Practice Exam 1

Are you ready to assess your preparedness for the CCNA 200-301 exam? Practice Exam 1 and Practice Exam 2 are here to help.

As you take this practice exam, consider the following test-taking tips:

  • Watch your time in the simulations: Just like the real exam, this practice exam includes simulations. You access these simulations from the companion website. Download these files before starting your exam. When you encounter one in this practice exam, launch the exercise and complete it, making sure to be careful about how much time you spend in the exercise—just as you would in the real exam.

  • Read each question twice if necessary: Be sure to read each question carefully so that you fully understand it. You may need to read some questions twice.

  • Read the answers starting from the bottom: When you read the answers from the bottom, you force yourself to carefully read each answer. If you read the answers from the top, you might find yourself quickly selecting an answer that looks right and skipping over the other answers. This is dangerous as there might be a better answer later in the options.

  • Time yourself: The CCNA 200-301 exam is a 90-minute exam. Time yourself during this practice exam to make sure that you stay within this time limit.

  • If you do not know the answer to a question, make a note of it: Go back and review any trouble areas later. Be sure that you are mastering each topic area, not just looking up the answers to individual questions. If you are unsure about one aspect of a topic, chances are you might be unsure about other areas related to that same topic.

  • Prepare mentally to take a test: To properly assess yourself, take this practice exam as you would take the real exam. This means that you should find a quiet place without any distractions so that you can focus on each question. Equip yourself with scratch paper and a pen and pencil. For the actual exam, you will be allowed no other tools (such as calculators), so you shouldn’t use additional tools for the practice exams either.

  • If you cannot determine the correct answer(s), begin by eliminating incorrect answer(s): If there are four options, and you know that three are absolutely wrong, the fourth option has to be the correct one.

  • Consider taking this practice exam, as well as the next one, multiple times until you get perfect scores: Consistently scoring high on these practice exams is a good indication that you’re ready to take the actual exam.

  • Pay close attention to the Answer Key: The answers to the practice exam questions include explanations, which often bring up related important information. Even if you answered a question correctly, be sure to read the explanation in the Answer Key.

  • Use the online materials: There are even more practice exams waiting for you on the Pearson Test Prep software that is available to you either online or as an offline Windows application. Be sure to use those materials as well.

  • Don’t despair: Do not be overly upset if on your first attempt at this practice exam, you do not score well. It only means that you need to continue studying. Be glad that you can spot your weak areas now and not after getting into the actual exam. Go back through and review your problem areas now to ensure that you are ready!

Congratulations on your pursuit of this valued IT certification!

1. What transport layer protocol features the use of sequencing and synchronization methods?

Image A. ICMP

Image B. TCP

Image C. UDP

Image D. ARP

2. Examine the figure. If devices 1, 2, and 3 are all Cisco Layer 2 switches in their default configurations, how many collision domains exist in this network?

images

_________

3. You have configured your gi0/1 Cisco switch port as follows:

interface gi0/1
switchport mode access
switchport port-security

Which of the following statements is true?

Image A. The default violation mode is Restrict.

Image B. The mode must be Trunk for port security to be used.

Image C. The default number of dynamic MAC addresses is one.

Image D. This configuration prevents the logging of port security violations.

Image E. The violation mode in use here is Protect.

4. What protocol is used with an Integrated Services approach to QoS?

Image A. ICMP

Image B. VTP

Image C. SPAN

Image D. NTP

Image E. RSVP

5. What is the default administrative distance for OSPF?

Image A. 20

Image B. 120

Image C. 110

Image D. 200

Image E. 90

6. What is the IPv4 address range 224.0.0.0 to 239.255.255.255 used for?

Image A. To send a packet to all systems

Image B. To send a packet to a group of systems

Image C. To send a packet to a single specific system

Image D. To send multiple packets to only a single specific system

7. Which RF band is used with 802.11ac?

Image A. 2.4 GHz

Image B. 5 GHz

Image C. Both 2.4 GHz and 5 GHz

Image D. 7 GHz

8. What is the privilege level for the user in the command username johns secret cisco123?

Image A. 0

Image B. 1

Image C. 15

Image D. 8

9. HANDS-ON SIMULATION QUESTION 1

10. Examine the figure. What is the Layer 2 destination address?

images

_________

11. Examine the code shown here. What format is in use?

"templateConfig":{
             "vInfraPolicy":"cloud82",
             "networks":[
                     {
                       "networkName":"lan0",
                       "networkType":1000,
                       "vlanIDPool":"100-199",
                       "networkPool":1000,
                       "ipSubnetPool":1000,
                       "networkIP":"10.10.10.0",
                       "networkMask":"255.255.255.0",
                       "gatewayIP":"10.10.10.1"
                     },

Image A. XML

Image B. YAML

Image C. JSON

Image D. PBF

12. What technology provides multiple default gateways in a redundant manner and automates load sharing?

Image A. FHRP

Image B. HSRP

Image C. VRRP

Image D. GLBP

13. You are in privileged mode on R1. Provide all configuration commands in order to configure this device as a router-on-a-stick (ROAS) using the following information:

Physical interface: GigabitEthernet 0/1

Protocol: 802.1Q

Subinterfaces: GigabitEthernet 0/1.10 (VLAN 10); GigabitEthernet 0/1.20 (VLAN 20)

IP addressing:

   GigabitEthernet 0/1.10: 10.1.10.1/24

   GigabitEthernet 0/1.20: 10.1.20.1/24

_________

14. How is a playbook expressed in Ansible?

Image A. YAML

Image B. XML

Image C. JSON

Image D. HTML5

15. Create an extended ACE that permits Telnet traffic from a Telnet server on the network 10.10.10.0/24, going to a host on network 192.168.1.0/24. Use ACL 101.

_________

16. What keyword enables the use of PAT in a NAT configuration?

Image A. load

Image B. ports

Image C. overload

Image D. pool

17. How many syslog levels are there with Cisco equipment?

Image A. 8

Image B. 6

Image C. 4

Image D. 16

18. What wireless security standard replaces PSK with SAE?

Image A. WPA3

Image B. AES

Image C. TKIP

Image D. WPA2

19. Examine the topology shown here. How many collision domains exist between the PC and Router 1?

images

Image A. 0

Image B. 1

Image C. 2

Image D. 3

20. Which of the following provides a secure method to transfer files in a Cisco network?

Image A. TFTP

Image B. FTP

Image C. Telnet

Image D. SCP

21. Examine the topology shown in the figure. The PC has sent a ping request to the server. Which devices in the network operate only at the physical layer of the OSI reference model? (Choose two.)

images

Image A. Ethernet cabling

Image B. Bridge 1

Image C. Router 2

Image D. Hub A

Image E. Switch 3

Image F. PC network interface card

22. Which of the following are true on a typical Cisco access layer switch? (Choose two.)

Image A. It can have IP routing enabled.

Image B. It can have an IP address configured for management.

Image C. It can be used for NAT or PAT.

Image D. A default gateway allows the switch to access remote networks.

Image E. Ports default to no switchport mode.

23. What feature does DAI rely on?

Image A. ACLs

Image B. DHCP snooping

Image C. QoS DiffServ

Image D. NBAR

Image E. OSPF

24. Examine the switch configuration shown. What problem exists with this suggested configuration change?

SW1
configure terminal
interface fa0/10
switchport trunk encapsulation isl
switchport mode trunk
switchport port-security
switchport port-security max 2
no shutdown

Image A. Port security can only support a single secure MAC address.

Image B. Port security can be used on trunks (depending on the switch), but it is likely that there will be many more than two learned MAC addresses on that port.

Image C. Port security can only be used with 802.1Q trunks.

Image D. A violation mode for port security must be selected.

25. Which of the following is not an HTTP method used with REST APIs?

Image A. PUT

Image B. POST

Image C. SEND

Image D. GET

Image E. DELETE

26. Examine the topology shown in the figure. If OSPF, EIGRP, and RIPv2 were all enabled on each interface on each router, which routing protocol would R4 use to determine the best route to 10.77.67.0/24?

images

Image A. EIGRP because its metric considers bandwidth and delay

Image B. OSPF because its cost is derived from bandwidth and delay

Image C. OSPF because it is an advanced distance-vector routing protocol

Image D. EIGRP because of administrative distance

27. You decided to reduce the size of your existing Layer 2 broadcast domains by creating new VLANs. What network device that forwards packets between those VLANs would be operating (at a minimum), and at which OSI layer?

Image A. A switch at Layer 1

Image B. A switch at Layer 2

Image C. A router at Layer 2

Image D. A router at Layer 3

28. Examine the topology shown in the figure. Provide the Router 2 configuration for OSPFv2 to enable OSPF area 0 for process 100 on G2/0. The G2/0 IP address is 192.168.0.1/24. Do not use the interface-level OSPF command and ensure that OSPF runs on no other interface.

_________

images

29. Which of the following statements regarding ICMP is correct?

Image A. ICMP functions at the network layer of the OSI model.

Image B. ICMP relies on TCP for reliable packet delivery.

Image C. ICMP relies on UDP for efficient packet delivery.

Image D. ICMP functions at the session layer of the OSI model.

30. What device can use a dual-band approach and 802.11 standards for connecting end users to the network?

Image A. Firewall

Image B. WLC

Image C. AP

Image D. Router

31. Which is not a major menu option in Cisco DNA Center?

Image A. Compliance

Image B. Policy

Image C. Design

Image D. Provision

32. What is the last usable host address, given the IP address and subnet mask 172.16.10.101 with 255.255.224.0?

_________

33. What command produced the following output?

MK5 unit 0, NIM slot 1, NIM type code 7, NIM version 1
idb = 0x6150, driver structure at 0x34A878, regaddr = 0x8100300
IB at 0x6045500: mode=0x0108, local_addr=0, remote_addr=0
N1=1524, N2=1, scaler=100, T1=1000, T3=2000, TP=1
buffer size 1524
DTE V.35 serial cable attached
RX ring with 32 entries at 0x45560 : RLEN=5, Rxhead 0
00 pak=0x6044D78 ds=0x6044ED4 status=80 max_size=1524 pak_size=0

_________

34. What is a potential underlay protocol for a VXLAN EVPN fabric?

Image A. VTP

Image B. eBGP

Image C. RIP

Image D. EIGRP

35. Which of the following addresses is a private-use-only address?

Image A. 12.43.56.120

Image B. 177.12.34.19

Image C. 201.92.34.100

Image D. 10.123.23.104

36. What must be in place before you can route other devices’ IPv6 traffic through a Cisco router?

Image A. The command dual-stack routing

Image B. A loopback 0 interface with an IPv4 address assigned

Image C. IPv4 interfaces

Image D. The ipv6 unicast-routing global configuration command

37. Which command displays a quick view of OSPF neighbor status?

Image A. show ip ospf neighbor

Image B. show ospf peers

Image C. show ip ospf routers

Image D. show ospf peers

38. What are two reasons a duplex mismatch can be difficult to find? (Choose two.)

Image A. Users are presented with an error message that varies by operating system.

Image B. Connectivity is typically intermittent.

Image C. Users cannot communicate on the network at all.

Image D. Connectivity might be slow.

39. What command would you use on a Cisco Layer 2 switch to verify errors regarding sending or receiving frames?

Image A. show controllers

Image B. show interface

Image C. show collisions

Image D. show version

40. A Cisco switch is currently in VTP Client mode. You issue the vlan 100 command in global configuration mode to create a new VLAN. What is the result?

Image A. The switch produces an error message.

Image B. The switch sends VLAN 100 configuration information to the VTP server.

Image C. The switch reverts to Transparent mode.

Image D. The switch configures the VLAN but on the local device only.

41. What traditional 802.1D STP port state does not exist in 802.1w RSTP?

Image A. Discarding

Image B. Listening

Image C. Learning

Image D. Forwarding

42. What global configuration command allows you to disable CDP on an entire Cisco switch?

Image A. no cdp

Image B. no cdp enable

Image C. no cdp run

Image D. no cdp search

43. When you enable port security for a switch port, what is the default violation mode?

Image A. Restrict

Image B. Shutdown

Image C. Protect

Image D. Passive

44. What is the default administrative distance for internal EIGRP?

Image A. 20

Image B. 110

Image C. 120

Image D. 90

45. What architectural model is used with Cisco ACI?

Image A. 2-tier spine-leaf

Image B. 2-tier collapsed core

Image C. 3-tier

Image D. Concentric

46. Examine the configuration that follows. What is the next hop for 10.10.20.0/24?

ip route 10.10.20.0 255.255.255.0 172.16.1.1

Image A. 255.255.255.0

Image B. 10.10.20.1

Image C. 172.16.1.1

Image D. 0.0.0.0

47. What command permits you to see your locally used OSPF routes?

Image A. show ip ospf database local

Image B. show ospf all

Image C. show ip route ospf

Image D. show ospf routes local

48. HANDS-ON SIMULATION QUESTION 2

49. What tool produced the output shown?

Server:            8.8.8.8
Address:        8.8.8.8#53

Non-authoritative answer:
www.yahoo.com canonical name = fd-fp3.wg1.b.yahoo.com.
Name: fd-fp3.wg1.b.yahoo.com
Address: 98.139.183.24
Name: fd-fp3.wg1.b.yahoo.com
Address: 98.139.180.149

Image A. netstat

Image B. nbtstat

Image C. nslookup

Image D. msconfig

50. What interface configuration mode command configures a Cisco router as a DHCP client?

Image A. ip address auto

Image B. ip address enable dhcp

Image C. dhcp address

Image D. ip address dhcp

51. What command allows you to confirm the IP address and mask assigned to an interface?

Image A. show interfaces terse

Image B. show addresses

Image C. show ip interface brief

Image D. show ip interface

52. What is the stratum of a Cisco router if you use the command ntp master to configure it to use its internal clock as a time source?

Image A. 0

Image B. 1

Image C. 2

Image D. 8

Image E. 13

53. Examine the access list shown here. What is the issue with this access list?

access-list 1 permit any
access-list 1 deny host 10.10.10.1
access-list 1 deny host 10.10.10.2
access-list 1 deny host 172.16.1.1
access-list 1 deny any log

Image A. The access list cannot end with a deny statement.

Image B. The access list permits the traffic before it denies any traffic.

Image C. The access list is not named, and naming is required.

Image D. Standard access lists do not support logging.

54. What do you use in dynamic NAT configuration in order to identify the traffic you intend to translate?

Image A. An access list

Image B. A pool

Image C. A NAT list

Image D. An interface reference

55. What is the name of the “database” used with SNMP?

Image A. AGENT

Image B. MIB

Image C. TREE

Image D. VARSTORE

56. What suite of protocols is often found in use with modern VPN connections?

Image A. IPsec

Image B. SLA

Image C. DNSSEC

Image D. PGP

57. Which of the following is not a step for supporting SSH connections on a Cisco router?

Image A. Configure a DNS domain.

Image B. Generate the SSH key.

Image C. Configure the hostname command.

Image D. Enable SSH globally.

58. Examine the configuration shown here. Which statement is false?

no service password-encryption
!
enable secret rtYHS3TTs
!
username admin01 privilege 15 secret Cisco123
!
line vty 0 4
password ChEeEs&WiZ
login
transport input telnet

Image A. Telnet users will be required to provide a password for Telnet access.

Image B. Telnet users will be required to provide the password ChEeEs&WiZ for access to privileged mode.

Image C. The account password of the admin privilege-level user is not very secure.

Image D. New plaintext passwords will not be encrypted.

59. A new Layer 2 switch in its default configuration has just been powered up. In addition to a console connection, there are two Windows hosts and an IP phone (using PoE) connected to its Ethernet ports. Which of the following are true? (Choose two.)

Image A. If either Windows host has successfully completed an ARP resolution, the switch will have learned the MAC addresses of both Windows hosts.

Image B. The switch would see the two Windows hosts’ directly connected devices from CDP.

Image C. The switch would not know if the IP phone is a Cisco IP phone or a third-party IP phone until a call is initiated from the phone.

Image D. The switch can be configured with an IPv4 address on interface VLAN 1.

60. Refer to the network topology that follows. Your senior network administrator is concerned about network security. He has asked you to ensure that the PC-10 device in VLAN 10 does not overflow the switch’s CAM table. How should you respond? (Choose two.)

images

Image A. Configure OSPF on all network devices and use MD5 authentication.

Image B. Configure the service password-encryption command on the switch.

Image C. Configure port-security on interface 0/2 of the switch.

Image D. Configure Router A to route traffic sourced from any device other than PC-10 to Null0.

Image E. Configure a static MAC address as part of port-security.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.190.144