Skip to Content

Cisco Certified Network Associate 200-301 CCNA Exam Questions and Answers – Page 5

The latest Cisco Certified Network Associate 200-301 CCNA certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco Certified Network Associate 200-301 CCNA exam and earn Cisco Certified Network Associate 200-301 CCNA certification.

Exam Question 461

How do TCP and UDP differ in the way they provide reliability for delivery of packets?

A. TCP does not guarantee delivery or error checking to ensure that there is no corruption of data, UDP provides message acknowledgement and retransmits data if lost.
B. TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking.
C. TCP is a connectionless protocol that does not provide reliable delivery of data; UDP is a connectionoriented protocol that uses sequencing to provide reliable delivery.
D. TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake.

Correct Answer:
B. TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking.

Exam Question 462

What is the primary effect of the spanning-tree portfast command?

A. It immediately enables the port in the listening state.
B. It immediately puts the port into the forwarding state when the switch is reloaded.
C. It enables BPDU messages.
D. It minimizes spanning-tree convergence time.

Correct Answer:
D. It minimizes spanning-tree convergence time.

Exam Question 463

Refer to the exhibit. How does SW2 interact with other switches in this VTP domain?

SW2
vtp domain cisco
vtp mode transparent
vtp password ciscotest
interface fastethernet0/1
description connection to sw1
switchport mode trunk
switchport trunk encapsulation dot1q

A. It transmits and processes VTP updates from any VTP clients on the network on its trunk ports.
B. It processes VTP updates from any VTP clients on the network on its access ports.
C. It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports.
D. It forwards only the VTP advertisements that it receives on its trunk ports.

Correct Answer:
D. It forwards only the VTP advertisements that it receives on its trunk ports.

Exam Question 464

A Cisco IP phone receives untagged data traffic from an attached PC. Which action is taken by the phone?

A. It drops the traffic.
B. It allows the traffic to pass through unchanged.
C. It tags the traffic with the native VLAN.
D. It tags the traffic with the default VLAN.

Correct Answer:
B. It allows the traffic to pass through unchanged.

Exam Question 465

Refer to the exhibit. Which two commands were used to create port channel 10? (Choose two.)

A. int range g0/0-1
channel-group 10 mode active
B. int range g0/0-1
channel-group 10 mode desirable
C. int range g0/0-1
channel-group 10 mode passive
D. int range g0/0-1
channel-group 10 mode auto
E. int range g0/0-1
channel-group 10 mode on

Correct Answer:
A. int range g0/0-1
channel-group 10 mode active
C. int range g0/0-1
channel-group 10 mode passive

Exam Question 466

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

A. The administrative distance must be higher on the primary route so that the backup route becomes secondary.
B. The default-information originate command must be configured for the route to be installed into the routing table.
C. The floating static route must have a lower administrative distance than the primary route so it is used as a backup.
D. The floating static route must have a higher administrative distance than the primary route so it is used as a backup

Correct Answer:
D. The floating static route must have a higher administrative distance than the primary route so it is used as a backup

Exam Question 467

Refer to the exhibit. How does the router manage traffic to 192.168.12.16?

EIGRP: 192.168.12.0/24
RIP: 192.168.12.0/27
OSPF: 192.168.12.0/28

A. It chooses the EIGRP route because it has the lowest administrative distance.
B. It load-balances traffic between all three routes.
C. It chooses the OSPF route because it has the longest prefix inclusive of the destination address.
D. It selects the RIP route because it has the longest prefix inclusive of the destination address.

Correct Answer:
C. It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

Exam Question 468

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

A. TACACS
B. CPU ACL
C. Flex ACL
D. RADIUS

Correct Answer:
B. CPU ACL

Exam Question 469

Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A accomplishes the task?


A.
config t
ip access-list extended wwwblock
permit ip any any
deny tcp any host 10.30.0.100 eq 80
int vlan 20
ip access-group wwwblock in

B.
config t
ip access-list extended wwwblock
permit ip any any
deny tcp any host 10.30.0.100 eq 80
int vlan 30
ip access-group wwwblock in

C.
config t
ip access-list extended wwwblock
deny tcp any host 10.30.0.100 eq 80
int vlan 10
ip access-group wwwblock in

D.
config t
ip access-list extended wwwblock
deny tcp any host 10.30.0.100 eq 80
permit ip any any
int vlan 20
ip access-group wwwblock in

Correct Answer:
D.
config t
ip access-list extended wwwblock
deny tcp any host 10.30.0.100 eq 80
permit ip any any
int vlan 20
ip access-group wwwblock in

Exam Question 470

In which two ways does a password manager reduce the chance of a hacker stealing a user’s password? (Choose two.)

A. It encourages users to create stronger passwords
B. It uses an internal firewall to protect the password repository from unauthorized access
C. It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
D. It automatically provides a second authentication factor that is unknown to the original user
E. It protects against keystroke logging on a compromised device or web site

Correct Answer:
A. It encourages users to create stronger passwords
E. It protects against keystroke logging on a compromised device or web site