CCNA 200-301 PRACTICE EXAM QUESTIONS WITH 100%
ACCURATE SOLUTIONS.
1) Which data format is the following snippet in?
d. d. d. d. d. d. d.
<root>
<message>success</message>
<timestamp>1560789260</timestamp><iss_position>
d.
<latitude>25.9990</latitude>
<longitude>-132.6992</longitude> </iss_position> d.
</root> -- Answer ✔✔ XML d. d. d. d.
2) A virus has replicated itself throughout systems it has infected and is executing its
d. d. d. d. d. d. d. d. d. d. d. d. d.
payload. Which of the following phases of the virus life cycle is this virus in? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Launch
d. d. d.
3) Which switching network type allows data connections that can be initiated when
d. d. d. d. d. d. d. d. d. d. d.
needed and terminated when communication is complete? -- Answer ✔✔ Circuit
d. d. d. d. d. d. d. d. d. d. d.
4) JSON is an easy to read data format that is used by applications for storing and
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
reading data. Which of the following describes the syntax for a JSON object? (Select
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
two.) -- Answer ✔✔ Keys and values are separated by a colon.
d. d. d. d. d. d. d. d. d. d. d. d.
Keys must be strings within double quotation marks (" ").
d. d. d. d. d. d. d. d. d.
5) Your network has been assigned 168.11.0.0 as the network address. You have
d. d. d. d. d. d. d. d. d. d. d.
determined that you need 70 subnets.
d. d. d. d. d. d.
Which subnet mask value should you select to provide 70 subnets? -- Answer ✔✔
d. d. d. d. d. d. d. d. d. d. d. d. d.
255.255.254.0
d.
, 6) Jaden is the network engineer at a branch office. There are non-Cisco devices on the
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
network that Jaden would like to make sure are discovered by the Cisco router.
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Jaden has just enabled the Link Layer Discovery Protocol (LLDP) on the router.
d. d. d. d. d. d. d. d. d. d. d. d. d.
Which of the following is true about LLDP? -- Answer ✔✔ Configured on a per-
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
interface basis. d.
7) Which two of the following statements accurately describe half-duplex Ethernet?
d. d. d. d. d. d. d. d. d.
(Select two.) -- Answer ✔✔ It sends both signals along the same wire.
d. d. d. d. d. d. d. d. d. d. d. d. d.
It uses collision detection and recovery.
d. d. d. d. d.
8) What is the backoff on an Ethernet network? -- Answer ✔✔ The random amount of
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
time a device waits before retransmitting after a collision.
d. d. d. d. d. d. d. d. d.
9) Queue schedulers are used for congestion management and define how a device will
d. d. d. d. d. d. d. d. d. d. d. d.
work through its queue.
d. d. d. d.
Match the names of the most commonly used queue schedulers on the left with
d. d. d. d. d. d. d. d. d. d. d. d. d.
the appropriate description on the right. (Each name can only be used once.) --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Weighted Round Robin - Labels one queue as priority.
d. d. d. d. d. d. d. d. d. d. d.
Round Robin - Rotates through... d. d. d. d.
Class-Based Weighted Fair Queuing - Mini bandwidth d. d. d. d. d. d.
10) You are the network administrator for a city library. Throughout the library are
d. d. d. d. d. d. d. d. d. d. d. d.
several groups of computers that provide public access to the internet. Supervision
d. d. d. d. d. d. d. d. d. d. d. d.
of these computers has been difficult. You've had problems with patrons bringing
d. d. d. d. d. d. d. d. d. d. d. d.
personal laptops into the library and disconnecting the network cables from the
d. d. d. d. d. d. d. d. d. d. d. d.
library computers to connect their laptops to the internet.
d. d. d. d. d. d. d. d. d.
The library computers are in groups of four. Each group of four computers is
d. d. d. d. d. d. d. d. d. d. d. d. d.
connected to a hub that is connected to the library network through an access
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
port on a switch. You want to restrict access to the network so only the library
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
computers are permitted connectivity to the internet.
d. d. d. d. d. d. d.
What can you do? -- Answer ✔✔ Configure port security on the switch.
d. d. d. d. d. d. d. d. d. d. d. d.
11) Which wireless networking component is used to connect multiple APs together? --
d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ DS
d. d. d.
ACCURATE SOLUTIONS.
1) Which data format is the following snippet in?
d. d. d. d. d. d. d.
<root>
<message>success</message>
<timestamp>1560789260</timestamp><iss_position>
d.
<latitude>25.9990</latitude>
<longitude>-132.6992</longitude> </iss_position> d.
</root> -- Answer ✔✔ XML d. d. d. d.
2) A virus has replicated itself throughout systems it has infected and is executing its
d. d. d. d. d. d. d. d. d. d. d. d. d.
payload. Which of the following phases of the virus life cycle is this virus in? --
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Launch
d. d. d.
3) Which switching network type allows data connections that can be initiated when
d. d. d. d. d. d. d. d. d. d. d.
needed and terminated when communication is complete? -- Answer ✔✔ Circuit
d. d. d. d. d. d. d. d. d. d. d.
4) JSON is an easy to read data format that is used by applications for storing and
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
reading data. Which of the following describes the syntax for a JSON object? (Select
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
two.) -- Answer ✔✔ Keys and values are separated by a colon.
d. d. d. d. d. d. d. d. d. d. d. d.
Keys must be strings within double quotation marks (" ").
d. d. d. d. d. d. d. d. d.
5) Your network has been assigned 168.11.0.0 as the network address. You have
d. d. d. d. d. d. d. d. d. d. d.
determined that you need 70 subnets.
d. d. d. d. d. d.
Which subnet mask value should you select to provide 70 subnets? -- Answer ✔✔
d. d. d. d. d. d. d. d. d. d. d. d. d.
255.255.254.0
d.
, 6) Jaden is the network engineer at a branch office. There are non-Cisco devices on the
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
network that Jaden would like to make sure are discovered by the Cisco router.
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Jaden has just enabled the Link Layer Discovery Protocol (LLDP) on the router.
d. d. d. d. d. d. d. d. d. d. d. d. d.
Which of the following is true about LLDP? -- Answer ✔✔ Configured on a per-
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
interface basis. d.
7) Which two of the following statements accurately describe half-duplex Ethernet?
d. d. d. d. d. d. d. d. d.
(Select two.) -- Answer ✔✔ It sends both signals along the same wire.
d. d. d. d. d. d. d. d. d. d. d. d. d.
It uses collision detection and recovery.
d. d. d. d. d.
8) What is the backoff on an Ethernet network? -- Answer ✔✔ The random amount of
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
time a device waits before retransmitting after a collision.
d. d. d. d. d. d. d. d. d.
9) Queue schedulers are used for congestion management and define how a device will
d. d. d. d. d. d. d. d. d. d. d. d.
work through its queue.
d. d. d. d.
Match the names of the most commonly used queue schedulers on the left with
d. d. d. d. d. d. d. d. d. d. d. d. d.
the appropriate description on the right. (Each name can only be used once.) --
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ Weighted Round Robin - Labels one queue as priority.
d. d. d. d. d. d. d. d. d. d. d.
Round Robin - Rotates through... d. d. d. d.
Class-Based Weighted Fair Queuing - Mini bandwidth d. d. d. d. d. d.
10) You are the network administrator for a city library. Throughout the library are
d. d. d. d. d. d. d. d. d. d. d. d.
several groups of computers that provide public access to the internet. Supervision
d. d. d. d. d. d. d. d. d. d. d. d.
of these computers has been difficult. You've had problems with patrons bringing
d. d. d. d. d. d. d. d. d. d. d. d.
personal laptops into the library and disconnecting the network cables from the
d. d. d. d. d. d. d. d. d. d. d. d.
library computers to connect their laptops to the internet.
d. d. d. d. d. d. d. d. d.
The library computers are in groups of four. Each group of four computers is
d. d. d. d. d. d. d. d. d. d. d. d. d.
connected to a hub that is connected to the library network through an access
d. d. d. d. d. d. d. d. d. d. d. d. d. d.
port on a switch. You want to restrict access to the network so only the library
d. d. d. d. d. d. d. d. d. d. d. d. d. d. d. d.
computers are permitted connectivity to the internet.
d. d. d. d. d. d. d.
What can you do? -- Answer ✔✔ Configure port security on the switch.
d. d. d. d. d. d. d. d. d. d. d. d.
11) Which wireless networking component is used to connect multiple APs together? --
d. d. d. d. d. d. d. d. d. d. d.
Answer ✔✔ DS
d. d. d.