Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers

Questions 1

200-301 Question 1

Refer to the exhibit. VLAN 23 is being implemented between SW1 and SW2. The command show interface ethernet0/0 switchport has been issued on SW1. Ethernet0/0 on SW1 is the uplink to SW2. Which command when entered on the uplink interface allows PC 1 and PC 2 to communicate without impact to the communication between PC 11 and PC 12?

Options:
A.

switchport trunk allowed vlan 2-1001

B.

switchport trunk allowed vlan add 23

C.

switchport trunk allowed vlan 23

D.

switchport trunk allowed vlan 22-23

Cisco 200-301 Premium Access
Questions 2

200-301 Question 2

Refer to the exhibit. Which two commands, when configured on router R1. fulfill these requirements? (Choose two.) ' Packets toward the entire network 2001:db8:23: :/64 must be forwarded through router R2. ' Packets toward host 2001: db8:23::14 preferably must be forwarded through R3.

Options:
A.

ipv6 route 2001:db8:23: :/128 fd00:12::2

B.

Ipv6 route 2001:db8:23::14/128 fd00:13::3

C.

ipv6 route 2001:db8:23::14/64 fd00:12::2 200

D.

ipv6 route 2001:db8:23: l4/64 fd00:12::2

E.

ipv6 route 2001:db8:23: :/64 fd00:12::2

Questions 3

Which security element uses a combination of one-time passwords, a login name, and a personal smartphone?

Options:
A.

software-defined segmentation

B.

multifactor authentication

C.

attribute-based access control

D.

rule-based access control

Questions 4

What is represented in line 3 within this JSON schema?

200-301 Question 4

Options:
A.

object

B.

key

C.

array

D.

value

Questions 5

What is a characteristic of a Layer 2 switch?

Options:
A.

Maintains stateful transaction information

B.

Responsible for sending data in a particular sequence

C.

Makes forwarding decisions based on MAC addresses

D.

Filters based on a transport layer protocol

Questions 6

200-301 Question 6

Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?

Options:
A.

GigabitEthernet1/0

B.

GigabitEthernet0/0

C.

GigabitEthernet2/0

D.

Null0

Questions 7

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

200-301 Question 7

Options:
Questions 8

Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.

200-301 Question 8

Options:
Questions 9

What is a characteristic of private IPv4 addressing?

Options:
A.

Reduces the forwarding table on network routers

B.

Used on the external interface of a firewall

C.

Used by ISPs when only one IP is needed to connect to the internet

D.

Address space which is isolated from the internet

Questions 10

How does automation leverage data models to reduce the operational complexity of a managed network?

Options:
A.

Reduces the response time for specific requests to devices with many interfaces

B.

Categorizes traffic and provides insights

C.

Allows the controller to be vendor-agnostic

D.

Streamlines monitoring using SNMP and other polling tools

Questions 11

Which type of protocol is VRRP?

Options:
A.

uses dynamic IP address assignment

B.

allows two or more routers to act as a default gateway

C.

uses a destination IP address 224.0.0.102 for router-to-router communication

D.

uses Cisco-proprietary First Hop Redundancy Protocol

Questions 12

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

200-301 Question 12

Options:
Questions 13

Aswitch receives a frame with the destination MAC address 3C:5D: 7E:9F: 1A:2B.

Switch# show ethernet-frame-and-mac-address-table

200-301 Question 13

How does the switch handle the frame?

Options:
A.

It ages out the frame until the MAC address becomes known.

B.

It drops the frame to avoid unnecessary network congestion.

C.

It switches the frame to a predetermined port based on settings.

D.

It floods the frame to all ports except the incoming port.

Questions 14

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

200-301 Question 14 200-301 Question 14

Options:
Questions 15

Which statement describes virtualization on containers?

Options:
A.

It is a type of operating system virtualization that allows the host operating system to control the different CPU memory processes.

B.

It emulates a physical computer and enables multiple machines to run with many operating systems on a physical machine.

C.

It separates virtual machines from each other and allocates memory, processors, and storage to compute.

D.

It contains a guest operating system and virtual partition of hardware for OS and requires application libraries.

Questions 16

Which key function is provided by the data plane?

Options:
A.

Making routing decisions

B.

Originating packets

C.

Forwarding traffic to the next hop

D.

Exchanging routing table data

Questions 17

What is a function of a northbound API in an SDN environment?

Options:
A.

It supports distributed processing for configuration.

B.

It relies on global provisioning and configuration.

C.

It upgrades software and restores files.

D.

It provides orchestration and network automation services.

Questions 18

200-301 Question 18

Refer to the exhibit. An administrator must connect SW_1 and the printer to the network. SW_2 requires DTP to be used for the connection to SW_1. The printer is configured as an access port with VLAN 5. Which set of commands completes the connectivity?

Options:
A.

switchport mode dynamic autoswitchport private-vlan association host 5

B.

switchport mode dynamic autoswitchport trunk encapsulation negotiate

C.

switchport mode dynamic desirableswitchport trunk allowed vlan add 5

D.

switchport mode trunkswitchport trunk pruning vlan add 5

Questions 19

Which statement describes virtual machines?

Options:
A.

They include a guest OS and the service.

B.

They enable the network to become agile and hardware-centric.

C.

They use a supervisor to provide management for services.

D.

They facilitate local management of infrastructure devices.

Questions 20

A network security team noticed that an increasing number of employees are becoming victims of phishing attacks. Which security program should be implemented to mitigate the problem?

Options:
A.

Physical access control

B.

Software firewall enabled on all PCs

C.

Email system patches

D.

User awareness training

Questions 21

Refer to the exhibit.

200-301 Question 21

Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?

Options:
A.

heavy traffic congestion

B.

a duplex incompatibility

C.

a speed conflict

D.

queuing drops

Questions 22

Which header must be included in a REST request from an application that requires JSON-formatted content?

Options:
A.

Content-Type: application/json

B.

Accept-Encoding: application/json

C.

Accept: application/json

D.

Accept-Language: application/json

Questions 23

What are two benefits of private IPv4 addressing? (Choose two.)

Options:
A.

provides external internet network connectivity

B.

provides unlimited address ranges

C.

propagates routing information to WAN links

D.

reuses addresses at multiple sites

E.

conserves globally unique address space

Questions 24

Which technology allows for logical Layer 3 separation on physical network equipment?

Options:
A.

Virtual Route Forwarding

B.

Virtual Switch System

C.

IPsec Transport Mode

D.

Time Division Multiplexer

Questions 25

200-301 Question 25

Refer to the exhibit.

Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?

Options:
A.

Disable WPA Policy and WPA Encryption and then enable PSK using ASCII.

B.

Enable PSK and FT PSK and then disable WPA Policy.

C.

Disable WPA Encryption and then enable FT PSK.

D.

Enable PSK using Hex format and then disable WPA Policy.

Questions 26

200-301 Question 26

200-301 Question 26

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:
Questions 27

200-301 Question 27

Refer to the exhibit.

How does router R1 forward packets destined to 10.0.4.10?

Options:
A.

via 10.0.4.2

B.

via 10.0.0.2

C.

via FastEthernet0/1

D.

via FastEthernet1/1

Questions 28

Which default condition must be considered when an encrypted mobility tunnel is used between two Cisco WLCs?

Options:
A.

TCP port 443 and UDP 21 are used.

B.

Control and data traffic encryption are enabled.

C.

The tunnel uses the IPsec protocol for encapsulation.

D.

The tunnel uses the EolP protocol to transmit data traffic.

Questions 29

Refer to the exhibit.

200-301 Question 29

Of the routes learned with dynamic routing protocols, which has the least preferred metric?

Options:
A.

Local

B.

EIGRP

C.

OSPF

D.

RIP

Questions 30

200-301 Question 30

Refer to the exhibit. Which tasks must be performed on the Download File tab to install new software using TCP port 22?)

Options:
A.

Set the File Type to Code, set the Transfer Mode to SFTP, and specify the IP address of the WLC.

B.

Set the File Type to Configuration, set the Transfer Mode to FTP, and specify the IP address of the file server.

C.

Set the File Type to Code, set the Transfer Mode to SFTP, and specify the IP address of the file server.

D.

Set the File Type to Configuration, set the Transfer Mode to SFTP, and specify the IP address of the WLC.

Questions 31

What is a characteristic of private IPv4 addressing?

Options:
A.

traverses the Internet when an outbound ACL Is applied

B.

used without allocation from a regional Internet authority

C.

shared address space between an ISP and subscriber

D.

reduces the need for isolated networks

Questions 32

200-301 Question 32

Refer to the exhibit. The routers R1-LAB and R2-LAB are configured with link-local addresses. What command must be applied to interface Gi0/0 on R1-LAB for an automated address self-assignment on the IPv6 network?

Options:
A.

ipv6 address 2001:db8:1:0FFA:0::/64

B.

ipv6 address 2001:db8:0:0FFA::1/64

C.

ipv6 address 2001:db8:0:0FFA::/64 eui-64

D.

ipv6 address 2001:db8:0:0FFA::/64 anycast

Questions 33

Which role do predictive Al models play in network load balancing?

Options:
A.

They anticipate future traffic spikes.

B.

They assign IP addresses to devices.

C.

They select correct cabling types for deployment.

D.

They solely monitor historical traffic volumes.

Questions 34

How does a network administrator securely manage an AP in lightweight mode?

Options:
A.

using the CLI via an out-of-band connection

B.

using the WLC GUI via HTTPS

C.

using the AP GUI via an in-band SSH connection

D.

using the CLI via a virtual interface with SSH

Questions 35

How does MAC learning function?

Options:
A.

rewrites the source and destination MAC address

B.

adds unknown source MAC addresses to the CAM table

C.

sends the frame back to the source to verify availability

D.

drops received MAC addresses not listed in the address table

Questions 36

How does MAC learning function?

Options:
A.

Sends frames with unknown destinations to a multicast group.

B.

Increases security on the management VLAN.

C.

Rewrites the source and destination MAC address.

D.

Associates the MAC address with the port on which it is received.

Questions 37

200-301 Question 37

Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?

Options:
A.

0.0.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.255

Questions 38

Which two northbound APIs are found in a software-defined network? (Choose two.)

Options:
A.

OpenFlow

B.

REST

C.

OpFlex

D.

SOAP

E.

NETCONF

Questions 39

Which fact must the engineer consider when implementing syslog on a new network?

Options:
A.

Syslog defines the software or hardware component that triggered the message.

B.

There are 16 different logging levels (0-15).

C.

By default, all message levels are sent to the syslog server.

D.

The logging level defines the severity of a particular message.

Questions 40

200-301 Question 40

Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:

    Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.

    Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.

Which two actions meet these requirements? (Choose two.)

Options:
A.

Enable the Aironet IE option.

B.

Enable the Coverage Hole Detection option.

C.

Set the MFP Client Protection option to Required

D.

Enable the client band select option.

E.

Enable the allow AAA Override option

Questions 41

What is the main capability of multifactor authentication?

Options:
A.

Identifying permissions for end users using three authentication factors

B.

Authenticating and authorizing end users using two authentication factors

C.

Confirming end-user identity using two or more authentication factors

D.

Verifying end-user access permissions using two authentication factors

Questions 42

What differentiates the TCP and UDP protocols?

Options:
A.

TCP tracks segments being transmitted or received by assigning segment numbers, and UDP adjusts data flow according to network conditions.

B.

TCP establishes a connection with the device on the other end before transferring, and UDP transfers without establishing a connection.

C.

TCP sends data at a constant rate with error checking on upper protocol layers, and UDP provides error-checking and sequencing.

D.

TCP immediately transmits data without waiting for a handshake, and UDP awaits a response from the receiver before sending additional data.

Questions 43

What is a characteristic of an SSID in wireless networks?

Options:
A.

provides protection against spyware

B.

eliminates network piggybacking

C.

associates a name to a wireless network

D.

allows easy file sharing between endpoints

Questions 44

Which interface is used to send traffic to the destination network?

10.249.210.56/25 [90/6144] via G0/15

10.249.210.56/25 [90/45053] via G0/13

10.249.210.56/25 [110/3693] via G0/16

10.249.210.56/25 [110/360] via G0/12

Options:
A.

G0/16

B.

G0/15

C.

G0/13

D.

G0/12

Questions 45

Which feature, when used on a WLC, allows it to bundle its distribution system ports into one 802.3ad group?

Options:
A.

QinQ

B.

ISL

C.

PAgP

D.

LAG

Questions 46

Refer to the exhibit.

200-301 Question 46

An engineer must document all Wi-Fi services on a new wireless LAN controller. The Wi-Fi SSID "Office_WLan" has Layer 2 Security. What is determined by this configuration?

Options:
A.

There is a strong mutual authentication used between NAC and the network devices using x.509 standard.

B.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network.

C.

There is a robust security mechanism configured to protect against various Layer 2 and Layer 3 attacks.

D.

There is Galois cache algorithm configured that provides strong encryption and authentication.

Questions 47

Refer to the exhibit.

200-301 Question 47

The LACP EtherChannel is configured, and the last change is to modify the interfaces on SwitchA to respond to packets received, but not to initiate negotiation. The interface range gigabitethernet0/0-15 command is entered. What must be configured next?

Options:
A.

SwitchA(config-if-range) #channel-group 1 mode desirable

B.

SwitchA(config-if-range) #channel-group 1 mode auto

C.

SwitchA(config-if-range) #channel-group 1 mode active

D.

SwitchA(config-if-range) #channel-group 1 mode passive

Questions 48

What is a reason to implement HSRP on a network?

Options:
A.

to Identify the closest hop to the default gateway In a LAN network

B.

to provide load balancing over multiple gateways in a LAN network

C.

to optimally route traffic based on the forwarding capacity of the edge routing devices in the LAN network

D.

to ensure that user traffic in a LAN rapidly recovers from the failure of an edge routing device

Questions 49

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

200-301 Question 49 200-301 Question 49

Options:
Questions 50

Which QoS feature drops traffic that exceeds the committed access rate?

Options:
A.

Shaping

B.

Policing

C.

Weighted fair queuing

D.

FIFO

Exam Code: 200-301
Certification Provider: Cisco
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: Oct 31, 2025
Questions: 1197