CISCO CCNA 200-301 Q47

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

A. 2000::/3
B. 2002::/5
C. FC00::/7
D. FF02::1
E. FF02::2

Correct Answers: D, E

CISCO CCNA 200-301 Q46

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)

A. Configure the ports in an EtherChannel.
B. Administratively shut down the ports
C. Configure the port type as access and place in VLAN 99
D. Configure the ports as trunk ports
E. Enable the Cisco Discovery Protocol

Correct Answers: B, C

CISCO CCNA 200-301 Q45

When configuring a WLAN with WPA2-PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)

A. ASCII
B. base64
C. binary
D. decimal
E. hexadecimal

Correct Answers: A, E

Explanation:
When configuring a WLAN with WPA2 Preshared Key (PSK), we can choose the encryption key format as either ASCII or HEX.

CISCO CCNA 200-301 Q44

An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A. Physical access control
B. Social engineering attack
C. brute force attack
D. user awareness

Correct Answers: D

Explanation:
This is the definition of “User awareness” from CCNA 200-301 Official Cert Guide Book:
“User awareness: All users should be made aware of the need for data confidentiality to protect corporate information, as well as their own credentials and personal information. They should also be made aware of potential threats, schemes to mislead, and proper procedures to report security incidents. “
Note: Physical access control means infrastructure locations, such as network closets and data centers, should remain securely locked.

CISCO CCNA 200-301 Q43

What is the primary effect of the spanning-tree portfast command?

A. It enables BPDU messages
B. It minimizes spanning-tree convergence time
C. It immediately puts the port into the forwarding state when the switch is reloaded
D. It immediately enables the port in the listening state

Correct Answers: C

Explanation:
Portfast feature should only be used on edge ports (ports directly connected to end stations). Neither edge ports or PortFast enabled ports generate topology changes when the link toggles so we cannot say PortFast reduces the STP convergence time. PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states so answer C is the best choice.

https://www.ciscopress.com/articles/article.asp?p=2832407&seqNum=6

CISCO CCNA 200-301 Q42

In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?

A. A spine switch and a leaf switch can be added with redundant connections between them
B. A spine switch can be added with at least 40 GB uplinks
C. A leaf switch can be added with a single connection to a core spine switch.
D. A leaf switch can be added with connections to every spine switch

Correct Answers: D

Explanation:
Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, non-blocking server-to-server connectivity. Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches. Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh. Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.

CISCO CCNA 200-301 Q41

Which output displays a JSON data representation?

Correct Answers: D

Explanation:
JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon and followed by a value:
“name”:”Mark”

JSON can use arrays. Array values must be of type string, number, object, array, boolean or null. For example:
{
“name”:”John”, “age”:30,
“cars”:[ “Ford”, “BMW”, “Fiat” ]
}
JSON can have empty object like “taskId”:{}

CISCO CCNA 200-301 Q40

Refer to the exhibit. What is the effect of this configuration?


A. All ARP packets are dropped by the switch
B. Egress traffic is passed only if the destination is a DHCP server.
C. All ingress and egress traffic is dropped because the interface is untrusted
D. The switch discards all ingress ARP traffic with invalid MAC-to-IP address bindings.

Correct Answers: D

Explanation:
Dynamic ARP inspection is an ingress security feature; it does not perform any egress checking.

CISCO CCNA 200-301 Q39

Refer to the exhibit. What is the effect of this configuration?


A. The switch port interface trust state becomes untrusted
B. The switch port remains administratively down until the interface is connected to another switch
C. Dynamic ARP inspection is disabled because the ARP ACL is missing
D. The switch port remains down until it is configured to trust or untrust incoming packets

Correct Answers: A

Explanation:
Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in-the-middle attacks. After enabling DAI, all ports become untrusted ports.

CISCO CCNA 200-301 Q38

Refer to the exhibit. Which route does R1 select for traffic that is destined to 192 168.16.2?


A. 192.168.16.0/21
B. 192.168.16.0/24
C. 192.168 26.0/26
D. 192.168.16.0/27

Correct Answers: D

Explanation:
Because each entry in a forwarding table may specify a sub-network, one destination address may match more than one forwarding table entry. The most specific of the matching table entries — the one with the longest subnet mask — is called the longest prefix match. It is called this because it is also the entry where the largest number of leading address bits of the destination address match those in the table entry.