CCNA 200-301 Exam Dumps Free | Full Questions & Answers – Study Guide [valid & updated]

 

Drag & Drop Questions:

A network engineer is configuring an OSPFv2 neighbor adjacency. Drag and drop the parameters from the left onto their required categories on the right. No all parameters are used.

Correct Answer:
[br] [br]

 

Must be unique:

router ID

IP address

Must match:

netmask

area ID

timers

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Select and Place:

Correct Answer:
[br] [br]

 

Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.

Select and Place:

Correct Answer:
[br] [br]

 

Layer 2 Security Mechanisms:

WPA+WPA2

802.1X

web policy

Passthrough

Drag and drop the network protocols from the left onto the correct transport services on the right. Select and Place:

Correct Answer:
[br] [br]

 

 

5. Refer to the exhibit.

Drag and drop the networking parameters from the left onto the correct values on the right.

Select and Place:

Correct Answer:
[br] [br]

 

Drag and drop the AAA functions from the left onto the correct AAA services on the right. Select and Place:

Correct Answer:
[br] [br]

 

Authentication:

verifies the password associated with a user

identifies the user

Authorization:

controls the actions that a user can perform

restricts the services that are available to a user

Accounting:

provides analytical Information for the network administrator

records user activities

Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right. Select and Place:

Correct Answer:
[br] [br]

 

172.28.228.144/21 –> 172.28.224.1 – 172.28.231.254

172.28.228.144/29 –> 172.28.228.145 – 172.28.228.150

172.28.228.144/23 –> 172.28.228.1 – 172.28.229.254

172.28.228.144/25 –> 172.28.228.129 – 172.28.228.254

172.28.228.144/18 –> 172.28.192.1 – 172.28.255.254

 

Drag and drop the descriptions of file transfer protocols from the left onto the correct protocols on the right.

Select and Place:

Correct Answer:
[br] [br]

 

FTP:

provides reliability when loading an IOS image upon boot up

uses ports 20 and 21

uses TCP

does not require user authentication

uses port 69

uses UD

Drag drop the descriptions from the left on to the correct configuration-management technologies on the right.

Select and Place:

Correct Answer:
[br] [br]

 

Ansible:

uses SSH for remote device communication

uses YAML for fundamental configuration elements

Chef:

uses TCP port 10002 for configuration push jobs

uses Ruby for fundamental configuration elements

Puppet:

fundamental configuration elements are stored in a manifest

uses TCP 8140 for communication

Drag and drop the WLAN components from the left onto the correct descriptions on the right. Select and Place:

Correct Answer:
[br] [br]

 

wireless LAN controller –> device that manages access points

access point –> device that provides Wi-Fi devices with a connection to a wired network service port –> used for out of band management of a WLC

virtual interface –> used to support mobility management of the WLC dynamic interface –> applied to the WLAN for wireless client communication

 

Drag and drop the functions from the left onto the correct network components on the right. Select and Place:

Correct Answer:
[br] [br]

 

 

12. Refer to the exhibit

Drag and drop the routing table components on the left onto the corresponding letter from the exhibit on the right not all options are used.

Select and Place:

Correct Answer:
[br] [br]

 

 

Drag and drop each broadcast IP address on the left to the Broadcast Address column on the right Not all options are used.

Select and Place

Correct Answer:
[br] [br]

 

14. An interface has been configured with the access list that is shown below.

access-list 107 deny tcp 207.16.12.0.0.0.3.255 any eq http access-list 107 permit ip any any

On the basis of that access list, drag each information packet on the left to the appropriate category on the right.

Select and Place:

Correct Answer:
[br] [br]

 

Order the DHCP message types as they would occur between a DHCP client and a DHCP server. Select and Place:

Correct Answer:
[br] [br]

 

Drag each route source from the left to the numbers on the right. Beginning with the lowest and ending with the highest administrative distance.

Correct Answer:
[br] [br]

 

Drag and drop the benefits of a cisco wireless Lan controller from the left onto the correct examples on the right.

Correct Answer:
[br] [br]

 

Drag and drop the application protocols from the left onto the transport protocols that is uses on the right.

Correct Answer:
[br] [br]

 

Refer to the exhibit. Drag and drop the networking parameters from the left on to the correct values on the right.

Correct Answer:
[br] [br]

 

²

20. Drag and drop the networking parameters from the left on to the correct values on the right.

Correct Answer:
[br] [br]

 

Drag and drop the characteristics of networking from the left onto the correct networking types on the right.

Correct Answer:
[br] [br]

 

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

Correct Answer:
[br] [br]

 

802.1q double-tagging VLAN-hopping attack: configure the native VLAN with a nondefault VLAN ID

MAC flooding attack: configure 802.1x authenticate

man-in-the-middle spoofing attack: configure DHCP snooping

switch-spoofing VLAN-hopping attack: disable DTP

23. Match the functions to the corresponding layers. (Not all options are used)

Correct Answer:
[br] [br]

 

Drag the descriptions of device management from the left onto the types of device management on the right.

Correct Answer:
[br] [br]

 

 

25. Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.

Correct Answer:
[br] [br]

 

TCP:

Sends tranmissions in sequence

Transmits packets as a stream

Uses a lower transmission rate to ensure relability

UDP:

Transmissions include an 8-byte header

Transmits packets individually

Uses a higher transmission rate to support latency-sensitive application

Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.

Correct Answer:
[br] [br]

 

27. Refer to the exhibit.

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

Correct Answer:
[br] [br]

 

28. Drag the IPv6 DNS record types from the left onto the description on the right.

Correct Answer:
[br] [br]

 

29. Drag and drop the SNMP components from the left onto the descriptions on the right.

Correct Answer:
[br] [br]

 

 

30. Drag and drop the QoS congestion management terms from the left onto the description on the right.

Correct Answer:
[br] [br]

 

31. Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

Correct Answer:
[br] [br]

 

32. Refer to the exhibit.

An engineer is configuring the router to provide static NAT for the webserver Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the right.

Correct Answer:
[br] [br]

 

Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.

Correct Answer:
[br] [br]

 

Drag and drop the SNMP manager and agent identifier commands from the left onto the functions on the right.

Correct Answer:
[br] [br]

 

35. Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right.

Correct Answer:
[br] [br]

 

Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right



Answer:

Which global command encrypt all passwords in the running configuration?

A. password-encrypt
B. enable password-encryption
C. enable secret
D. service password-encryption

Correct Answer: D



What is the function of a hub-and-spoke WAN topology?

A. allows access restrictions to be implemented between subscriber sites.
B. provides direct connections between subscribers
C. supports Layer 2 VPNs
D. supports application optimization

Correct Answer: B



Download CCNA 200-301 VCE for Free


Leave a Reply

Your email address will not be published. Required fields are marked *