Sale!

200-301 CCNA Cisco Certified Network Associate

$25.00 $19.95

  • Passing Score: 800
  • Time Limit: 120 min
  • File Version: 1.3
  • Q&A: 455
  • Updated May 2020
Recommend this page

Description


Advance your career in Cloud Computing and get $50 off on a Udacity Nanodegrees Program

Exam Demo

200-301 CCNA Cisco Certified Network Associate

QUESTION 1
You are the network administrator for your company and have configured Cisco Discovery Protocol (CDP) in your network. You recently noticed that
when devices send large numbers of CDP neighbor announcements, some devices are crashing. You decide to disable CDP on the router.
Which command should you use to achieve the objective?
A. no cdp run
B. set cdp disable
C. no cdp enable
D. no cdp advertise-v2

Correct Answer: A

Explanation:
You should use the no cdp run command to disable CDP on the router. Due to a known vulnerability regarding the handling of CDP by Cisco routers and
switches when devices send large numbers of CDP neighbor announcements, some devices can crash or cause abnormal system behavior. To
overcome this problem, you can disable CDP for the entire router by using the no cdp run command.
You cannot use the set cdp disable command to disable CDP on the router. This command disables CDP on an entire Catalyst switch.
You cannot use the no cdp enable command to disable CDP on the router. This command disables CDP on a specific interface.
You cannot use the no cdp advertise-v2 command to disable CDP on the router. This command disables CDPv2 advertisements.
Objective:
LAN Switching Fundamentals
Sub-Objective:
Configure and verify Layer 2 protocols
References:
Cisco > Support > Using Cisco Discovery Protocol
Cisco > Support > Technology Support > Network Management > Cisco’s Response to the CDP Issue > Document ID: 13621

QUESTION 2
Which is NOT a valid range for private IP addresses?
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255

D. 192.255.255.255-193.0.0.0

Correct Answer: D

Explanation:
The range 192.255.255.255 – 193.0.0.0 is a valid public IP address range, not a private IP address range.
The Internet Assigned Numbers Authority (IANA) has reserved the following three ranges for private Internet use:
10.0.0.0 – 10.255.255.255 (10.0.0.0/8)
172.16.0.0 – 172.31.255.255 (172.16.0.0/12)
192.168.0.0 – 192.168.255.255 (192.168.0.0/16)
The Internet Assigned Numbers Authority (IANA) manages and distributes global public IP addresses. IANA also performs DNS root zone management.
IANA operates with the help of International Engineering Task Force (IETF) and RFC Editor to manage IP address allocation and DNS root zone
management. There are Regional Internet Registries (RIRs) through which IANA allocates local registrations of IP addresses to different regions of the
world. Each RIR handles a specific region of the world.
Objective:
Network Fundamentals
Sub-Objective:
Describe the need for private IPv4 addressing
References:
http://www.ietf.org/rfc/rfc1918.txt
http://www.iana.org/

QUESTION 3
Which of the following protocols allow the root switch location to be optimized per VLAN? (Choose all that apply.)
A. PVST+
B. RSTP
C. PVRST
D. STP

Correct Answer: AC

 

Explanation:
Both Per VLAN Spanning Tree Plus (PVST+) and Per VLAN Rapid Spanning Tree (PVRST) protocols allow for a spanning tree instance for each VLAN,
allowing for the location optimization of the root bridge for each VLAN. These are Cisco proprietary enhancements to the 802.1d and 802.1w standards,
respectively.
Rapid Spanning Tree Protocol (RSTP) is another name for the 802.1w standard. It supports only one instance of spanning tree.
Spanning Tree Protocol (STP) is another name for the 802.1d standard. It supports only one instance of spanning tree.
Objective:
LAN Switching Fundamentals
Sub-Objective:
Configure, verify, and troubleshoot STP protocols
References:
Cisco Home > Support > Technology Support > LAN Switching

QUESTION 4
Your assistant just finished configuring a small test network as part of his training. The network is configured as shown in the diagram below:

200-301-1

When testing the configuration, you find that Host A in the diagram cannot ping Host B.

Which of the following pairs of connections are required to be in the same subnet for Host A to be able to ping Host B? (Choose all that apply.)
A. The IP address of Host A and the IP address of the Fa0/0 interface of Router A
B. The IP address of the Fa0/0 interface of Router A and the IP address of the Fa0/0 interface of Router B
C. The IP address of Host A and the IP address of the Fa0/0 interface of Router B
D. The IP address of Host A and the IP address of Switch A
E. The IP address of the S 0/0 interface of Router A and the IP address of the S 0/0 interface of Router B
F. The IP address of Host A and the IP address of Host B
G. The IP address of Host B and the IP address of the Fa0/0 interface of Router B

Correct Answer: AEG

Explanation:
The following pairs of connections are required to be in the same subnet:
the IP address of Host A and the IP address of the Fa0/0 interface of Router A
the IP address of the S 0/0 interface of Router A and the IP address of the S 0/0 interface of Router B
the IP address of Host B and the IP address of the Fa0/0 interface of Router B
When troubleshooting a correctly labeled network diagram for IP addressing problems, one must start on one end and trace each link in one direction,
ensuring at each step that the interfaces are in the same subnet. A switch simply passes the packet to the router; therefore, the IP address of the switch
is not important. It performs its job even if it has no IP address.
Moving from Host A to Host B, however, the following links must be in the same subnet:
The IP address of Host A and the IP address of the Fa0/0 interface of Router A
The IP address of the S0/0 interface of Router A and the IP address of the S0/0 interface of Router B
The IP address of Host B and the IP address of the Fa0/0 interface of Router B
Neither of the switch addresses is important to the process.
If all other routing issues are correct, it is also not required for Host A and Host B to be in the same subnet.
Objective:
Network Fundamentals
Sub-Objective:
Configure, verify, and troubleshoot IPv4 addressing and subnetting
References:
Cisco > Home > Support > Technology Support > IP > IP Routing > Design > Design Technotes > IP Addressing and Subnetting for New Users

QUESTION 5
DRAG DROP
Click and drag the components on the left to their corresponding layers of the Open Systems Interconnection (OSI) model on the right.

200-301-2

Explanation/Reference:
Explanation:
File Transfer Protocol (FTP) and Telnet are services, which are implemented at the Application layer in the Open Systems Interconnection (OSI) model.
The Application layer is responsible for interacting directly with the application. It provides application services, such as e-mail.
Motion Picture Experts Group (MPEG) and Tagged Image File Format (TIFF) are graphic image formats, which are implemented at the Presentation
layer. The Presentation layer enables coding and conversion functions for application layer data. Data is formatted and encrypted at this layer. The
Presentation layer converts data into a format which is acceptable to the Application layer.
The following are also OSI layers and their descriptions:
Session: Used to create, manage, and terminate sessions between communicating nodes. The Session layer handles the service requests and
service responses which take place between different applications.
Transport: Responsible for error-free and sequential delivery of data. This layer is used to manage data transmission between devices, a process
known as flow control. The Transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
Network: Used to define the network address or the Internet Protocol (IP) address, which is then used by the routers to make routing decisions.
Data Link: Ensures the reliable transmission of data across a network on the basis of Layer 2 addresses such as MAC addresses (Ethernet) or DLCIs
(Frame relay).
Physical: Consists of hardware for sending and receiving data on a carrier. The protocols which work at the Physical layer include Fast Ethernet,
RS232 and Asynchronous Transfer Mode (ATM).
Objective:
Network Fundamentals
Sub-Objective:
Compare and contrast OSI and TCP/IP models
References:
Internetworking Technology Handbook > Internetworking Basics > OSI Model and Communication Between Systems

Google IT Support Professional Certificate by Grow with Google (300x600) - 2

0/5 (0 Reviews)