Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Cisco Certified Network Associate

Last Update 19 hours ago Total Questions : 1153

The Cisco Certified Network Associate content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include 200-301 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 200-301 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 200-301 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Cisco Certified Network Associate practice test comfortably within the allotted time.

Question # 4

Refer to the exhibit.

All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?

A.

192.168.1.0/24 via 192.168.12.2

B.

192.168.1.128/25 via 192.168.13.3

C.

192.168.1.192/26 via 192.168.14.4

D.

192.168.1.224/27 via 192.168.15.5

Question # 5

What is a requirement when configuring or removing LAG on a WLC?

A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Question # 6

Which two components comprise part of a PKI? (Choose two.)

A.

preshared key that authenticates connections

B.

RSA token

C.

CA that grants certificates

D.

clear-text password that authenticates connections

E.

one or more CRLs

Question # 7

Refer to the exhibit.

If R1 receives a packet destined to 172.161.1, to which IP address does it send the packet?

A.

192.168.12.2

B.

192.168.13.3

C.

192.168.14.4

D.

192.168.15.5

Question # 8

SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two.)

A.

Set the QoS level to silver or greater for voice traffic.

B.

Set the QoS level to platinum for voice traffic.

C.

Enable Media Session Snooping on re WLAN.

D.

Enable traffic shaping for the LAN interlace of the WLC.

E.

Configure two different QoS rotes tor data and voice traffic.

Question # 9

NO: 346

What must a network administrator consider when deciding whether to configure a new wireless network with APs in autonomous mode or APs running in cloud-based mode?

    Autonomous mode APs are less dependent on an underlay but more complex to maintain than APs in cloud-based mode.

A.

Cloud-based mode APs relay on underlays and are more complex to maintain than APs in autonomous mode.

B.

Cloud-based mode APs are easy to deploy but harder to automate than APs in autonomous mode.

C.

Autonomous mode APs are easy to deploy and automate than APs in cloud-based mode.

Question # 10

Refer to the exhibit. Users at a branch office are experiencing application performance issues, poor VoIP audio quality, and slow downloads. What is the cause of the issues?

A.

broadcast storm

B.

overutilization

C.

interface configuration

D.

QoS queuing

Question # 11

Which device segregates a network into separate zones that have their own security policies?

A.

IPS

B.

firewall

C.

access point

D.

switch

Question # 12

What is the default port-security behavior on a trunk link?

A.

It causes a network loop when a violation occurs.

B.

It disables the native VLAN configuration as soon as port security is enabled.

C.

It places the port in the err-disabled state if it learns more than one MAC address.

D.

It places the port in the err-disabled slate after 10 MAC addresses are statically configured.

Question # 13

Refer to the exhibit. After applying this configuration to router R1, a network engineer is verifying the implementation. If all links are operating normally, and the engineer sends a series of packets from PC1 to PC3. how are the packets routed?

A.

They are routed to 172.16.20.2.

B.

They are routed to 192.168.100.2.

C.

They are distributed sent round robin to interfaces SO/0/0 and SO/0/1.

D.

They are routed to 10.0.0.2.

Question # 14

A router received three destination prefixes:10.0.0/18, and 10.0.0/24. When the show ip route command is executed, which output does it return?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question # 15

Refer to the exhibit. Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?

A.

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management

B.

Set the Fast Transition option and the WPA gik-randomize State to disable

C.

Under Protected Management Frames, set the PMF option to Required

D.

Enable CCKM under Authentication Key Management

Question # 16

What is a DHCP client?

A.

a server that dynamically assigns IP addresses to hosts

B.

a router that statically assigns IP addresses to hosts

C.

a host that is configured to request an IP address automatically

D.

a workstation that requests a domain name associated with its IP address

Question # 17

Which type of DNS record is used to specify the mail server responsible for accepting email messages on behalf of a recipient's domain?

A.

MX record

B.

TXT record

C.

A record

D.

SRV record

Question # 18

What is the role of SNMP in the network?

A.

to monitor network devices and functions using a TCP underlay that operates on the presentation layer

B.

to collect data directly from network devices using an SSL underlay that operates on the transport layer

C.

to monitor and manage network devices using a UDP underlay that operates on the application layer

D.

to collect telemetry and critical information from network devices using an SSH underlay that operates on the network layer

Question # 19

How does machine learning improve the detection of unauthorized network access?

A.

It monitors for outdated software.

B.

It dictates security policy updates.

C.

It identifies patterns indicating intrusions.

D.

It assigns security clearance levels.

Question # 20

Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.147?

A.

FastEthemet 0/0

B.

Senal0/0

C.

FastEthemet 0/1

Go to page: