DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Get Real Cisco 200-301 CCNA Exam Questions & Practice Tests

Prepare for the Cisco Certified Network Associate (CCNA) 200-301 exam with our comprehensive exam resources. Our CCNA200-301 practice tests and study materials provide authentic exam questions and answers, allowing you to simulate the real exam environment. Access verified dumps and practice exams to identify your strengths and weaknesses, ensuring thorough exam preparation. Our up-to-date study materials cover all exam objectives, equipping you with the knowledge and skills needed to successfully pass the CCNA certification exam. Boost your confidence and increase your chances of acing the exam with our reliable CCNA 200-301 exam resources.
Take other online exams

Question #1
Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32?
A. efault route
B. etwork route
C. ost route
D. loating static route
View answer
Correct Answer: B

View The Updated 200-301 Exam Questions

SPOTO Provides 100% Real 200-301 Exam Questions for You to Pass Your 200-301 Exam!

Question #2
Refer to the exhibit. Which prefix does Router1 use for traffic to Host A?
A. 0
B. 0
C. 0
D. 0
View answer
Correct Answer: D
Question #3
A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two.)
A. CP uses the three-way handshake, and UDP does not guarantee message delivery
B. CP uses synchronization packets, and UDP uses acknowledgment packets
C. DP provides reliable message transfer, and TCP is a connectionless protocol
D. DP uses SYN, SYN ACK, and FIN bits in the frame header while TCP uses SYN, SYN ACK, and ACK bits
View answer
Correct Answer: AD
Question #4
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
A. spine switch and a leaf switch can be added with redundant connections between them
B. spine switch can be added with at least 40 GB uplinks
C. leaf switch can be added with connections to every spine switch
D. leaf switch can be added with a single connection to a core spine switch
View answer
Correct Answer: A
Question #5
Which 802.11 frame type is Association Response?
A. he hypervisor communicates on Layer 3 without the need for additional resources
B. ach hypervisor supports a single virtual machine and a single software switch
C. he hypervisor virtualizes physical components including CPU, memory, and storage
D. irtualized servers run efficiently when physically connected to a switch that is separate from the hypervisor
View answer
Correct Answer: A
Question #6
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
A. pv6 address dhcp
B. pv6 address 2001:DB8:5:112::/64 eui-64
C. pv6 address autoconfig
D. pv6 address 2001:DB8:5:112::2/64 link-local
View answer
Correct Answer: C
Question #7
You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?
A. MON
B. NMPv3
C. etFlow
D. isco Discovery Protocol
View answer
Correct Answer: C
Question #8
You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface?
A. MON
B. NMPv3
C. etFlow
D. isco Discovery Protocol
View answer
Correct Answer: C
Question #9
In which phase of PPDIOO are the network requirements identified?
A. esign
B. lan
C. repare
D. mplement
E. perate
F. ptimize
View answer
Correct Answer: B
Question #10
Which is part of the Prepare phase of PPDIOO?
A. btain site contact information
B. erform network audit
C. dentify customer requirements
D. erform gap analysis
View answer
Correct Answer: C
Question #11
When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?
A. 02
B. CLs in the core layer
C. isco Security MARS
D. etFlow
View answer
Correct Answer: A
Question #12
Which is the purpose of the Cisco NAC Profiler?
A. utomates discovery and inventory of all LAN attached devices
B. enerates a profile based on username and group
C. earns and creates a database of virus definitions based on LAN traffic
D. database used to map user VPN accounts
View answer
Correct Answer: A
Question #13
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?
A. ADIUS
B. EAP
C. Psec
D. ACACS
E. SAKMP
View answer
Correct Answer: A
Question #14
Which protocol is used for voice bearer traffic?
A. GCP
B. TP
C. CCP
D. DP
E. CMP
View answer
Correct Answer: B
Question #15
Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network?
A. RTP
B. EEE 802
C. SVP
D. FI
E. uto QOS
View answer
Correct Answer: C
Question #16
Which two features are supported by single wireless controller deployments? (Choose two.)
A. utomatic detection and configuration of LWAPPs
B. WAPP support across multiple floors and buildings
C. utomatic detection and configuration of RF parameters
D. ayer 2 and Layer 3 roaming
E. ontroller redundancy
F. obility groups
View answer
Correct Answer: AB
Question #17
Which two options are the best reasons to use an IPV4 private IP space? (Choose two.)
A. to enable intra-enterprise communication
B. to implement NAT
C. to connect applications
D. to conserve global address space
E. to manage routing overhead
View answer
Correct Answer: AD
Question #18
Refer to the exhibit. When PC1 sends a packet to PC2, the packet has which source and destination IP address when it arrives at interface Gi0/0 on router R2?
A. source 192
B. source 192
C. source 192
D. source 10
View answer
Correct Answer: C
Question #19
What is the same for both copper and fiber interfaces when using SFP modules?
A. They support an inline optical attenuator to enhance signal strength
B. They accommodate single-mode and multi-mode in a single module
C. They provide minimal interruption to services by being hot-swappable
D. They offer reliable bandwidth up to 100 Mbps in half duplex mode
View answer
Correct Answer: C
Question #20
What are two functions of a server on a network? (Choose two.)
A. handles requests from multiple workstations at the same time
B. achieves redundancy by exclusively using virtual server clustering
C. housed solely in a data center that is dedicated to a single client achieves redundancy by exclusively using virtual server clustering
D. runs the same operating system in order to communicate with other servers
E. runs applications that send and retrieve data for workstations that make requests
View answer
Correct Answer: AE
Question #21
Which function is performed by the collapsed core layer in a two-tier architecture?
A. enforcing routing policies
B. marking interesting traffic for data policies
C. applying security policies
D. attaching users to the edge of the network
View answer
Correct Answer: A
Question #22
What is the primary function of a Layer 3 device?
A. to transmit wireless traffic between hosts
B. to analyze traffic and drop unauthorized traffic from the Internet
C. to forward traffic within the same broadcast domain
D. to pass traffic between different networks
View answer
Correct Answer: D
Question #23
Which two functions are performed by the core layer in a three-tier architecture? (Choose two.)
A. Provide uninterrupted forwarding service
B. Inspect packets for malicious activity
C. Ensure timely data transfer between layers
D. Provide direct connectivity for end user devices
E. Police traffic that is sent to the edge of the network
View answer
Correct Answer: AC
Question #24
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
A. different nonoverlapping channels
B. one overlapping channel
C. one nonoverlapping channel
D. different overlapping channels
View answer
Correct Answer: A
Question #25
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend?
A. infrastructure-as-a-service
B. platform-as-a-service
C. business process as service to support different types of service
D. software-as-a-service
View answer
Correct Answer: D
Question #26
What are two functions of a Layer 2 switch? (Choose two.)
A. acts as a central point for association and authentication servers
B. selects the best route between networks on a WAN
C. moves packets within a VLAN
D. moves packets between different VLANs
E. makes forwarding decisions based on the MAC address of a packet
View answer
Correct Answer: CE
Question #27
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use5GHz access points?
A. Client Band Select
B. Re-Anchor Roamed Clients
C. OEAP Spilt Tunnel
D. 11ac MU-MIMO
View answer
Correct Answer: A
Question #28
Which networking function occurs on the data plane?
A. processing inbound SSH management traffic
B. sending and receiving OSPF Hello packets
C. facilitates spanning-tree elections
D. forwarding remote client/server traffic
View answer
Correct Answer: D
Question #29
Under which condition is TCP preferred over UDP?
A. UDP is used when low latency is optimal, and TCP is used when latency is tolerable
B. TCP is used when dropped data is more acceptable, and UDP is used when data is accepted out-of-order
C. TCP is used when data reliability is critical, and UDP is used when missing packets are acceptable
D. UDP is used when data is highly interactive, and TCP is used when data is time-sensitive
View answer
Correct Answer: C
Question #30
Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue?
A. Interface errors are incrementing
B. High usage is causing high latency
C. An incorrect SFP media type was used at SiteA
D. The sites were connected with the wrong cable type
View answer
Correct Answer: A
Question #31
Which capability does TFTP provide?
A. oads configuration files on systems without data storage devices
B. rovides authentication for data communications over a private data network
C. rovides encryption mechanisms for file transfer across a WAN
D. rovides secure file access within the LAN
View answer
Correct Answer: A
Question #32
How does IPsec provide secure networking for applications within an organization?
A. t takes advantage of FTP to secure file transfers between nodes on the network
B. t provides GRE tunnels to transmit traffic securely between network nodes
C. t enables sets of security associations between peers
D. t leverages TFTP providing secure file transfers among peers on the network
View answer
Correct Answer: C
Question #33
What are two functions of DHCP servers? (Choose two.)
A. revent users from assigning their own IP addresses to hosts
B. ssign dynamic IP configurations to hosts in a network
C. upport centralized IP management
D. ssue DHCPDISCOVER messages when added to the network
E. espond to client DHCPOFFER requests by issuing an IP address
View answer
Correct Answer: BC
Question #34
It work security team noticed that an increasing number of employees are becoming victims of phishing attacks. Which security program should be implemented to mitigate the problem?
A. mail system patches
B. hysical access control
C. oftware firewall enabled on all PCs
D. ser awareness training
View answer
Correct Answer: D
Question #35
What does WPA3 provide in wireless networking?
A. afeguards against brute force attacks with SAE
B. ptional Protected Management Frame negotiation
C. ackward compatibility with WPAand WPA2
D. ncreased security and requirement of a complex configuration
View answer
Correct Answer: A
Question #36
Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32?
A. efault route
B. etwork route
C. ost route
D. loating static route
View answer
Correct Answer: B
Question #37
Refer to the exhibit. Which prefix does Router1 use for traffic to Host A?
A. 0
B. 0
C. 0
D. 0
View answer
Correct Answer: D
Question #38
DRAG DROP (Drag and Drop is not supported)Drag and drop the descriptions of file-transfer protocols from the left onto the correct protocols on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #39
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #40
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
A. CP uses the three-way handshake, and UDP does not guarantee message delivery
B. CP uses synchronization packets, and UDP uses acknowledgment packets
C. DP provides reliable message transfer, and TCP is a connectionless protocol
D. DP uses SYN, SYN ACK, and FIN bits in the frame header while TCP uses SYN, SYN ACK, and ACK bits
View answer
Correct Answer: A
Question #41
Which 802.11 frame type is Association Response?
A. anagement
B. rotected frame
C. ction
D. ontrol
View answer
Correct Answer: A
Question #42
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
A. spine switch and a leaf switch can be added with redundant connections between them
B. spine switch can be added with at least 40 GB uplinks
C. leaf switch can be added with connections to every spine switch
D. leaf switch can be added with a single connection to a core spine switch
View answer
Correct Answer: C
Question #43
What identifies the functionality of virtual machines?
A. he hypervisor communicates on Layer 3 without the need for additional resources
B. ach hypervisor supports a single virtual machine and a single software switch
C. he hypervisor virtualizes physical components including CPU, memory, and storage
D. irtualized servers run efficiently when physically connected to a switch that is separate from the hypervisor
View answer
Correct Answer: C
Question #44
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
A. pv6 address dhcp
B. pv6 address 2001:DB8:5:112::/64 eui-64
C. pv6 address autoconfig
D. pv6 address 2001:DB8:5:112::2/64 link-local
View answer
Correct Answer: C
Question #45
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: DE
Question #46
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
A. he Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table
B. he Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning
C. he Layer 2 switch floods packets to all ports except the receiving port in the given VLAN
D. he Layer 2 switch drops the received frame
View answer
Correct Answer: C
Question #47
An engineer must configure a /30 subnet between two routes. Which usable IP address and subnet mask combination meets this criteria?
A. nterface e0/0 description to XX-AXXX:XXXXX ip address 10
B. nterface e0/0 description to XX-AXXX:XXXXX ip address 192
C. nterface e0/0 description to XX-AXXX:XXXXX ip address 172
D. nterface e0/0 description to XX-AXXX:XXXXX ip address 209
View answer
Correct Answer: D
Question #48
Which network allows devices to communicate without the need to access the Internet?
A. 72
B. 72
C. 92
D. 09
View answer
Correct Answer: B
Question #49
Refer to the exhibit. Which statement explains the configuration error message that is received?
A. t belongs to a private IP address range
B. he router does not support /28 mask
C. t is a network IP address
D. t is a broadcast IP address
View answer
Correct Answer: D
Question #50
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
A. ink-local
B. nique local
C. ulticast
D. lobal unicast
View answer
Correct Answer: B
Question #51
Which IPv6 address block sends packets to a group address rather than a single address?
A. 000::/3
B. C00::/7
C. E80::/10
D. F00::/8
View answer
Correct Answer: D
Question #52
What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two.)
A. t eliminates the need to configure each access point individually
B. entral AP management requires more complex configurations
C. nique SSIDs cannot use the same authentication method
D. t supports autonomous and lightweight APs
View answer
Correct Answer: BE
Question #53
Which action is taken by switch port enabled for PoE power classification override?
A. f a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled
B. hen a powered device begins drawing power from a PoE switch port, a syslog message is generated
C. s power usage on a PoE switch port is checked, data flow to the connected device is temporarily paused
D. f a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it
View answer
Correct Answer: A
Question #54
What occurs to frames during the process of frame flooding?
A. rames are sent to all ports, including those that are assigned to other VLANs
B. rames are sent to every port on the switch that has a matching entry in MAC address table
C. rames are sent to every port on the switch in the same VLAN except from the originating port
D. rames are sent to every port on the switch in the same VLAN
View answer
Correct Answer: C
Question #55
Which function does the range of private IPv4 addresses perform?
A. llows multiple companies to each use the same addresses without conflicts
B. rovides a direct connection for hosts from outside of the enterprise network
C. nsures that NAT is not required to reach the Internet with private range addressing
D. nables secure communications to the Internet for all external hosts
View answer
Correct Answer: A
Question #56
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
A. xplicitly assign a link-local address
B. isable the EUI-64 bit process
C. nable SLAAC on an interface
D. onfigure a stateful DHCPv6 server on the network
View answer
Correct Answer: C
Question #57
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two.)
A. CP does not guarantee delivery or error checking to ensure that there is no corruption of data, UDP provides message acknowledgement and retransmits data if lost
B. CP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking
C. CP is a connectionless protocol that does not provide reliable delivery of data; UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery
D. CP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake
View answer
Correct Answer: CE
Question #58
How do TCP and UDP differ in the way they provide reliability for delivery of packets?
A. he access point must not be connected to the wired network, as it would create a loop
B. he access point must be connected to the same switch as the WLC
C. he access point must directly connect to the WLC using a copper cable
D. he access point has the ability to link to any switch in the network, assuming connectivity to the WLC
View answer
Correct Answer: B
Question #59
Which IPv6 address block forwards packets to a multicast address rather than a unicast address?
A. 000::/3
B. C00::/7
C. E80::/10
D. F00::/12
View answer
Correct Answer: D
Question #60
What is the difference regarding reliability and communication type between TCP and UDP?
A. CP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol
B. CP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol
C. CP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol
D. CP is reliable and is a connection-oriented protocol; UDP is not reliable and is a connectionless protocol
View answer
Correct Answer: D
Question #61
What are two descriptions of three-tier network topologies? (Choose two.)
A. ulticast
B. nique local
C. ink-local
D. lobal unicast
View answer
Correct Answer: AB
Question #62
What is the expected outcome when an EUI-64 address is generated?
A. he interface ID is configured as a random 64-bit value
B. he characters FE80 are inserted at the beginning of the MAC address of the interface
C. he seventh bit of the original MAC address of the interface is inverted
D. he MAC address of the interface is used as the interface ID without modification
View answer
Correct Answer: C
Question #63
A corporate office uses four floors in a building.-Floor 1 has 24 users.-Floor 2 has 29 users.-Floor 3 has 28 users.-Floor 4 has 22 users.Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
A. 92
B. 92
C. 92
D. 92
View answer
Correct Answer: C
Question #64
Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?
A. 0
B. 0
C. 0
D. 0
View answer
Correct Answer: D
Question #65
What is a characteristic of spine-and-leaf architecture?
A. ach link between leaf switches allows for higher bandwidth
B. t provides greater predictability on STP blocked ports
C. t provides variable latency
D. ach device is separated by the same number of hops
View answer
Correct Answer: D
Question #66
An office has 8 floors with approximately 30-40 users per floor. One subnet must be used. Which command must be configured on the router Switched VirtualInterface to use address space efficiently?
A. p address 192
B. p address 192
C. p address 192
D. p address 192
View answer
Correct Answer: B
Question #67
DRAG DROP (Drag and Drop is not supported)Drag and drop the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #68
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received. Which interface counter increments?
A. unt
B. ollision
C. ate collision
D. RC
View answer
Correct Answer: C
Question #69
Refer to the exhibit. Which outcome is expected when PC_A sends data to PC_B after their initial communication?
A. he source MAC address is changed
B. he destination MAC address is replaced with ffff
C. he source and destination MAC addresses remain the same
D. he switch rewrites the source and destination MAC addresses with its own
View answer
Correct Answer: C
Question #70
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?
A. , 6, 7
B. , 2, 3
C. , 6, 11
D. , 5, 10
View answer
Correct Answer: C
Question #71
How do TCP and UDP differ in the way they guarantee packet delivery?
A. CP uses retransmissions, acknowledgment, and parity checks, and UDP uses cyclic redundancy checks only
B. CP uses two-dimensional parity checks, checksums, and cyclic redundancy checks, and UDP uses retransmissions only
C. CP uses checksum, acknowledgements, and retransmissions, and UDP uses checksums only
D. CP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only
View answer
Correct Answer: C
Question #72
A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. Which action must be taken to meet the requirement?
A. nable Band Select
B. nable DTIM
C. nable RX-SOP
D. nable AAA override
View answer
Correct Answer: A
Question #73
DRAG DROP (Drag and Drop is not supported)Drag and drop the application protocols from the left onto the transport protocols that it uses on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #74
What is the destination MAC address of a broadcast frame?
A. 0:00:0c:07:ac:01
B. f:ff:ff:ff:ff:ff
C. 3:2e:08:00:00:0c
D. 0:00:0c:43:2e:08
E. 0:00:0c:ff:ff:ff
View answer
Correct Answer: B
Question #75
For what two purposes does the Ethernet protocol use physical addresses?
A. ee Explanation section for answer
View answer
Correct Answer: AE
Question #76
DRAG DROP (Drag and Drop is not supported)Drag and drop the networking parameters from the left on to the correct values on the right.Select and Place:
A. tart of frame delimiter
B. ype field
C. reamble
D. ata field
View answer
Correct Answer: A
Question #77
You are configuring your edge routers interface with a public IP address for Internet connectivity. The router needs to obtain the IP address from the service provider dynamically.Which command is needed on interface FastEthernet 0/0 to accomplish this?
A. p default-gateway
B. p route
C. p default-network
D. p address dhcp
E. p address dynamic
View answer
Correct Answer: D
Question #78
Which two statements about the purpose of the OSI model are accurate? (Choose two.)
A. AT
B. to 4 tunneling
C. 2TPv3
D. ual-stack
View answer
Correct Answer: AB
Question #79
Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?
A. his design will function as intended
B. panning-tree will need to be used
C. he router will not accept the addressing scheme
D. he connection between switches should be a trunk
E. he router interfaces must be encapsulated with the 802
View answer
Correct Answer: C
Question #80
Which two goals reasons to implement private IPv4 addressing on your network? (Choose two.)
A. roadband cable access
B. rame-relay packet switching
C. edicated point-to-point leased line
D. ntegrated Services Digital Network switching
View answer
Correct Answer: BD
Question #81
Which WAN access technology is preferred for a small office / home office architecture?
A. 0000000
B. 1111100
C. 1111111
D. 1111101
View answer
Correct Answer: A
Question #82
Which two options are the best reasons to use an IPV4 private IP space? (Choose two.)
A. ource 192
B. ource 192
C. ource 192
D. ource 10
View answer
Correct Answer: AD
Question #83
Refer to the exhibit. When PC1 sends a packet to PC2, the packet has which source and destination IP address when it arrives at interface Gi0/0 on router R2?
A. hey support an inline optical attenuator to enhance signal strength
B. hey accommodate single-mode and multi-mode in a single module
C. hey provide minimal interruption to services by being hot-swappable
D. hey offer reliable bandwidth up to 100 Mbps in half duplex mode
View answer
Correct Answer: C
Question #84
Which function is performed by the collapsed core layer in a two-tier architecture?
A. nforcing routing policies
B. arking interesting traffic for data policies
C. pplying security policies
D. ttaching users to the edge of the network
View answer
Correct Answer: A
Question #85
What is the primary function of a Layer 3 device?
A. o transmit wireless traffic between hosts
B. o analyze traffic and drop unauthorized traffic from the Internet
C. o forward traffic within the same broadcast domain
D. o pass traffic between different networks
View answer
Correct Answer: D
Question #86
Which two functions are performed by the core layer in a three-tier architecture? (Choose two.)
A. ifferent nonoverlapping channels
B. ne overlapping channel
C. ne nonoverlapping channel
D. ifferent overlapping channels
View answer
Correct Answer: AC
Question #87
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend?
A. nfrastructure-as-a-service
B. latform-as-a-service
C. usiness process as service to support different types of service
D. oftware-as-a-service
View answer
Correct Answer: D
Question #88
What are two functions of a Layer 2 switch? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: CE
Question #89
DRAG DROP (Drag and Drop is not supported)Drag and drop the TCP/IP protocols from the left onto their primary transmission protocols on the right.Select and Place:
A. lient Band Select
B. e-Anchor Roamed Clients
C. EAP Spilt Tunnel
D. 1ac MU-MIMO
View answer
Correct Answer: A
Question #90
Which networking function occurs on the data plane?
A. rocessing inbound SSH management traffic
B. ending and receiving OSPF Hello packets
C. acilitates spanning-tree elections
D. orwarding remote client/server traffic
View answer
Correct Answer: D
Question #91
Under which condition is TCP preferred over UDP?
A. DP is used when low latency is optimal, and TCP is used when latency is tolerable
B. CP is used when dropped data is more acceptable, and UDP is used when data is accepted out-of-order
C. CP is used when data reliability is critical, and UDP is used when missing packets are acceptable
D. DP is used when data is highly interactive, and TCP is used when data is time-sensitive
View answer
Correct Answer: C
Question #92
Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue?
A. nterface errors are incrementing
B. igh usage is causing high latency
C. n incorrect SFP media type was used at SiteA
D. he sites were connected with the wrong cable type
View answer
Correct Answer: A
Question #93
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied, the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?
A. pv6 address 2001::db8:0000::500:a:400F:583B
B. pv6 address 2001:db8:0::500:a:4F:583B
C. pv6 address 2001:db8::500:a:400F:583B
D. pv6 address 2001:0db8::5:a:4F:583B
View answer
Correct Answer: C
Question #94
What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?
A. ayer 2 switch
B. AN controller
C. oad balancer
D. irewall
View answer
Correct Answer: D
Question #95
What is a role of access points in an enterprise network?
A. ntegrate with SNMP in preventing DDoS attacks
B. erve as a first line of defense in an enterprise network
C. onnect wireless devices to a wired network
D. upport secure user logins to devices on the network
View answer
Correct Answer: C
Question #96
An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?
A. outer
B. ypervisor
C. witch
D. traight cable
View answer
Correct Answer: B
Question #97
How does a Cisco Unified Wireless Network respond to Wi-Fi channel overlap?
A. t allows the administrator to assign the channels on a per-device or per-interface basis
B. t segregates devices from different manufactures onto different channels
C. t analyzes client load and background noise and dynamically assigns a channel
D. t alternates automatically between 2
View answer
Correct Answer: C
Question #98
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A. he network has multiple endpoint listeners, and it is desired to limit the number of broadcasts
B. he ISP requires the new subnet to be advertised to the Internet for web services
C. here is limited unique address space, and traffic on the new subnet will stay local within the organization
D. raffic on the subnet must traverse a site-to-site VPN to an outside organization
View answer
Correct Answer: C
Question #99
DRAG DROP (Drag and Drop is not supported)Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #100
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
A. ata
B. anagement
C. ontrol
D. ction
View answer
Correct Answer: B
Question #101
What is the difference in data transmission delivery and reliability between TCP and UDP?
A. CP transmits data at a higher rate and ensures packet delivery
B. CP requires the connection to be established before transmitting data
C. DP sets up a connection between both devices before transmitting data
D. DP is used for multicast and broadcast communication
View answer
Correct Answer: B
Question #102
Refer to the exhibit. When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A, verifying the IP addresses, and forwarding the packet to PC-B?
A. outer
B. ayer 2 switch
C. oad balancer
D. irewall
View answer
Correct Answer: A
Question #103
What is the maximum bandwidth of a T1 point-to-point connection?
A.
B.
C. 4
D. 3
View answer
Correct Answer: A
Question #104
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)
A. nsite network services are provided with physical Layer 2 and Layer 3 components
B. ireless connections provide the sole access method to services
C. hysical workstations are configured to share resources
D. ervices are provided by a public, private, or hybrid deployment
View answer
Correct Answer: BD
Question #105
Which network action occurs within the data plane?
A. eply to an incoming ICMP echo request
B. ake a configuration change from an incoming NETCONF RPC
C. un routing protocols (OSPF, EIGRP, RIP, BGP)
D. ompare the destination IP address to the IP routing table
View answer
Correct Answer: D
Question #106
Refer to the exhibit. R1 has just received a packet from host A that is destined to host B. Which route in the routing table is used by R1 to reach host B?
A. 0
B. 0
C. 0
D. 0
View answer
Correct Answer: B
Question #107
Which two network actions occur within the data plane? (Choose two.)
A. upport inter-VLAN connectivity
B. threat to the network if they are compromised
C. ct as routers to connect a user to the service provider network
D. nforce policies for campus-wide traffic going to the Internet
View answer
Correct Answer: CD
Question #108
Refer to the exhibit. The link between PC1 and the switch is up, but it is performing poorly. Which interface condition is causing the performance problem?
A. here is an issue with the fiber on the switch interface
B. here is a duplex mismatch on the interface
C. here is an interface type mismatch
D. here is a speed mismatch on the interface
View answer
Correct Answer: B
Question #109
Why was the RFC 1918 address space defined?
A. onserve public IPv4 addressing
B. upport the NAT protocol
C. reserve public IPv6 address space
D. educe instances of overlapping IP addresses
View answer
Correct Answer: A
Question #110
DRAG DROP (Drag and Drop is not supported)Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #111
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #112
Which type of organization should use a collapsed-core architecture?
A. mall and needs to reduce networking costs
B. arge and must minimize downtime when hardware fails
C. arge and requires a flexible, scalable network design
D. urrently small but is expected to grow dramatically in the near future
View answer
Correct Answer: A
Question #113
A network administrator is setting up a new IPv6 network using the 64-bit address 2001:0EB8:00C1:2200:0001:0000:0000:0331/64. To simplify the configuration, the administrator has decided to compress the address. Which IP address must the administrator configure?
A. pv6 address 2001:EB8:C1:22:1::331/64
B. pv6 address 21:EB8:C1:2200:1::331/64
C. pv6 address 2001:EB8:C1:2200:1:0000:331/64
D. pv6 address 2001:EB8:C1:2200:1::331/64
View answer
Correct Answer: D
Question #114
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #115
What is an appropriate use for private IPv4 addressing?
A. o allow hosts inside to communicate in both directions with hosts outside the organization
B. n internal hosts that stream data solely to external resources
C. n the public-facing interface of a firewall
D. n hosts that communicate only with other internal hosts
View answer
Correct Answer: D
Question #116
Refer to the exhibit. An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0/1 interface for the router to assign a unique 64-bit IPv6 address to itself?
A. pv6 address 2001:DB8:0:1:FFFF:C601:420F:7/64
B. pv6 address 2001:DB8:0:1:FE80:C601:420F:7/64
C. pv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64
D. pv6 address 2001:DB8:0:1:C601:42FF:800F:7/64
View answer
Correct Answer: B
Question #117
What is a similarity between 1000BASE-LX and 1000BASE-T standards?
A. oth use the same data-link header and trailer formats
B. oth cable types support RJ-45 connectors
C. oth support up to 550 meters between nodes
D. oth cable types support LR connectors
View answer
Correct Answer: A
Question #118
Refer to the exhibit. The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?
A. 92
B. 92
C. 92
D. 92
View answer
Correct Answer: A
Question #119
Which function forwards frames to ports that have a matching destination MAC address?
A. rame flooding
B. rame filtering
C. rame pushing
D. rame switching
View answer
Correct Answer: D
Question #120
Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on the same network at the same time?
A. lobal unicast address
B. ink-local address
C. nycast address
D. ulticast address
View answer
Correct Answer: C
Question #121
What is a characteristic of private IPv4 addressing?
A. omposed of up to 65,536 available addresses
B. ssued by IANA in conjunction with an autonomous system number
C. sed without tracking or registration
D. raverse the Internet when an outbound ACL is applied
View answer
Correct Answer: C
Question #122
What is a function of an endpoint on a network?
A. rovides wireless services to users in a building
B. onnects server and client device to a network
C. llows users to record data and transmit to a file server
D. orwards traffic between VLANs on a network
View answer
Correct Answer: C
Question #123
What is the function of a controller in controller-based networking?
A. t serves as the centralized management point of an SDN architecture
B. t is a pair of core routers that maintain all routing decisions for a campus
C. t centralizes the data plane for the network
D. t is the card on a core router that maintains all routing decisions for a campus
View answer
Correct Answer: A
Question #124
Refer to the exhibit. Each router must be configured with the last usable IP address in the subnet. Which configuration fulfills this requirement?
A. 7# interface FastEthernet1/0 ip address 10
B. 7# interface FastEthernet1/0 ip address 10
C. 7# interface FastEthernet1/0 ip address 10
D. 7# interface FastEthernet1/0 ip address 10
View answer
Correct Answer: D
Question #125
How do TCP and UDP fit into a query-responsible model?
A. CP avoids using sequencing and UDP avoids using acknowledgments
B. CP establishes a connection prior to sending data, and UDP sends immediately
C. CP encourages out-of-order packet delivery, and UDP prevents re-ordering
D. CP uses error detection for packets, and UDP uses error recovery
View answer
Correct Answer: B
Question #126
What provides centralized control of authentication and roaming in an enterprise network?
A. lightweight access point
B. wireless LAN controller
C. firewall
D. LAN switch
View answer
Correct Answer: B
Question #127
Which set of 2 4 GHz nonoverlapping wireless channels is standard in the United States?
A. hannels 1, 6, 11, and 14
B. hannels 2, 7, 9, and 11
C. hannels 2, 7, and 11
D. hannels 1, 6, and 11
View answer
Correct Answer: D
Question #128
A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network.Which type of IPv6 address must the engineer assign?
A. Pv4-compatible IPv6 address
B. nique local address
C. ink-local address
D. ggregatable global address
View answer
Correct Answer: B
Question #129
What is a requirement for nonoverlapping Wi-Fi channels?
A. ifferent security settings
B. iscontinuous frequency ranges
C. nique SSIDs
D. ifferent transmission speeds
View answer
Correct Answer: B
Question #130
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?
A. nterface vlan 2000 ipv6 address ff00:0000:aaaa::1234:2343/64
B. nterface vlan 2000 ipv6 address fd00::1234:2343/64
C. nterface vlan 2000 ipv6 address fe80:0000:aaaa::1234:2343/64
D. nterface vlan 2000 ipv6 address fc00:0000:aaaa::a15d:1234:2343:8aca/64
View answer
Correct Answer: B
Question #131
When a switch receives a frame for a known destination MAC address, how is the frame handled?
A. looded to all ports except the one from which it originated
B. orwarded to the first available port
C. ent to the port identified for the known MAC address
D. roadcast to all ports
View answer
Correct Answer: C
Question #132
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 address details from the left onto the corresponding types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #133
What is the collapsed layer in collapsed core architectures?
A. ore and distribution
B. ccess and WAN
C. istribution and access
D. ore and WAN
View answer
Correct Answer: A
Question #134
What is a characteristic of a SOHO network?
A. ncludes at least three tiers of devices to provide load balancing and redundancy
B. onnects each switch to every other switch in the network
C. nables multiple users to share a single broadband connection
D. rovides high throughput access for 1000 or more users
View answer
Correct Answer: C
Question #135
What is the role of disaggregation in controller-based networking?
A. t divides the control-plane and data-plane functions
B. t streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions
C. t summarizes the routes between the core and distribution layers of the network topology
D. t enables a network topology to quickly adjust from a ring network to a star network
View answer
Correct Answer: A
Question #136
What is a function performed by a web server?
A. end and retrieve email from client devices
B. ecurely store files for FTP access
C. uthenticate and authorize a user's identity
D. rovide an application that is transmitted over HTTP
View answer
Correct Answer: D
Question #137
Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with applications hosted at site B. What is the reason for the problem?
A. hysical network errors are being transmitted between the two sites
B. eavy usage is causing high latency
C. he wrong cable type was used to make the connection
D. n incorrect type of transceiver has been inserted into a device on the link
View answer
Correct Answer: D
Question #138
Which protocol uses the SSL?
A. SH
B. TTPS
C. TTP
D. elnet
View answer
Correct Answer: B
Question #139
Why is UDP more suitable than TCP for applications that require low latency such as VoIP?
A. DP reliably guarantees delivery of all packets: TCP drops packets under heavy load
B. DP uses sequencing data for packets to arrive in order TCP offers the capability to receive packets in random order
C. CP uses congestion control for efficient packet delivery: UDP uses flow control mechanisms for the delivery of packets
D. CP sends an acknowledgement for every packet received: UDP operates without acknowledgments
View answer
Correct Answer: D
Question #140
What are the two functions of SSIDs? (Choose two.)
A. uto
B. tatic
C. ynamic
D. ctive
View answer
Correct Answer: AD
Question #141
Refer to the exhibit. The router has been configured with a super net to accommodate the requirements for 380 users on a Subnet. The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
A. ubnet: 10
B. ubnet: 10
C. ubnet: 10
D. ubnet: 10
View answer
Correct Answer: D
Question #142
Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
A. nterface GigabitEthernet0/0 ip address 10
B. nterface GigabitEthernet0/0
C. nterface GigabitEthernet0/0
D. nterface GigabitEthernet0/0
View answer
Correct Answer: B
Question #143
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 address type characteristics from the left to the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #144
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these requirements:-DC-1 Gi1/0 must be the last usable address on a /30-DC-1 Gi1/1 must be the first usable address on a /29-DC-1 Gi1/2 must be the last usable address on a /28-HQ-1 Gi1/3 must be the last usable address on a /29Drag and drop the commands from the left onto the destination interfaces on the right. Not all commands are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #145
How is RFC 1918 addressing used in a network?
A. hey are used to access the Internet from the internal network without conversion
B. hey are used in place of public addresses for Increased security
C. hey are used with NAT to preserve public IPv4 addresses
D. hey are used by Internet Service Providers to route over the Internet
View answer
Correct Answer: C
Question #146
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 address types from the left onto their descriptions on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #147
Refer to the exhibit. What is a reason for poor performance on the network interface?
A. he interface is receiving excessive broadcast traffic
B. he bandwidth setting of the interface is misconfigured
C. he cable connection between the two devices is faulty
D. he interface is operating at a different speed than the connected device
View answer
Correct Answer: C
Question #148
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 address descriptions from the left onto the IPv6 address types on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #149
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #150
Which WAN topology has the highest degree of reliability?
A. oint-to-point
B. outer-on-a-stick
C. ull mesh
D. ub-and-spoke
View answer
Correct Answer: C
Question #151
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 address type characteristics from the left to the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #152
What causes a port to be placed in the err-disabled state?
A. othing plugged into the port
B. ink flapping
C. atency
D. hutdown command issued on the port
View answer
Correct Answer: B
Question #153
DRAG DROP (Drag and Drop is not supported)Drag and drop the characteristics of transport layer protocols from the left onto the corresponding protocols on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #154
A network engineer must configure an interface with IP address 10.10.10.145 and a subnet mask equivalent to 11111111.11111111.11111111.11111000. Which subnet mask must the engineer use?
A. 29
B. 30
C. 27
D. 28
View answer
Correct Answer: A
Question #155
Refer to the exhibit. The switches are connected via a Cat5 Ethernet cable that is tested successfully. The interfaces are configured as access ports and are both in a down status. What is the cause of the issue?
A. he speed settings on the switches are mismatched
B. he distance between the two switches is not supported by Cat5
C. he switches are configured with incompatible duplex settings
D. he portfast command is missing from the configuration
View answer
Correct Answer: A
Question #156
The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:-Create 8 new subnets.-Each subnet must accommodate 30 hosts.-Interface VLAN 10 must use the last usable IP in the first new subnet.-A Layer 3 interface is used.Which configuration must be applied to the interface?
A. o switchport mode trunk ip address 192
B. witchport ip address 192
C. o switchport ip address 192
D. o switchport mode access ip address 192
View answer
Correct Answer: C
Question #157
DRAG DROP (Drag and Drop is not supported)Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #158
What are two reasons to deploy private addressing on a network? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: BC
Question #159
Which property is shared by 10GBase-SR and 10GBase-LR interfaces?
A. oth use the single-mode fiber type
B. oth require UTP cable media for transmission
C. oth require fiber cable media for transmission
D. oth use the multimode fiber type
View answer
Correct Answer: C
Question #160
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #161
Which device permits or denies network traffic based on a set of rules?
A. witch
B. irewall
C. ireless controller
D. ccess point
View answer
Correct Answer: B
Question #162
What is the role of a firewall in an enterprise network?
A. etermines which packets are allowed to cross from unsecured to secured networks
B. rocesses unauthorized packets and allows passage to less secure segments of the network
C. orwards packets based on stateless packet inspection
D. xplicitly denies all packets from entering an administrative domain
View answer
Correct Answer: A
Question #163
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit.An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #164
DRAG DROP (Drag and Drop is not supported)Drag and drop the DNS lookup components from the left onto the functions on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #165
DRAG DROP (Drag and Drop is not supported)Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #166
Which action is taken by a switch port enabled for PoE power classification override?
A. s power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
B. hen a powered device begins drawing power from a PoE switch port, a syslog message is generated
C. f a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it
D. hould a monitored port exceed the maximum administrative value for power, the port is shut down and err-disabled
View answer
Correct Answer: D
Question #167
What is a function spine-and-leaf architecture?
A. ffers predictable latency of the traffic path between end devices
B. xclusively sends multicast traffic between servers that are directly connected to the spine
C. itigates oversubscription by adding a layer of leaf switches
D. imits payload size of traffic within the leaf layer
View answer
Correct Answer: A
Question #168
Which action is taken by the data plane within a network device?
A. onstructs a routing table based on a routing protocol
B. orwards traffic to the next hop
C. ooks up an egress interface in the forwarding information base
D. rovides CLI access to the network device
View answer
Correct Answer: B
Question #169
What is the function of the control plane?
A. t exchanges routing table information
B. t provides CLI access to the network device
C. t looks up an egress interface in the forwarding information base
D. t forwards traffic to the next hop
View answer
Correct Answer: A
Question #170
Which two cable types must be used to connect an access point to the WLC when 2.5-Gbps and 5-Gbps upload speeds are required? (Choose two.)
A. mplemented over a dedicated WAN
B. ll hosted on physical servers
C. ccessed over the Internet
D. ocated in the same data center as the users
View answer
Correct Answer: AC
Question #171
What is a benefit for external users who consume public cloud resources?
A. 55
B. 55
C. 55
D. 55
View answer
Correct Answer: C
Question #172
An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?
A. riginating packets
B. xchanging routing table data
C. aking routing decisions
D. orwarding traffic to the next hop
View answer
Correct Answer: C
Question #173
When should an engineer implement a collapsed-core architecture?
A. nly when using VSS technology
B. or small networks with minimal need for growth
C. or large networks that are connected to multiple remote sites
D. he access and distribution layers must be on the same device
View answer
Correct Answer: B
Question #174
Refer to the exhibit. An engineer assigns IP addressing to the current VLAN with three PCs. The configuration must also account for the expansion of 30 additionalVLANS using the same Class C subnet for subnetting and host count. Which command set fulfills the request while reserving address space for the expected growth?
A. witch(config)#interface vlan 10 Switch(config-if)#ip address 192
B. witch(config)#interface vlan 10 Switch(config-if)#ip address 192
C. witch(config)#interface vlan 10 Switch(config-if)#ip address 192
D. witch(config)#interface vlan 10 Switch(config-if)#ip address 192
View answer
Correct Answer: B

View The Updated CCNA Exam Questions

SPOTO Provides 100% Real CCNA Exam Questions for You to Pass Your CCNA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: