cisco 200-301 practice test

Exam Title: Cisco Certified Network Associate (CCNA)

Last update: Dec 25 ,2025
Question 1



Refer to the exhibit. The IPv6 address for the LAN segment on router R2 must be configured using the EUI-64 format. When configured which ipv6 address is produced by the router?

  • A. 2001:db8:9aa6:6aa9:C801:A6FF:FEA4:1
  • B. 2001:db8:9aa6:6aa9:C081:A6FF:FF4A:1
  • C. 2001:db8:9aa6:6aa9:C001:6AFE:FF00:1
  • D. 2001:db8:9aa6:6aa9:4642:823F:FE47:1
Answer:

a

vote your answer:
A
B
C
D
A 2 B 0 C 2 D 0
Comments
Question 2

What must be considered before deploying virtual machines?

  • A. resource limitations, such as the number of CPU cores and the amount of memory
  • B. support for physical peripherals, such as monitors, keyboards, and mice
  • C. whether to leverage VSM to map multiple virtual processors to two or more virtual machines
  • D. location of the virtual machines within the data center environment
Answer:

a

vote your answer:
A
B
C
D
A 4 B 0 C 1 D 0
Comments
Question 3

SIMULATION


Guidelines

This is a lab item in which tasks will be performed on virtual devices

Refer to the Tasks tab to view the tasks for this lab item.
Refer to the Topology tab to access the device console(s) and perform the tasks.
Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
All necessary preconfigurations have been applied.
Do not change the enable password or hostname for any device.
Save your configurations to NVRAM before moving to the next item.
Click Next at the bottom of the screen to submit this lab and move to the next question.
When Next is clicked the lab closes and cannot be reopened.


Topology




Tasks

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted across any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:


VLAN 202: MARKETING

VLAN 303: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.
2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.
3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.





Answer:

Comments
Question 4

DRAG DROP

Drag and drop the characteristic from the left onto the cable type on the right.

Answer:

Comments
rattwell
10 months, 3 weeks ago

Copper:
- Is typically used in small office applications
- Is not easily broken

Single-mode fiber:
- Eliminates distortion from overlapping light pulses
- Transmits data of up to 40Gbit/s over long distances

Tinker
8 months ago

a grandes rasgos se puede aceptar lo descrito, sin embargo la fibra tampoco es facil de romper debido a su revestimiento, sea tanto para troncales o para acceso

Question 5


Refer to the exhibit. Which outcome is expected when PC_A sends data to PC_B after their initial communication?

  • A. The source MAC address is changed.
  • B. The destination MAC address is replaced with ffff.ffff.ffff.
  • C. The source and destination MAC addresses remain the same.
  • D. The switch rewrites the source and destination MAC addresses with its own.
Answer:

c

vote your answer:
A
B
C
D
A 0 B 0 C 3 D 1
Comments
Question 6

What is the function of the controller in a software-defined network?

  • A. forwarding packets
  • B. multicast replication at the hardware level
  • C. setting packet-handling policies
  • D. fragmenting and reassembling packets
Answer:

c

vote your answer:
A
B
C
D
A 0 B 0 C 4 D 0
Comments
Question 7

What is a characteristic of encryption in wireless networks?

  • A. provides increased protection against spyware
  • B. prompts a user for a login ID
  • C. uses ciphers to detect and prevent zero-day network attacks
  • D. prevents the interception of data as it transits a network
Answer:

d

vote your answer:
A
B
C
D
A 0 B 1 C 0 D 4
Comments
Question 8


Refer to the exhibit. Each router must be configured with the last usable IP address in the subnet. Which configuration fulfills this requirement?

  • A. R7# interface FastEthernet1/0 ip address 10.88.31.127 255.255.255.192 R8# interface FastEthernet0/0 ip address 10.19.63.95 255.255.255.240 R9# interface FastEthernet1/1 ip address 10.23.98.159 255.255.255.224
  • B. R7# interface FastEthernet1/0 ip address 10.88.31.126 255.255.255.240 R8# interface FastEthernet0/0 ip address 10.19.63.94 255.255.255.192 R9# interface FastEthernet1/1 ip address 10.23.98.158 255.255.255.248
  • C. R7# interface FastEthernet1/0 ip address 10.88.31.127 255.255.255.240 R8# interface FastEthernet0/0 ip address 10.19.63.95 255.255.255.192 R9# interface FastEthernet1/1 ip address 10.23.98.159 255.255.255.248
  • D. R7# interface FastEthernet1/0 ip address 10.88.31.126 255.255.255.192 R8# interface FastEthernet0/0 ip address 10.19.63.94 255.255.255.240 R9# interface FastEthernet1/1 ip address 10.23.98.158 255.255.255.224
Answer:

d

vote your answer:
A
B
C
D
A 2 B 0 C 0 D 3
Comments
Question 9

Which protocol does a REST API use to communicate?

  • A. SSH
  • B. STP
  • C. SNMP
  • D. HTTP
Answer:

d

vote your answer:
A
B
C
D
A 0 B 0 C 2 D 3
Comments
Question 10

Which device separates networks by security domains?

  • A. intrusion protection system
  • B. firewall
  • C. wireless controller
  • D. access point
Answer:

b

vote your answer:
A
B
C
D
A 0 B 5 C 0 D 0
Comments
Page 1 out of 136
Viewing questions 1-10 out of 1368
Go To
page 2