DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Boost Your Certification Prep with CCNA 200-301 Mock Tests, Cisco Certified Network Associate | SPOTO

Elevate your certification preparation for the 200-301 CCNA exam with SPOTO's mock tests. Our mock exams provide a comprehensive platform to reinforce theoretical knowledge and practical skills in networking. Dive into our extensive collection of exam materials, including exam dumps and sample questions, to enhance your understanding of key topics. Engage in mock exams to simulate real exam scenarios and refine your test-taking abilities. Whether you're seeking exam answers or looking for free test samples, SPOTO offers the essential resources to support your exam preparation journey. With our online exam questions and exam simulator, you'll gain invaluable insights and confidence for success. Trust SPOTO to boost your certification prep and guide you towards achieving your CCNA certification goals.
Take other online exams

Question #1
Which of the following is NOT a possible component of Enhanced Interior Gateway Routing Protocol's (EIGRP) composite metric?
A. Cost
B. Load
C. Delay
D. Bandwidth
View answer
Correct Answer: A

View The Updated 200-301 Exam Questions

SPOTO Provides 100% Real 200-301 Exam Questions for You to Pass Your 200-301 Exam!

Question #2
You are the network administrator for your company and have configured Cisco Discovery Protocol (CDP) in your network. You recently noticed that when devices send large numbers of CDP neighbor announcements, some devices are crashing. You decide to disable CDP on the router. Which command should you use to achieve the objective?
A. no cdp run
B. set cdp disable
C. no cdp enable
D. no cdp advertise-v2
View answer
Correct Answer: A
Question #3
Which Cisco IOS command disables Cisco Discovery Protocol Version 2 (CDPv2) advertisements?
A. no cdp advertise-v2
B. no cdp v2-advertise
C. no cdp run
D. no cdp enable
View answer
Correct Answer: A
Question #4
Which command would you use to see which switch interface is associated with a particular MAC address?
A. show interface mac
B. show mac
C. show mac-address-table
D. show ip interface
View answer
Correct Answer: C
Question #5
Which command can be issued at the following prompt? Router(config-router)#
A. show interface
B. network
C. interface
D. ip default-gateway
View answer
Correct Answer: B
Question #6
How many IP addresses can be assigned to hosts in subnet 192.168.12.64/26?
A. 32
B. 62
C. 128
D. 256
View answer
Correct Answer: B
Question #7
In which of the following networks does the address 192.168.54.23/27 reside?
A. 192
B. 192
C. 192
D. 192
View answer
Correct Answer: A
Question #8
What data structure is pictured in the graphic?
A. TCP segment
B. UDP datagram
C. IP header
D. Http header
View answer
Correct Answer: B
Question #9
Refer to the partial output of the show interfaces command: What does the Serial 0 is administratively down, line protocol is down line indicate with certainty?
A. There is no problem with the physical connectivity
B. There is a configuration problem in the local or remote router
C. There is a problem at the telephone company's end
D. The shutdown interface command is present in the router configuration
View answer
Correct Answer: D
Question #10
The conference room has a switch port available for use by the presenter during classes. Each presenter uses the same PC attached to the port. You would like to prevent any other PCs from using that port. You have completely removed the former configuration in order to start anew. Which of the following steps are required to prevent any other PCs from using that port?
A. make the port a trunk port
B. enable port security
C. make the port an access port
D. assign the MAC address of the PC to the port
E. make the port a sticky port
F. set the maximum number of MAC addresses on the port to 1
View answer
Correct Answer: BCD
Question #11
You are the network administrator for your company. You want to upgrade the network, which is currently running on IPv4, to a fully functional IPv6 network. During the transition, you want to ensure that hosts capable only of IPv6 can communicate with hosts capable only of IPv4 on the network. Which solution should you implement to accomplish the task in this scenario?
A. IPv6 over IPv4 tunnels
B. IPv6 over dedicated Wide Area Network (WAN) links
C. Dual-Stack Backbones
D. Protocol translation
View answer
Correct Answer: D
Question #12
You recently implemented SNMPv3 to increase the security of your network management system. A partial output of the show run command displays the following output that relates to SNMP: snmp-server group TECHS v3 noauth read TECHS write TECHS Which of the following statements is true of this configuration?
A. It provides encryption, but it does not provide authentication
B. It provides neither authentication nor encryption
C. It provides authentication, but it does not provide encryption
D. It provides both authentication and encryption
View answer
Correct Answer: B
Question #13
Which Enhanced Interior Gateway Routing Protocol (EIGRP) packet is NOT sent reliably over the network?
A. Update
B. Query
C. Reply
D. Acknowledgement
View answer
Correct Answer: D
Question #14
What is the primary benefit of the Virtual Local Area Network (VLAN) Trunking Protocol (VTP)?
A. broadcast control
B. frame tagging
C. inter-VLAN routing
D. consistent VLAN configuration across switches in a domain
View answer
Correct Answer: D
Question #15
Which of the following items are NOT required to match for two routers to form an OSPF adjacency?
A. Area IDs
B. Hello/Dead timers
C. Passwords (if OSPF authentication has been configured)
D. Process IDs
View answer
Correct Answer: D
Question #16
You run the following command: switch# show ip interface brief What information is displayed?
A. A summary of the IP addresses and subnet mask on the interface
B. A summary of the IP addresses on the interface and the interface's status
C. The IP packet statistics for the interfaces
D. The IP addresses for the interface and the routing protocol advertising the network
View answer
Correct Answer: B
Question #17
Which Cisco Internetwork Operating System (IOS) command is used to make the running configuration in Random Access Memory (RAM) to the configuration the router will use at startup?
A. copy running-config startup-config
B. copy flash running-config
C. copy tftp flash
D. copy running-config flash memory
E. copy startup-config tftp
F. copy tftp running-config
G. copy running-config tftp
View answer
Correct Answer: A
Question #18
You are configuring Open Shortest Path First (OSPF) protocol for IPv6 on Router5. The router has two interfaces, which have been configured as follows: S0/0 - 192.168.5.1/24 S0/1 - 10.0.0.6/8 You would like OSPF to route for IPv6 only on the S0/0 network. It should not route for IPv6 on the S0/1 network. The process ID you have chosen to use is 25. You do not want to apply an IPv6 address yet. Which of the following command sets would enable OSPF for IPv6 as required?
A. Router5(config)#ipv6 ospf 25 Router5(config)# network 192
B. Router5(config)#ipv6 ospf 25 Router5(config)#router-id 192
C. Router5(config)#ipv6 unicast-routingRouter5(config)#ipv6 router ospf 25 Router5(config-rtr)#router-id 1
D. Router5(config)#ipv6 unicast-routingRouter5(config)#ipv6 ospf 25 Router5(config-rtr)#router-id 1
View answer
Correct Answer: C
Question #19
Which are among the valid steps in the process of recovering a password on a Cisco router? (Choose all that apply.)
A. Restart the router
B. Configure the enable secret password
C. Enter the router diagnostic mode
D. Enter user mode
E. Answer the security question to recover the password
View answer
Correct Answer: ABC
Question #20
Which of the following is the correct command to define a default route using a gateway address of 172.16.0.254?
A. ip default-route 172
B. ip route 0
C. default-gateway 172
D. ip route default 172
View answer
Correct Answer: B
Question #21
You have been assigned a network ID of 172.16.0.0/26. If you utilize the first network resulting from this ID, what would be the last legitimate host address in this subnet?
A. 172
B. 172
C. 172
D. 172
View answer
Correct Answer: C
Question #22
Which of the following is NOT managed by the cloud provider in an IaaS deployment?
A. virtualization
B. servers
C. storage
D. operating system
View answer
Correct Answer: D
Question #23
Which Cisco Internetwork Operating System (IOS) command is used to save the running configuration to non-volatile random access memory (NVRAM)?
A. copy startup-config running-config
B. move startup-config running-configC
D. move startup-config running-config
View answer
Correct Answer: C
Question #24
Which command will display the Virtual LAN (VLAN) frame tagging method for a switch link?
A. show vlan
B. show vlan encapsulation
C. show vtp status
D. show interfaces trunk
View answer
Correct Answer: D
Question #25
The exhibit displays the MAC address table of a switch in your network, along with the location of each device connected to the switch. Which of the following frames will cause the switch to add a new MAC address to its table and forward the frame to all ports when the frame is received?
A. source MAC: 12-34-56-78-9A-BC, destination MAC: ff-ff-ff-ff-ff-ff
B. source MAC: ff-ff-ff-ff-ff, destination MAC: 12-34-56-78-9A-BC
C. source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BC
D. source MAC: 12-34-56-78-9A-BC, destination MAC: 12-34-56-78-9A-BF
View answer
Correct Answer: A
Question #26
In the following partial output of the show ip route command, what does the letter D stand for? D 192.1.2.0/24 via 5.1.1.71 [w:0 m:0] C 192.8.1.1/32 directly connected to loopback 0
A. This is a default route
B. This is an EIGRP route
C. This is static route
D. This is a directly connected route
View answer
Correct Answer: B
Question #27
Which of the following statements is true with regard to SDN?
A. It combines the control plane and the data plane
B. It separates the data plane and the forwarding plan
C. It implements the control plane as software
D. It implements the data plane as software
View answer
Correct Answer: C
Question #28
What command would provide the output displayed in the exhibit? (Click on the Exhibit(s) button.)
A. switch# show hsrp
B. switch# show standby
C. switch# show interface vlan
D. switch# show standby brief
View answer
Correct Answer: D
Question #29
Which of the following topologies is used in Wide Area Networks (WANs)?
A. FDDI
B. CDDI
C. SONET
D. Token Ring
View answer
Correct Answer: C
Question #30
You are the network administrator for your company. You have implemented VLAN Trunking Protocol (VTP) in your network. However, you have found that VTP is not synchronizing VLAN information. Which of the following items should be verified to resolve the problem? (Choose three.)
A. Ensure that switches in the VTP domain are configured with VTP version 1 and version 2
B. Ensure that VLANs are active on at least one switch on the VTP domain
C. Ensure that all of the ports that interconnect switches are configured as trunks and are trunking properly
D. Ensure that the VTP domain name is the same on all switches in the domain
E. Ensure that identical passwords are configured on all VTP switches
View answer
Correct Answer: CDE
Question #31
Which of the following statements are TRUE regarding EIGRP operation? (Choose two.)
A. A successor is a backup route, and is installed in both the routing and topology tables
B. A successor is a primary route, and is installed in both the routing and topology tables
C. A successor is a primary route, and is installed only in the routing table
D. A feasible successor is a backup route, and is installed in both the routing and topology tables
E. A feasible successor is a primary route, and is only installed in the routing table
F. A feasible successor is a backup route, and is only installed in the topology table
G. If the successor route fails and no feasible successor route exists, the router will send an update with the route marked with an unreachable metric of 16
View answer
Correct Answer: BF
Question #32
Consider the following diagram: Which of the following routing protocols could NOT be used with this design?
A. RIPv1
B. RIPv2
C. EIGRP
D. OSPF
View answer
Correct Answer: A
Question #33
Which show interfaces command output indicates that the link may not be functional due to a Data Link layer issue, while the Physical layer is operational?
A. Ethernet 0/0 is up, line protocol is up
B. Ethernet 0/0 is up, line protocol is down
C. Ethernet 0/0 is down, line protocol is up
D. Ethernet 0/0 is down, line protocol is down
View answer
Correct Answer: B
Question #34
Which option lists the given applications in the correct sequence of increasing bandwidth consumption?
A. an interactive Telnet session on a server running an SAP application a voice conversation between PC-based VoIP services a voice conversation between two IP phones while accessing an online video site
B. a voice conversation between two IP phones while accessing an online video site an interactive Telnet session on a server running an SAP application a voice conversation between PC-based VoIP services
C. a voice conversation between PC-based VoIP services a voice conversation between two IP phones while accessing an online video site an interactive Telnet session on a server running an SAP application
D. an interactive Telnet session on a server running an SAP application a voice conversation between two IP phones while accessing an online video site a voice conversation between PC-based VoIP services
View answer
Correct Answer: A
Question #35
In the diagram below, when a packet sent from the PC at 10.0.1.3 to the PC at 10.1.1.3 leaves the Fa0/1 interface of R1, what will be the source and destination IP and MAC addresses?
A. source IP 10
B. source IP 10
C. source IP 10
D. source IP 10
View answer
Correct Answer: C
Question #36
Which of the following statements are true of Class C IP addresses?
A. The decimal values of the first octet can range from 192 to 223
B. The decimal values of the first octet can range from 1 to 126
C. The first octet represents the entire network portion of the address
D. The first three octets represent the entire network portion of the address
E. The value of the first binary place in the first octet must be 0
F. The value of the first two binary places in the first octet must be 11
View answer
Correct Answer: ADF

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: