The latest Cisco Certified Network Associate 200-301 CCNA certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco Certified Network Associate 200-301 CCNA exam and earn Cisco Certified Network Associate 200-301 CCNA certification.
Exam Question 491
Which of the following statements describes split horizon?
A. The router learns from its neighbor that a route has gone down, and the router sends an update back to the neighbor with an infinite metric to that route.
B. For a period of time, the router will ignore any route advertisements with a lower metric to a downed route.
C. A router will not send route information back out the same interface over which it was learned.
D. The moment a router determines a route has gone down, it will immediately send a route update with an infinite metric to that route.
E. The packets are flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes.
Correct Answer:
C. A router will not send route information back out the same interface over which it was learned.
Answer Description:
Split horizon is used to prevent routing loops in distance vector routing environments. It prevents a router from advertising a network back in the direction of the router from which it was learned. In this sense, route advertisements flow “downstream” (away from the route), but never “upstream” (back towards the
advertised route).
Poison reverse describes when a router learns that a network has gone down, and the router sends an update back to the neighbor with an infinite metric.
Holddown describes when a router ignores any route advertisements that have a lower metric to a downed route.
Triggered updates describe when a router immediately sends a route update with an infinite metric, as opposed to waiting for its next regularly scheduled routing update.
Link State Advertisements (LSA) are packets that are flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes.
Exam Question 492
Which of the following is NOT an advantage of static routes over dynamic routing protocols?
A. Routing protocol overhead is not generated by the router.
B. Bandwidth is not consumed by route advertisements between network devices.
C. Static routes are easier to configure and troubleshoot than dynamic routing protocols.
D. Static route configuration is more fault tolerant than dynamic routing protocols.
Correct Answer:
D. Static route configuration is more fault tolerant than dynamic routing protocols.
Answer Description:
Static route configuration is NOT more fault tolerant than dynamic routing protocols. The following lists the true advantages of static routes over dynamic routing protocols:
- Routing protocol overhead is not generated by the router.
- Bandwidth is not consumed by route advertisements between network devices.
- Static routes are easier to configure and troubleshoot than dynamic routing protocols.
- Router resources are more efficiently used.
- Network security is increased by using static routes.
The following are disadvantages of static routes:
- Static routes are not recommended for large networks because static routes are manually configured on the router. Therefore, maintaining routes in a timely manner is nearly impossible.
- Static route configuration is not fault tolerant without configuring multiple static routes to each network with varying administrative distances.
All other options are incorrect because these are the advantages of static routes over dynamic routing protocols.
Exam Question 493
Examine the diagram below and assume that routing is configured properly.
Why is Host A unable to ping Host B?
A. The IP address of Switch A is incorrect
B. The gateway address of Host B is incorrect
C. The IP address of Host A is incorrect
D. The Fa0/2 and Fa0/1 interfaces on R1 and R2 are not in the same subnet
Correct Answer:
C. The IP address of Host A is incorrect
Answer Description:
The IP address of Host A is incorrect. The Fa0/1 interface on R1 (Host A’s default gateway) is in the 192.168.1.64/27 network, and Host A’s IP address is in the 192.168.1.32/27 network. With a 27-bit mask against the 192.168.1.0 classful network, the resulting subnets are:
192.168.1.0
192.168.1.32
192.168.1.64
192.168.1.92
And so it would continue, increasing the fourth octet in intervals of 32. By only going this far we can see that they are in different subnets.
The IP address of Switch A is correct for its subnet because it needs to be in the same subnet as the Fa0/1 interface on R1. Even if it were incorrect or missing altogether it would have no impact on Host A. Switches merely switch frames based on MAC addresses and only need an IP address for management purposes.
The gateway address of Host B is correct. It is in the same subnet (15.0.0.0/8) with the Fa0/2 interface on R2, its gateway.
The Fa0/2 and Fa0/1 interfaces on R1 and R2 are in the same subnet. Using a 25-bit mask against the 192.18.5.0/24 classful network yields the following subnets:
192.18.5.0
192.168.5.128
Both router interfaces in question are in the 192.18.5.0 subnet.
Exam Question 494
Which switch port will be in a blocking state? (Click the Exhibit(s) button to view the switch port diagram.)
A. SwitchA Fa0/1
B. SwitchA Fa0/2
C. SwitchB Fa0/1
D. SwitchB Fa0/2
Correct Answer:
D. SwitchB Fa0/2
Answer Description:
SwitchB will be forwarding on F0/1, and blocking on F0/2.
SwitchA will become the STP root bridge due to its lower MAC address. All ports on the root bridge will become designated ports in a forwarding state. SwitchB has redundant connectivity to the root bridge, and must block one of its interfaces to prevent a switching loop. STP will use its operations to determine which of the redundant interfaces on SwitchB to block to prevent a switching loop
Both interfaces are the same speed (FastEthernet), and thus their cost to the root is the same.
Finally, the interface with the lowest number will become the forwarding port. F0/1 has a lower port number than F0/2, so F0/1 becomes a forwarding port, and F0/2 becomes a blocking port.
Note: Unlike STP, Rapid Spanning Tree Protocol (RSTP) uses the term “discarding” for a switch port that is not forwarding frames.
Exam Question 495
Which command was used to create the following configuration?
A. Router(config-router)# network 192.168.1.0 0.0.0.15
B. Router(config-router)# network 192.168.1.0 255.255.255.0
C. Router(config-router)# network 192.168.1.80
Router(config-router)# network 192.168.1.128
D. Router(config-router)# network 192.168.1.0
Correct Answer:
D. Router(config-router)# network 192.168.1.0
Answer Description:
The network 192.168.1.0 command instructs the router to activate EIGRP on every interface that belongs to the class C network 192.168.1.0. The exhibit indicates that the router is running EIGRP on two subnets of 192.168.1.0 (192.168.1.80/28 and 192.168.1.128/28). Since both of these are subnets of the same class C network number, only the class C address needs to be referenced with a network statement.
All interfaces that will participate in EIGRP must be specified with a network command that specifying the network of which the interface is a member. Failure to do so will result in neighbor relationships not forming.
In the example below, Router A and Router B are directly connected, but not forming a neighbor relationship. The network they share is the 192.168.5.0/24 network. The output of the show run command for both routers reveals that Router B does not have EIGRP running on the 192.168.5.0 network.
The network 192.168.1.0 0.0.0.15 command is incorrect because only the class C network number (192.168.1.0) needs to be referenced to enable EIGRP on all subnets. It is actually valid to include an inverse mask with EIGRP network statements, but it is unnecessary in this case, and the network/mask provided does not match either of the routed networks.
The network 192.168.1.0 255.255.255.0 command is incorrect because the mask is unnecessary in this case, and if masks are included, they must be expressed inversely (0.0.0.255).
It is unnecessary to configure two network commands in this example, as both networks are subnets of the same class C network (192.168.1.0), and a single network command can enable EIGRP on both. Additionally, if specific subnets are referenced in network commands, it is necessary to include an inverse mask after them, or EIGRP will automatically summarize the command to the classful boundary.
Exam Question 496
Which of the following represents the correct method of assigning an IP address and default gateway to a switch?
A. Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Switch(config-if)# default-gateway 10.0.0.254
B. Switch(config)# ip default-gateway 10.0.0.254
Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
C. Switch(config)# ip address 10.0.0.1 255.0.0.0
Switch(config)# default-gateway 10.0.0.254
D. Switch(config)# ip address 10.0.0.1 255.0.0.0
Switch(config)# interface vlan1
Switch(config)# ip default-gateway 10.0.0.254
Correct Answer:
B. Switch(config)# ip default-gateway 10.0.0.254
Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Answer Description:
IP addresses are assigned to switches by assigning the address to VLAN 1 using the ip address command, while the default gateway is configured in global configuration mode using the ip default-gateway command. A default gateway is assigned to a Layer 2 switch using the following command syntax, where h.h.h.h is the IP address of the default gateway:
Switch(config)# ip default-gateway h.h.h.h
An IP address is assigned to a Layer 2 switch using the following command syntax, where h.h.h.h is the IP address and m.m.m.m is the subnet mask:
Switch(config)# interface vlan1
Switch(config-if)# ip address h.h.h.h m.m.m.m
Configuring an IP address on a switch is usually accompanied by adding a default gateway as well. Switches do not require an IP address to perform their function on the network. IP addresses are added so that an administrator can make a Telnet connection to the switch to manage the switch. If this Telnet access does not occur on the same local subnet with the switch, which is unlikely, or if the administrator is trying to Telnet to the switch using a host that resides a VLAN other VLAN1 (the management VLAN) the absence of a gateway address will render the switch incapable of answering Telnet connection attempts. Therefore, a gateway address is usually required on the switch to make a telnet connection.
The following command set is incorrect because the command setting the default gateway must be executed in global configuration mode, not in configuration mode, for VLAN1:
Switch(config)# interface vlan1
Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Switch(config-if)# default-gateway 10.0.0.254
The following command set is incorrect because the IP address must be configured in configuration mode for VLAN1, not global configuration mode:
Switch(config)# ip address 10.0.0.1 255.0.0.0
Switch(config)# default-gateway 10.0.0.254
The following command set is incorrect because an IP address must be configured in configuration mode for VLAN1. Also, if you executed the command interface vlan1, the prompt would change to Switch(configif)#. Once it did, that would be an incorrect mode for entering the default gateway.
Switch(config)# ip address 10.0.0.1 255.0.0.0
Switch(config)# interface vlan1
Switch(config)# ip default-gateway 10.0.0.254
Exam Question 497
Which command can be issued at the following prompt?
Router(config-router)#
A. show interface
B. network
C. interface
D. ip default-gateway
Correct Answer:
B. network
Answer Description:
The network command can be issued at the Router(config-router)# prompt, which also indicates that the router is in router configuration mode. The network command is used to configure the network upon which a routing protocol is functioning.
The router configuration mode is accessed by issuing the router command in the global configuration mode along with a parameter indicating the routing protocol to be configured. For example:
R4(config)#router eigrp 1
changes the prompt to:
R4(config-router)#
which then allows you to specify the network as follows:
R4(config-router)#network 192.18.5.0
All other options are incorrect as these commands can be issued only in the global configuration command mode (which would be indicated by the R4(config)# prompt.
Exam Question 498
Which of the following is NOT managed by the cloud provider in an IaaS deployment?
A. virtualization
B. servers
C. storage
D. operating system
Correct Answer:
D. operating system
Answer Description:
Operating systems are not managed by the cloud provider in an Infrastructure as a service (IaaS) deployment. Only storage, virtualization, servers, and networking are the responsibility of the provider. The customer is responsible for the following with IaaS:
- Operating systems
- Data
- Applications
- Middleware
- Runtime
In a Platform as a Service (PaaS) deployment, the provider is responsible for all except the following, which is the responsibility of the customer:
- Applications
- Data
In Software as a Service (SaaS) deployment, the provider is responsible for everything.
Exam Question 499
In the diagram below, when a packet sent from the PC at 10.0.1.3 to the PC at 10.1.1.3 leaves the Fa0/1 interface of R1, what will be the source and destination IP and MAC addresses?
A. source IP 10.1.1.2 destination IP 10.1.1.3
Source MAC ad.ad.ad.ad.ad.ad destination MAC ab.ab.ab.ab.ab.ab
B. source IP 10.1.1.1 destination IP 10.1.1.3
Source MAC ad.dd.dd.dd.dd.dd.dd destination MAC ab.ab.ab.ab.ab.ab
C. source IP 10.0.1.3 destination IP 10.1.1.3
Source MAC ad.ad.ad.ad.ad.ad destination MAC ae.ae.ae.ae.ae.ae
D. source IP 10.0.6.3 destination IP 10.1.1.3
Source MAC ad.ad.ad.ad.ad.ad destination MAC ae.ae.ae.ae.ae.ae
Correct Answer:
C. source IP 10.0.1.3 destination IP 10.1.1.3
Source MAC ad.ad.ad.ad.ad.ad destination MAC ae.ae.ae.ae.ae.ae
Answer Description:
The source IP address will be 10.0.1.3 and the destination IP address will be 10.1.1.3. The source MAC address will be ad.ad.ad.ad.ad.ad and the destination MAC address will be ae.ae.ae.ae.ae.ae.
The source and destination IP addresses never change as the packet is routed across the network. The MAC address will change each time a router sends the packet to the next router or to the ultimate destination. The switches do not change either set of addresses in the header; they just switch the frame to the correct switch port according to the MAC address table. Therefore, when the packet leaves R1, the source MAC address will be that of R1 and the destination MAC address will be that of the Fa0/0 interface of R2. The IP addresses will be those of the two workstations, 10.0.1.3 and 10.1.1.3.
When the workstation at 10.0.1.3 starts the process, it will first determine that the destination address is in another subnet and will send to its default gateway (10.0.1.2). It will perform an ARP broadcast for the MAC address that goes with 10.0.1.2, and R1 will respond with its MAC address, bb.bb.bb.bb.bb.bb.
After R2 determines the next-hop address to send to 10.0.1.3 by parsing the routing table, it will send the packet to R1 at 10.0.6.2. When R2 receives the packet, R2 will determine that the network 10.0.1.0/24 is directly connected and will perform an ARP broadcast for the MAC address that goes with 10.0.1.3. The workstation at 10.0.1.3 will respond with its MAC address, ab.ab.ab.ab.ab.ab.
Exam Question 500
You are the network administrator for your company. You have implemented VLAN Trunking Protocol (VTP) in your network. However, you have found that VTP is not synchronizing VLAN information.
Which of the following items should be verified to resolve the problem? (Choose three.)
A. Ensure that switches in the VTP domain are configured with VTP version 1 and version 2.
B. Ensure that VLANs are active on at least one switch on the VTP domain.
C. Ensure that all of the ports that interconnect switches are configured as trunks and are trunking properly.
D. Ensure that the VTP domain name is the same on all switches in the domain.
E. Ensure that identical passwords are configured on all VTP switches.
Correct Answer:
C. Ensure that all of the ports that interconnect switches are configured as trunks and are trunking properly.
D. Ensure that the VTP domain name is the same on all switches in the domain.
E. Ensure that identical passwords are configured on all VTP switches.
Answer Description:
The following is a list of the steps to take if VTP fails to exchange VLAN information:
- Ensure that all of the ports that interconnect switches are configured as trunks and are trunking properly.
- Ensure that VLANs are active in all the devices.
- Ensure that at least one switch is acting as a VTP server in the VTP domain.
- Ensure that the VTP domain name is the same for all switches in the domain. The VTP domain name is case-sensitive.
- Ensure that the VTP password is the same for all switches in the domain.
- Ensure that the same VTP version is used by every switch in the domain. VTP version 1 and version 2 are not compatible on switches in the same VTP domain.
You should not ensure that switches are configured with VTP version 1 and version 2 in the domain, because VTP version 1 and version 2 are incompatible. VTP version 1 is the default on all Cisco switches.
You should not ensure that VLANs are active on at least one switch in the VTP domain, because VLANs should be active in all of the devices in a VTP domain.