Podcast
Questions and Answers
Which two outcomes are predictable behaviors for HSRP? (Choose two)
Which two outcomes are predictable behaviors for HSRP? (Choose two)
How does HSRP provide first hop redundancy?
How does HSRP provide first hop redundancy?
Which command corrects the configuration issue for workstations on VLAN 20 at Site B to reach a DNS server on the Internet? Add the command: Configure the _ command on R1.
Which command corrects the configuration issue for workstations on VLAN 20 at Site B to reach a DNS server on the Internet? Add the command: Configure the _ command on R1.
ip route 0.0.0.0 0.0.0.0 10.10.10.18
What OSPF network type is seen on a serial interface running encapsulation PPP by default?
What OSPF network type is seen on a serial interface running encapsulation PPP by default?
Signup and view all the answers
Match the following OSPF neighbor adjacency parameters:
Match the following OSPF neighbor adjacency parameters:
Signup and view all the answers
What is an advantage of Cisco DNA Center versus traditional campus device management?
What is an advantage of Cisco DNA Center versus traditional campus device management?
Signup and view all the answers
What are two fundamentals of virtualization?
What are two fundamentals of virtualization?
Signup and view all the answers
How does Cisco DNA Center gather data from the network?
How does Cisco DNA Center gather data from the network?
Signup and view all the answers
Which type of route does R1 use to reach host 10.10.13.10/32?
Which type of route does R1 use to reach host 10.10.13.10/32?
Signup and view all the answers
Which prefix does Router1 use for traffic to Host A?
Which prefix does Router1 use for traffic to Host A?
Signup and view all the answers
A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)
A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)
Signup and view all the answers
Match the IPv4 network subnets with their correct usable host ranges.
Match the IPv4 network subnets with their correct usable host ranges.
Signup and view all the answers
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
Signup and view all the answers
Which 802.11 frame type is association response?
Which 802.11 frame type is association response?
Signup and view all the answers
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
Signup and view all the answers
Which statement identifies the functionality of virtual machines?
Which statement identifies the functionality of virtual machines?
Signup and view all the answers
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
Signup and view all the answers
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined?
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined?
Signup and view all the answers
Which type of security program is in place when the webpage reports safety but warns about a potentially malicious link?
Which type of security program is in place when the webpage reports safety but warns about a potentially malicious link?
Signup and view all the answers
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
Signup and view all the answers
Which set of actions satisfy the requirement for multifactor authentication?
Which set of actions satisfy the requirement for multifactor authentication?
Signup and view all the answers
Which configuration is needed to generate an RSA key for SSH on a router?
Which configuration is needed to generate an RSA key for SSH on a router?
Signup and view all the answers
An extended ACL has been configured and applied to a router but failed to work as intended. Which two changes can stop outbound traffic on TCP ports 25 and 80 to a specific subnet while allowing all other traffic? (Choose two)
An extended ACL has been configured and applied to a router but failed to work as intended. Which two changes can stop outbound traffic on TCP ports 25 and 80 to a specific subnet while allowing all other traffic? (Choose two)
Signup and view all the answers
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement?
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement?
Signup and view all the answers
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
Signup and view all the answers
What are two differences between optical-fiber cabling and copper cabling?
What are two differences between optical-fiber cabling and copper cabling?
Signup and view all the answers
How does CAPWAP communicate between an access point in local mode and a WLC?
How does CAPWAP communicate between an access point in local mode and a WLC?
Signup and view all the answers
Which IPv6 address block forwards packets to a multicast address rather than a unicast address?
Which IPv6 address block forwards packets to a multicast address rather than a unicast address?
Signup and view all the answers
What is the difference regarding reliability and communication type between TCP and UDP?
What is the difference regarding reliability and communication type between TCP and UDP?
Signup and view all the answers
Which type of IPv6 address is publicly routable in the same way as IPv4 public addresses?
Which type of IPv6 address is publicly routable in the same way as IPv4 public addresses?
Signup and view all the answers
What is the expected outcome when an EUI-64 address is generated?
What is the expected outcome when an EUI-64 address is generated?
Signup and view all the answers
A corporate office uses four floors in a building with differing numbers of users per floor. Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
A corporate office uses four floors in a building with differing numbers of users per floor. Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
Signup and view all the answers
An engineer must add a subnet for a new office that will add 20 users to the network. The engineer assigns the IPv4 network 10.10.225.32 with subnet mask ______.
An engineer must add a subnet for a new office that will add 20 users to the network. The engineer assigns the IPv4 network 10.10.225.32 with subnet mask ______.
Signup and view all the answers
What is a characteristic of spine-and-leaf architecture?
What is a characteristic of spine-and-leaf architecture?
Signup and view all the answers
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?
Signup and view all the answers
Which two conditions must be met before SSH can operate normally on a Cisco IOS switch?
Which two conditions must be met before SSH can operate normally on a Cisco IOS switch?
Signup and view all the answers
Which password must an engineer use to enter the enable mode?
Which password must an engineer use to enter the enable mode?
Signup and view all the answers
After the switch configuration shown in the exhibit, the ping test fails between PC A and PC B. Based on the output for switch 1, which error must be corrected?
After the switch configuration shown in the exhibit, the ping test fails between PC A and PC B. Based on the output for switch 1, which error must be corrected?
Signup and view all the answers
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
Signup and view all the answers
To which device does Router1 send packets that are destined to host 10.10.13.165?
To which device does Router1 send packets that are destined to host 10.10.13.165?
Signup and view all the answers
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?
Signup and view all the answers
Which two minimum parameters must be configured on an active interface to enable OSPFV2 to operate? (Choose two)
Which two minimum parameters must be configured on an active interface to enable OSPFV2 to operate? (Choose two)
Signup and view all the answers
What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Signup and view all the answers
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Signup and view all the answers
An engineer configured NAT translations and verified that the configuration is correct. Which IP address is the source IP after the NAT has taken place?
An engineer configured NAT translations and verified that the configuration is correct. Which IP address is the source IP after the NAT has taken place?
Signup and view all the answers
If a notice-level message is sent to a syslog server, the event that has occurred is that an ARP inspection has failed.
If a notice-level message is sent to a syslog server, the event that has occurred is that an ARP inspection has failed.
Signup and view all the answers
Which command enables a router to become a DHCP client?
Which command enables a router to become a DHCP client?
Signup and view all the answers
Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to Dynamic Auto and SW2 is set to Dynamic Desirable. What is the result of this configuration?
Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to Dynamic Auto and SW2 is set to Dynamic Desirable. What is the result of this configuration?
Signup and view all the answers
A Cisco IP phone receives untagged data traffic from an attached PC. What action is taken by the phone?
A Cisco IP phone receives untagged data traffic from an attached PC. What action is taken by the phone?
Signup and view all the answers
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
Signup and view all the answers
What command accomplishes the task of having VLAN 67 traffic untagged between Switch 1 and Switch 2, while keeping other VLANs tagged?
What command accomplishes the task of having VLAN 67 traffic untagged between Switch 1 and Switch 2, while keeping other VLANs tagged?
Signup and view all the answers
Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol?
Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol?
Signup and view all the answers
Match the following commands used to create port channel 10:
Match the following commands used to create port channel 10:
Signup and view all the answers
An administrator is configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to a specific port on a switch?
An administrator is configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to a specific port on a switch?
Signup and view all the answers
When an untagged frame is received on GigabitEthernet0/1 interface of SW1, which VLAN is the frame processed in?
When an untagged frame is received on GigabitEthernet0/1 interface of SW1, which VLAN is the frame processed in?
Signup and view all the answers
Match the following conclusions based on the configuration shown:
Match the following conclusions based on the configuration shown:
Signup and view all the answers
To map the topology of a multivendor network, which command must be configured on Cisco devices?
To map the topology of a multivendor network, which command must be configured on Cisco devices?
Signup and view all the answers
How do AAA operations differ regarding user identification, user services, and access control?
How do AAA operations differ regarding user identification, user services, and access control?
Signup and view all the answers
What is the difference between RADIUS and TACACS+?
What is the difference between RADIUS and TACACS+?
Signup and view all the answers
What is a difference between local AP mode and FlexConnect AP mode?
What is a difference between local AP mode and FlexConnect AP mode?
Signup and view all the answers
What does router R1 use as its OSPF router-ID?
What does router R1 use as its OSPF router-ID?
Signup and view all the answers
When OSPF learns multiple paths to a network, how does it select a route?
When OSPF learns multiple paths to a network, how does it select a route?
Signup and view all the answers
When a floating static route is configured, what action ensures that the backup route is used when the primary route fails?
When a floating static route is configured, what action ensures that the backup route is used when the primary route fails?
Signup and view all the answers
Based on the 'show ip ospf interface' command output on R1, how is OSPF configured on the interface?
Based on the 'show ip ospf interface' command output on R1, how is OSPF configured on the interface?
Signup and view all the answers
By default, what kind of OSPF network does an interface belong to when advertised in OSPF?
By default, what kind of OSPF network does an interface belong to when advertised in OSPF?
Signup and view all the answers
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
Signup and view all the answers
Router A learns the same route from OSPF and EIGRP neighbors. What is the administrative distance of the route installed in the routing table?
Router A learns the same route from OSPF and EIGRP neighbors. What is the administrative distance of the route installed in the routing table?
Signup and view all the answers
An engineer sets up a new circuit through eBGP on the Gi0/1 interface of Router 1, learning the route to VLAN25. How does traffic flow for route 10.10.13.0/25?
An engineer sets up a new circuit through eBGP on the Gi0/1 interface of Router 1, learning the route to VLAN25. How does traffic flow for route 10.10.13.0/25?
Signup and view all the answers
What influences the EIGRP route selection process?
What influences the EIGRP route selection process?
Signup and view all the answers
In the network setup shown, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A if OSPF is running?
In the network setup shown, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A if OSPF is running?
Signup and view all the answers
Study Notes
Network Fundamentals
- The CCNA 200-301 exam has a passing score of 800, a time limit of 120 minutes, and is divided into 6 sections: Network Fundamentals, Network Access, IP Connectivity, IP Services, Security Fundamentals, and Automation and Programmability.
- Route types:
- Network route: used to reach host 10.10.13.10/32
- Host route: used to reach a specific host
- Default route: used to reach destinations not in the routing table
- File-transfer protocols:
- FTP (File Transfer Protocol)
- SFTP (Secure File Transfer Protocol)
- TFTP (Trivial File Transfer Protocol)
- Frame Check Sequence (FCS) errors:
- Increment the input error counter
- Increment the CRC error counter
- IPv6 address types:
- Link-local: provides communication between devices on the same link
- Unique local: provides communication between subnets and cannot be routed on the Internet
- Global unicast: publicly routable and can be routed on the Internet
- Multicast: forwards packets to a group of devices
- Switching:
- Late collisions occur when a collision is detected late in the transmission process
- Frame flooding: sends frames to all ports in the same VLAN except the originating port
- Spanning tree: prevents switching loops and broadcast storms
- Wireless networking:
- Wireless LAN Controller (WLC): provides centralized management and configuration of wireless networks
- Lightweight AP: uses the WLC to manage and configure wireless networks
- Autonomous AP: does not use a WLC and is managed and configured locally
Network Access
- Link Aggregation:
- Requires two or more ports to be configured
- Provides increased bandwidth and redundancy
- Can be configured in "mode active"
- SSH (Secure Shell):
- Requires a k9 (crypto) IOS image
- Requires the
ip domain-name
command to be configured - Provides secure remote access to network devices
- Spanning tree:
- PortFast: minimizes spanning tree convergence time
- BPDU (Bridge Protocol Data Unit) messages: used to detect and prevent switching loops
- Root port: the port that is closest to the root bridge
IP Connectivity
- IPv4 subnetting:
- The most efficient subnet is one that minimizes wasted addresses
- Subnets can be summarized to reduce the number of routes in the routing table
- IPv6 address configuration:
- EUI-64 (Extended Unique Identifier 64-bit) address: uses the MAC address of the interface
- SLAAC (Stateless Address Autoconfiguration): allows hosts to configure their own IPv6 addresses
IP Services
- DHCP (Dynamic Host Configuration Protocol):
- Provides IP addresses and other network settings to hosts
- Can be used to reserve IP addresses for specific devices
Security Fundamentals
- Network security:
- Private IP addresses: cannot be routed on the Internet
- NAT (Network Address Translation): translates private IP addresses to public IP addresses
- Access control:
- Passwords: can be used to authenticate and authorize access to network devices
- SSH: provides secure remote access to network devices
Automation and Programmability
- Network automation:
- Can be used to simplify network configuration and management
- Can be used to reduce errors and increase efficiency### Network Access
- QoS Profile in a Voice over WLAN deployment: Platinum
- After a switch configuration, a ping test fails between PC A and PC B due to a native VLAN mismatch
- In a WLAN deployment, a Local Mode AP will continue to serve wireless clients even after losing connectivity to the Cisco Wireless LAN Controller
- EtherChannel can be configured between two switches without a negotiation protocol by using the "on" mode
IP Connectivity
- OSPF router-ID is the highest IP address on the router, or the IP address configured using the
router-id
command - OSPF selects a route based on the lowest cost, calculated by dividing the reference bandwidth of 100 Mbps by the actual bandwidth of the exiting interface
- A floating static route with a higher administrative distance than the primary route is used as a backup route
- OSPF network types: point-to-point, point-to-multipoint, broadcast, nonbroadcast; default type is broadcast for Gigabit Ethernet interfaces
- Administrative distance is used to select the best path when two or more different routes to the same destination exist from two different routing protocols (e.g. OSPF vs EIGRP)
- EIGRP route selection process: advertised distance, feasible distance, reported distance
- HSRP provides first hop redundancy using a shared virtual MAC and virtual IP address
- OSPFv2 neighbor adjacency parameters: hello interval, dead interval, area ID, authentication, MTU
Routing Protocols
- OSPF: uses cost as the metric, default reference bandwidth is 100 Mbps, default Hello and Dead timers are 10 and 40 seconds, respectively
- EIGRP: uses bandwidth and delay as the metrics, administrative distance is 90
- BGP: uses AS Path as the metric, administrative distance is 20
- OSPFv2: uses IP address, area ID, and authentication for neighbor adjacency
Network Troubleshooting
- To troubleshoot OSPF issues, use the
show ip ospf interface
command - To troubleshoot EIGRP issues, use the
show ip eigrp neighbors
command - To troubleshoot routing table issues, use the
show ip route
command### IP Connectivity - There are two types of communication: point-to-point and point-to-multipoint.
- VRRP virtual address is 0000.5E00.010a.
- To allow communication between Atlanta and Washington routers, ipv6 routes need to be configured on both routers.
- EIGRP router uses the metric parameter to select the best path.
- In OSPF, a designated router is verified by the "Full" state.
- A router selects the best route based on the longest prefix match.
- A static default route can be configured using the command "ip route 0.0.0.0 0.0.0.0 ".
- To forward packets to a specific destination, a static route needs to be configured.
- The administrative distance of a route determines the preference of the route.
- A floating static route can be used for fallback static routing when the dynamic routing protocol fails.
- To enable OSPFV2, an active interface needs to have an OSPF process ID and an OSPF area configured.
IP Services
- NAT translations allow one IP address to be translated to another.
- Syslog is used to send messages about events that occur on a network device.
- NTP client mode is configured using the command "ntp server ".
- SNMP is used for network management and monitoring.
- DHCP client mode is configured using the command "ip address dhcp".
- SNMP agent responds to requests from the NMS (Network Management System).
- DHCP server assigns IP addresses dynamically and offers the ability to exclude specific IP addresses from a pool of IP addresses.
- NTP server mode is configured using the command "ntp master".
- Syslog is used to send notice-level messages to a syslog server.
Security Fundamentals
- DHCP snooping is used to prevent DHCP spoofing attacks.
- Wireless encryption protocols include WPA2 with AES-256 in preshared key mode.
- Site-to-site VPNs use IPsec for the transport of user data.
- Threat-mitigation techniques include access control lists, firewalls, and intrusion prevention systems.
- Password encryption is enabled using the command "service password-encryption".
- AAA (Authentication, Authorization, and Accounting) is used for user authentication and authorization.
- WPA2 PSK can be configured in hexadecimal or ASCII format.
- Unused switch ports should be administratively shut down and placed in an inaccessible VLAN to prevent unauthorized access.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Prepare for the Cisco Certified Network Associate 200-301 exam with 160 questions. Covers network fundamentals, access, IP connectivity, services, security, and automation.