Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 3

Questions 101

Which two outcomes are predictable behaviors for HSRP? (Choose two.)

Options:
A.

The two routers synchronize configurations to provide consistent packet forwarding

B.

The two routers negotiate one router as the active router and the other as the standby router

C.

Each router has a different IP address, both routers act as the default gateway on the LAN, and traffic is load-balanced between them

D.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN

E.

The two routers share the same interface IP address and default gateway traffic is load-balanced between them

Cisco 200-301 Premium Access
Questions 102

When implementing a router as a DHCP server, which two features must be configured'? (Choose two)

Options:
A.

relay agent information

B.

database agent

C.

address pool

D.

smart-relay

E.

manual bindings

Questions 103

Drag and drop the SNMP manager and agent identifier commands from the left onto the functions on the right

200-301 Question 103

Options:
Questions 104

Which technology is appropriate for communication between an SDN controller and applications running over the network?

Options:
A.

OpenFlow

B.

REST API

C.

NETCONF

D.

Southbound API

Questions 105

Which configuration ensures that the switch is always the root for VLAN 750?

Options:
A.

Switch(config)#spanning-tree vlan 750 priority 38003685

B.

Switch(config)#spanning-tree vlan 750 root primary

C.

Switch(config)#spanning-tree vlan 750 priority 614440

D.

Switch(config)#spanning-tree vlan 750 priority 0

Questions 106

Refer to the exhibit.

200-301 Question 106

What is the result if Gig1/11 receives an STP BPDU?

Options:
A.

The port transitions to STP blocking

B.

The port transitions to the root port

C.

The port immediately transitions to STP forwarding.

D.

The port goes into error-disable state

Questions 107

What criteria is used first during me root port selection process?

Options:
A.

local port ID

B.

lowest path cost to the root bridge

C.

lowest neighbor's bridge ID

D.

lowest neighbor's port ID

Questions 108

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

Options:
A.

TCP uses synchronization packets, and UDP uses acknowledgment packets.

B.

UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits

C.

UDP provides reliable message transfer and TCP is a connectionless protocol

D.

TCP uses the three-way handshake and UDP does not guarantee message delivery

Questions 109

Refer to the exhibit.

200-301 Question 109

Which outcome is expected when PC_A sends data to PC_B?

Options:
A.

The switch rewrites the source and destination MAC addresses with its own.

B.

The source MAC address is changed.

C.

The source and destination MAC addresses remain the same.

D.

The destination MAC address is replaced with ffff.ffff.ffff.

Questions 110

What does a switch use to build its MAC address table?

Options:
A.

VTP

B.

DTP

C.

egress traffic

D.

ingress traffic

Questions 111

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

Options:
A.

CPU ACL

B.

TACACS

C.

Flex ACL

D.

RADIUS

Questions 112

Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable

What is the result of this configuration?

Options:
A.

The link is in a down state.

B.

The link is in an error disables state

C.

The link is becomes an access port.

D.

The link becomes a trunk port.

Questions 113

What are two functions of an SDN controller? (Choose two)

Options:
A.

Layer 2 forwarding

B.

coordinating VTNs

C.

tracking hosts

D.

managing the topology

E.

protecting against DDoS attacks

Questions 114

What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)

Options:
A.

serves as the network aggregation point

B.

provides a boundary between Layer 2 and Layer 3 communications

C.

designed to meet continuous, redundant uptime requirements

D.

is the backbone for the network topology

E.

physical connection point for a LAN printer

Questions 115

How is the native VLAN secured in a network?

Options:
A.

separate from other VLANs within the administrative domain

B.

give it a value in the private VLAN range

C.

assign it as VLAN 1

D.

configure it as a different VLAN ID on each end of the link

Questions 116

A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software which is only used occasionally Which cloud service model does the engineer recommend?

Options:
A.

infrastructure-as-a-service

B.

platform-as-a-service

C.

business process as service to support different types of service

D.

software-as-a-service

Questions 117

What is a characteristic of cloud-based network topology?

Options:
A.

wireless connections provide the sole access method to services

B.

onsite network services are provided with physical Layer 2 and Layer 3 components

C.

services are provided by a public, private, or hybrid deployment

D.

physical workstations are configured to share resources

Questions 118

What software defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?

Options:
A.

data plane

B.

control plane

C.

policy plane

D.

management plane

Questions 119

What facilitates a Telnet connection between devices by entering the device name?

Options:
A.

SNMP

B.

DNS lookup

C.

syslog

D.

NTP

Questions 120

Which type of attack can be mitigated by dynamic ARP inspection?

Options:
A.

worm

B.

malware

C.

DDoS

D.

man-in-the-middle

Questions 121

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

Options:
A.

platform-as-a-service

B.

software-as-a-service

C.

network-as-a-service

D.

infrastructure-as-a-service

Questions 122

Which network allows devices to communicate without the need to access the Internet?

Options:
A.

1729.0.0/16

B.

172.28.0.0/16

C.

192.0.0.0/8

D.

209.165.201.0/24

Questions 123

What is a DHCP client?

Options:
A.

a host that is configured to request an IP address automatically

B.

a server that dynamically assigns IP addresses to hosts

C.

a workstation that requests a domain name associated with its IP address

D.

a rooter that statically assigns IP addresses to hosts

Questions 124

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)

Options:
A.

listening

B.

blocking

C.

forwarding

D.

learning

E.

speaking

Questions 125

Which CRUD operation modifies an existing table or view?

Options:
A.

read

B.

create

C.

replace

D.

update

Questions 126

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)

Options:
A.

5GHz provides increased network capacity with up to 23 nonoveriapping channels.

B.

For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.

C.

5GHz channel selection requires an autonomous access point.

D.

Adjacent cells with overlapping channels use a repeater access point.

E.

Cells that overlap one another are configured to use nonoveriapping channels.

Questions 127

What is the purpose of using First Hop Redundancy Protocol in a specific subnet?

Options:
A.

Filter traffic based on destination IP addressing

B.

Sends the default route to the hosts on a network

C.

ensures a loop-free physical topology

D.

forwards multicast hello messages between routers

Questions 128

200-301 Question 128

Refer to the exhibit Router R1 Fa0/0 is unable to ping router R3 Fa0'1. Which action must be taken in router R1 to help resolve the configuration issue?

Options:
A.

set the default network as 20.20.20.0/24

B.

set the default gateway as 20.20.20.2

C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network

D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

Questions 129

Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?

Options:
A.

lldp timer

B.

lldp holdtimt

C.

lldp reinit

D.

lldp tlv-select

Questions 130

Refer to the exhibit.

200-301 Question 130

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Options:
A.

the path through R1, because the OSPF administrative distance is 110

B.

the path through R2. because the IBGP administrative distance is 200

C.

the path through R2 because the EBGP administrative distance is 20

D.

the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP

Questions 131

When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?

Options:
A.

spanning -tree vlan 200 priority 614440

B.

spanning -tree vlan 200 priority 38572422

C.

spanning -tree vlan 200 priority 0

D.

spanning -tree vlan 200 root primary

Questions 132

Which switch technology establishes a network connection immediately when it is plugged in?

Options:
A.

PortFast

B.

BPDU guard

C.

UplinkFast

D.

BackboneFast

Questions 133

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

Options:
A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Questions 134

Which technology is used to improve web traffic performance by proxy caching?

Options:
A.

WSA

B.

Firepower

C.

ASA

D.

FireSIGHT

Questions 135

Which 802.11 management frame type is sent when a client roams between access points on the same SSID?

Options:
A.

Reassociation Request

B.

Probe Request

C.

Authentication Request

D.

Association Request

Questions 136

Drag and drop the AAA functions from the left onto the correct AAA services on the right

200-301 Question 136

Options:
Questions 137

Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used

200-301 Question 137

Options:
Questions 138

What are two roles of Domain Name Services (DNS)? (Choose Two)

Options:
A.

builds a flat structure of DNS names for more efficient IP operations

B.

encrypts network Traffic as it travels across a WAN by default

C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

D.

enables applications to identify resources by name instead of IP address

E.

allows a single host name to be shared across more than one IP address

Questions 139

Which protocol is used for secure remote CLI access?

Options:
A.

HTTPS

B.

HTTP

C.

Telnet

D.

SSH

Questions 140

Refer to the exhibit.

200-301 Question 140

Which two commands when used together create port channel 10? (Choose two.)

Options:
A.

int range g0/0-1channel-group 10 mode active

B.

int range g0/0-1 chanm.l-group 10 mode desirable

C.

int range g0/0-1channel-group 10 mode passive

D.

int range g0/0-1 channel-group 10 mode auto

E.

int range g0/0-1 channel-group 10 mode on

Questions 141

Refer to the exhibit.

200-301 Question 141

Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?

Options:
A.

10.10.10.5

B.

10.10.11.2

C.

10.10.12.2

D.

10.10.10.9

Questions 142

Refer to the exhibit.

200-301 Question 142

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:
A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Questions 143

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

Options:
A.

2000::/3

B.

2002::5

C.

FC00::/7

D.

FF02::1

E.

FF02::2

Questions 144

What is the difference between IPv6 unicast and anycast addressing?

Options:
A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Questions 145

Refer to the exhibit.

200-301 Question 145

Which plan must be Implemented to ensure optimal QoS marking practices on this network?

Options:
A.

As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer.

B.

Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2.

C.

Remark traffic as it traverses R1 and trust all markings at the access layer.

D.

As traffic enters from the access layer on SW1 and SW2. trust all traffic markings.

Questions 146

Refer to the exhibit.

200-301 Question 146

The link between PC1 and the switch is up. but it is performing poorly. Which interface condition is causing the performance problem?

Options:
A.

There is a duplex mismatch on the interface

B.

There is an issue with the fiber on the switch interface.

C.

There is a speed mismatch on the interface.

D.

There is an interface type mismatch

Questions 147

Refer to the exhibit.

200-301 Question 147

The following must be considered:

• SW1 is fully configured for all traffic

• The SW4 and SW9 links to SW1 have been configured

• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured

• The remaining switches have had all VLANs adde d to their VLAN database

Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?

A)

200-301 Question 147

B)

200-301 Question 147

C)

200-301 Question 147

D)

200-301 Question 147

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 148

What is a requirement when configuring or removing LAG on a WLC?

Options:
A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Questions 149

Refer to the exhibit.

200-301 Question 149

Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?

Options:
A.

ip route 0.0.0.0 0.0.0.0 g0/1 1

B.

ip route 0.0.0.0 0.0.0.0 209.165.201.5 10

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.226 1

D.

ip route 0,0.0.0 0.0.0.0 g0/1 6

Questions 150

Refer to the exhibit.

200-301 Question 150

Which switch becomes the root of a spanning tree for VLAN 20 if all li links are of equal speed?

200-301 Question 150

Options:
A.

SW1

B.

SW2

C.

SW3

D.

SW4

Exam Code: 200-301
Certification Provider: Cisco
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: Oct 30, 2025
Questions: 1197