DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CCNA 200-301 certification sample questions and answer

Prepare for the Cisco Certified Network Associate (CCNA) 200-301 exam with our comprehensive exam resources. Our CCNA 200-301 practice tests and study materials provide authentic exam questions and answers, allowing you to simulate the real exam environment. Access verified dumps and practice exams to identify your strengths and weaknesses, ensuring thorough exam preparation. Our up-to-date study materials cover all exam objectives, equipping you with the knowledge and skills needed to successfully pass the CCNA certification exam. Boost your confidence and increase your chances of acing the exam with our reliable CCNA 200-301 exam resources. Whether you're a beginner or have some experience, our resources cater to your needs, helping you achieve your certification goals efficiently and effectively.
Take other online exams

Question #1
A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue?
A. physical cable fault
B. speed mismatch
C. igh bandwidth usage
D. cable that is too long
View answer
Correct Answer: A

View The Updated 200-301 Exam Questions

SPOTO Provides 100% Real 200-301 Exam Questions for You to Pass Your 200-301 Exam!

Question #2
What is the difference between 1000BASE-LX/LH and 1000BASE-ZX interfaces?
A. 000BASE-LX/LH interoperates with multimode and single-mode fiber, and 1000BASE-ZX needs a conditioning patch cable with multimode
B. 000BASE-ZX interoperates with dual-rate 100M/1G 10Km SFP over multimode fiber, and 1000BASE-LX/LH supports only single-rate
C. 000BASE-ZX is supported on links up to 1000km, and 1000BASE-LX/LH operates over links up to 70 km
D. 000BASE- LX/LH is supported on links up to 10km, and 1000Base-ZX operates over links up to 70 km
View answer
Correct Answer: D
Question #3
What are two reasons to implement IPv4 private addressing on a network? (Choose two.)
A. ack of routing protocol support for CIDR and VLSM
B. ack of security protocols at the network perimeter
C. ack of available TCP/UDP ports per IPv5 address
D. ack of available publicly routable unique IPv4 address
View answer
Correct Answer: DE
Question #4
Which concern is addressed with the use of private IPv4 addressing?
A. ccess “" core “" access
B. ccess “" distribution “" distribution “" access
C. ccess “" core “" distribution “" access
D. ccess “" distribution “" core “" distribution “" access
View answer
Correct Answer: D
Question #5
What is the path for traffic sent from one user workstation to another workstation on a separate switch in a three-tier architecture model?
A. n individual IPv6 unicast address is supported on a single interface on one node, but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes
B. Pv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration
C. Pv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration
D. nlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes
View answer
Correct Answer: D
Question #6
Refer to the exhibit. Between which zones do wireless users expect to experience intermittent connectivity?
A. etween zones 1 and 2
B. etween zones 2 and 5
C. etween zones 3 and 4
D. etween zones 3 and 6
View answer
Correct Answer: C
Question #7
Which WAN topology provides a combination of simplicity quality, and availability?
A. artial mesh
B. ull mesh
C. oint-to-point
D. ub-and-spoke
View answer
Correct Answer: C
Question #8
DRAG DROP (Drag and Drop is not supported)Drag and drop the statements about wireless architectures from the left onto the architectures on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #9
DRAG DROP (Drag and Drop is not supported)Drag and drop the Wi-Fi terms from the left onto the descriptions on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #10
How are the switches in a spine-and-leaf topology interconnected?
A. ach leaf switch is connected to one of the spine switches
B. ach leaf switch is connected to each spine switch
C. ach leaf switch is connected to two spine switches, making a loop
D. ach leaf switch is connected to a central leaf switch, then uplinked to a core spine switch
View answer
Correct Answer: B
Question #11
What is the primary effect of the spanning-tree portfast command?
A. t immediately enables the port in the listening state
B. t immediately puts the port into the forwarding state when the switch is reloaded
C. t enables BPDU messages
D. t minimizes spanning-tree convergence time
View answer
Correct Answer: D
Question #12
What occurs when PortFast is enabled on an interface that is connected to another switch?
A. oot port choice and spanning-tree recalculation are accelerated when a switch link goes down
B. fter spanning-tree converges, PortFast shuts down any port that receives BPDUs
C. TP is allowed to propagate VLAN configuration information from switch to switch automatically
D. panning-tree fails to detect a switching loop increasing the likelihood of broadcast storms
View answer
Correct Answer: D
Question #13
Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
A. latinum
B. ronze
C. old
D. ilver
View answer
Correct Answer: A
Question #14
Refer to the exhibit. Which switch in this configuration will be elected as the root bridge?SW1: 0C:E0:38:41:86:07SW2: 0C:0E:15:22:05:97SW3: 0C:0E:15:1A:3C:9DSW4: 0C:E0:18:A1:B3:19
A. W1
B. W2
C. W3
D. W4
View answer
Correct Answer: C
Question #15
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. An engineer is required to verify that the network parameters are valid for the users' wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #16
An engineer needs to configure LLDP to send the port description type length value (TLV). Which command sequence must be implemented?
A. witch(config-if)#lldp port-description
B. witch#lldp port-description
C. witch(config-line)#lldp port-description
D. witch(config)#lldp port-description
View answer
Correct Answer: D
Question #17
Refer to the exhibit. Which switch becomes the root bridge?
A. 1
B. 2
C. 3
D. 4
View answer
Correct Answer: B
Question #18
Which configuration ensures that the switch is always the root for VLAN 750?
A. witch(config)#spanning-tree vlan 750 priority 38418607
B. witch(config)#spanning-tree vlan 750 priority 0
C. witch(config)#spanning-tree vlan 750 root primary
D. witch(config)#spanning-tree vlan 750 priority 614440
View answer
Correct Answer: C
Question #19
Refer to the exhibit. After the switch configuration, the ping test fails between PC A and PC B. Based on the output for switch 1, which error must be corrected?
A. he PCs are in the incorrect VLAN
B. ll VLANs are not enabled on the trunk
C. ccess mode is configured on the switch ports
D. here is a native VLAN mismatch
View answer
Correct Answer: D
Question #20
DRAG DROP (Drag and Drop is not supported)Drag and drop the WLAN components from the left onto the correct descriptions on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #21
Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?
A. ocal
B. esh
C. lexconnect
D. niffer
View answer
Correct Answer: C
Question #22
Refer to the exhibit. Which command provides this output?
A. how ip route
B. how cdp neighbor
C. how ip interface
D. how interface
View answer
Correct Answer: B
Question #23
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
A. ctive
B. n
C. uto
D. esirable
View answer
Correct Answer: B
Question #24
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
A. ridge
B. ightweight
C. obility express
D. utonomous
View answer
Correct Answer: B
Question #25
Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?
A. ldp timer
B. ldp tlv-select
C. ldp reinit
D. ldp holdtime
View answer
Correct Answer: C
Question #26
Refer to the exhibit. How does SW2 interact with other switches in this VTP domain?
A. t transmits and processes VTP updates from any VTP clients on the network on its trunk ports
B. t processes VTP updates from any VTP clients on the network on its access ports
C. t receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
D. t forwards only the VTP advertisements that it receives on its trunk ports
View answer
Correct Answer: D
Question #27
Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?
A. ode on
B. ctive
C. assive
D. uto
View answer
Correct Answer: B
Question #28
Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to Dynamic Auto and SW2 is set to Dynamic Desirable. What is the result of this configuration?
A. he link becomes an access port
B. he link is in an error disabled state
C. he link is in a down state
D. he link becomes a trunk port
View answer
Correct Answer: D
Question #29
A Cisco IP phone receives untagged data traffic from an attached PC. Which action is taken by the phone?
A. t drops the traffic
B. t allows the traffic to pass through unchanged
C. t tags the traffic with the native VLAN
D. t tags the traffic with the default VLAN
View answer
Correct Answer: B
Question #30
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
A. llocating nonoverlapping channels to access points that are in close physical proximity to one another
B. isabling TCP so that access points can negotiate signal levels with their attached wireless devices
C. onfiguring access points to provide clients with a maximum of 5 Mbps
D. etting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
View answer
Correct Answer: A
Question #31
Refer to the exhibit. The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2, while all other VLANs are to remain tagged.Which command accomplishes this task?
A. witchport access vlan 67
B. witchport trunk allowed vlan 67
C. witchport private-vlan association host 67
D. witchport trunk native vlan 67
View answer
Correct Answer: D
Question #32
Refer to the exhibit. Which two commands when used together create port channel 10? (Choose two.)
A. he phone and a workstation that is connected to the phone do not have VLAN connectivity
B. he phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1
C. he phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity
D. he phone and a workstation that is connected to the phone send and receive data in VLAN 50
View answer
Correct Answer: AC
Question #33
Refer to the exhibit. An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to theGigabitEthernet 3/1/4 port on a switch?
A. he frame is processed in VLAN 1
B. he frame is processed in VLAN 11
C. he frame is processed in VLAN 5
D. he frame is dropped
View answer
Correct Answer: B
Question #34
Refer to the exhibit. Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?
A. ldp run
B. ldp enable
C. ldp transmit
D. dp run
E. dp enable
View answer
Correct Answer: C
Question #35
Which command should you enter to configure an LLDP delay time of 5 seconds?
A. ldp timer 5000
B. ldp holdtime 5
C. ldp reinit 5000
D. ldp reinit 5
View answer
Correct Answer: D
Question #36
In a CDP environment, what happens when the CDP interface on an adjacent device is configured without an IP address?
A. DP becomes inoperable on that neighbor
B. DP uses the IP address of another interface for that neighbor
C. DP operates normally, but it cannot provide IP address information for that neighbor
D. DP operates normally, but it cannot provide any information for that neighbor
View answer
Correct Answer: C
Question #37
DRAG DROP (Drag and Drop is not supported)Drag and drop the benefits of a Cisco Wireless Lan Controller from the left onto the correct examples on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #38
When configuring an EtherChannel bundle, which mode enables LACP only if a LACP device is detected?
A. assive
B. esirable
C. n
D. uto
E. ctive
View answer
Correct Answer: A
Question #39
Refer to the exhibit. Which VLAN ID is associated with the default VLAN in the given environment?
A. LAN 1
B. LAN 5
C. LAN 10
D. LAN 20
View answer
Correct Answer: A
Question #40
Refer to the exhibit. How will switch SW2 handle traffic from VLAN 10 on SW1?
A. t sends the traffic to VLAN 10
B. t sends the traffic to VLAN 100
C. t drops the traffic
D. t sends the traffic to VLAN 1
View answer
Correct Answer: B
Question #41
Which two commands can you use to configure an actively negotiate EtherChannel? (Choose two.)
A. TL
B. AC address forwarding
C. ollision avoidance
D. ort blocking
View answer
Correct Answer: DE
Question #42
Which type does a port become when it receives the best BPDU on a bridge?
A. he designated port
B. he backup port
C. he alternate port
D. he root port
View answer
Correct Answer: D
Question #43
Which value can you modify to configure a specific interface as the preferred forwarding interface?
A. he interface number
B. he port priority
C. he VLAN priority
D. he hello time
View answer
Correct Answer: B
Question #44
Which statement about Cisco Discovery Protocol is true?
A. t is a Cisco-proprietary protocol
B. t runs on the network layer
C. t can discover information from routers, firewalls, and switches
D. t runs on the physical layer and the data link layer
View answer
Correct Answer: A
Question #45
What are two benefits of using VTP in a switching environment? (Choose two.)
A. router with subinterfaces configured on the physical interface that is connected to the switch
B. router with an IP address on the physical interface connected to the switch
C. switch with an access link that is configured between the switches
D. switch with a trunk link that is configured between the switches
View answer
Correct Answer: CE
Question #46
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
A. t is a Cisco proprietary protocol
B. t is configured in global configuration mode
C. he LLDP update frequency is a fixed value
D. t runs over the transport layer
View answer
Correct Answer: BDE
Question #47
What is a function of Wireless LAN Controller?
A. egister with a single access point that controls traffic between wired and wireless endpoints
B. se SSIDs to distinguish between wireless clients
C. end LWAPP packets to access points
D. onitor activity on wireless and wired LANs
View answer
Correct Answer: C
Question #48
Which technology is used to improve web traffic performance by proxy caching?
A. SA
B. irepower
C. SA
D. ireSIGHT
View answer
Correct Answer: A
Question #49
What criteria is used first during the root port selection process?
A. ocal port ID
B. owest path cost to the toot bridge
C. owest neighbor's bridge ID
D. owest neighbor's port ID
View answer
Correct Answer: B
Question #50
Which statement about VLAN configuration is true?
A. he switch must be in VTP server or transparent mode before you can configure a VLAN
B. he switch must be in config-vlan mode before you configure an extended VLAN
C. ynamic inter-VLAN routing is supported on VLAN2 through VLAN 4064
D. switch in VTP transparent mode save the VLAN databases to the running configuration only
View answer
Correct Answer: A
Question #51
Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two.)
A. evice(config)#lldp run
B. evice(config)#cdp run
C. evice(config-if)#cdp enable
D. evice(config)#flow-sampler-map topology
View answer
Correct Answer: AE
Question #52
A network engineer must create a diagram of a multivendor network. Which command must be configured on the Cisco devices so that the topology of the network is allowed to be mapped?
A. uthorization provides access control, and authentication tracks user services
B. uthentication identifies users, and accounting tracks user services
C. ccounting tracks user services, and authentication provides access control
D. uthorization identifies users, and authentication provides access control
View answer
Correct Answer: A
Question #53
How do AAA operations compare regarding user identification, user services, and access control?
A. ADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands
B. ACACS+ separates authentication and authorization, and RADIUS merges them
C. ACACS+ encrypts only password information, and RADIUS encrypts the entire payload
D. ADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication
View answer
Correct Answer: B
Question #54
What is a difference between local AP mode and FlexConnect AP mode?
A. ocal AP mode creates two CAPWAP tunnels per AP to the WLC
B. ocal AP mode causes the AP to behave as if it were an autonomous AP
C. lexConnect AP mode fails to function if the AP loses connectivity with the WLC
D. lexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured
View answer
Correct Answer: A
Question #55
The SW1 interface g0/1 is in the down/down state. What are two reasons for the interface condition? (Choose two.)
A. he EtherChannel must be configured in “mode active”
B. hen enabled, the WLC bandwidth drops to 500 Mbps
C. o pass client traffic, two or more ports must be configured
D. ne functional physical port is needed to pass client traffic
View answer
Correct Answer: DE
Question #56
Refer to the exhibit. Which password must an engineer use to enter the enable mode?
A. dminadmin123
B. isco123
C. efault
D. esting1234
View answer
Correct Answer: D
Question #57
Which state does the switch port move to when PortFast is enabled?
A. locking
B. istening
C. earning
D. orwarding
View answer
Correct Answer: D
Question #58
Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?
A. ADIUS
B. TTPS
C. ACACS+
D. TTP
View answer
Correct Answer: B
Question #59
An engineer must configure interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?
A. onfigure DSCP
B. onfigure IEEE 802
C. onfigure ISL
D. onfigure IEEE 802
View answer
Correct Answer: B
Question #60
An engineer requires a switch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?
A. witchport mode trunk
B. witchport mode dynamic desirable
C. witchport nonegotiate
D. witchport mode dynamic auto
View answer
Correct Answer: B
Question #61
Refer to the exhibit. After the election process, what is the root bridge in the HQ LAN?Switch 1: 0C:E0:38:81:32:58 Switch 2: 0C:0E:15:22:1A:61 Switch 3: 0C:0E:15:1D:3C:9A Switch 4: 0C:E0:19:A1:4D:16
A. witch 1
B. witch 2
C. witch 3
D. witch 4
View answer
Correct Answer: C
Question #62
An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?
A. onfigure switchport nonegotiate
B. onfigure switchport mode dynamic desirable
C. onfigure switchport mode dynamic auto
D. onfigure switchport trunk dynamic desirable
View answer
Correct Answer: C
Question #63
Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?
A. PDUfilter
B. ortFast
C. ackbonefast
D. PDUguard
View answer
Correct Answer: B
Question #64
How does the dynamically-learned MAC address feature function?
A. he CAM table is empty until ingress traffic arrives at each port
B. witches dynamically learn MAC addresses of each connecting CAM table
C. he ports are restricted and learn up to a maximum of 10 dynamically-learned addresses
D. t requires a minimum number of secure MAC addresses to be filled dynamically
View answer
Correct Answer: A
Question #65
When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?
A. panning-tree vlan 200 priority 614440
B. panning-tree vlan 200 priority 0
C. panning-tree vlan 200 root primary
D. panning-tree vlan 200 priority 38813258
View answer
Correct Answer: B
Question #66
Refer to the exhibit. Which command must be executed for Gi1/1 on SW1 to passively become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?
A. witchport mode dynamic auto
B. witchport mode dot1-tunnel
C. witchport mode dynamic desirable
D. witchport mode trunk
View answer
Correct Answer: A
Question #67
Refer to the exhibit. The entire contents or the MAC address table are shown. Sales-4 sends a data frame to Sales-1.What does the switch do as it receives the frame from Sales-4?
A. ap the Layer 2 MAC address to the Layer 3 IP address and forward the frame
B. nsert the source MAC address and port into the forwarding table and forward the frame to Sales-1
C. erform a lookup in the MAC address table and discard the frame due to a missing entry
D. lood the frame out of all ports except on the port where Sales-1 is connected
View answer
Correct Answer: B
Question #68
Refer to the exhibit. An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic. Which configuration accomplishes this task?
A. nterface gigabitethernet1/1 switchport mode access switchport access vlan 300 switchport voice vlan 400
B. nterface gigabitethernet1/1 switchport mode trunk switchport trunk vlan 300 switchport trunk vlan 400
C. nterface gigabitethernet1/1 switchport mode access switchport voice vlan 300 switchport access vlan 400
D. nterface gigabitethernet1/1 switchport mode trunk switchport trunk vlan 300 switchport voice vlan 400
View answer
Correct Answer: A
Question #69
An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database, with action must be taken?
A. dd the switch in the VTP domain with a lower revision number
B. dd the switch in the VTP domain with a higher revision number
C. dd the switch with DTP set to dynamic desirable
D. dd the switch with DTP set to desirable
View answer
Correct Answer: A
Question #70
Which technology prevents client devices from arbitrarily connecting to the network without state remediation?
A. 02
B. 02
C. AC Authentication Bypass
D. P Source Guard
View answer
Correct Answer: B
Question #71
Which protocol does an access point use to draw power from a connected switch?
A. nternet Group Management Protocol
B. isco Discovery Protocol
C. daptive Wireless Path Protocol
D. eighbor Discovery Protocol
View answer
Correct Answer: B
Question #72
An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?
A. nable MAC filtering and set the SA Query timeout to 10
B. nable 802
C. nable Security Association Teardown Protection and set the SA Query timeout to 10
D. nable the Protected Management Frame service and set the Comeback timer to 10
View answer
Correct Answer: D
Question #73
Refer to the exhibit. Only four switches are participating in the VLAN spanning-tree process.Branch-1: priority 614440 Branch-2: priority 39391170 Branch-3: priority 0 Branch-4: root primary Which switch becomes the permanent root bridge for VLAN 5?
A. ranch-1
B. ranch-2
C. ranch-3
D. ranch-4
View answer
Correct Answer: C
Question #74
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
A. witchport trunk encapsulation dot1q
B. witchport trunk allowed vlan 10
C. witchport mode trunk
D. witchport trunk native vlan 10
View answer
Correct Answer: D
Question #75
What is the benefit of configuring PortFast on an interface?
A. he frames entering the interface are marked with the higher priority and then processed faster by a switch
B. fter the cable is connected, the interface is available faster to send and receive user data
C. eal-time voice and video frames entering the interface are processed faster
D. fter the cable is connected, the interface uses the fastest speed setting available for that cable type
View answer
Correct Answer: B
Question #76
DRAG DROP (Drag and Drop is not supported)Drag and drop the functions of AAA supporting protocols from the left onto the protocols on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #77
Why does a switch flood a frame to all ports?
A. he frame has zero destination MAC addresses
B. he destination MAC address of the frame is unknown
C. he source MAC address of the frame is unknown
D. he source and destination MAC addresses of the frame are the same
View answer
Correct Answer: B
Question #78
An engineer configures interface Gi1/0 on the company PE router to connect to an ISP. Neighbor discovery is disabled.Which action is necessary to complete the configuration if the ISP uses third-party network devices?
A. isable autonegotiation
B. nable LLDP globally
C. nable LLDP-MED on the ISP device
D. isable Cisco Discovery Protocol on the interface
View answer
Correct Answer: B
Question #79
DRAG DROP (Drag and Drop is not supported)Drag and drop the Rapid PVST+ forwarding state actions from the left to the right. Not all actions are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #80
Which access point mode relies on a centralized controller for management, roaming, and SSID configuration?
A. ightweight mode
B. utonomous mode
C. ridge mode
D. epeater mode
View answer
Correct Answer: A
Question #81
Refer to the exhibit. A network engineer must configure communication between PC A and the File Server. To prevent interruption for any other communications, which command must be configured?
A. witchport truck allowed vlan 12
B. witchport truck allowed vlan none
C. witchport truck allowed vlan add 13
D. witchport truck allowed vlan remove 10-11
View answer
Correct Answer: C
Question #82
Refer to the exhibit. What is the result if Gig1/11 receives an STP BPDU?
A. he port transitions to STP blocking
B. he port immediately transitions to STP forwarding
C. he port goes into error-disable state
D. he port transitions to the root port
View answer
Correct Answer: C
Question #83
Which access layer threat-mitigation technique provides security based on identity?
A. ynamic ARP Inspection
B. HCP snooping
C. 02
D. sing a non-default native VLAN
View answer
Correct Answer: C
Question #84
Refer to the exhibit. Which action do the switches take on the trunk link?
A. he trunk does not form, and the ports go into an err-disabled status
B. he trunk forms, but the mismatched native VLANs are merged into a single broadcast domain
C. he trunk forms, but VLAN 99 and VLAN 999 are in a shutdown state
D. he trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link
View answer
Correct Answer: B
Question #85
A network engineer must configure two new subnets using the address block 10.70.128.0/19 to meet these requirements:-The first subnet must support 24 hosts.-The second subnet must support 472 hosts.-Both subnets must use the longest subnet mask possible from the address block.Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two.)
A. nterface gigabitethernet1/1 switchport mode access switchport access vlan 8 ! interface gigabitethernet1/3 switchport mode access switchport access vlan 8 switchport voice vlan 9
B. nterface gigabitethernet1/1 switchport mode access switchport access vlan 8 ! interface gigabitethernet1/3 switchport mode trunk switchport trunk vlan 8 switchport voice vlan 9
C. nterface gigabitethernet1/1 switchport mode access switchport access vlan 9 ! interface gigabitethernet1/3 switchport mode trunk switchport trunk vlan 8 switchport trunk vlan 9
D. nterface gigabitethernet1/1 switchport mode access switchport access vlan 8 ! interface gigabitethernet1/3 switchport mode access switchport voice vlan 8 switchport access vlan 9
View answer
Correct Answer: AE
Question #86
Refer to the exhibit. Users need to connect to the wireless network with IEEE 802.11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building. What must be the configuration of the connection?
A. isable AES encryption
B. nable Fast Transition and select the FT 802
C. nable Fast Transition and select the FT PSK option
D. elect the WPA Policy option with the CCKM option
View answer
Correct Answer: C
Question #87
Refer to the exhibit. An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured. Which command accomplishes this task?
A. witchport trunk allowed vlan 100-104
B. witchport trunk allowed vlan 104
C. witchport trunk allowed vlan all
D. witchport trunk allowed vlan add 104
View answer
Correct Answer: D
Question #88
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: DE
Question #89
Which interface mode must be configured to connect the lightweight APs in a centralized architecture?
A. LAN dynamic
B. runk
C. ccess
D. anagement
View answer
Correct Answer: C
Question #90
Refer to the exhibit. The following must be considered:-SW1 is fully configured for all traffic.-The SW4 and SW9 links to SW1 have been configured.-The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured.-The remaining switches have had all VLANs added to their VLAN database.Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?
A. W4 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 108 ! interface Gi/0/2 switchport mode access switchport access vlan 14 SW11# interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 14,108 ! interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 14,108 SW9# interface Gi0/2 switchport mode access switchport access vlan 14
B. W4 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 14,108 SW11# interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 14,108 !! interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 14,108 SW9# interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 14
C. W4 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 14 SW11# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 14 SW9# interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 108
D. W4 interface Gi/0/2 switchport mode access switchport access vlan 14 SW11# interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 14 ! interface Gi0/0 switchport mode access switchport access vlan 14 ! interface Gi0/1 switchport mode trunk SW9# interface Gi0/2 switchport mode access switchport access vlan 14
View answer
Correct Answer: B
Question #91
Refer to the exhibit. The network administrator must prevent the switch Cat9K-2 IP address from being visible in LLDP without disabling the protocol. Which action must be taken to complete the task?
A. onfigure the no lldp mac-phy-cfg command globally on Cat9K-2
B. onfigure the no lldp receive command on interface G1/0/21 on Cat9K-1
C. onfigure the no lldp transmit command on interface G1/0/21 on Cat9K-1
D. onfigure the no lldp tlv-select management-address command globally on Cat9K-2
View answer
Correct Answer: D
Question #92
Refer to the exhibit. An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?
A. W1(config)#interface fa0/2 SW1(config-if)#no switchport access vlan 2 SW1(config-if)#no switchport trunk allowed vlan 3 SW1(config-if)#switchport trunk allowed vlan 2
B. W1(config)#interface fa0/2 SW1(config-if)#no switchport access vlan 2 SW1(config-if)#switchport trunk native vlan 2 SW1(config-if)#switchport trunk allowed vlan 3
C. W1(config)#interface fa0/2 SW1(config-if)#no switchport mode trunk SW1(config-if)#no switchport trunk allowed vlan 3 SW1(config-if)#switchport mode access
D. W1(config)#interface fa0/1 SW1(config-if)#no switchport access vlan 2 SW1(config-if)#switchport access vlan 3 SW1(config-if)#switchport trunk allowed vlan 2
View answer
Correct Answer: C
Question #93
Refer to the exhibit. Which switch becomes the root of the spanning tree?Switch 1BID: 32778 0018.184e.3c00Switch 2BID: 24586 001a.e3ff.a680Switch 3BID: 28682 0022.55cf.cc00Switch 4BID: 64000 4e15.8403.08f
A. witch 1
B. witch 2
C. witch 3
D. witch 4
View answer
Correct Answer: B
Question #94
DRAG DROP (Drag and Drop is not supported)Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #95
Refer to the exhibit. An engineer is configuring a Layer 3 port-channel interface with LACP. The configuration on the first device is complete, and it is verified that both interfaces have registered the neighbor device in the CDP table. Which task on the neighbor device enables the new port channel to come up without negotiating the channel?
A. onfigure the IP address of the neighboring device
B. ring up the neighboring interfaces using the no shutdown command
C. hange the EtherChannel mode on the neighboring interfaces to auto
D. odify the static EtherChannel configuration of the device to passive mode
View answer
Correct Answer: D
Question #96
Refer to the exhibit. Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?
A. nterface range G1/1 “" 1/3 switchport mode trunk channel-group 1 mode active no shutdown
B. nterface range G1/1 “" 1/3 switchport mode access channel-group 1 mode passive no shutdown
C. nterface range G1/1 “" 1/3 switchport mode trunk channel-group 1 mode desirable no shutdown
D. nterface range G1/1 “" 1/3 switchport mode access channel-group 1 mode on no shutdown
View answer
Correct Answer: D
Question #97
Which switching concept is used to create separate broadcast domains?
A. TP
B. TP
C. LAN
D. SMA/CD
View answer
Correct Answer: C
Question #98
Refer to the exhibit. Which action must be taken so that neighboring devices rapidly discover switch Cat9300?
A. nable portfast on the ports that connect to neighboring devices
B. onfigure the cdp timer 10 command on switch Cat9300
C. onfigure the cdp holdtime 10 command on switch Cat9300
D. onfigure the cdp timer 10 command on the neighbors of switch Cat9300
View answer
Correct Answer: B
Question #99
What is a requirement when configuring or removing LAG on a WLC?
A. he incoming and outgoing ports for traffic flow must be specified if LAG is enabled
B. he management interface must be reassigned if LAG is disabled
C. he controller must be rebooted after enabling or reconfiguring LAG
D. ultiple untagged interfaces on the same port must be supported
View answer
Correct Answer: B
Question #100
DRAG DROP (Drag and Drop is not supported)Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #101
Which type of port is used to connect the wired network when an autonomous AP maps two VLANs to its WLANs?
A. ccess
B. AG
C. runk
D. therChannel
View answer
Correct Answer: C
Question #102
A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?
A. LDP
B. ACP
C. isco vPC
D. 02 1q trunks
View answer
Correct Answer: B
Question #103
Refer to the exhibit. An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work establish anLACP port channel?
A. hange the channel-group mode on SW1 to desirable
B. hange the channel-group mode on SW1 to active or passive
C. hange the channel-group mode on SW2 to auto
D. onfigure the interface port-channel 1 command on both swtiches
View answer
Correct Answer: B
Question #104
Refer to the exhibit. For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:-Disable all neighbor discovery methods on R5 interface Gi0/1-Permit neighbor discovery on R5 interface Gi0/2.-Verify there are no dynamically learned neighbors on R5 interface Gi0/1.-Display the IP address of R6's interface Gi0/2Which configuration must be used?
A. 5(config)#int Gi0/1 R5(config-if)#no cdp enable R5(config-if)#exit R5(config)#lldp run R5(config)#no cdp run R5#sh cdp neighbor detail R5#sh lldp neighbor
B. 5(config)#int Gi0/1 R5(config-if)#no cdp enable R5(config-if)#exit R5(config)#no lldp run R5(config)#cdp run R5#sh cdp neighbor R5#sh lldp neighbor
C. 5(config)#int Gi0/1 R5(config-if)#no cdp run R5(config-if)#exit R5(config)#lldp run R5(config)#cdp enable R5#sh cdp neighbor R5#sh lldp neighbor
D. 5(config)#int Gi0/1 R5(config-if)#no cdp enable R5(config-if)#exit R5(config)#no lldp run R5(config)#cdp run R5#sh cdp neighbor detail R5#sh lldp neighbor
View answer
Correct Answer: D
Question #105
Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: BC
Question #106
DRAG DROP (Drag and Drop is not supported)Drag and drop the management connection types from the left onto the definitions on the right.Select and Place:
A. nterface fastethernet0/1 switchport voice vlan dot1p
B. nterface fastethernet0/1 switchport priority extend cos 7
C. nterface fastethernet0/1 switchport voice vlan untagged
D. nterface fastethernet0/1 switchport priority extend trust
View answer
Correct Answer: A
Question #107
An engineer is configuring data and voice services to pass through the same port. The designated switch interface fastethernet0/1 must transmit packets using the same priority for data when they are received from the access port of the IP phone. Which configuration must be used?
A. hange the LACP mode to desirable
B. hange the protocol to PAgP and use auto mode
C. hange the LACP mode to active
D. hange the protocol to EtherChannel mode on
View answer
Correct Answer: D
Question #108
Refer to the exhibit. An engineer must configure the interface that connects to PC1 and secure it in a way that only PC1 is allowed to use the port. No VLAN tagging can be used except for a voice VLAN. Which command sequence must be entered to configure the switch?
A. W1(config-if)#switchport mode dynamic auto SW1(config-if)#switchport port-security SW1(config-if)#switchport port-security violation restrict
B. W1(config-if)#switchport mode nonegotiate SW1(config-if)#switchport port-security SW1(config-if)#switchport port-security maximum 1
C. W1(config-if)#switchport mode access SW1(config-if)#switchport port-security SW1(config-if)#switchport port-security mac-address 0050
D. W1(config-if)#switchport mode dynamic desirable SW1(config-if)#switchport port-security mac-address 0050
View answer
Correct Answer: C
Question #109
Which protocol must be implemented to support separate authorization and authentication solutions for wireless APs?
A. ADIUS
B. ACACS+
C. 02
D. erberos
View answer
Correct Answer: A
Question #110
Which port type supports the spanning-tree portfast command without additional configuration?
A. runk ports
B. ayer 3 sub interfaces
C. ayer 3 main interfaces
D. ccess ports
View answer
Correct Answer: D
Question #111
A Cisco engineer must configure a single switch interface to meet these requirements:-Accept untagged frames and place them in VLAN 20-Accept tagged frames in VLAN 30 when CDP detects a Cisco IP phoneWhich command set must the engineer apply?
A. witchport mode dynamic desirable switchport access vlan 20 switchport trunk allowed vlan 30 switchport voice vlan 30
B. witchport mode access switchport access vlan 20 switchport voice vlan 30
C. witchport mode dynamic auto switchport trunk native vlan 20 switchport trunk allowed vlan 30 switchport voice vlan 30
D. witchport mode trunk switchport access vlan 20 switchport voice vlan 30
View answer
Correct Answer: D
Question #112
What does a switch use to build its MAC address table?
A. TP
B. TP
C. ngress traffic
D. gress traffic
View answer
Correct Answer: C
Question #113
Refer to the exhibit. The EtherChannel is configured with a speed of 1000 and duplex as full on both ends of channel group 1. What is the next step to configure the channel on switch A to respond to but not initiate LACP communication?
A. nterface range gigabitethernet0/0/0-15 channel-group 1 mode on
B. nterface range gigabitethernet0/0/0-15 channel-group 1 mode desirable
C. nterface port-channel 1 channel-group 1 mode auto
D. nterface port-channel 1 channel-group 1 mode passive
View answer
Correct Answer: D
Question #114
Which command entered on a switch configured with Rapid PVST+ listens and learns for a specific time period?
A. witch(config)#spanning-tree vlan 1 priority 4096
B. witch(config)#spanning-tree vlan 1 hello-time 10
C. witch(config)#spanning-tree vlan 1 max-age 6
D. witch(config)#spanning-tree vlan 1 forward-time 20
View answer
Correct Answer: D
Question #115
What must a network administrator consider when deciding whether to configure a new wireless network with APs in autonomous mode or APs running in cloud- based mode?
A. utonomous mode APs are less dependent on an underlay but more complex to maintain than APs in cloud-based mode
B. loud-based mode APs relay on underlays and are more complex to maintain than APs in autonomous mode
C. loud-based mode APs are easy to deploy but harder to automate than APs in autonomous mode
D. utonomous mode APs are easy to deploy and automate than APs in cloud-based mode
View answer
Correct Answer: A
Question #116
When a switch receives a frame for an unknown destination MAC address, how is the frame handled?
A. looded to all ports except the origination port
B. orwarded to the first available port
C. roadcast to all ports on the switch
D. nspected and dropped by the switch
View answer
Correct Answer: A
Question #117
Which state is bypassed in Rapid PVST+ when PortFast is enabled on a port?
A. locking
B. orwarding
C. earning
D. iscarding
View answer
Correct Answer: C
Question #118
What happens when a switch receives a frame with a destination MAC address that recently aged out?
A. he switch floods the frame to all ports in all VLANs except the port that received the frame
B. he switch floods the frame to all ports in the VLAN except the port that received the frame
C. he switch references the MAC address aging table for historical addresses on the port that received the frame
D. he switch drops the frame and learns the destination MAC address again from the port that received the frame
View answer
Correct Answer: B
Question #119
What is a function of store-and forward switching?
A. t reduces latency by eliminating error checking within the frame
B. t produces an effective level of error-free network traffic using CRCs
C. t buffers frames and forwards regardless of errors within the frames
D. t forwards a frame by checking only the destination MAC address
View answer
Correct Answer: B
Question #120
Refer to the exhibit. Switch AccSw1 has just been added to the network along with PC2. All VLANs have been implemented on AccSw2. How must the ports onAccSw2 be configured to establish Layer 2 connectivity between PC1 and PC2?
A. nterface GigabitEthernet1/2 switchport mode access switchport access vlan 2 ! interface GigabitEthernet1/24 switchport mode trunk
B. nterface GigabitEthernet1/1 switchport mode access switchport access vlan 11 ! interface GigabitEthernet1/24 switchport mode trunk
C. nterface GigabitEthernet1/24 switchport mode trunk switchport trunk allowed vlan 11, 12 ! interface GigabitEthernet1/1 switchport access vlan 11
D. nterface GigabitEthernet1/2 switchport mode access switchport access vlan 12 ! interface GigabitEthernet1/24 switchport mode trunk switchport trunk allowed vlan 11, 12
View answer
Correct Answer: B
Question #121
Refer to the exhibit. A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes. Which configuration must the engineer apply?
A. witch2(config)#lldp timer 60 Switch2(config)#lldp tlv-select 180
B. witch2(config)#lldp timer 60 Switch2(config)#lldp holdtime 180
C. witch2(config)#lldp timer 1 Switch2(config)#lldp holdtime 3
D. witch2(config)#lldp timer 1 Switch2(config)#lldp tlv-select 3
View answer
Correct Answer: B
Question #122
Refer to the exhibit. Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?
A. witchA(config-if)#switchport mode access SwitchA(config-if)#switchport access vlan 50 SwitchA(config-if)#switchport voice vlan 51
B. witchA(config-if)#switchport mode trunk SwitchA(config-if)#switchport trunk allowed vlan add 50, 51 SwitchA(config-if)#switchport voice vlan dot1p
C. witchA(config-if)#switchport mode trunk SwitchA(config-if)#switchport trunk allowed vlan 50, 51 SwitchA(config-if)#mis qos trust cos
D. witchA(config-if)#switchport mode access SwitchA(config-if)#switchport access vlan 50 SwitchA(config-if)#switchport voice vlan untagged
View answer
Correct Answer: A
Question #123
Refer to the exhibit. Two new switches are being installed. The remote monitoring team uses the support network to monitor both switches. Which configuration is the next step to establish a Layer 2 connection between the two PCs?
A. witchA(config)#interface GigabitEthernet0/1 SwitchA(config-if)#switchport access vlan 500 SwitchB(config)#interface GigabitEthernet0/1 SwitchB(config-if)#switchport access vlan 500
B. witchA(config)#interface GigabitEthernet0/1 SwitchA(config-if)#switchport mode trunk SwitchB(config)#interface GigabitEthernet0/1 SwitchB(config-if)#switchport mode trunk
C. witchA(config)#interface GigabitEthernet0/0 SwitchA(config-if)#switchport trunk allowed vlan 500, 550 SwitchB(config)#interface GigabitEthernet0/0 SwitchB(config-if)#switchport trunk allowed vlan 500, 550
D. witchA(config)#interface GigabitEthernet0/0 SwitchA(config-if)#spanning-tree portfast SwitchA(config-if)#spanning-tree bpduguard enable SwitchB(config)#interface GigabitEthernet0/0 SwitchB(config-if)#spanning-tree portfast SwitchB(config-if)#spanning-tree bpduguard enable
View answer
Correct Answer: A
Question #124
Refer to the exhibit. An engineer is configuring a new Cisco switch, NewSW, to replace SW2. The details have been provided:-Switches SW1 and SW2 are third-party devices without support for trunk ports.-The existing connections must be maintained between PC1, PC2, and PC3.-Allow the switch to pass traffic from future VLAN 10.Which configuration must be applied?
A. ewSW(config)#interface f0/0 NewSW(config-if)#switchport mode trunk NewSW(config-if)#switchport trunk native vlan 10 NewSW(config-if)#switchport trunk native vlan 10
B. ewSW(config)#interface f0/0 NewSW(config-if)#switchport mode access NewSW(config-if)#switchport trunk allowed vlan 2, 10 NewSW(config-if)#switchport trunk native vlan 2
C. ewSW(config)#interface f0/0 NewSW(config-if)#switchport mode access NewSW(config-if)#switchport trunk allowed vlan 2, 10 NewSW(config-if)#switchport trunk native vlan 10
D. ewSW(config)#interface f0/0 NewSW(config-if)#switchport mode trunk NewSW(config-if)#switchport trunk allowed vlan 2, 10 NewSW(config-if)#switchport trunk native vlan 2
View answer
Correct Answer: D
Question #125
Which WLC interface provides out-of-band management in the Cisco Unified Wireless Network Architecture?
A. P-Manager
B. ervice port
C. ynamic
D. irtual
View answer
Correct Answer: B
Question #126
Refer to the exhibit. The network engineer is configuring a new WLAN and is told to use a setup password for authentication instead of the RADIUS servers.Which additional set of tasks must the engineer perform to complete the configuration?
A. isable PMF Enable PSK Enable 802
B. elect WPA Policy Enable CCKM Enable PSK
C. elect WPA Policy Select WPA2 Policy Enable FT PSK
D. elect WPA2 Policy Disable PMF Enable PSK
View answer
Correct Answer: D
Question #127
Which mode must be set for Aps to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol?
A. oute
B. ridge
C. ightweight
D. utonomous
View answer
Correct Answer: C
Question #128
Which switch technology establishes a network connection immediately when it is plugged in?
A. ortFast
B. PDU guard
C. plinkFast
D. ackboneFast
View answer
Correct Answer: A
Question #129
Which command on a port enters the forwarding state immediately when a PC is connected to it?
A. witch(config)#spanning-tree portfast default
B. witch(config)#spanning-tree portfast bpduguard default
C. witch(config-if)#spanning-tree portfast trunk
D. witch(config-if)#no spanning-tree portfast
View answer
Correct Answer: A
Question #130
If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?
A. he new frame is delivered first, the previous frame is dropped, and a retransmission request is sent
B. he previous frame is delivered, the new frame is dropped, and a retransmission request is sent
C. he new frame is placed in a queue for transmission after the previous frame
D. he two frames are processed and delivered at the same time
View answer
Correct Answer: C
Question #131
Refer to the exhibit. The entire MAC address table for SW1 is shown here:What does SW1 do when Br-4 sends a frame for Br-2
A. t performs a lookup in the MAC address table for Br-4 and discards toe frame due to a missing entry
B. t floods the frame out or all ports except on the port where Br-2 is connected
C. t Inserts the source MAC address and port into the forwarding table and forwards the frame to Br-2
D. t maps the Layer 2 MAC address for Fa0/3 to the Layer 3 IP address and towards the frame
View answer
Correct Answer: C
Question #132
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?
A. o pass client traffic two or more ports must be configured
B. he EtherChannel must be configured in “mode active”
C. hen enabled, the WLC bandwidth drops to 500 Mbps
D. ne functional physical port is needed to pass client traffic
View answer
Correct Answer: D
Question #133
Refer to the exhibit. The entire Marketing-SW1 MAC address table is shown here:What does the switch do when PC-4 sends a frame to PC-1?
A. t performs a lookup in the MAC address table and discards the frame due to a missing entry
B. t maps the Layer 2 MAC address to the Layer 3 IP address and forwards the frame
C. t inserts the source MAC address and port into the table and forwards the frame to PC-1
D. t floods the frame out of all ports except on the port where PC-1 is connected
View answer
Correct Answer: C
Question #134
Refer to the exhibit. Which switch becomes the root of a spanning tree for VLAN 10 if the primary switch fails and all links are of equal speed?
A. W1
B. W2
C. W3
D. W4
View answer
Correct Answer: C
Question #135
Refer to the exhibit. Host A sent a data frame destined for host D.What does the switch do when it receives the frame from host A?
A. t floods the frame out of all ports except port Fa0/1
B. t experiences a broadcast storm
C. t shuts down the port Fa0/1 and places it in err-disable mode
D. t drops the frame from the switch CAM table
View answer
Correct Answer: A
Question #136
Refer to the exhibit. Which switch becomes the root of the spanning tree?
A. witch 1
B. witch 2
C. witch 3
D. witch 4
View answer
Correct Answer: B
Question #137
Which channel-group mode must be configured when multiple distribution interfaces connected to a WLC are bundled?
A. hannel-group mode passive
B. hannel-group mode on
C. hannel-group mode desirable
D. hannel-group mode active
View answer
Correct Answer: B
Question #138
Refer to the exhibit. Which switch become the root of a spanning tree for VLAN 20 if all links are of equal speed?
A. W1
B. W2
C. W3
D. W4
View answer
Correct Answer: A
Question #139
Which Layer 2 switch function encapsulates packets for different VLANs so that the packets transverse the same port and maintain traffic separation between theVLANs?
A. LAN marking
B. LAN numbering
C. LAN DSCP
D. LAN tagging
View answer
Correct Answer: D
Question #140
Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices?
A. LAN ID
B. SID
C. FID
D. LAN ID
View answer
Correct Answer: B
Question #141
An engineer must configure neighbor discovery between the company router and an ISP.What is the next step to complete the configuration if the ISP uses a third-party router?
A. nable LLDP globally
B. isable CDP on gi0/0
C. nable LLDP TLVs on the ISP router
D. isable auto-negotiation
View answer
Correct Answer: A
Question #142
DRAG DROP (Drag and Drop is not supported)Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #143
What is a function of MAC learning on a switch?
A. AC address learning is disabled by default on all VLANs
B. rames received for a destination MAC address not listed in the address table are dropped
C. he MAC address table is used to populate the ARP table
D. static MAC address is manually added to the MAC table
View answer
Correct Answer: D
Question #144
What does a switch do when it receives a frame whose destination MAC address is missing from the MAC address table?
A. t changes the checksum of the frame to a value that indicates an invalid frame
B. t updates the CAM table with the destination MAC address of the frame
C. t appends the table with a static entry for the MAC and shuts down the port
D. t floods the frame unchanged across all remaining ports in the incoming VLAN
View answer
Correct Answer: D
Question #145
By default, how long will the switch continue to know a workstation MAC address after the workstation stops sending traffic?
A. 00 seconds
B. 00 seconds
C. 00 seconds
D. 00 seconds
View answer
Correct Answer: B
Question #146
A project objective is to minimize the association time to the different access points as mobile devices move around the office. The ideal solution must cover numerous devices and device types, including laptops, mobile phones, tablets and wireless printers. What must be configured?
A. 02
B. 02
C. 02
D. 02
View answer
Correct Answer: B
Question #147
Which two protocols are used by an administrator for authentication and configuration on access points? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: BD
Question #148
A WLC sends alarms about a rogue AP, and the network administrator verifies that the alarms are caused by a legitimate autonomous AP. How must the alarms be stopped for the MAC address of the AP?
A. emove the AP from WLC management
B. lace the AP into manual containment
C. anually remove the AP from Pending state
D. et the AP Class Type to Friendly
View answer
Correct Answer: B
Question #149
What is one reason to implement LAG on a Cisco WLC?
A. o increase security and encrypt management frames
B. o enable connected switch ports to failover and use different VLANs
C. o provide link redundancy and load balancing
D. o allow for stateful and link-state failover
View answer
Correct Answer: C
Question #150
When an access point is seeking to join wireless LAN controller, which message is sent to the AP-Manager interface?
A. iscovery response
B. HCP request
C. HCP discover
D. iscovery request
View answer
Correct Answer: C
Question #151
Refer to the exhibit. A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server. Which task must be performed to complete the process?
A. hange the Support for CoA to Enabled
B. elect Enable next to Management
C. elect Enable next to Network User
D. hange the Server Status to Disabled
View answer
Correct Answer: C
Question #152
After installing a new Cisco ISE server which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?
A. isable the LAG Mode on Next Reboot
B. nable the Event Driven RRM
C. nable the Allow AAA Override
D. nable the Authorize MIC APs against auth-list or AAA
View answer
Correct Answer: C
Question #153
Refer to the exhibit. Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?
A. ongest prefix
B. dministrative distance
C. ost
D. etric
View answer
Correct Answer: A
Question #154
Refer to the exhibit. Router R1 Fa0/0 cannot ping router R3 Fa0/1. Which action must be taken in router R1 to help resolve the configuration issue?
A. et the default gateway as 20
B. onfigure a static route with Fa0/1 as the egress interface to reach the 20
C. onfigure a static route with 10
D. et the default network as 20
View answer
Correct Answer: C
Question #155
By default, how does EIGRP determine the metric of a route for the routing table?
A. t uses the bandwidth and delay values of the path to calculate the route metric
B. t uses a default metric of 10 for all routes that are learned by the router
C. t counts the number of hops between the receiving and destination routers and uses that value as the metric
D. t uses a reference bandwidth and the actual bandwidth of the connected link to calculate the route metric
View answer
Correct Answer: A
Question #156
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?
A. 1#config t R1(config)#ip routing R1(config)#ip route default-route 192
B. 1#config t R1(config)#ip routing R1(config)#ip route 192
C. 1#config t R1(config)#ip routing R1(config)#ip route 0
D. 1#config t R1(config)#ip routing R1(config)#ip default-gateway 192
View answer
Correct Answer: C
Question #157
A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet?
A. p route 10
B. p route 10
C. p route 10
D. p route 10
View answer
Correct Answer: B
Question #158
Refer to the exhibit. How does the router manage traffic to 192.168.12.16?
A. t chooses the EIGRP route because it has the lowest administrative distance
B. t load-balances traffic between all three routes
C. t chooses the OSPF route because it has the longest prefix inclusive of the destination address
D. t selects the RIP route because it has the longest prefix inclusive of the destination address
View answer
Correct Answer: D
Question #159
Refer to the exhibit. How does router R1 handle traffic to 192.168.10.16?
A. t selects the IS-IS route because it has the shortest prefix inclusive of the destination address
B. t selects the RIP route because it has the longest prefix inclusive of the destination address
C. t selects the OSPF route because it has the lowest cost
D. t selects the EIGRP route because it has the lowest administrative distance
View answer
Correct Answer: B
Question #160
Refer to the exhibit. A router received these five routes from different routing information sources. Which two routes does the router install in its routing table?(Choose two.)
A. outer2
B. outer3
C. outer4
D. outer5
View answer
Correct Answer: AD
Question #161
Refer to the exhibit. To which device does Router1 send packets that are destined to host 10.10.13.165?
A. oute with the next hop that has the highest IP
B. oute with the lowest cost
C. oute with the lowest administrative distance
D. oute with the shortest prefix length
View answer
Correct Answer: B
Question #162
Which two minimum parameters must be configured on an active interface to enable OSPFV2 to operate? (Choose two.)
A. 1(config)#interface ethernet0/0 R1(config-if)#encapsulation dot1q 20 R1(config-if)#ip address 10
B. 1(config)#interface ethernet0/0
C. 1(config)#interface ethernet0/0
D. 1(config)#interface ethernet0/0 R1(config-if)#ip address 10
View answer
Correct Answer: AE
Question #163
Refer to the exhibit. What commands are needed to add a sub-interface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
A. 0
B. 0
C. 72
D. 92
View answer
Correct Answer: B
Question #164
Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. What is the reason for the problem?
A. he OSPF process IDs are mismatched
B. he network statement on Router1 is misconfigured
C. outer2 is using the default hello timer
D. he OSPF router IDs are mismatched
View answer
Correct Answer: C
Question #165
Refer to the exhibit. Which route type is configured to reach the Internet?
A. loating static route
B. ost route
C. etwork route
D. efault route
View answer
Correct Answer: D
Question #166
Refer to the exhibit. Which path is used by the router for Internet traffic?
A. 09
B.
C. 0
D. 0
View answer
Correct Answer: B
Question #167
When OSPF learns multiple paths to a network, how does it select a route?
A. or each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth
B. t counts the number of hops between the source router and the destination to determine the route with the lowest metric
C. t divides a reference bandwidth of 100 Mbps by the actual bandwidth of the exiting interface to calculate the route with the lowest cost
D. t multiplies the active K values by 256 to calculate the route with the lowest metric
View answer
Correct Answer: C
Question #168
When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?
A. he administrative distance must be higher on the primary route so that the backup route becomes secondary
B. he default-information originate command must be configured for the route to be installed into the routing table
C. he floating static route must have a lower administrative distance than the primary route so it is used as a backup
D. he floating static route must have a higher administrative distance than the primary route so it is used as a backup
View answer
Correct Answer: D
Question #169
Refer to the exhibit. The show ip ospf interface command has been executed on R1. How is OSPF configured?
A. point-to-point network type is configured
B. he interface is not participating in OSPF
C. he default Hello and Dead timers are in use
D. here are six OSPF neighbors on this interface
View answer
Correct Answer: C
Question #170
A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF. By default, to which type of OSPF network does this interface belong?
A. oint-to-multipoint
B. oint-to-point
C. roadcast
D. onbroadcast
View answer
Correct Answer: C
Question #171
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
A. ual algorithm
B. etric
C. dministrative distance
D. op count
View answer
Correct Answer: C
Question #172
Router A learns the same route from two different neighbors; one of the neighbor routers is an OSPF neighbor, and the other is an EIGRP neighbor.What is the administrative distance of the route that will be installed in the routing table?
A. 0
B. 0
C. 10
D. 15
View answer
Correct Answer: B
Question #173
Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router 1. The new circuit uses eBGP and learns the route to VLAN25 from the BGP path.What is the expected behavior for the traffic flow for route 10.10.13.0/25?
A. raffic to 10
B. raffic to 10
C. oute 10
D. oute 10
View answer
Correct Answer: D
Question #174
Which two actions influence the EIGRP route selection process? (Choose two.)
A. t sends packets out of interface Fa0/1 only
B. t sends packets out of interface Fa0/2 only
C. t load-balances traffic out of Fa0/1 and Fa0/2
D. t cannot send packets to 10
View answer
Correct Answer: BD
Question #175
Which two outcomes are predictable behaviors for HSRP? (Choose two.)
A. t load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN
B. t uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
C. t forwards multiple packets to the same destination over different routed links in the data path
D. t load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table
View answer
Correct Answer: AE

View The Updated CCNA Exam Questions

SPOTO Provides 100% Real CCNA Exam Questions for You to Pass Your CCNA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: