Best October Special Limited Time 50% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s50disc

200-301 PDF

$51.25

$102.5

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

200-301 PDF + Testing Engine

$70

$139.99

3 Months Free Update

  • Exam Name: Cisco Certified Network Associate
  • Last Update: Oct 20, 2021
  • Questions and Answers: 219
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

200-301 Engine

$57.5

$114.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

200-301 Cisco Certified Network Associate Questions and Answers

Question # 4

R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?

A.

IS-IS

B.

RIP

C.

Internal EIGRP

D.

OSPF

Full Access
Question # 5

Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration failed to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two.)

A.

Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.

B.

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic

C.

The source and destination IPs must be swapped in ACL 101

D.

The ACL must be configured the Gi0/2 interface inbound on R1

E.

The ACL must be moved to the Gi0/1 interface outbound on R2

Full Access
Question # 6

What is the primary different between AAA authentication and authorization?

A.

Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.

B.

Authentication identifies a user who is attempting to access a system, and authorization validates the users password

C.

Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform.

D.

Authentication controls the system processes a user can access and authorization logs the activities the user initiates

Full Access
Question # 7

What is a function of a remote access VPN?

A.

used cryptographic tunneling to protect the privacy of data for multiple users simultaneously

B.

used exclusively when a user is connected to a company's internal network

C.

establishes a secure tunnel between two branch sites

D.

allows the users to access company internal network resources through a secure tunnel

Full Access
Question # 8

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

A.

WEP

B.

RC4

C.

AES

D.

TKIP

Full Access
Question # 9

Refer to the exhibit.

A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with VLAN 10, 11, 12, and 13. What is the next step in the configuration?

A.

Add PC A to VLAN 10 and the File Server to VLAN 11 fa VLAN segmentation

B.

Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation

C.

Add a router on a stick between Switch A and Switch B allowing for Inter-VLAN routing.

D.

Add PC A to the same subnet as the Fie Server allowing for intra-VLAN communication.

Full Access
Question # 10

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.

Which two misconfigurations cause this behavior? (Choose two)

A.

The packets fail to match any permit statement

B.

A matching permit statement is too high in the access test

C.

A matching permit statement is too broadly defined

D.

The ACL is empty

E.

A matching deny statement is too high in the access list

Full Access
Question # 11

A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF By default, which type of OSPF network does this interface belong to?

A.

point-to-multipoint

B.

point-to-point

C.

broadcast

D.

nonbroadcast

Full Access
Question # 12

How does QoS optimize voice traffic?

A.

reducing bandwidth usage

B.

by reducing packet loss

C.

by differentiating voice and video traffic

D.

by increasing jitter

Full Access
Question # 13

What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?

A.

No router ID is set, and the OSPF protocol does not run.

B.

The highest up/up physical interface IP address is selected as the router ID.

C.

The lowest IP address is incremented by 1 and selected as the router ID.

D.

The router ID 0.0.0.0 is selected and placed in the OSPF process.

Full Access
Question # 14

Which IPv6 address block sends packets to a group address rather than a single address?

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Full Access
Question # 15

Refer to the exhibit.

Drag and drop the networking parameters from the left onto the correct values on the right.

Full Access
Question # 16

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

A.

IKEv2

B.

IKEv1

C.

IPsec

D.

MD5

Full Access
Question # 17

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. What is the reason for the problem?

A.

The OSPF router IDs are mismatched.

B.

Router2 is using the default hello timer.

C.

The network statement on Router1 is misconfigured.

D.

The OSPF process IDs are mismatched.

Full Access
Question # 18

What is the primary function of a Layer 3 device?

A.

to analyze traffic and drop unauthorized traffic from the Internet

B.

to transmit wireless traffic between hosts

C.

to pass traffic between different networks

D.

forward traffic within the same broadcast domain

Full Access
Question # 19

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

A.

action

B.

management

C.

control

D.

data

Full Access
Question # 20

Refer to Exhibit.

How does SW2 interact with other switches in this VTP domain?

A.

It processes VTP updates from any VTP clients on the network on its access ports.

B.

It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports

C.

It forwards only the VTP advertisements that it receives on its trunk ports.

D.

It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports

Full Access
Question # 21

Refer to the exhibit.

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 22

Refer to the exhibit The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router Which two static host routes must be configured on the New York router’ (Choose two)

A.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::3/128 2023::3

C.

ipv6 route 2000::3/128 s0/0/0

D.

ipv6 route 2000::1/128 2012::2

E.

ipv6 route 2000::1/128 s0/0/1

Full Access
Question # 23

What is a design element when deploying an 802.11b wireless infrastructure?

A.

disabling TPC so that access points can negotiate signal levels with their attached wireless devices.

B.

setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller

C.

allocating nonoverlapping channels to access points that are in close physical proximity to one another

D.

configuring access points to provide clients with a maximum of 5 Mbps

Full Access
Question # 24

Why does a switch flood a frame to all ports?

A.

The frame has zero destination MAC addresses.

B.

The source MAC address of the frame is unknown

C.

The source and destination MAC addresses of the frame are the same

D.

The destination MAC address of the frame is unknown.

Full Access
Question # 25

Which two components are needed to create an Ansible script that configures a VLAN on a switch (Choose two)?

A.

cookbook

B.

task

C.

playbook

D.

model

E.

recipe

Full Access
Question # 26

Refer to the exhibit. The entire MAC address table for SW1 is shown here:

SW1#show mac-address-table

Mac Address Table

Vlan Mac Address Type Ports

000c.8590.bb7d DYNAMIC Fa0/1

010a.7a17.45bc DYNAMIC FaO/3

7aa7.4037.8935 DYNAMIC FaO/4

SW1#

What does SW1 do when Br-4 sends a frame to Br-2?

A.

It inserts the source MAC address and port into the forwarding table and forwards the frame to Br-2.

B.

It maps the Layer 2 MAC address for FaO/3 to the Layer 3 IP address and forwards the frame.

C.

It performs a lookup in the MAC address table for Br-4 and discards the frame due to a missing entry.

D.

It floods the frame out of all ports except on the port where Br-2 is connected.

Full Access
Question # 27

Refer to the exhibit.

An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEfriemet3/1/4 port on a switch?

A.

The phone and a workstation that is connected to the phone do not have VLAN connectivity

B.

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

C.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

D.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

Full Access
Question # 28

Which two events occur automatically when a device Is added to Cisco DNA Center? (Choose two. )

A.

The device Is assigned to the Global site.

B.

The device Is placed into the Unmanaged state.

C.

The device Is placed into the Provisioned state.

D.

The device Is placed into the Managed state.

E.

The device is assigned to the Local site.

Full Access
Question # 29

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?

A.

The application requires an administrator password to reactivate after a configured Interval.

B.

The application requires the user to enter a PIN before it provides the second factor.

C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

D.

The application verifies that the user is in a specific location before it provides the second factor.

Full Access
Question # 30

An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?

A.

switch(config-line)#IIdp port-description

B.

switch(config)#IIdp port-description

C.

switch(config-if)#IIdp port-description

D.

switch#IIdp port-description

Full Access
Question # 31

Refer to the exhibit An engineer must configure GigabitEthemet1/1 to accommodate voice and data traffic. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?

A.

There is limited unique address space, and traffic on the new subnet will stay local within the organization.

B.

The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.

C.

Traffic on the subnet must traverse a site-to-site VPN to an outside organization.

D.

The ISP requires the new subnet to be advertised to the internet for web services.

Full Access