PDF Download
B.4 CISCO CCNA 200-301 PRACTICE EXAM
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -90 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Which of the following are true about Gigabit Ethernet? (Select two.)
Answer:
Can use both copper and fiber optic Uses CSMA/CD Question 2: In traditional networking models, the date plane, control plane, and management plane are all contained within the firmware of networking devices.This is known as what kind of architecture?
Answer:
Distributed Question 3: Which of the following statements about the dynamic host configuration protocol (DHCP) are true? (Select two.)
Answer:
A DHCP server assigns addresses to requesting hosts.It can deliver other configuration information in addition to IP addresses.
Question 4: The administrative distance determines the trustworthiness of the route source.Assuming that two separate routes are available to the same location, the router will use the following criteria for choosing between these routes. Put the criteria in order.
Answer:
If a static route is available, it is selected.If a router has learned of two routes to a single network through different routing protocols, it chooses the route with the lowest administrative distance.If a router has learned of two routes through the same protocol, the router will choose the route that has the best cost as defined by the routing metric.Question 5: Drag the information type on the left to the appropriate layer of the TCP/IP model it is associated with on the right.
Answer:
Transport Layer - Segments Link Layer - Frames Application Layer - Data Internet Layer - Packets Question 6: You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet.The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet.What can you do?
Answer:
Configure port security on the switch.Question 7: You want to create an ACL statement that allows traffic from any network. Which network address and wildcard mask value should you use?
Answer:
0.0.0.0 255.255.255.255
Question 8: You have two Cisco 2960 switches with 12 FastEthernet ports and 2 GigabitEthernet ports on each switch.You connect Fa0/1 on SwitchA to Fa0/1 on SwitchB with a crossover cable. A partial configuration for both switches is shown below.hostname SwitchA!interface FastEthernet0/1switchport mode dynamic autospanning-tree link-type point-to-point !--output omitted!interface GigabitEthernet0/1switchport mode dynamic desirable!--output omitted hostname SwitchB!interface FastEthernet0/1switchport mode dynamic auto!--output omitted!interface GigabitEthernet0/1switchport mode dynamic desirablespanning-tree link-type point-to-point!--output omitted You notice that VLAN traffic for VLAN 2 is not being carried from SwitchA to SwitchB. What should you do?
Answer:
For Fa0/1 on SwitchA, set the switchport mode to dynamic desirable.Question 9: Which of the following would cause a TCP/IP connectivity issue between two routers?
Answer:
Both routers have an IP address of 192.168.1.100.Question 10: Drag each leased line component on the left with its corresponding description on the right. Each component may be used once, more than once, or not at all.
Answer:
Serial cable
- Connects the WIC...
CSU/DSU
- Controls the speed...
CSU/DSU
- Provides the clocking...
- The equipment at the customer site.
CPE
CSU/DSU
- Provides a Layer 1 interface...
Question 11: Which of the following best describes the key difference between DoS and DDoS?
Answer:
Attackers use numerous computers and connections.
Question 12: Which of the following protocols enables Cisco devices to discover non-Cisco devices?
Answer:
LLDP Question 13: Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Answer:
WEP, WPA Personal, and WPA2 Personal Question 14: Computers A and B are on the same VLAN and are separated by two switches as shown. Computer A sends a frame to Computer B.Which of the following best describes the composition of the frame as it travels from A to B?
Answer:
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.Question 15: Match each layer of the TCP/IP model to its functions. (Each layer matches with two functions.)
Answer:
Link - how messages are electrically transmitted Internet - forwarding packets through multiple networks.Link - describing the physical layout Transport - error checking and reliable delivery Internet - not concerned with reliable delivery Application - Integrates network functionality into OS Application - Provides the capability for services Transport - Uses ports to enable app-to-app comms