Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 2

Questions 51

Which interface is used to send traffic to the destination network?

10.90.207.87/26 [110/1912] via F0/7

10.90.207.87/26 [110/28968] via F0/6

10.90.207.87/26 [120/14] via F0/4

10.90.207.87/26 [120/11] via F0/5

Options:
A.

F0/7

B.

F0/5

C.

F0/4

D.

F0/6

Cisco 200-301 Premium Access
Questions 52

200-301 Question 52

Refer to the exhibit. What is preventing host A from reaching the internet?

Options:
A.

The domain name server is unreachable.

B.

LAN and WAN network segments are different.

C.

IP address assignment is incorrect.

D.

The default gateway should be the first usable IP address.

Questions 53

How does automation affect network management processes?

Options:
A.

It interoperates with ISE to define and manage patch and update schedules.

B.

It performs configuration updates based on user profiles.

C.

It improves the efficiency of system lifecycle management.

D.

It provides a reactive support model.

Questions 54

Drag and drop the IPv6 address from the left onto the type on the right.

200-301 Question 54

Options:
Questions 55

Which combination of methods satisfies the minimum security requirements when a new multifactor authentication solution is deployed?

Options:
A.

password of 8 to 15 characters and personal 12-diglt PIN

B.

authorized USB dongle and mobile phone

C.

fingerprint scanning and facial recognition

D.

complex password and time-based one-time password

Questions 56

200-301 Question 56

Refer to the exhibit. A guest WLAN must be created that prompts the client for a username and password on the local web page of the WLC. Which two actions must be performed on the Layer 2 tab before enabling the Authentication option on the Layer 3 tab? (Choose two.)

Options:
A.

Uncheck the WPA Policy option check box, and check the WPA2 Policy option check box.

B.

Uncheck the MAC Filtering option check box.

C.

Change the WPA Encryption option from TKIP to CCMP(128AES).

D.

Set the Security Type option to Personal.

E.

Set the Layer 2 Security option to None.

Questions 57

Drag and drop the IPv6 address from the left onto the type on the right.

200-301 Question 57

Options:
Questions 58

What is a characteristic of encryption in wireless networks?

Options:
A.

uses a unidirectional handshake for authentication

B.

Intercepts data threats before they attack a network

C.

uses integrity checks to identify forgery attacks

D.

prevents intercepted data from being easily read

Questions 59

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

Options:
A.

DHCP

B.

STP

C.

SNMP

D.

DNS

Questions 60

What are network endpoints?

Options:
A.

act as routers to connect a user to the service prowler network

B.

a threat to the network if they are compromised

C.

support inter-VLAN connectivity

D.

enforce policies for campus-wide traffic going to the internet

Questions 61

When a switch receives a frame for a known destination MAC address, how is the frame handed?

Options:
A.

sent to the port identified for the known MAC address

B.

broadcast to all ports

C.

forwarded to the first available port

D.

flooded to all ports except the one from which it originated

Questions 62

Which technology allows multiple operating systems lo run a single physical server?

Options:
A.

cloud computing

B.

virtualization

C.

application hosting

D.

containers

Questions 63

Refer to the exhibit.

200-301 Question 63

What is the metric for the route to the 192.168.10.33 host?

Options:
A.

84

B.

110

C.

192

D.

193

Questions 64

When deploying syslog, which severity level logs informational message?

Options:
A.

0

B.

2

C.

4

D.

6

Questions 65

What are two descriptions of three-tier network topologies? (Choose two)

Options:
A.

The core and distribution layers perform the same functions

B.

The access layer manages routing between devices in different domains

C.

The network core is designed to maintain continuous connectivity when devices fail.

D.

The core layer maintains wired connections for each host

E.

The distribution layer runs Layer 2 and Layer 3 technologies

Questions 66

Refer to the exhibit.

200-301 Question 66

A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server Which configuration when applied to switch A accomplishes this task?

200-301 Question 66

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 67

200-301 Question 67

Refer to the exhibit. A network engineer is configuring a wireless LAN with Web Passthrough Layer 3 Web Policy. Which action must the engineer take to complete the configuration?

Options:
A.

Set the Layer 2 Security to 802.1X.

B.

Enable TKIP and CCMP256 WPA2 Encryption.

C.

Set the Layer 2 Security to None.

D.

Enable the WPA Policy.

Questions 68

200-301 Question 68

Refer to the exhibit. During initial configuration testing, the Windows workstation PC1 cannot connect with the 172.16.2.0/24 network.

Which set of actions corrects the configuration?

Options:
A.

Change the IP address to 172.16.1.6 and change the subnet mask to 255.255.255.248.

B.

Change the IP address to 172.16.1.6 and change the DNS servers to 172.16.1.12 and 172.16.1.13.

C.

Change the IP address to 172.16.1.9 and change the default gateway to 172.16.1.7.

D.

Change the IP address to 172.16.1.9 and change the DNS server to 172.16.1.12 only.

Questions 69

What is the total number of users permitted to simultaneously browse the controller management pages when using the AireOS GUI?

Options:
A.

2

B.

5

C.

8

D.

9

Questions 70

200-301 Question 70

Refer to the exhibit. After a recent internal security audit, the network administrator decided to block all P2P-capable devices from the selected SSID. Which configuration setting must the administrator apply?

Options:
A.

Set the P2P Block Action to Drop.

B.

Select a correctly configured Layer 2 ACL.

C.

Set the Wi-Fi Direct Client Policy to Not-Allow.

D.

Set the MFP Client Protection to Required.

Questions 71

How are the switches in a spine-and-leaf topology interconnected?

Options:
A.

Each leaf switch is connected to one of the spine switches.

B.

Each leaf switch is connected to two spine switches, making a loop.

C.

Each leaf switch is connected to each spine switch.

D.

Each leaf switch is connected to a central leaf switch, then uplinked to a core spine switch.

Questions 72

200-301 Question 72

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:
A.

router D

B.

router B

C.

router C

D.

router A

Questions 73

Which action does the router take as it forwards a packet through the network?

Options:
A.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

B.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination

C.

The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination

D.

The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination

Questions 74

Which two capacities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two)

Options:
A.

adapters that support all families of Cisco IOS software

B.

SDKs that support interaction with third-party network equipment

C.

customized versions for small, medium, and large enterprises

D.

REST APIs that allow for external applications to interact natively with Cisco DNA Center

E.

modular design that is upgradable as needed

Questions 75

Refer to the exhibit.

200-301 Question 75

Which switch becomes the root bridge?

Options:
A.

S1

B.

S2

C.

S3

D.

S4

Questions 76

Which device performs stateful inspection of traffic?

Options:
A.

firewall

B.

switch

C.

access point

D.

wireless controller

Questions 77

Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)

Options:
A.

OSPF area

B.

OSPF MD5 authentication key

C.

iPv6 address

D.

OSPf process ID

E.

OSPf stub flag

Questions 78

Which type of address is the public IP address of a NAT device?

Options:
A.

outside global

B.

outsdwde local

C.

inside global

D.

insride local

E.

outside public

F.

inside public

Questions 79

An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?

Options:
A.

logging trap 5

B.

logging trap 2

C.

logging trap 4

D.

logging trap 3

Questions 80

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:
A.

Provide uninterrupted forwarding service.

B.

Police traffic that is sent to the edge of the network.

C.

Provide direct connectivity for end user devices.

D.

Ensure timely data transfer between layers.

E.

Inspect packets for malicious activity.

Questions 81

What is a DNS lookup operation?

Options:
A.

DNS server pings the destination to verify that it is available

B.

serves requests over destination port 53

C.

DNS server forwards the client to an alternate IP address when the primary IP is down

D.

responds to a request for IP address to domain name resolution to the DNS server

Questions 82

Refer to Exhibit.

200-301 Question 82

The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)

Options:
A.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::3/128 2023::3

C.

ipv6 route 2000::3/128 s0/0/0

D.

ipv6 route 2000::1/128 2012::2

E.

ipv6 route 2000::1/128 s0/0/1

Questions 83

Drag and drop the SNMP components from the left onto the descriptions on the right.

200-301 Question 83

Options:
Questions 84

Which command on a port enters the forwarding state immediately when a PC is connected to it?

Options:
A.

switch(config)#spanning-tree portfast default

B.

switch(config)#spanning-tree portfast bpduguard default

C.

switch(config-if)#spanning-tree portfast trunk

D.

switch(config-if)#no spanning-tree portfast

Questions 85

An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured Drag and drop the configuration commands from the left into the correct sequence on the right Not all commands are used

200-301 Question 85

Options:
Questions 86

Refer to the exhibit.

200-301 Question 86

How does the router manage traffic to 192.168.12.16?

Options:
A.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

C.

it load-balances traffic between all three routes

D.

It chooses the EIGRP route because it has the lowest administrative distance

Questions 87

Which IPv6 address block sends packets to a group address rather than a single address?

Options:
A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Questions 88

Drag and drop the network protocols from the left onto the correct transport services on the right.

200-301 Question 88

Options:
Questions 89

What is the purpose of traffic shaping?

Options:
A.

to mitigate delays over slow links

B.

to provide fair queuing for buffered flows

C.

to limit the bandwidth that a flow can use to

D.

be a marking mechanism that identifies different flows

Questions 90

Refer to the exhibit.

200-301 Question 90

Which two commands, when configured on router R1, fulfill these requirements? (Choose two.)

Packets towards the entire network 2001:db8:2::/64 must be forwarded through router R2.

Packets toward host 2001:db8:23::14 preferably must be forwarded through R3.

Options:
A.

Ipv6 route 2001:db8:23::/128 fd00:12::2

B.

Ipv6 route 2001:db8:23::14/128 fd00:13::3

C.

Ipv6 route 2001:db8:23::14/64 fd00:12::2

D.

Ipv6 route 2001:db8:23::/64 fd00:12::2

E.

Ipv6 route 2001:db8:23::14/64 fd00:12::2 200

Questions 91

What is an advantage of Cisco DNA Center versus traditional campus device management?

Options:
A.

It supports numerous extensibility options including cross-domain adapters and third-party SDKs.

B.

It supports high availability for management functions when operating in cluster mode.

C.

It enables easy autodiscovery of network elements m a brownfield deployment.

D.

It is designed primarily to provide network assurance.

Questions 92

A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?

Options:
A.

Clock timezone

B.

Clock summer-time-recurring

C.

Clock summer-time date

D.

Clock set

Questions 93

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two )

Options:
A.

interface GigabitEthernet0/0/1channel-group 10 mode on

B.

interface GigabitEthernet0/0/1channel-group 10 mode active

C.

interface GigabitEthernet0/0/1channel-group 10 mode auto

D.

interface port-channel 10switchportswitchport mode trunk

E.

interface port-channel 10no switchportip address 172.16.0.1.255.255.255.0

Questions 94

What is a DHCP client?

Options:
A.

a workstation that requests a domain name associated with its IP address

B.

a host that is configured to request an IP address automatically

C.

a server that dynamically assigns IP addresses to hosts.

D.

a router that statically assigns IP addresses to hosts.

Questions 95

What are two functions of a server on a network? (Choose two)

Options:
A.

achieves redundancy by exclusively using virtual server clustering

B.

runs applications that send and retrieve data for workstations that make requests

C.

handles requests from multiple workstations at the same time

D.

runs the same operating system in order to communicate with other servers

E.

housed solely in a data center that is dedicated to a single client

Questions 96

When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?

Options:
A.

default-router

B.

default-gateway

C.

ip helper-address

D.

dns-server

Questions 97

Refer to the exhibit.

200-301 Question 97

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

Options:
A.

interface gi0/1no cdp enable

B.

interface gi0/1clear cdp table

C.

interface gi0/0no cdp advertise-v2

D.

interface gi0/0no cdp run

Questions 98

Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.

200-301 Question 98

Options:
Questions 99

Which mode allows access points to be managed by Cisco Wireless LAN Controllers?

Options:
A.

autonomous

B.

lightweight

C.

bridge

D.

mobility express

Questions 100

Which option about JSON is true?

Options:
A.

uses predefined tags or angle brackets () to delimit markup text

B.

used to describe structured data that includes arrays

C.

used for storing information

D.

similar to HTML, it is more verbose than XML

Exam Code: 200-301
Certification Provider: Cisco
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: Oct 31, 2025
Questions: 1197