Skip to Content

Cisco Certified Network Associate 200-301 CCNA Exam Questions and Answers – Page 1

The latest Cisco Certified Network Associate 200-301 CCNA certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Cisco Certified Network Associate 200-301 CCNA exam and earn Cisco Certified Network Associate 200-301 CCNA certification.

Exam Question 81

Which are among the valid steps in the process of recovering a password on a Cisco router? (Choose all that apply.)

A. Restart the router.
B. Configure the enable secret password.
C. Enter the router diagnostic mode.
D. Enter user mode.
E. Answer the security question to recover the password.

Correct Answer:
A. Restart the router.
B. Configure the enable secret password.
C. Enter the router diagnostic mode.
Answer Description:
Three of the steps that should be performed while recovering a password on a Cisco router are to restart the router in ROMMOM mode, enter ROMMON mode (router diagnostic mode) and reset the enable secret password. The complete password recovery process on a Cisco Router is as follows:
Configure the router so that it starts without reading the non-volatile random access memory (NVRAM). This is also referred to as the system test mode, which you enter by changing the configuration register. You must first restart the router and within 60 seconds press Break on the terminal keyboard. Then the router will skip normal reading of the startup configuration file and will go to the ROMMON prompt (shown below this text section). At this command prompt, type confreg 0x2142 to instruct the router to boot to flash memory at the next reboot. When it does, it will ignore the startup configuration file again and will behave as if it had no configuration, as a new router would.
rommon 1> confreg 0x2142
Type reset to reboot the router.
Enter enable mode through the test system mode.
View the existing password (if it can be viewed, it may be encrypted), configure a new password, or delete the configuration.
Configure the router to start by reading the NVRAM, which is done by resetting the configuration register to its normal value. Run these commands:
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#config
Router(config)#config-register 0x2102

Restart the router.
You will proceed through user mode but to make any changes you make must be at the global configuration prompt.
Finally, there is no way to recover a password by answering a security question.
Objective: Infrastructure Management
Sub-Objective: Use Cisco IOS tools to troubleshoot and resolve problems

Exam Question 82

Which of the following is NOT a possible component of Enhanced Interior Gateway Routing Protocol’s (EIGRP) composite metric?

A. Cost
B. Load
C. Delay
D. Bandwidth

Correct Answer:
A. Cost
Answer Description:
Cost is not a component of EIGRP’s composite metric. The cost, or efficiency, of a path is used as a metric by the Open Shortest Path First (OSPF) routing protocol.
Enhanced IGRP (EIGRP) is Cisco Systems’ proprietary routing protocol. It can use bandwidth, delay, load, reliability, and maximum transmission unit (MTU) to calculate the metric. Of these five metrics, by default, only minimum bandwidth and delay are used to compute the best path.
The metric for EIGRP can be calculated with this formula:
Metric = [K1 * Bandwidth + (K2 * Bandwidth) / (256-load) + K3*Delay] * [K5 / (reliability + K4)]
The default constant values for Cisco routers are K1 = 1, K3 = 1, and K2 = 0, K4 = 0, K5 = 0. In the default setting, K1 and K3 have non-zero values, and therefore, by default, the metric is dependent on bandwidth and delay.
Objective: Routing Fundamentals
Sub-Objective: Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)

Exam Question 83

Which of the following is the correct command to define a default route using a gateway address of 172.16.0.254?

A. ip default-route 172.16.0.254 255.255.0.0
B. ip route 0.0.0.0 0.0.0.0 172.16.0.254
C. default-gateway 172.16.0.254
D. ip route default 172.16.0.254

Correct Answer:
B. ip route 0.0.0.0 0.0.0.0 172.16.0.254
Answer Description:
The ip route command is used to manually define a static route to a destination network. The syntax of the command is as follows:
ip route [destination_network] [mask] [next-hop_address or exit interface] [administrative_distance] [permanent]
The attributes of the command are as follows:

  • destination_network: Defines the network that needs to be added in the routing table.
  • mask: Defines the subnet mask used on the network.
  • next-hop_address: Defines the default gateway or next-hop router that receives and forwards the packets to the remote network.
  • administrative_distance (AD): States the administrative distance. Static routes have an AD of 1, which can be changed to change the priority of the route.

Creating a default route is accomplished by substituting 0.0.0.0 for both the [destination_network] and [mask] fields, yielding the following command to create a default route through host 172.16.0.254:
router(config)# ip route 0.0.0.0 0.0.0.0 172.16.0.254
Any route configured manually is considered a static route. Another example of a command that creates a non-default route is shown below:
router(config)# ip route 192.168.12.0 255.255.255.0 172.65.3.1
This command would instruct the router on which the command was executed to send any traffic for the 192.168.12.0/24 network to the router located at 172.65.3.1.
You can also affect the route by changing the administrative distance of the route. By default, all static routes have an AD of 1, making them preferable to routes learned from routing protocols. However, you can add the AD parameter at the end of the command as shown below, making the static route less desirable than one learned from a routing protocol such as RIP:
router(config)# ip route 192.168.12.0 255.255.255.0 172.65.3.1 150
One reason to configure the routes this way could be to make the static route a backup route to the route learned by RIP, such as when the static route is a less desirable route through a distant office.
Once the ip route command has been used to add either a static route or a static default route to a router, the routes should appear in the routing table. They will be indicated with an S next to a static route and an S* for a default static route. The first two examples from the explanation above would appear in the routing table as follows:
S*0.0.0.0/0 [1/0] via 172.16.0.254
S 192.168.12.0/24 [1/0] via 172.65.3.1

The ip default-route, default-gateway, and ip route default commands are incorrect because they are not valid Cisco IOS commands.
Objective: Routing Fundamentals
Sub-Objective: Configure, verify, and troubleshoot IPv4 and IPv6 static routing

Exam Question 84

Which Cisco Internetwork Operating System (IOS) command is used to save the running configuration to non-volatile random access memory (NVRAM)?

A. copy startup-config running-config
B. move startup-config running-config
C. copy running-config startup-config
D. move startup-config running-config

Correct Answer:
C. copy running-config startup-config
Answer Description:
The copy running-config startup-config command is used to save the running configuration to NVRAM. This command will should always been run after making changes to the configuration. Failure to do so will result in the changes being discarded at the next restart of the router. When the router is restarted, the startup configuration file is copied to RAM and becomes the running configuration.
The copy startup-config running-config command is incorrect because this command is used to copy the startup configuration to the running configuration. The command would be used to discard changes to the configuration without restarting the router.
The move startup-config running-config and move startup-config running-config commands are incorrect because these are not valid Cisco IOS commands. There is no move command when discussing the manipulation of configuration files.
Objective: Infrastructure Management
Sub-Objective: Perform device maintenance

Exam Question 85

Which option lists the given applications in the correct sequence of increasing bandwidth consumption?

A. an interactive Telnet session on a server running an SAP application
a voice conversation between PC-based VoIP services
a voice conversation between two IP phones while accessing an online video site
B. a voice conversation between two IP phones while accessing an online video site
an interactive Telnet session on a server running an SAP application
a voice conversation between PC-based VoIP services
C. a voice conversation between PC-based VoIP services
a voice conversation between two IP phones while accessing an online video site
an interactive Telnet session on a server running an SAP application
D. an interactive Telnet session on a server running an SAP application
a voice conversation between two IP phones while accessing an online video site
a voice conversation between PC-based VoIP services

Correct Answer:
A. an interactive Telnet session on a server running an SAP application
a voice conversation between PC-based VoIP services
a voice conversation between two IP phones while accessing an online video site
Answer Description:
The correct sequence of increasing bandwidth consumption in the given scenario would be, from lowest to highest:

  1. an interactive Telnet session on a server running an SAP application
  2. a voice conversation between PC-based VoIP services
  3. a voice conversation between two IP phones while accessing an online video site

An interactive Telnet session uses the least amount of bandwidth of the three application examples because it mainly involves the transfer of text.
A voice conversation between IP phones, also known as voice over IP (VoIP) traffic, requires more bandwidth than Telnet. Voice traffic is delay-sensitive and benefits from Quality of Service (QoS) to ensure service quality.
A voice conversation between two IP phones while accessing an online video site would consume the most bandwidth. A voice conversation with real-time video exchange is the equivalent of real-time video traffic. Video traffic is real-time and benefits from dedicated bandwidth with QoS implementation to ensure quality.
Objective: WAN Technologies
Sub-Objective: Describe basic QoS concepts

Exam Question 86

Which command would be used to establish static translation between an inside local address 192.168.144.25 and an inside global address 202.56.63.102?

A. router(config)#ip nat inside source static 192.168.144.25 202.56.63.102
B. router(config)#ip source nat inside static local-ip 192.168.144.25 global-ip 202.56.63.102
C. router(config)#ip nat static inside source 192.168.144.25 202.56.63.102
D. router(config)#ip nat inside static source 192.168.144.25 202.56.63.102

Correct Answer:
A. router(config)#ip nat inside source static 192.168.144.25 202.56.63.102
Answer Description:
To establish a static translation between an inside local address 192.168.144.25 and an inside global address 202.56.63.102, you would use the ip nat inside source static 192.168.144.25 202.56.63.102 command executed in global configuration mode. The correct format of the command is:
ip nat inside source static local-ip global-ip
This static configuration can be removed by entering the global no ip nat inside source static command.
Simply executing the ip nat inside source command will not result in NAT functioning. The NAT process also has to be applied correctly to the inside and outside interfaces. For example if, in this scenario the Fa0/0 interface hosted the LAN and the S0/0 interface connected to the Internet the following commands would complete the configuration of static NAT.
Router(config)#interface F0/0
Router(config-if)#ip nat inside
Router(config-if)#exit
Router(config)#interface S0/0
Router(config-if)#ip nat outside

The other options are incorrect because they are not valid Cisco IOS configuration commands. They all contain syntax errors.
Objective: Infrastructure Services
Sub-Objective: Configure, verify, and troubleshoot inside source NAT

Exam Question 87

How many IP addresses can be assigned to hosts in subnet 192.168.12.64/26?

A. 32
B. 62
C. 128
D. 256

Correct Answer:
B. 62
Answer Description:
Subnet 192.168.12.64/26 has 62 IP addresses that can be assigned to hosts.
The formula to calculate the available number of hosts is: 2n – 2 = x
Where n = the number of host bits in the subnet mask and x = the number of possible hosts.
You will subtract 2 from the hosts calculation to remove the first address (the network ID) and the last address (the broadcast ID) from the valid hosts range. These addresses are reserved as the network ID and the broadcast address, respectively, in each subnet.
An IP address has 32 available bits divided into four octets. In this scenario, the /26 indicates that the subnet mask is 26 bits long, or that 26 bits are reserved for the network portion of the address. This leaves 6 bits for the host addresses (32 – 26 = 6). The number of host addresses would be calculated as follows:
Number of hosts = 26 – 2
Number of hosts = 64 – 2 = 62
Another simple way of determining the number of hosts in a range, when the subnet mask extends into the last octet, is to determine the decimal value of the last bit in the subnet mask after converting it to binary notation. This process only works when the subnet extends into the last octet, meaning that the subnet is greater than /24. The /26 subnet mask equals 26 network bits and 6 hosts bits, written as follows:
11111111.11111111.1111111.11000000
The 1s represent network bits and the 0s represent host bits.
In this example, the 26th bit (read from left to right) has a decimal value of 64, indicating that this subnet has 64 addresses. Subtract 2 to represent the network and broadcast addresses (64 – 2 = 62). This shows that this subnet range can be used to address 62 hosts.
Network address: 192.168.12.0
Subnet Mask in decimal: 255.255.255.192
Subnet Mask in binary: 11111111.11111111.11111111.11000000
Hosts: 64 – 2 = 62
For subnet 192.168.12.64, the valid host range will start from 192.168.12.65 to 192.168.12.126. For the next subnet 192.168.12.128, the valid host range will start from 192.168.12.129 to 192.168.12.190.
To construct a subnet that would contain 32 addresses would require using a mask of 255.255.255.224. This mask would leave 5 host bits, and 25 – 2 = 32.
To construct a subnet that would contain 128 addresses would require using a mask of 255.255.255.128. This mask would leave 7 host bits, and 27 – 2 = 128.
To construct a subnet that would contain 256 addresses would require using a mask of 255.255.255.0. This mask would leave 8 host bits, and 2(8) – 2 = 256.
Objective: Network Fundamentals
Sub-Objective: Configure, verify, and troubleshoot IPv4 addressing and subnetting

Exam Question 88

Examine the network diagram.

Which switch port(s) will be in a forwarding state?

Which switch port(s) will be in a forwarding state?

Which switch port(s) will be in a forwarding state? (Choose two.)

A. SwitchA – Fa0/1 and Fa0/2
B. SwitchA – Fa0/1
C. SwitchA – Fa0/2
D. SwitchB – Fa0/1
E. SwitchB – Fa0/2

Correct Answer:
A. SwitchA – Fa0/1 and Fa0/2
D. SwitchB – Fa0/1
Answer Description:
Both switch ports on Switch A and Fa0/1 on Switch B will be in a forwarding state. Switch A will become the STP root bridge due to its lower MAC address. All ports on the root bridge will become designated ports in a forwarding state. Switch B has redundant connectivity to the root bridge, and must block one of its interfaces to prevent a switching loop. Both interfaces are the same speed (FastEthernet), and thus their cost to the root is the same. Finally, the interface with the lowest number will become the forwarding port. F0/1 has a lower port number than F0/2, so F0/1 becomes a forwarding port, and F0/2 becomes a blocking port.
In this scenario there are only two switches in the diagram. However, if there were more switches and Switch A were not the root bridge, the result would be the same with regard to the ports between Swicth A and B. Whenever there are redundant links between switches, one of the four ports involved will be set to a blocking (or in the case of RSTP, discarding) mode. The logic will still be the same, since the cost to get to the root bridge will still be equal if the port speeds are equal.
Without STP (which can be disabled) operating on switches with redundant links, such as those in the figure, loops can and almost surely will occur. For example, if a host connected to SwitchA were to send an ARP request for the MAC address of a host connected to SwitchB, the request could loop and cause a broadcast storm, slowing performance dramatically. This would probably occur when any host connected to either switch sends a broadcast frame, such as a DHCP request.
Rapid Spanning Tree Protocol (RSTP) uses the term discarding for a switch port that is not forwarding frames.
Objective: LAN Switching Fundamentals
Sub-Objective: Configure, verify, and troubleshoot STP protocols

Exam Question 89

Refer to the partial output of the show interfaces command:

Refer to the partial output of the show interfaces command

Refer to the partial output of the show interfaces command

What does the Serial 0 is administratively down, line protocol is down line indicate with certainty?

A. There is no problem with physical connectivity.
B. There is a configuration problem in the local or remote router.
C. There is a problem at the telephone company’s end.
D. The shutdown interface command is present in the router configuration.

Correct Answer:
D. The shutdown interface command is present in the router configuration.
Answer Description:
The Serial 0 is administratively down, line protocol is down line in the output of the show interfaces command indicates the following:

  • The shutdown interface command is present in the router configuration. This indicates that the administrator might have manually shut down the interface by issuing the shutdown command.
  • A duplicate Internet Protocol (IP) address might be in use.

This line does not show that there is no problem with the physical connectivity. Since the interface is administratively shut down, there is no way of determining the operational status of the physical layer.
The Serial 0 is administratively down, line protocol is down line does not indicate a configuration problem in the local or remote router. A problem in the configuration of local or remote router would be indicated by the Serial 0 is up, line protocol is down message.
This line does not show that there is a problem at the telephone company’s end. Since the interface is administratively shut down, there is no way of determining the operational status of the physical layer or protocol layer on the other end of the line.
Objective: Infrastructure Management
Sub-Objective: Use Cisco IOS tools to troubleshoot and resolve problems

Exam Question 90

The following exhibit displays the MAC address table of a switch in your network, along with the location of each device connected to the switch:

The following exhibit displays the MAC address table of a switch in your network, along with the location of each device connected to the switch。

The following exhibit displays the MAC address table of a switch in your network, along with the location of each device connected to the switch。

Which of the following frames will be flooded to all ports after it is received by the switch?

A. source MAC: 12-34-56-78-9A-BD, destination MAC: 12-34-56-78-9A-BF
B. source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BD
C. source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BC
D. source MAC: 12-34-56-78-9A-BC, destination MAC: 12-34-56-78-9A-BF

Correct Answer:
C. source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BC
Answer Description:
The frame with a source MAC of 12-34-56-78-9A-BF and a destination MAC of 12-34-56-78-9A-BC would be sent to all ports because the destination MAC address is not already in the MAC address table.
The frame with a source MAC of 12-34-56-78-9A-BD and a destination MAC of 12-34-56-78-9A-BF would not be sent to all ports because the destination MAC address is in the MAC address table.
The frame with a source MAC of 12-34-56-78-9A-BF and a destination MAC of 12-34-56-78-9A-BD would not be sent to all ports because the destination MAC address is in the MAC address table.
The frame with a source MAC of 12-34-56-78-9A-BC and a destination MAC of 12-34-56-78-9A-BF would not be sent to all ports because the destination MAC address is in the MAC address table.
Objective: LAN Switching Fundamentals
Sub-Objective: Interpret Ethernet frame format