. d. d. d. d. d.
accessing the network.
d. d. d.
C) It consists of a collapsed layer composed of the access and the distribution
d. d. d. d. d. d. d. d. d. d. d. d.
layer, and a second layer composed of the core layer.
d. d. d. d. d. d. d. d. d. d.
, D) The primary function of the collapsed layer is to provide network access to
d. d. d. d. d. d. d. d. d. d. d. d.
the user. -- Correct Answer ✔✔ It is recommended in smaller campus
d. d. d. d. d. d. d. d. d. d. d. d.
locations where there are fewer users accessing the network.
d. d. d. d. d. d. d. d. d.
4) A technician is troubleshooting a network device and suspects there might be a
d. d. d. d. d. d. d. d. d. d. d. d.
duplex mismatch. What could cause a duplex mismatch?
d. d. d. d. d. d. d. d.
A) data corruption d.
B) interconnection of unlike devices d. d. d.
C) interface misconfiguration d.
D) auto-MDIX detection failure -- Correct Answer ✔✔ interface d. d. d. d. d. d. d.
misconfiguration
d.
5) A pharmaceutical company wants to contract the services of a cloud provider to
d. d. d. d. d. d. d. d. d. d. d. d.
store employee data and company-specific applications with strict access security.
d. d. d. d. d. d. d. d. d. d.
Which type of cloud would be the most appropriate for this scenario?
d. d. d. d. d. d. d. d. d. d. d. d.
A) public cloud d.
B) private cloud d.
C) hybrid cloud d.
D) community cloud -- Correct Answer ✔✔ private cloud d. d. d. d. d. d. d.
Explanation: Private clouds - Cloud-based applications and services offered in a
d. d. d. d. d. d. d. d. d. d.
private cloud are intended for a specific organization or entity, such as the
d. d. d. d. d. d. d. d. d. d. d. d. d.
government. A private cloud can be set up using the organization's private
d. d. d. d. d. d. d. d. d. d. d. d.
network, though this can be expensive to build and maintain. A private cloud can
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
also be managed by an outside organization with strict access security.
d. d. d. d. d. d. d. d. d. d. d.
6) Which LAN attack involves the sending of a double-tagged 802.1Q frame to the
d. d. d. d. d. d. d. d. d. d. d. d.
switch?
d.
A) VLAN double-tagging attack d. d.
B) VLAN hopping attack d. d.
C) DHCP spoofing attack d. d.
D) DHCP starvation attack -- Correct Answer ✔✔ VLAN double-tagging
d. d. d. d. d. d. d. d.
attack
d.
,7) SNMP has been implemented on a network to monitor and manage devices. Which
d. d. d. d. d. d. d. d. d. d. d. d.
SNMP authentication process is preferred when SNMP managers communicate
d. d. d. d. d. d. d. d. d.
with SNMP agents?
d. d. d.
A) plain-text community string d. d.
B) MD5 or SHA authentication d. d. d.
C) username authentication d.
D) community string encryption -- Correct Answer ✔✔ plain-text community d. d. d. d. d. d. d. d.
string
d.
8) What characteristic completes the following statement?
d. d. d. d. d.
When an IPv6 static route is configured, the use of a link-local address as a next-
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
hop address requires entering ......
d. d. d. d.
A) the interface type and interface number.
d. d. d. d. d.
B) the "show ipv6 route static" command.
d. d. d. d. d.
C) the next-hop address of two different adjacent routers.
d. d. d. d. d. d. d.
D) the "ipv6 unicast-routing" command. -- Correct Answer ✔✔ the interface
d. d. d. d. d. d. d. d. d.
type and interface number.
d. d. d. d.
9) A network engineer is examining the routing table of a Cisco router. Consider the
d. d. d. d. d. d. d. d. d. d. d. d. d.
following routing table entry:
d. d. d. d.
S 10.2.2.0/30 [1/0] via 10.1.1.2, 00:00:13, Serial0/0/0
d. d. d. d. d. d.
What is the significance of the Serial0/0/0?
d. d. d. d. d. d.
A) It is the interface on the next-hop router that is directly connected to the
d. d. d. d. d. d. d. d. d. d. d. d. d.
10.2.2.0/30 network
d. d.
B) It is the interface on the next-hop router that is directly connected to the
d. d. d. d. d. d. d. d. d. d. d. d. d.
10.1.1.0/24 network.
d. d.
C) It is the R4 interface through which the OSPF update was learned
d. d. d. d. d. d. d. d. d. d. d.
D) It is the interface R4 uses to send data that is destined for 10.2.2.0/30. --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Correct Answer ✔✔ It is the interface R4 uses to send data that is destined
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
for 10.2.2.0/30. d. d.
, 10) A technician must accommodate at least 500 subnets from address 172.16.0.0/16.
d. d. d. d. d. d. d. d. d. d.
What is an appropriate subnet mask and corresponding number of available host IP
d. d. d. d. d. d. d. d. d. d. d. d. d.
addresses per subnet to meet the requirement?
d. d. d. d. d. d. d.
A) 255.255.255.128 and 126 hosts d. d. d.
B) 255.255.255.0 and 128 hosts d. d. d.
C) 255.255.255.192 and 126 hosts d. d. d.
D) 255.255.255.224 and 128 hosts -- Correct Answer ✔✔ 255.255.255.128 d. d. d. d. d. d. d. d.
and 126 hosts
d. d. d.
11) Refer to the exhibit. A PC with the MAC address of 0800.069d.3841 attached to
d. d. d. d. d. d. d. d. d. d. d. d. d.
port Fa0/8 is sending data to a device that has the MAC address of 6400.6a5a.6821.
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
What will the switch do first to handle the data transfer?
d. d. d. d. d. d. d. d. d. d. d.
A) The switch will add the address 0800.069d.3841 to the MAC address table.
d. d. d. d. d. d. d. d. d. d. d.
B) The switch will send the frame to ports Fa0/4 and Fa0/6.
d. d. d. d. d. d. d. d. d. d.
C) The switch will flood the frame out all ports except port Fa0/8.
d. d. d. d. d. d. d. d. d. d. d.
D) The switch will send the frame to port Fa0/6.
d. d. d. d. d. d. d. d.
E) The switch will add the address 6400.6151.6821 to the MAC address table.
d. d. d. d. d. d. d. d. d. d. d.
-- Correct Answer ✔✔ The switch will add the address 0800.069d.3841 to
d. d. d. d. d. d. d. d. d. d. d. d.
the MAC address table.
d. d. d. d.
Explanation: Every frame that enters a switch is checked for new information to
d. d. d. d. d. d. d. d. d. d. d. d.
learn. It does this by examining the source MAC address of the frame and port
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
number where the frame entered the switch:
d. d. d. d. d. d. d.
If the source MAC address does not exist in the MAC address table, the MAC
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
address and incoming port number are added to the table.
d. d. d. d. d. d. d. d. d. d.
12) A network engineer is giving a tour of the company network operations center to a
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
college class. The engineer is trying to describe how a WAN and connectivity to
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
the internet relate to the network infrastructure. Which statement correctly
d. d. d. d. d. d. d. d. d. d.
describes network infrastructure and network communication?
d. d. d. d. d. d.
A) Communication across the internet requires application of recognized d. d. d. d. d. d. d.
technologies and standards.
d. d. d.
B) LANs are used to connect WANs around the world. d. d. d. d. d. d. d. d.
C) A LAN connects small networks to large global networks.
d. d. d. d. d. d. d. d.
100% CORRECT ANSWERS.
1) When configuring a wireless LAN, to which category does a home wireless router
d. d. d. d. d. d. d. d. d. d. d. d.
belong?
d.
A) controller-based AP d.
B) LWAPP-protocol based d.
C) autonomous AP d.
D) CAPWAP-protocol based -- Correct Answer ✔✔ autonomous AP d. d. d. d. d. d. d.
2) Which feature or function does an AP provide in a wireless LAN?
d. d. d. d. d. d. d. d. d. d. d.
A) A wireless client can connect to more than one AP at a time.
d. d. d. d. d. d. d. d. d. d. d. d.
B) Each AP advertises one or more SSIDs and a user can choose to connect to
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
the closest SSID.
d. d. d.
C) An AP is easier to configure and to set up than Wi-Fi range extenders.
d. d. d. d. d. d. d. d. d. d. d. d. d.
D) A wireless device has to be associated to an AP in order to have access to
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
network resources. -- Correct Answer ✔✔ A wireless device has to be
d. d. d. d. d. d. d. d. d. d. d. d.
associated to an AP in order to have access to network resources.
d. d. d. d. d. d. d. d. d. d. d. d.
3) A network engineer is designing a borderless switched network in a hierarchical
d. d. d. d. d. d. d. d. d. d. d.
fashion. Why might the engineer consider using a two-tier layer model?
d. d. d. d. d. d. d. d. d. d. d.
A) The access layer in this model has different functions from the access layer
d. d. d. d. d. d. d. d. d. d. d. d.
in the three-tier layer model.
d. d. d. d. d.
B) It is recommended in smaller campus locations where there are fewer users
d. d. d. d. d. d. d. d. d. d. d.
accessing the network.
d. d. d.
C) It consists of a collapsed layer composed of the access and the distribution
d. d. d. d. d. d. d. d. d. d. d. d.
layer, and a second layer composed of the core layer.
d. d. d. d. d. d. d. d. d. d.
, D) The primary function of the collapsed layer is to provide network access to
d. d. d. d. d. d. d. d. d. d. d. d.
the user. -- Correct Answer ✔✔ It is recommended in smaller campus
d. d. d. d. d. d. d. d. d. d. d. d.
locations where there are fewer users accessing the network.
d. d. d. d. d. d. d. d. d.
4) A technician is troubleshooting a network device and suspects there might be a
d. d. d. d. d. d. d. d. d. d. d. d.
duplex mismatch. What could cause a duplex mismatch?
d. d. d. d. d. d. d. d.
A) data corruption d.
B) interconnection of unlike devices d. d. d.
C) interface misconfiguration d.
D) auto-MDIX detection failure -- Correct Answer ✔✔ interface d. d. d. d. d. d. d.
misconfiguration
d.
5) A pharmaceutical company wants to contract the services of a cloud provider to
d. d. d. d. d. d. d. d. d. d. d. d.
store employee data and company-specific applications with strict access security.
d. d. d. d. d. d. d. d. d. d.
Which type of cloud would be the most appropriate for this scenario?
d. d. d. d. d. d. d. d. d. d. d. d.
A) public cloud d.
B) private cloud d.
C) hybrid cloud d.
D) community cloud -- Correct Answer ✔✔ private cloud d. d. d. d. d. d. d.
Explanation: Private clouds - Cloud-based applications and services offered in a
d. d. d. d. d. d. d. d. d. d.
private cloud are intended for a specific organization or entity, such as the
d. d. d. d. d. d. d. d. d. d. d. d. d.
government. A private cloud can be set up using the organization's private
d. d. d. d. d. d. d. d. d. d. d. d.
network, though this can be expensive to build and maintain. A private cloud can
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
also be managed by an outside organization with strict access security.
d. d. d. d. d. d. d. d. d. d. d.
6) Which LAN attack involves the sending of a double-tagged 802.1Q frame to the
d. d. d. d. d. d. d. d. d. d. d. d.
switch?
d.
A) VLAN double-tagging attack d. d.
B) VLAN hopping attack d. d.
C) DHCP spoofing attack d. d.
D) DHCP starvation attack -- Correct Answer ✔✔ VLAN double-tagging
d. d. d. d. d. d. d. d.
attack
d.
,7) SNMP has been implemented on a network to monitor and manage devices. Which
d. d. d. d. d. d. d. d. d. d. d. d.
SNMP authentication process is preferred when SNMP managers communicate
d. d. d. d. d. d. d. d. d.
with SNMP agents?
d. d. d.
A) plain-text community string d. d.
B) MD5 or SHA authentication d. d. d.
C) username authentication d.
D) community string encryption -- Correct Answer ✔✔ plain-text community d. d. d. d. d. d. d. d.
string
d.
8) What characteristic completes the following statement?
d. d. d. d. d.
When an IPv6 static route is configured, the use of a link-local address as a next-
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
hop address requires entering ......
d. d. d. d.
A) the interface type and interface number.
d. d. d. d. d.
B) the "show ipv6 route static" command.
d. d. d. d. d.
C) the next-hop address of two different adjacent routers.
d. d. d. d. d. d. d.
D) the "ipv6 unicast-routing" command. -- Correct Answer ✔✔ the interface
d. d. d. d. d. d. d. d. d.
type and interface number.
d. d. d. d.
9) A network engineer is examining the routing table of a Cisco router. Consider the
d. d. d. d. d. d. d. d. d. d. d. d. d.
following routing table entry:
d. d. d. d.
S 10.2.2.0/30 [1/0] via 10.1.1.2, 00:00:13, Serial0/0/0
d. d. d. d. d. d.
What is the significance of the Serial0/0/0?
d. d. d. d. d. d.
A) It is the interface on the next-hop router that is directly connected to the
d. d. d. d. d. d. d. d. d. d. d. d. d.
10.2.2.0/30 network
d. d.
B) It is the interface on the next-hop router that is directly connected to the
d. d. d. d. d. d. d. d. d. d. d. d. d.
10.1.1.0/24 network.
d. d.
C) It is the R4 interface through which the OSPF update was learned
d. d. d. d. d. d. d. d. d. d. d.
D) It is the interface R4 uses to send data that is destined for 10.2.2.0/30. --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Correct Answer ✔✔ It is the interface R4 uses to send data that is destined
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
for 10.2.2.0/30. d. d.
, 10) A technician must accommodate at least 500 subnets from address 172.16.0.0/16.
d. d. d. d. d. d. d. d. d. d.
What is an appropriate subnet mask and corresponding number of available host IP
d. d. d. d. d. d. d. d. d. d. d. d. d.
addresses per subnet to meet the requirement?
d. d. d. d. d. d. d.
A) 255.255.255.128 and 126 hosts d. d. d.
B) 255.255.255.0 and 128 hosts d. d. d.
C) 255.255.255.192 and 126 hosts d. d. d.
D) 255.255.255.224 and 128 hosts -- Correct Answer ✔✔ 255.255.255.128 d. d. d. d. d. d. d. d.
and 126 hosts
d. d. d.
11) Refer to the exhibit. A PC with the MAC address of 0800.069d.3841 attached to
d. d. d. d. d. d. d. d. d. d. d. d. d.
port Fa0/8 is sending data to a device that has the MAC address of 6400.6a5a.6821.
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
What will the switch do first to handle the data transfer?
d. d. d. d. d. d. d. d. d. d. d.
A) The switch will add the address 0800.069d.3841 to the MAC address table.
d. d. d. d. d. d. d. d. d. d. d.
B) The switch will send the frame to ports Fa0/4 and Fa0/6.
d. d. d. d. d. d. d. d. d. d.
C) The switch will flood the frame out all ports except port Fa0/8.
d. d. d. d. d. d. d. d. d. d. d.
D) The switch will send the frame to port Fa0/6.
d. d. d. d. d. d. d. d.
E) The switch will add the address 6400.6151.6821 to the MAC address table.
d. d. d. d. d. d. d. d. d. d. d.
-- Correct Answer ✔✔ The switch will add the address 0800.069d.3841 to
d. d. d. d. d. d. d. d. d. d. d. d.
the MAC address table.
d. d. d. d.
Explanation: Every frame that enters a switch is checked for new information to
d. d. d. d. d. d. d. d. d. d. d. d.
learn. It does this by examining the source MAC address of the frame and port
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
number where the frame entered the switch:
d. d. d. d. d. d. d.
If the source MAC address does not exist in the MAC address table, the MAC
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
address and incoming port number are added to the table.
d. d. d. d. d. d. d. d. d. d.
12) A network engineer is giving a tour of the company network operations center to a
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
college class. The engineer is trying to describe how a WAN and connectivity to
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
the internet relate to the network infrastructure. Which statement correctly
d. d. d. d. d. d. d. d. d. d.
describes network infrastructure and network communication?
d. d. d. d. d. d.
A) Communication across the internet requires application of recognized d. d. d. d. d. d. d.
technologies and standards.
d. d. d.
B) LANs are used to connect WANs around the world. d. d. d. d. d. d. d. d.
C) A LAN connects small networks to large global networks.
d. d. d. d. d. d. d. d.