CISCO CCNA 200-301 Q50

An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

A.
interface e/0
description to HQ-A371:10975
ip address 172.16.1.4 255.255.255.248

B.
interface e/0
description to HQ-A371:10975
ip address 10.2.1.3 255.255.255.252

C.
interface e/0
description to HQ-A371:10975
ip address 192.168.1.1 255.255.255.248

D.
interface e/0
description to HQ-A371:10975
ip address 209.165.201.2 255.255.255.252

Correct Answers: D

Explanation:
/30 subnet means subnet mask of 255.255.255.252. But 10.2.1.3 255.255.255.252 is a broadcast IP address; only 209.165.201.2/30 is the usable IP address.

CISCO CCNA 200-301 Q49

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

A. The floating static route must have a higher administrative distance than the primary route so it is used as a backup
B. The administrative distance must be higher on the primary route so that the backup route becomes secondary.
C. The floating static route must have a lower administrative distance than the primary route so it is used as a backup
D. The default-information originate command must be configured for the route to be installed into the routing table

Correct Answers: A

CISCO CCNA 200-301 Q48

Which IPv6 address block sends packets to a group address rather than a single address?

A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8

Correct Answers: D

CISCO CCNA 200-301 Q47

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

A. 2000::/3
B. 2002::/5
C. FC00::/7
D. FF02::1
E. FF02::2

Correct Answers: D, E

CISCO CCNA 200-301 Q46

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)

A. Configure the ports in an EtherChannel.
B. Administratively shut down the ports
C. Configure the port type as access and place in VLAN 99
D. Configure the ports as trunk ports
E. Enable the Cisco Discovery Protocol

Correct Answers: B, C

CISCO CCNA 200-301 Q45

When configuring a WLAN with WPA2-PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)

A. ASCII
B. base64
C. binary
D. decimal
E. hexadecimal

Correct Answers: A, E

Explanation:
When configuring a WLAN with WPA2 Preshared Key (PSK), we can choose the encryption key format as either ASCII or HEX.

CISCO CCNA 200-301 Q44

An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A. Physical access control
B. Social engineering attack
C. brute force attack
D. user awareness

Correct Answers: D

Explanation:
This is the definition of “User awareness” from CCNA 200-301 Official Cert Guide Book:
“User awareness: All users should be made aware of the need for data confidentiality to protect corporate information, as well as their own credentials and personal information. They should also be made aware of potential threats, schemes to mislead, and proper procedures to report security incidents. “
Note: Physical access control means infrastructure locations, such as network closets and data centers, should remain securely locked.

CISCO CCNA 200-301 Q43

What is the primary effect of the spanning-tree portfast command?

A. It enables BPDU messages
B. It minimizes spanning-tree convergence time
C. It immediately puts the port into the forwarding state when the switch is reloaded
D. It immediately enables the port in the listening state

Correct Answers: C

Explanation:
Portfast feature should only be used on edge ports (ports directly connected to end stations). Neither edge ports or PortFast enabled ports generate topology changes when the link toggles so we cannot say PortFast reduces the STP convergence time. PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states so answer C is the best choice.

https://www.ciscopress.com/articles/article.asp?p=2832407&seqNum=6

CISCO CCNA 200-301 Q42

In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?

A. A spine switch and a leaf switch can be added with redundant connections between them
B. A spine switch can be added with at least 40 GB uplinks
C. A leaf switch can be added with a single connection to a core spine switch.
D. A leaf switch can be added with connections to every spine switch

Correct Answers: D

Explanation:
Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, non-blocking server-to-server connectivity. Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches. Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh. Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.

CISCO CCNA 200-301 Q41

Which output displays a JSON data representation?

Correct Answers: D

Explanation:
JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon and followed by a value:
“name”:”Mark”

JSON can use arrays. Array values must be of type string, number, object, array, boolean or null. For example:
{
“name”:”John”, “age”:30,
“cars”:[ “Ford”, “BMW”, “Fiat” ]
}
JSON can have empty object like “taskId”:{}