Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Test Free

200-301 Practice Test Free

Table of Contents

Toggle
  • 200-301 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence
  • Free Access Full 200-301 Practice Test Free Questions

200-301 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence

Preparing for the 200-301 exam? Start with our 200-301 Practice Test Free – a set of 50 high-quality, exam-style questions crafted to help you assess your knowledge and improve your chances of passing on the first try.

Taking a 200-301 practice test free is one of the smartest ways to:

  • Get familiar with the real exam format and question types
  • Evaluate your strengths and spot knowledge gaps
  • Gain the confidence you need to succeed on exam day

Below, you will find 50 free 200-301 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level. You can click on each Question to explore the details.

Question 1

Which output displays a JSON data representation?
A.
 Image
B.
 Image
C.
 Image
D.
 Image

 


Suggested Answer: C

JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:
ג€nameג€:ג€Markג€
JSON can use arrays. Array values must be of type string, number, object, array, boolean or null. For example:
{
ג€nameג€:ג€Johnג€,
ג€ageג€:30,
ג€carsג€:[ ג€Fordג€, ג€BMWג€, ג€Fiatג€ ]
}
JSON can have empty object like ג€taskIdג€:{}

Question 2

Which SDN plane forwards user-generated traffic?

A. Management plane

B. Control plane

C. Policy plane

D. Data plane

 


Suggested Answer: D

Community Answer: D

 

Question 3

What is a benefit of using private IPv4 addressing?

A. Multiple companies can use the same addresses without conflicts.

B. Direct connectivity is provided to internal hosts from outside an enterprise network.

C. Communication to the internet is reachable without the use of NAT.

D. All external hosts are provided with secure communication to the internet.

 


Suggested Answer: A

Community Answer: A

 

Question 4

By default, how does EIGRP determine the metric of a route for the routing table?

A. It uses the bandwidth and delay values of the path to calculate the route metric.

B. It uses a default metric of 10 for all routes that are learned by the router.

C. It counts the number of hops between the receiving and destination routers and uses that value as the metric.

D. It uses a reference bandwidth and the actual bandwidth of the connected link to calculate the route metric.

 


Suggested Answer: A

Community Answer: A

 

Question 5

Image
Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?

A. It will always prefer the static route over dynamic routes and choose the routeS 100.100.0.0/16 [1/0] via 192.168.4.1.

B. It will choose the route with the lowest metric,R 100.0.0.0/8 [120/2] via 192.168.3.1, 00:00:13, Ethernet0/3.

C. It will choose the route with the highest metric,D 100.100.100.0/24 [90/435200] via 192.168.2.1, 00:00:13, Ethernet0/2.

D. It will choose the route with the longest match,O 100.100.100.100/32 [110/21] via 192.168.1.1, 00:05:57, Ethernet0/1.

 


Suggested Answer: D

Community Answer: D

 

Question 6

An engineer must configure interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?

A. configure DSCP

B. configure IEEE 802.1q

C. configure ISL

D. configure IEEE 802.1p

 


Suggested Answer: B

Community Answer: B

VLAN trunking offers two options, ISL and 802.1Q. ISL is Cisco proprietary while 802.1Q is standards based and supported by multiple vendors.

Question 7

Image
Refer to the exhibit. An engineer configured NAT translations and has verified that the configuration is correct. Which IP address is the source IP after the NAT has taken place?

A. 10.4.4.4

B. 10.4.4.5

C. 172.23.103.10

D. 172.23.104.4

 


Suggested Answer: C

Community Answer: D

 

Question 8

DRAG DROP
-
Drag and drop the IPv6 address from the left onto the type on the right.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 9

SIMULATION
-
Guidelines
-
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology
-
 Image
Tasks
-
All physical cabling is in place and verified. Connectivity for the Switches on ports E0/1, E0/2, and E0/3 must be configured and available for voice and data capabilities.
1. Configure Sw1 and Sw2 with both VLANS, naming them according to the VLAN Name provided in the topology.
2. Configure the E0/1, E0/2, and E0/3 ports on both switches for both VLANS and ensure that Cisco IP phones and PCs pass traffic.
3. Configure Sw1 and Sw2 to allow neighbor discovery via the vendor-neutral protocol on e0/0.

 


Suggested Answer:
Correct Answer Image

 

Question 10

What is the primary purpose of private address space?

A. limit the number of nodes reachable via the Internet

B. simplify the addressing in the network

C. conserve globally unique address space

D. reduce network complexity

 


Suggested Answer: C

Community Answer: C

 

Question 11

What is the role of the root port in a switched network?

A. It replaces the designated port when the designated port fails.

B. It replaces the designated port when the root port fails.

C. It is the best path to the root from a nonroot switch.

D. It is administratively disabled until a failover occurs.

 


Suggested Answer: B

Community Answer: C

 

Question 12

Image
Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?

A. 0.0.0.0

B. 255.255.254.0

C. 255.255.255.0

D. 255.255.255.255

 


Suggested Answer: B

Community Answer: B

 

Question 13

Which port-security violation mode drops traffic from unknown MAC addresses and forwards an SNMP trap?

A. shutdown VLAN

B. protect

C. restrict

D. shutdown

 


Suggested Answer: C

Community Answer: C

 

Question 14

Image
Refer to the exhibit. A packet sourced from 172.18.33.2 is destined for 172.18.32.38. Where does the router forward the packet?

A. 10.1.1.1

B. 10.1.1.3

C. Loopback0

D. GigabitEthernet0/0

 


Suggested Answer: D

Community Answer: D

 

Question 15

Which two IP addressing schemes provide internet access to users on the network while preserving the public IPv4 address space? (Choose two.)

A. IPv6 addressing

B. PAT with private internal addressing

C. single public Class A network

D. private networks only

E. custom addresses from ARIN

 


Suggested Answer: AB

Community Answer: AB

PAT with private internal addressing is the usual method of allowing Internet access while preserving IPv4 addresses. Another alternative is using IPV6, which will allow internet access without using any IPv4 addresses. The other answer choices will consume a great deal of public IPV4 addresses, or will not allow for internet access.

Question 16

What is the primary function of a Layer 3 device?

A. to transmit wireless traffic between hosts

B. to analyze traffic and drop unauthorized traffic from the Internet

C. to forward traffic within the same broadcast domain

D. to pass traffic between different networks

 


Suggested Answer: D

Community Answer: D

 

Question 17

What is a characteristic of RSA?

A. It uses preshared keys for encryption.

B. It is a public-key cryptosystem.

C. It is a private-key encryption algorithm.

D. It requires both sides to have identical keys.

 


Suggested Answer: B

Community Answer: B

 

Question 18

An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address
192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?

A. 255.255.255.248

B. 255.255.255.224

C. 255.255.255.0

D. 255.255.255.252

 


Suggested Answer: C

Community Answer: C

 

Question 19

Image
Refer to the exhibit. Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A. SwitchA(config-if)#switchport mode access SwitchA(config-if)#switchport access vlan 50 SwitchA(config-if)#switchport voice vlan 51

B. SwitchA(config-if)#switchport mode trunk SwitchA(config-if)#switchport trunk allowed vlan add 50, 51 SwitchA(config-if)#switchport voice vlan dot1p

C. SwitchA(config-if)#switchport mode trunk SwitchA(config-if)#switchport trunk allowed vlan 50, 51 SwitchA(config-if)#mis qos trust cos

D. SwitchA(config-if)#switchport mode access SwitchA(config-if)#switchport access vlan 50 SwitchA(config-if)#switchport voice vlan untagged

 


Suggested Answer: A

Community Answer: A

 

Question 20

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two.)

A. blocking

B. speaking

C. listening

D. learning

E. forwarding

 


Suggested Answer: DE

Community Answer: DE

Reference:
https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.html

Question 21

Image
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration failed to work as intended.
Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two.)

A. Add a ג€permit ip any anyג€ statement at the end of ACL 101 for allowed traffic.

B. Add a ג€permit ip any anyג€ statement to the beginning of ACL 101 for allowed traffic.

C. The ACL must be moved to the Gi0/1 interface outbound on R2.

D. The source and destination IPs must be swapped in ACL 101.

E. The ACL must be configured the Gi0/2 interface inbound on R1.

 


Suggested Answer: AD

Community Answer: AD

 

Question 22

Image
Refer to the exhibit. Router R14 is in the process of being configured. Which configuration must be used to establish a host route to a PC 10?

A. ip route 10.80.65.10 255.255.255.254 10.80.65.1

B. ip route 10.80.65.10 255.255.255.255 10.73.65.66

C. ip route 10.73.65.66 0.0.0.255 10.80.65.10

D. ip route 10.73.65.66 255.0.0.0 10.80.65.10

 


Suggested Answer: D

Community Answer: B

 

Question 23

What are the two functions of SSIDs? (Choose two.)

A. uses the maximum of 32 alphanumeric characters

B. controls the speed of the Wi-Fi network

C. used exclusively with controller-based Wi-Fi networks

D. supports a single access point

E. broadcasts by default

 


Suggested Answer: AD

Community Answer: AE

The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. The SSID can consist of up to 32 alphanumeric, case-sensitive, characters. Wireless clients connect using the SSID for secure communications. The SSID is a unique token that identifies an
802.11 wireless network. It is used by wireless devices to identify a network and to establish and maintain wireless connectivity. An SSID must be configured and assigned to a wireless client device interface before the device can associate with an access point.

Question 24

Which action protects a network from VLAN hopping attacks?

A. Implement port security on internet-facing VLANs.

B. Change the native VLAN to an unused VLAN ID.

C. Enable dynamic ARP inspection.

D. Configure an ACL to prevent traffic from changing VLANs.

 


Suggested Answer: B

Community Answer: B

 

Question 25

Which two host addresses are reserved for private use within an enterprise network? (Choose two.)

A. 10.172.76.200

B. 12.17.1.20

C. 172.15.2.250

D. 172.31.255.100

E. 192.169.32.10

 


Suggested Answer: AC

Community Answer: AD

 

Question 26

Image
Refer to the exhibit. Which two values does router R1 use to determine the best path to reach destinations in network 1.0.0.0/8? (Choose two.)

A. lowest cost to reach the next hop

B. highest administrative distance

C. lowest metric

D. highest metric

E. longest prefix match

 


Suggested Answer: BC

Community Answer: CE

 

Question 27

What is the purpose of classifying network traffic in QoS?

A. configures traffic-matching rules on network devices

B. services traffic according to its class

C. identifies the type of traffic that will receive a particular treatment

D. writes the class identifier of a packet to a dedicated field in the packet header

 


Suggested Answer: C

 

Question 28

SIMULATION
-
Guidelines
-
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked the lab closes and cannot be reopened
Topology
-
 Image
Tasks
-
R1 has been pre-configured with all the necessary commands. All physical cabling is in place and verified. Connectivity from PC1, PC3, and the Server must be established to the switches, and each port must only allow one VLAN.
1. Configure the VLAN connecting to the switch port for PC3 with the name "SALES"
2. Configure the switch port connecting to Server1
3. Configure the switch port connecting to PC3
4. Ensure R1 discovers SW-1 via the Cisco proprietary neighbor discovery protocol and all other devices on the network are unable to discover SW-1

 


Suggested Answer:
Correct Answer Image

 

Question 29

Image
Refer to the exhibit. An engineer configures interface fa0/1 on SW1 and SW2 to pass traffic from two different VLANs. For security reasons, company policy requires the native VLAN to be set to a nondefault value. Which configuration meets this requirement?

A. Switch(config-if)#switchport mode trunkSwitch(config-if)#switchport trunk encapsulation dot1qSwitch(config-if)#switchport trunk allowed vlan 100,105Switch(config-if)#switchport trunk native vlan 3

B. Switch(config-if)#switchport mode trunkSwitch(config-if)#switchport trunk encapsulation islSwitch(config-if)#switchport trunk allowed vlan 100,105Switch(config-if)#switchport trunk native vlan 1

C. Switch(config-if)#switchport mode dynamicSwitch(config-if)#switchport access vlan 100,105Switch(config-if)#switchport trunk native vlan 1

D. Switch(config-if)#switchport mode accessSwitch(config-if)#switchport trunk encapsulation dot1qSwitch(config-if)#switchport access vlan 100,105Switch(config-if)#switchport trunk native vlan 3

 


Suggested Answer: A

Community Answer: A

 

Question 30

Image
Refer to the exhibit. Which prefix did router R1 learn from internal EIGRP?

A. 192.168.3.0/24

B. 192.168.1.0/24

C. 172.16.1.0/24

D. 192.168.2.0/24

 


Suggested Answer: D

Community Answer: D

 

Question 31

SIMULATION
-
Guidelines
-
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked the lab closes and cannot be reopened
Topology
-
 Image
Tasks
-
All physical cabling is in place. A company plans to deploy 16 new sites. The sites will utilize both IPv4 and IPv6 networks.
1. Subnet 10.20.0.0/16 to meet the subnet requirements and maximize the number of hosts
•	Using the second subnet
- 	Assign the first usable IP address to e0/0 on Sw101
- 	Assign the last usable IP address to e0/0 on Sw102
2. Subnet 2001:db8::/52 to meet the subnet requirements and maximize the number of hosts
•	Using the second subnet
- 	Assign an IPv6 GUA using a unique 64-Bit interface identifier on e0/0 on Sw101
- 	Assign an IPv6 GUA using a unique 64-Bit interface identifier on e0/0 on Sw102

 


Suggested Answer:
Correct Answer Image

 

Question 32

Which interface on the WLC is limited to one when LAG is in use?

A. service

B. virtual

C. trunk

D. AP-manager

 


Suggested Answer: D

Community Answer: D

 

Question 33

Image
Refer to the exhibit. A network engineer must configure the link with these requirements:
•	Consume as few IP addresses as possible.
•	Leave at least two additional useable IP addresses for future growth.
Which set of configurations must be applied?

A. R1(config-if)#ip address 10.10.10.1 255.255.255.252R2(config-if)#ip address 10.10.10.2 255.255.255.252

B. R1(config-if)#ip address 10.10.10.1 255.255.255.240R2(config-if)#ip address 10.10.10.12 255.255.255.240

C. R1(config-if)#ip address 10.10.10.1 255.255.255.248R2(config-if)#ip address 10.10.10.4 255.255.255.248

D. R1(config-if)#ip address 10.10.10.1 255.255.255.0R2(config-if)#ip address 10.10.10.5 255.255.255.0

 


Suggested Answer: A

Community Answer: C

 

Question 34

Image
Refer to the exhibit. PC1 regularly sends 1800 Mbps of traffic to the server. A network engineer needs to configure the EtherChannel to disable Port Channel 1 between SW1 and SW2 when the Ge0/0 and Ge0/1 ports on SW2 go down. Which configuration must the engineer apply to the switch?

A. SW2# configure terminal -SW2(config)# interface port-channel 4SW2(config-if)# port-channel min-links 2

B. SW2# configure terminal -SW2(config)# interface port-channel 4SW2(config-if)# lacp port-priority 32000

C. SW2# configure terminal -SW2(config)# interface port-channel 4SW2(config-if)# lacp max-bundle 2

D. SW2# configure terminal -SW2(config)# lacp system-priority 32000

 


Suggested Answer: A

Community Answer: A

 

Question 35

Image
Refer to the exhibit. Which command provides this output?

A. show ip route

B. show cdp neighbor

C. show ip interface

D. show interface

 


Suggested Answer: B

Community Answer: B

 

Question 36

Which interface is used to send traffic to the destination network?
 Image

A. G0/10

B. G0/24

C. G0/5

D. G0/1

 


Suggested Answer: B

Community Answer: B

 

Question 37

Image
Refer to the exhibit. The network engineer is configuring a new WLAN and is told to use a setup password for authentication instead of the RADIUS servers.
Which additional set of tasks must the engineer perform to complete the configuration?

A. Disable PMF Enable PSK Enable 802.1x

B. Select WPA Policy Enable CCKM Enable PSK

C. Select WPA Policy Select WPA2 Policy Enable FT PSK

D. Select WPA2 Policy Disable PMF Enable PSK

 


Suggested Answer: D

Community Answer: D

 

Question 38

Which alternative to password authentication is implemented to allow enterprise devices to log in to the corporate network?

A. 90-day renewal policies

B. magic links

C. one-time passwords

D. digital certificates

 


Suggested Answer: D

 

Question 39

DRAG DROP
-
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 40

Which command implies the use of SNMPv3?

A. snmp-server user

B. snmp-server host

C. snmp-server enable traps

D. snmp-server community

 


Suggested Answer: A

Community Answer: A

Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/15-e/snmp-15-e-book.pdf

Question 41

What is the difference between AAA authentication and authorization?

A. Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user performs.

B. Authentication controls the system processes a user accesses, and authorization logs the activities the user initiates.

C. Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.

D. Authentication identifies a user who is attempting to access a system, and authorization validates the user’s password.

 


Suggested Answer: A

Community Answer: A

AAA stands for Authentication, Authorization and Accounting.
✑ Authentication: Specify who you are (usually via login username & password)
✑ Authorization: Specify what actions you can do, what resource you can access
✑ Accounting: Monitor what you do, how long you do it (can be used for billing and auditing)
An example of AAA is shown below:
✑ Authentication: ג€I am a normal user. My username/password is user_tom/learnforeverג€
✑ Authorization: ג€user_tom can access LearnCCNA server via HTTP and FTPג€
✑ Accounting: ג€user_tom accessed LearnCCNA server for 2 hoursג€. This user only uses ג€showג€ commands.

Question 42

Which statement about VLAN configuration is true?

A. The switch must be in VTP server or transparent mode before you can configure a VLAN

B. The switch must be in config-vlan mode before you configure an extended VLAN

C. Dynamic inter-VLAN routing is supported on VLAN2 through VLAN 4064

D. A switch in VTP transparent mode save the VLAN databases to the running configuration only

 


Suggested Answer: A

Community Answer: A

 

Question 43

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A. enable dynamic MAC address learning

B. implement static MAC addressing

C. enable sticky MAC addressing

D. implement auto MAC address learning

 


Suggested Answer: C

Community Answer: C

 

Question 44

DRAG DROP -
Drag and drop the characteristics of transport layer protocols from the left onto the corresponding protocols on the right.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 45

DRAG DROP
-
Drag and drop the statements about device management from the left onto the corresponding device-management types on the right.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 46

Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two.)

A. REST APIs that allow for external applications to interact natively

B. adapters that support all families of Cisco IOS software

C. SDKs that support interaction with third-party network equipment

D. modular design that is upgradable as needed

E. customized versions for small, medium, and large enterprises

 


Suggested Answer: AC

Community Answer: AC

Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities:
✑ Intent-based APIs leverage the controller and enable business and IT applications to deliver intent to the network and to reap network analytics and insights for
IT and business innovation.
✑ Process adapters, built on integration APIs, allow integration with other IT and network systems to streamline IT operations and processes.
✑ Domain adapters, built on integration APIs, allow integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent intent-based infrastructure across the entire IT environment.
✑ SDKs allow management to be extended to third-party vendor’s network devices to offer support for diverse environments.
Reference:
https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-dna-cent-platf-aag-cte-en.html

Question 47

What is a function of Wireless LAN Controller?

A. register with a single access point that controls traffic between wired and wireless endpoints

B. use SSIDs to distinguish between wireless clients

C. send LWAPP packets to access points

D. monitor activity on wireless and wired LANs

 


Suggested Answer: C

Community Answer: C

Lightweight APs (LAPs) is devices require no initial configuration. LAPs use the Lightweight Access Point Protocol (LWAPP) to communicate with a WLAN controller (WLC), as shown in the below figure. Controller-based APs are useful in situations where many APs are required in the network. As more APs are added, each AP is automatically configured and managed by the WLC.

Question 48

When a switch receives a frame from an unknown source MAC address, which action does the switch take with the frame?

A. It sends the frame to ports within the CAM table identified with an unknown source MAC address.

B. It floods the frame out all interfaces, including the interface it was received on.

C. It associates the source MAC address with the LAN port on which it was received and saves it to the MAC address table.

D. It attempts to send the frame back to the source to ensure that the source MAC address is still available for transmissions.

 


Suggested Answer: C

Community Answer: C

 

Question 49

Which enhancements were implemented as part of WPA3?

A. Forward secrecy and SAE in personal mode for secure initial key exchange

B. 802.1x authentication and AES-128 encryption

C. AES-64 in personal mode and AES-128 in enterprise mode

D. TKIP encryption improving WEP and per-packet keying

 


Suggested Answer: A

Community Answer: A

 

Question 50

Refer to exhibit. What Administrative distance has route to 192.168.10.1?
 Image

A. 1

B. 90

C. 110

D. 120

 


Suggested Answer: B

Community Answer: B

 

Free Access Full 200-301 Practice Test Free Questions

If you’re looking for more 200-301 practice test free questions, click here to access the full 200-301 practice test.

We regularly update this page with new practice questions, so be sure to check back frequently.

Good luck with your 200-301 certification journey!

Share18Tweet11
Previous Post

200-201 Practice Test Free

Next Post

200-901 Practice Test Free

Next Post

200-901 Practice Test Free

201-450 Practice Test Free

202-450 Practice Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.