Skip to Content

Cisco Certified Network Associate 200-301 CCNA Exam Questions and Answers – Page 1

The latest Cisco Certified Network Associate 200-301 CCNA certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco Certified Network Associate 200-301 CCNA exam and earn Cisco Certified Network Associate 200-301 CCNA certification.

Exam Question 61

Which statement best describes a converged network?

A. a network with real-time applications
B. a network with a mix of voice, video, and data traffic
C. a network with a mix of voice and video traffic
D. a network with mix of data and video traffic

Correct Answer:
B. a network with a mix of voice, video, and data traffic
Answer Description:
A converged network is a combination of voice, video, and data traffic. Network convergence is a migration from maintaining multiple service-specific networks, namely data voice and video, to a single IP-based network. All services are delivered on the same network, reducing infrastructure costs. Despite the benefits that network convergence provides, it is highly susceptible to network delays, especially for real-time traffic.
Converged networks frequently face the following problems:

  • Bandwidth: As all the voice and video networks are combined into one universal converged network, bandwidth capacity becomes a priority.
  • Packet loss: When links become congested, packets will be dropped. Voice and video traffic are intolerant of dropped packets.
  • Delay: Delay represents the time it takes for packets to traverse the network and reach their destinations. While some delay is expected, delay increases when links are over-subscribed.

Voice and video traffic are intolerant of high or variable delay. A packet that arrives late is no better than a packet that does not arrive. Delays can be variable and fixed.
Fixed delays are constant and mostly induced by the computing software of the hardware devices, such as processing delay and packetization delay.
Variable delays, known as jitter, cause problems for voice and video.
Objective: Network Fundamentals
Sub-Objective: Compare and contrast network topologies

Exam Question 62

What is the purpose of frame tagging in Virtual LAN (VLAN) configurations?

A. inter-VLAN routing
B. encryption of network packets
C. frame identification over trunk links
D. frame identification over access links

Correct Answer:
C. frame identification over trunk links
Answer Description:
Frame tagging is used when VLAN traffic travels over a trunk link. Trunk links carry frames for multiple VLANs. Therefore, frame tags are used for identification of frames from different VLANs. Inter Switch Link (ISL) and Institute of Electrical and Electronics Engineers (IEEE) 802.1q are the two frame tagging methods supported on Cisco devices.
The purpose of frame tagging is not inter-VLAN routing. A Layer 3 device, such as a router or multilayer switch, is used for inter-VLAN routing. To configure inter-VLAN routing a logical or subinterface for each VLAN must be created on the single physical interface used to connect to the switch. An IP address is NOT applied to the physical interface; instead, each subinterface is configured with an IP address that will become the default gateway of all devices residing in that VLAN. Consequently, each subinterface and its VLAN devices must reside a different subnet as well. If a subinterface on the router is NOT configured with an IP address that resides in the same network as the hosts that reside in the VLAN that the subinterface serves, the hosts in that VLAN will be isolated from the other VLANs. The hosts in the VLAN served by the subinterface should also use this address as their default gateway, or the hosts in the VLAN will likewise be isolated form the other VLANs
To verify the IP address of the subinterface, execute the show interfaces subinterface ID command. As shown below, the IP address will appear in line 3 of the output. Compare this IP address will the IP address set as the default gateway of each host in the VLAN served by the subinterface. They should be the same, and the IP address of the hosts should be in the same subnet as this address as well.
router# show interfaces fastEthernet 0/0.1
FastEthernet0/0.1 is up, line protocol is up
Hardware is AmdFE, address is 0003.e36f.41e0 (bia 0003.e36f.41e0)
Internet address is 10.10.10.1/24
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ISL Virtual LAN, Color 1.
ARP type: ARPA, ARP Timeout 04:00:00

Frame tagging does not provide encryption of network packets. Packets are transmitted unencrypted unless the network device or the application uses an additional encryption mechanism. A Virtual Private Network (VPN) is a popular solution for providing encrypted network communication.
An access link is a connection between a switch and an end-user computer with a normal Ethernet Network Interface Card (NIC). On these links, Ethernet frames are transmitted without frame tagging.
Objective: LAN Switching Fundamentals
Sub-Objective: Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches

Exam Question 63

The output of the show ip route command is given:
Router# show ip route
Gateway of last resort is 10.119.254.240 to network 10.140.0.0
O 172.16.0.0 [110/5] via 10.19.24.6, 0:01:00, Ethernet2
B 172.17.12.0 [200/128] via 10.19.24.24, 0:02:22, Ethernet2
O 172.71.13.0 [110/5] via 10.19.24.6, 0:00:59, Ethernet2
O 10.13.0.0 [110/5] via 10.19.24.6, 0:00:59, Ethernet2

What does the value 110 in the output represent?

A. The administrative distance of the information source
B. The metric to the route
C. The type of route
D. The port number of the remote router

Correct Answer:
A. The administrative distance of the information source
Answer Description:
The value 110 in the output represents the administrative distance (AD) of the information source. Administrative distance is used by Cisco routers to select the most trustworthy source of routing information for a particular route. Every routing protocol has a default administrative distance, and if more than one routing protocol is providing route information about a route, the protocol with the lowest AD will be selected to populate the routing table. The following table shows the AD values for different routing protocols:

The following table shows the AD values for different routing protocols

The following table shows the AD values for different routing protocols

The following is the sample output for the show ip route command:
Router# show ip route
Gateway of last resort is 10.119.254.240 to network 10.140.0.0
O 172.16.0.0 [110/5] via 10.19.24.6, 0:01:00, Ethernet2
B 172.17.12.0 [200/128] via 10.19.24.24, 0:02:22, Ethernet2
O 172.71.13.0 [110/5] via 10.19.24.6, 0:00:59, Ethernet2
O 10.13.0.0 [110/5] via 10.19.24.6, 0:00:59, Ethernet2

The following are the fields in the output:

  • O: Indicates that the route was discovered using Open Shortest Path First (OSPF).
  • B: Indicates that the route was discovered using Border Gateway Protocol (BGP).
  • 172.16.0.0: Indicates the address of the remote network.
  • 110: Indicates the administrative distance of the route.
  • 128: Indicates the metric for the route.
  • Via 10.19.24.6: Specifies the address of the next router in the remote network.
  • 0:02:22: Indicates the last time the route was updated.
  • The metric for the route is also called the cost. In the case of the OSPF routes above, the cost is 5.

The administrative distance for any particular protocol can be changed if you would like to use a routing protocol that is normally not the preferred provider. For example, if you prefer that RIP routes be installed in the routing table rather than OSPF routes, you could change the administrative distance of RIP to a lower value than OSPF (110), as shown below.
Router(config)# router rip
Router(config)# distance 100

All the other options are incorrect because they do not represent the administrative distance.
Objective: Routing Fundamentals
Sub-Objective: Interpret the components of routing table

Exam Question 64

Which set of Cisco Internetwork Operating System (IOS) commands is used on Cisco routers to set a password for Telnet lines?

A. router(config-router)# line vty 0 4
router(config-line)# login
router(config-line)# password password
B. router(config)# line telnet 0 4
router(config-line)# login
router(config-line)# password password
C. router(config)# line aux 0
router(config-line)# login
router(config-line)# password password
D. router(config)# line vty 0 4
router(config-line)# login
router(config-line)# password password

Correct Answer:
D. router(config)# line vty 0 4
router(config-line)# login
router(config-line)# password password
Answer Description:
The following commands are used on Cisco routers to set a password for Telnet lines:
router(config)# line vty 0 4
router(config-line)# login
router(config-line)# password password

An explanation of the commands is below:
router(config)# line vty 0 4: Enters line configuration mode for virtual terminal lines 0 to 4.
router(config-line)# login: Ensures that any remote access is prompted for a password.
router(config-line)# password password: Sets a password of “password” for VTY lines.
Assigning a password to the VTY lines is required for remote connections to the device to be possible. If a password has not been configured the following error message will be generated when the connection is attempted:
Password required but not set
[Connection to foreign host 106.5.5.1 closed by foreign host]

Configuring a VTY password and requiring the password (accomplished with the login command) is good first step in securing Telnet access to the device. Another step that can enhance the security of remote access to the device would be to apply an access list to the VTY lines with the access-class command.
The command sequence which begins with router(config-router)# line vty 0 4 is incorrect because the line vty 0 4 command should be executed in global configuration mode, not routing protocol configuration mode.
The line telnet 0 4 command is incorrect because this is not a valid Cisco IOS command.
The line aux 0 command is incorrect because this allows you to configure the properties of the Auxiliary port, as opposed to the incoming Telnet (VTY) lines.
Objective: Infrastructure Management
Sub-Objective: Configure and verify device management

Exam Question 65

In which of the following networks does the address 192.168.54.23/27 reside?

A. 192.168.54.0
B. 192.168.54.8
C. 192.168.54.4
D. 192.168.54.16

Correct Answer:
A. 192.168.54.0
Answer Description:
When a class C address such as 192.168.54.0 is subnetted with a /27 mask, the subnet mask in dotted decimal format is 255.255.255.224. This means that the interval between the network IDs of the resulting subnets is 32. The resulting network IDs are as follows:
192.168.54.0
192.168.54.32
192.168.54.64
192.168.54.92 and so on.
Therefore, the address 192.168.54.23 resides in the 192.168.54.0 subnet. The address 192.168.54.0 is called a network ID or, alternately, a subnet address. It represents the subnet as a group and will be used in the routing tables to represent and locate the subnet.
Neither the first address (192.168.54.0, the network ID) nor the last address (192.168.54.31, the broadcast address) in any resulting subnet can be used. Therefore, the addresses in this range are 192.168.54.1 through 192.168.54.30, which includes the 192.168.54.23 address.
192.168.54.8 would only be a network ID if the mask were /29, which would result in an interval of 8 between network IDs. However, even if a /29 mask were used, the 192.168.54.23 address would not fall in its range. The address range for a /29 mask would be 192.168.54.9 through 192.168.54.14.
Similarly, 192.168.54.4 would only be a network ID for a /30 mask, which would result in an interval of 4 between network IDs. But even if a /30 mask were used, the 192.168.54.23 address would not fall in its range. The address range for a /30 mask would be 192.168.54.5 through 192.168.54.6.
192.168.54.16 could be a network ID if the mask were /28, /29 or /30, but not with a /27 mask.
Objective: Network Fundamentals
Sub-Objective: Apply troubleshooting methodologies to resolve problems

Exam Question 66

What is the primary benefit of the Virtual Local Area Network (VLAN) Trunking Protocol (VTP)?

A. broadcast control
B. frame tagging
C. inter-VLAN routing
D. consistent VLAN configuration across switches in a domain

Correct Answer:
D. consistent VLAN configuration across switches in a domain
Answer Description:
VTP manages configured VLANs across a switched network and maintains consistency of VLAN information throughout a VTP domain. When an administrator adds, deletes, or renames VLANs, VTP propagates this information to all other switches in the VTP domain. This makes the process of VLAN changes a plug-and-play activity. This protocol was developed by, and remains proprietary to Cisco Systems.
Broadcast control is not the primary benefit of VTP. Broadcast control is achieved by using VLANs. VLANs segment the network into logical broadcast domains. This helps in the reduction of unnecessary traffic over the network and optimizes the available bandwidth use. VTP pruning helps reduce broadcast and unknown unicast over VLAN trunk links. However, this is not the primary benefit of VTP.
Frame tagging is required for VLAN identification as frames traverse trunk links in a switch fabric. Inter-Switch Link (ISL) and IEEE 802.1q are the two methods of frame tagging available on Cisco devices. ISL is proprietary to Cisco, whereas IEEE 802.1q is a standard method. VTP is not a frame tagging method.
Inter-VLAN routing is achieved by an Open Systems Interconnect (OSI) Layer 3 device (Router). Inter-VLAN routing is not a benefit of VTP.
Objective: LAN Switching Fundamentals
Sub-Objective: Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches

Exam Question 67

Which of the following is NOT a feature offered by Enhanced Interior Gateway Routing Protocol (EIGRP)?

A. variable length subnet masks (VLSM)
B. partial updates
C. neighbor discovery mechanism
D. multiple vendor compatibility

Correct Answer:
D. multiple vendor compatibility
Answer Description:
EIGRP is a Cisco-proprietary routing protocol, and does not support multiple vendor environments.
EIGRP is a classless routing protocol, and thus supports variable length subnet masks (VLSM).
EIGRP routers build a neighbor table in memory, and use a multicast-based neighbor discovery mechanism.
EIGRP routers send partial updates when there are network events.
The following are features offered by EIGRP:

  • Fast convergence
  • Partial updates
  • Neighbor discovery mechanism
  • VLSM
  • Route summarization
  • Scalability

Objective: Routing Fundamentals
Sub-Objective: Compare and contrast distance vector and link-state routing protocols

Exam Question 68

Which of the following topologies is used in Wide Area Networks (WANs)?

A. FDDI
B. CDDI
C. SONET
D. Token Ring

Correct Answer:
C. SONET
Answer Description:
Synchronous Optical NETwork (SONET) is the standard topology for fiber optic networks. Developed in 1980s, SONET can transmit data at rates of up to 2.5 gigabits per second (Gbps).
All other options are incorrect because they are LAN topologies, not WAN topologies.
Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps dual-ring fiber optics-based token-passing LAN. FDDI is typically implemented for high-speed LAN backbones because of its support for high bandwidth.
Copper Distributed Data Interface (CDDI) is copper version of FDDI. They differ only in that FDDI can span longer distances than CDDI due to the attenuation characteristics of copper wiring.
Token Ring/IEEE 802.5 LAN technology was developed by IBM in 1970. Token-ring LAN technology is based on token-passing, in which a small frame, called a token, is passed around the network. Possession of the token grants the node the right to transmit data. Once the data is transmitted, the station passes the token to the next end station.
Objective: Network Fundamentals
Sub-Objective: Compare and contrast network topologies

Exam Question 69

Two catalyst switches on a LAN are connected to each other with redundant links and have Spanning Tree Protocol (STP) disabled.
What problem could occur from this configuration?

A. It may cause broadcast storms.
B. All ports on both switches may change to a forwarding state.
C. It may cause a collision storm.
D. These switches will not forward VTP information.

Correct Answer:
A. It may cause broadcast storms.
Answer Description:
The configuration in the scenario may cause broadcast storms. When there are redundant links between two switches, it is recommended that you enable Spanning Tree Protocol to avoid switching loops or broadcast storms. Loops occur when there is more than one path between two switches. STP allows only one active path at a time, thus preventing loops. A broadcast storm occurs when the network is plagued with constant broadcasts. When the switches have redundant links, the resulting loops would generate more broadcasts, eventually resulting in a complete blockage of available bandwidth that could bring the complete network down. This situation is referred to as a broadcast storm.
The option stating that all ports on both switches may change to a forwarding state is incorrect. Forwarding is a port state that is available when using STP. When STP is disabled, the switch cannot change the STP states of its ports.
The option stating that the switches will not forward VLAN Trunking Protocol (VTP) information is incorrect. Enabling or disabling STP does not have a direct effect on VTP messages.
The term collision storm is not a valid term.
Objective: LAN Switching Fundamentals
Sub-Objective: Configure, verify, and troubleshoot interswitch connectivity

Exam Question 70

Which two statements are TRUE of Internet Protocol (IP) addressing? (Choose two.)

A. Public addresses are registered with the Internet Assigned Numbers Authority (IANA).
B. These addresses are publicly registered with the Internet Service Provider (ISP).
C. Through a public IP address, you can access another computer on the Internet, such as a Web server.
D. The ranges of public IP addressing are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
E. Private addresses are allocated by the Internet Assigned Numbers Authority (IANA).

Correct Answer:
A. Public addresses are registered with the Internet Assigned Numbers Authority (IANA).
C. Through a public IP address, you can access another computer on the Internet, such as a Web server.
Answer Description:
Public addresses are publicly registered with the Internet Assigned Numbers Authority (IANA). Through a public IP address, you can access an Internet computer like a Web server.
The following statements are true of public IP addressing:

  • These addresses are publicly registered with the Internet Assigned Numbers Authority (IANA)
  • Through a public IP address, you can access another Internet computer, such as a Web server.
  • Other people on the Internet can obtain information about or access to your computer via a public IP address.
  • Public IP addresses are visible to the public.

The option stating that public IP addresses are publicly registered with the Internet Service Provider (ISP) is incorrect. Public IP addresses are registered with the Internet Assigned Numbers Authority (IANA). Since 1998, InterNIC has been primarily responsible for allocating domain names and IP addresses under the governance of the Internet Corporation for Assigned Names and Numbers (ICANN) body, a U.S. non-profit corporation that was created to oversee work performed by the Internet Assigned Numbers Authority (IANA).
The option stating that 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are the range of public IP addressing is incorrect. These ranges belong to private IP addressing.
The option stating that private addresses are allocated by the IANA is incorrect. Private IP address are not managed, but are used by private organizations as they see fit.. The IANA is governed by ICANN, and its primarily role is to allocate overseas global IP addresses from the pools of unallocated addresses, as well as DNS root zone management.
Objective: Network Fundamentals
Sub-Objective: Describe the need for private IPv4 addressing