Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 6

Questions 251

What is the expected outcome when an EUI-64 address is generated?

Options:
A.

The seventh bit of the original MAC address of the interface is inverted

B.

The interface ID is configured as a random 64-bit value

C.

The characters FE80 are inserted at the beginning of the MAC address of the interface

D.

The MAC address of the interface is used as the interface ID without modification

Cisco 200-301 Premium Access
Questions 252

200-301 Question 252

Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?

Options:
A.

10.10.225.48 255.255.255.240

B.

10.10.225.32 255.255.255.240

C.

10.10.225.48 255.255.255.224

D.

10.10.225.32 255.255.255.224

Questions 253

Refer to the exhibit.

200-301 Question 253

Which prefix does Router 1 use for traffic to Host A?

Options:
A.

10.10.10.0/28

B.

10.10.13.0/25

C.

10.10.13.144/28

D.

10.10.13.208/29

Questions 254

Refer to the exhibit.

200-301 Question 254

For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

200-301 Question 254

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 255

Which two QoS tools provides congestion management? ( Choose two )

Options:
A.

CAR

B.

CBWFQ

C.

PQ

D.

PBR

E.

FRTS

Questions 256

What is a characteristic of private IPv4 addressing?

Options:
A.

traverse the Internet when an outbound ACL is applied

B.

issued by IANA in conjunction with an autonomous system number

C.

composed of up to 65.536 available addresses

D.

used without tracking or registration

Questions 257

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

Options:
A.

enable AAA override

B.

enable RX-SOP

C.

enable DTIM

D.

enable Band Select

Questions 258

Refer to the exhibit.

200-301 Question 258

What is the effect of this configuration?

Options:
A.

All ARP packets are dropped by the switch

B.

Egress traffic is passed only if the destination is a DHCP server.

C.

All ingress and egress traffic is dropped because the interface is untrusted

D.

The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.

Questions 259

Refer to the exhibit.

200-301 Question 259

Which two commands were used to create port channel 10? (Choose two )

200-301 Question 259

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Questions 260

Drag and drop the descriptions from the left onto the configuration-management technologies on the right.

200-301 Question 260

Options:
Questions 261

How does the dynamically-learned MAC address feature function?

Options:
A.

The CAM table is empty until ingress traffic arrives at each port

B.

Switches dynamically learn MAC addresses of each connecting CAM table.

C.

The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses

D.

It requires a minimum number of secure MAC addresses to be filled dynamically

Questions 262

Refer to the exhibit.

200-301 Question 262

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:
A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

Questions 263

Which two actions influence the EIGRP route selection process? (Choose two)

Options:
A.

The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.

B.

The router calculates the best backup path to the destination route and assigns it as the feasible successor.

C.

The router calculates the feasible distance of all paths to the destination route

D.

The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link

E.

The router must use the advertised distance as the metric for any given route

Questions 264

What are two characteristics of a public cloud Implementation? (Choose two.)

Options:
A.

It is owned and maintained by one party, but it is shared among multiple organizations.

B.

It enables an organization to fully customize how It deploys network resources.

C.

It provides services that are accessed over the Internet.

D.

It Is a data center on the public Internet that maintains cloud services for only one company.

E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources

Questions 265

Refer to the exhibit.

200-301 Question 265

To which device does Router1 send packets that are destined to host 10.10.13.165?

Options:
A.

Router2

B.

Router3

C.

Router4

D.

Router5

Questions 266

Which IPv6 address type provides communication between subnets and is unable to route on the Internet?

Options:
A.

global unicast

B.

unique local

C.

link-local

D.

multicast

Questions 267

Which network plane is centralized and manages routing decisions?

Options:
A.

policy plane

B.

management plane

C.

control plane

D.

data plane

Questions 268

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)

Options:
A.

enable the PortFast feature on ports

B.

implement port-based authentication

C.

configure static ARP entries

D.

configure ports to a fixed speed

E.

shut down unused ports

Questions 269

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

Options:
A.

WEP

B.

RC4

C.

AES

D.

TKIP

Questions 270

When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI which format is supported?

Options:
A.

Unicode

B.

base64

C.

decimal

D.

ASCII

Questions 271

What benefit does controller-based networking provide versus traditional networking?

Options:
A.

moves from a two-tier to a three-tier network architecture to provide maximum redundancy

B.

provides an added layer of security to protect from DDoS attacks

C.

allows configuration and monitoring of the network from one centralized port

D.

combines control and data plane functionality on a single device to minimize latency

Questions 272

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

Options:
A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Questions 273

Refer to the exhibit.

200-301 Question 273

A network engineer executes the show ip route command on router D. What is the next hop to network 192.168 1 0/24 and why?

Options:
A.

The next hop is 10.0.2.1 because it uses distance vector routing

B.

The next hop is 10.0.2.1 because it is a link-state routing protocol

C.

The next hop is 10.0.0.1 because it has a better administrative distance

D.

The next hop is 10.0.0.1 because it has a higher metric.

Questions 274

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

Options:
A.

sniffer

B.

mesh

C.

flexconnect

D.

local

Questions 275

What are two benefits of network automation? (Choose two.)

Options:
A.

Faster changes with more reliable results

B.

Reduced operational costs

C.

Fewer network failures

D.

Reduced hardware footprint

E.

Increased network security

Questions 276

A network engineer must migrate a router loopback interface to the IPv6 address space. If the current IPv4 address of the interface is 10.54.73.1/32, and the engineer configures IPv6 address 0.0.0.0.0:ffff:a36:4901, which prefix length must be used?

Options:
A.

/64

B.

/96

C.

/124

D.

/128

Questions 277

Drag and drop the IPv6 address description from the left onto the IPv6 address types on the right. Not all options are used.

200-301 Question 277

Options:
Questions 278

A new DHCP server has been deployed in a corporate environment with lease time set to eight hours. Which CMD command on a Windows-based device allows the engineer to verify the DHCP lease expiration?

Options:
A.

ipconfig /renew

B.

ipconfig

C.

ipconfig /all

D.

ipconfig /displaydns

Questions 279

Which action does the router take as rt forwards a packet through the network?

Options:
A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Questions 280

The service password-encryption command is entered on a router. What is the effect of this configuration?

Options:
A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.

encrypts the password exchange when a VPN tunnel is established

C.

prevents network administrators from configuring clear-text passwords

D.

protects the VLAN database from unauthorized PC connections on the switch

Questions 281

Which JSON data type is an unordered set of attribute- value pairs?

Options:
A.

array

B.

string

C.

object

D.

Boolean

Questions 282

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

Options:
A.

TKiP encryption

B.

AES encryption

C.

scrambled encryption key

D.

SAE encryption

Questions 283

Which function does an SNMP agent perform?

Options:
A.

it sends information about MIB variables in response to requests from the NMS

B.

it requests information from remote network nodes about catastrophic system events.

C.

it manages routing between Layer 3 devices in a network

D.

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

Questions 284

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

Options:
A.

It allows the traffic to pass through unchanged

B.

It drops the traffic

C.

It tags the traffic with the default VLAN

D.

It tags the traffic with the native VLAN

Questions 285

Refer to the exhibit.

200-301 Question 285

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:
A.

Branch-1

B.

Branch-2

C.

Branch-3

D.

Branch-4

Questions 286

Refer to the exhibit.

200-301 Question 286

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

200-301 Question 286

B)

200-301 Question 286

C)

200-301 Question 286

D)

200-301 Question 286

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 287

What is the primary purpose of a First Hop Redundancy Protocol?

Options:
A.

It allows directly connected neighbors to share configuration information.

B.

It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.

C.

It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.

D.

It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.

Questions 288

Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?

Options:
A.

DTP

B.

FTP

C.

SMTP

D.

TFTP

Questions 289

Refer to the exhibit.

200-301 Question 289

How does router R1 handle traffic to 192.168.10.16?

Options:
A.

It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.

B.

It selects the EIGRP route because it has the lowest administrative distance.

C.

It selects the OSPF route because it has the lowest cost.

D.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

Questions 290

How does CAPWAP communicate between an access point in local mode and a WLC?

Options:
A.

The access point must directly connect to the WLC using a copper cable

B.

The access point must not be connected to the wired network, as it would create a loop

C.

The access point must be connected to the same switch as the WLC

D.

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

Questions 291

What is the benefit of configuring PortFast on an interface?

Options:
A.

After the cable is connected, the interface uses the fastest speed setting available for that cable type

B.

After the cable is connected, the interface is available faster to send and receive user data

C.

The frames entering the interface are marked with higher priority and then processed faster by a switch.

D.

Real-time voice and video frames entering the interface are processed faster

Questions 292

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

Options:
A.

when the sending device waits 15 seconds before sending the frame again

B.

when the cable length limits are exceeded

C.

when one side of the connection is configured for half-duplex

D.

when Carrier Sense Multiple Access/Collision Detection is used

E.

when a collision occurs after the 32nd byte of a frame has been transmitted

Questions 293

Refer to the exhibit.

200-301 Question 293

Refer to the exhibit. The IPv6 address for the LAN segment on router R1 must be configured using the EUI-64 format. When configured which ipv6 address is produced by the router?

Options:
A.

2001:db8:1a44:41a4:C801:BEFF:FE4A:1

B.

2001:db8:1a44:41a4:C081:BFFF:FE4A:1

C.

2001:db8:1a44:41a4:4562:098F:FE36:1

D.

2001:db8:1a44:41a4:C800:BAFE:FF00:1

Questions 294

Refer to the exhibit.

200-301 Question 294

What is represented by "R1" and "SW1" within the JSON output?

Options:
A.

key

B.

array

C.

value

D.

object

Questions 295

What is the role of the root port in a switched network?

Options:
A.

It replaces the designated port when the designated port fails

B.

It is the best path to the root from a nonroot switch.

C.

It replaces the designated port when the root port fails.

D.

It is administratively disabled until a failover occurs.

Questions 296

Which two network actions occur within the data plane? (Choose two.)

Options:
A.

Add or remove an 802.1Q trunking header.

B.

Make a configuration change from an incoming NETCONF RPC.

C.

Run routing protocols.

D.

Match the destination MAC address to the MAC address table.

E.

Reply to an incoming ICMP echo request.

Questions 297

Refer to the exhibit.

200-301 Question 297

All interfaces are configured with duplex auto and ip ospf network broadcast. Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency and act as a central point for exchanging OSPF information between routers?

200-301 Question 297

200-301 Question 297

200-301 Question 297

200-301 Question 297

Options:
A.

Option A

B.

Option B

C.

Option C

D.

option D

Questions 298

Refer to the exhibit.

200-301 Question 298

Which IP route command created the best path for a packet destined for 10.10.10.3?

Options:
A.

ip route 10.10.0.0 255.255.252.0 g0/0

B.

ip route 10.0.0.0 255.0.0.0 g0/0

C.

ip route 10.10.10.1 255.255.255.255 g0/0

D.

ip route 10.10.10.0 255.255.255.240 g0/0

Questions 299

What is the MAC address used with VRRP as a virtual address?

Options:
A.

00-00-0C-07-AD-89

B.

00-00-5E-00-01-0a

C.

00-07-C0-70-AB-01

D.

00-C6-41-93-90-91

Questions 300

Refer to the exhibit.

200-301 Question 300

Which action must be taken so that neighbofing devices rapidly discover switch Cat9300?

Options:
A.

Configure the cdp timer 10 command on switch Cat9300.

B.

Enable portfast on the ports that connect to neighboring devices.

C.

Configure the cdp holdtime 10 command on switch Cat9300.

D.

Configure the cdp timer 10 command on the neighbors of switch Cat9300.

Exam Code: 200-301
Certification Provider: Cisco
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: Oct 30, 2025
Questions: 1197