200-301: Cisco Certified Network Associate (CCNA) Part 3
Question #: 121
Topic #: 1
What is the role of disaggregation in controller-based networking?
A. It divides the control-plane and data-plane functions.
B. It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions
C. It summarizes the routes between the core and distribution layers of the network topology
D. It enables a network topology to quickly adjust from a ring network to a star network
Selected Answer: A
Question #: 122
Topic #: 1
What is a function performed by a web server?
A. send and retrieve email from client devices
B. securely store files for FTP access
C. authenticate and authorize a user’s identity
D. provide an application that is transmitted over HTTP
Selected Answer: D
Question #: 123
Topic #: 1
Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with applications hosted at site B. What is the reason for the problem?
A. Physical network errors are being transmitted between the two sites.
B. Heavy usage is causing high latency.
C. The wrong cable type was used to make the connection.
D. An incorrect type of transceiver has been inserted into a device on the link
Selected Answer: D
Question #: 124
Topic #: 1
Which protocol uses the SSL?
A. SSH
B. HTTPS
C. HTTP
D. Telnet
Selected Answer: B
Question #: 125
Topic #: 1
Why is UDP more suitable than TCP for applications that require low latency such as VoIP?
A. UDP reliably guarantees delivery of all packets: TCP drops packets under heavy load
B. UDP uses sequencing data for packets to arrive in order TCP offers the capability to receive packets in random order
C. TCP uses congestion control for efficient packet delivery: UDP uses flow control mechanisms for the delivery of packets
D. TCP sends an acknowledgement for every packet received: UDP operates without acknowledgments
Selected Answer: D
Question #: 126
Topic #: 1
What are the two functions of SSIDs? (Choose two.)
A. uses the maximum of 32 alphanumeric characters
B. controls the speed of the Wi-Fi network
C. used exclusively with controller-based Wi-Fi networks
D. supports a single access point
E. broadcasts by default
Selected Answer: AE
Question #: 127
Topic #: 1
Which two characteristics describe the access layer in a three-tier network architecture? (Choose two.)
A. serves as the network aggregation point
B. physical connection point for a LAN printer
C. designed to meet continuous redundant uptime requirements
D. layer at which a wireless access point connects to the wired network
E. provides a boundary between Layer 2 and Layer 3 communications
Selected Answer: BD
Question #: 128
Topic #: 1
Which PoE mode enables powered-devices detection and guarantees power when the device detected?
A. auto
B. static
C. dynamic
D. active
Selected Answer: A
Question #: 129
Topic #: 1
Refer to the exhibit. The router has been configured with a super net to accommodate the requirements for 380 users on a Subnet. The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
A. Subnet: 10.7.54.0 Subnet mask: 255.255.128.0 Broadcast address: 10.5.55.255 Usable IP address range: 10.7.54.1 ג€” 10.7.55.254
B. Subnet: 10.7.54.0 Subnet mask: 255.255.255.0 Broadcast address: 10.7.54.255 Usable IP address range: 10.7.54.1 ג€” 10.7.55.254
C. Subnet: 10.7.54.0 Subnet mask: 255.255.254.0 Broadcast address: 10.7.54.255 Usable IP address range: 10.7.54.1 ג€” 10.7.55.254
D. Subnet: 10.7.54.0 Subnet mask: 255.255.254.0 Broadcast address: 10.7.55.255 Usable IP address range: 10.7.54.1 ג€” 10.7.55.254
Selected Answer: C
Question #: 130
Topic #: 1
Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
A. interface GigabitEthernet0/0 ip address 10.10.2.10 255.255.252.0
B. interface GigabitEthernet0/0.10 encapsulation dot1Q 3 ip address 10.10.2.10 255.255.254.0
C. interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip address 10.10.2.10 255.255.252.0
D. interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip address 10.10.2.10 255.255.255.252
Selected Answer: B
Question #: 131
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 address type characteristics from the left to the right.
Select and Place:
Suggestion Answer:
Question #: 132
Topic #: 1
DRAG DROP –
Refer to the exhibit. The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these requirements:
✑ DC-1 Gi1/0 must be the last usable address on a /30
✑ DC-1 Gi1/1 must be the first usable address on a /29
✑ DC-1 Gi1/2 must be the last usable address on a /28
✑ HQ-1 Gi1/3 must be the last usable address on a /29
Drag and drop the commands from the left onto the destination interfaces on the right. Not all commands are used.
Select and Place:
Suggestion Answer:
Question #: 133
Topic #: 1
How is RFC 1918 addressing used in a network?
A. They are used to access the Internet from the internal network without conversion.
B. They are used in place of public addresses for Increased security.
C. They are used with NAT to preserve public IPv4 addresses.
D. They are used by Internet Service Providers to route over the Internet.
Selected Answer: C
Question #: 134
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 address types from the left onto their descriptions on the right.
Select and Place:
Suggestion Answer:
Question #: 135
Topic #: 1
Refer to the exhibit. What is a reason for poor performance on the network interface?
A. The interface is receiving excessive broadcast traffic.
B. The bandwidth setting of the interface is misconfigured.
C. The cable connection between the two devices is faulty.
D. The interface is operating at a different speed than the connected device.
Selected Answer: C
Question #: 136
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 address descriptions from the left onto the IPv6 address types on the right. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 137
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
Select and Place:
Suggestion Answer:
Question #: 138
Topic #: 1
Which WAN topology has the highest degree of reliability?
A. point-to-point
B. router-on-a-stick
C. full mesh
D. hub-and-spoke
Selected Answer: C
Question #: 139
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 address type characteristics from the left to the right.
Select and Place:
Suggestion Answer:
Question #: 140
Topic #: 1
What causes a port to be placed in the err-disabled state?
A. nothing plugged into the port
B. link flapping
C. latency
D. shutdown command issued on the port
Selected Answer: B
Question #: 141
Topic #: 1
DRAG DROP –
Drag and drop the characteristics of transport layer protocols from the left onto the corresponding protocols on the right.
Select and Place:
Suggestion Answer:
Question #: 142
Topic #: 1
A network engineer must configure an interface with IP address 10.10.10.145 and a subnet mask equivalent to 11111111.11111111.11111111.11111000. Which subnet mask must the engineer use?
A. /29
B. /30
C. /27
D. /28
Selected Answer: A
Question #: 143
Topic #: 1
Refer to the exhibit. The switches are connected via a Cat5 Ethernet cable that is tested successfully. The interfaces are configured as access ports and are both in a down status. What is the cause of the issue?
A. The speed settings on the switches are mismatched
B. The distance between the two switches is not supported by Cat5
C. The switches are configured with incompatible duplex settings
D. The portfast command is missing from the configuration
Selected Answer: A
Question #: 144
Topic #: 1
Which two IP addressing schemes provide internet access to users on the network while preserving the public IPv4 address space? (Choose two.)
A. IPv6 addressing
B. PAT with private internal addressing
C. single public Class A network
D. private networks only
E. custom addresses from ARIN
Selected Answer: AB
Question #: 145
Topic #: 1
The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:
✑ Create 8 new subnets.
✑ Each subnet must accommodate 30 hosts.
✑ Interface VLAN 10 must use the last usable IP in the first new subnet.
✑ A Layer 3 interface is used.
Which configuration must be applied to the interface?
A. no switchport mode trunk ip address 192.168.32.97 255.255.255.224
B. switchport ip address 192.168.32.65 255.255.255.240
C. no switchport ip address 192.168.32.30 255.255.255.224
D. no switchport mode access ip address 192.168.32.62 255.255.255.240
Selected Answer: C
Question #: 146
Topic #: 1
DRAG DROP –
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:
Suggestion Answer:
Question #: 147
Topic #: 1
What are two reasons to deploy private addressing on a network? (Choose two.)
A. to subnet addresses in an organized hierarchy
B. to reduce network maintenance costs
C. to segment local IP addresses from the global routing table
D. to hide sensitive data from access users within an enterprise
E. to route protected data securely via an Internet service provider
Selected Answer: BC
Question #: 148
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 DNS record types from the left onto the description on the right.
Select and Place:
Suggestion Answer:
Question #: 149
Topic #: 1
Which property is shared by 10GBase-SR and 10GBase-LR interfaces?
A. Both use the single-mode fiber type.
B. Both require UTP cable media for transmission.
C. Both require fiber cable media for transmission.
D. Both use the multimode fiber type.
Selected Answer: C
Question #: 150
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
Select and Place:
Suggestion Answer:
Question #: 151
Topic #: 1
Which device permits or denies network traffic based on a set of rules?
A. switch
B. firewall
C. wireless controller
D. access point
Selected Answer: B
Question #: 152
Topic #: 1
What is the role of a firewall in an enterprise network?
A. determines which packets are allowed to cross from unsecured to secured networks
B. processes unauthorized packets and allows passage to less secure segments of the network
C. forwards packets based on stateless packet inspection
D. explicitly denies all packets from entering an administrative domain
Selected Answer: A
Question #: 153
Topic #: 1
DRAG DROP –
Refer to the exhibit.
An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.
Select and Place:
Suggestion Answer:
Question #: 154
Topic #: 1
DRAG DROP –
Drag and drop the DNS lookup components from the left onto the functions on the right.
Select and Place:
Suggestion Answer:
Question #: 155
Topic #: 1
DRAG DROP –
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:
Suggestion Answer:
Question #: 156
Topic #: 1
Which action is taken by a switch port enabled for PoE power classification override?
A. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
B. When a powered device begins drawing power from a PoE switch port, a syslog message is generated
C. If a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it
D. Should a monitored port exceed the maximum administrative value for power, the port is shut down and err-disabled
Selected Answer: D
Question #: 157
Topic #: 1
What is a function spine-and-leaf architecture?
A. Offers predictable latency of the traffic path between end devices.
B. Exclusively sends multicast traffic between servers that are directly connected to the spine.
C. Mitigates oversubscription by adding a layer of leaf switches.
D. Limits payload size of traffic within the leaf layer.
Selected Answer: A
Question #: 158
Topic #: 1
Which action is taken by the data plane within a network device?
A. Constructs a routing table based on a routing protocol.
B. Forwards traffic to the next hop.
C. Looks up an egress interface in the forwarding information base.
D. Provides CLI access to the network device.
Selected Answer: B
Question #: 159
Topic #: 1
What is the function of the control plane?
A. It exchanges routing table information.
B. It provides CLI access to the network device.
C. It looks up an egress interface in the forwarding information base.
D. It forwards traffic to the next hop.
Selected Answer: A
Question #: 160
Topic #: 1
Which two cable types must be used to connect an access point to the WLC when 2.5-Gbps and 5-Gbps upload speeds are required? (Choose two.)
A. 10GBASE-T
B. 1000BASE-LX/LH
C. Cat 5e
D. Cat 5
E. Cat 3
Selected Answer: AC