200-301 Cisco Certified Network Associate Free Practice Exam Questions (2025 Updated)
Prepare effectively for your Cisco 200-301 Cisco Certified Network Associate certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Refer to the exhibit.
R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?
Refer to the exhibit.
All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?
Refer to the exhibit.
Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?
Which PoE mode enables powered-device detection and guarantees power when the device is detected?
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
Refer to the exhibit.
Which command configures OSPF on the point-to-point link between routers R1 and R2?
Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
Refer to the exhibit.
Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?
A)
B)
C)
D)
What is the purpose of the ip address dhcp command?
Drag and drop the statements about networking from the left onto the corresponding networking types on the right.
Which WLC management connection type is vulnerable to man-in-the-middle attacks?
Which two components comprise part of a PKI? (Choose two.)
Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?
Refer to the exhibit.
A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?
A)
B)
C)
D)
Which action implements physical access control as part of the security program of an organization?
A Cisco engineer must configure a single switch interface to meet these requirements
• accept untagged frames and place them in VLAN 20
• accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone
Which command set must the engineer apply?
A)
B)
C)
D)
Refer to the exhibit.
Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?
Refer to the exhibit.
An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?
A)
B)
C)
D)
What is one reason to implement LAG on a Cisco WLC?
OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?
Refer to the exhibit.
The following must be considered:
• SW1 is fully configured for all traffic
• The SW4 and SW9 links to SW1 have been configured
• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured
• The remaining switches have had all VLANs adde d to their VLAN database
Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?
A)
B)
C)
D)
Refer to the exhibit.
Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?
Which wireless security protocol relies on Perfect Forward Secrecy?
Which field within the access-request packet is encrypted by RADIUS?
Refer to the exhibit.
An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?
Refer to the exhibit.
Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B. What is the reason for the problem?
Which protocol uses the SSL?
Refer to the exhibit.
Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?
What is a function of an endpoint on a network?
Refer to the exhibit.
A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?
Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.
Refer to the exhibit.
An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?
A)
B)
C)
D)
An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence on the right Not all commands are used.
What is a function of Opportunistic Wireless Encryption in an environment?
What is a requirement for nonoverlapping Wi-Fi channels?
What is a function of a Next-Generation IPS?
Refer to the exhibit.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )
Refer to the exhibit.
Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)
A)
B)
C)
D)
E)
What is the function of the controller in a software-defined network?