200-301 Exam Simulation
200-301 Exam Simulation
   A) Agent-less deployment
   B) Installation is very easy and configured easily.
Explanation
 Understanding of the script execution is NOT difficult. On the contrary, Ansible commands are executed in sequential
 order so that understanding of the script execution is straightforward.
It is true that SSH communications are slow, which may cause more downtime.
It is also true that the Ansible installation is very simple and configured easily.
Finally, Ansible uses agent-less deployment. This makes connection faster compared to an agent-based model.
 Objective:
 Automation and Programmability
 Sub-Objective:
 Recognize the capabilities of configuration management mechanisms such as Ansible and Terraform
References:
Which Cisco IOS command disables Cisco Discovery Protocol Version 2 (CDPv2) advertisements?
   A) no cdp enable
   B) no cdp v2-advertise
   C) no cdp run
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              1/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
D) no cdp advertise-v2
Explanation
 The no cdp advertise-v2 command disables CDPv2 advertisements. It is the reverse of the cdp advertise-v2
 command, which enables CDPv2 advertisements on a device.
 Objective:
 Network Access
 Sub-Objective:
 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
References:
 Cisco > Support > Cisco Discovery Protocol Configuration Guide, Cisco IOS Release 12.4 > Chapter: Using Cisco
 Discovery Protocol
Assume that all ports on Layer 2 devices are in the same virtual LAN (VLAN). View the given network topology.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             2/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Which network device should be placed at the highlighted box to produce a total of two broadcast domains and seven
 collision domains in the network?
   A) Switch
   B) Hub
   C) Router
D) Bridge
Explanation
 A hub should be placed at the highlighted box to produce a total of two broadcast domains and seven collision domains
 in the network. Network devices segment collision domains and broadcast domains in the following manner:
      Hub: A Layer 1 device with all ports in the same collision domain and broadcast domain.
      Bridge/Switch: Layer 2 devices on which all ports are in different collision domains, but in the same broadcast
      domain (assuming that all ports are in the same VLAN or no VLAN is configured).
      Routers: A Layer 3 device on which every port is a separate collision as well as broadcast domain.
 The bridge shown in the graphic has three ports populated by active links, resulting in three collision domains. The
 switch shown in the exhibit has four ports populated with the links, resulting in four collision domains. Together these
 two devices create seven collision domains.
 Because the scenario requires that there be no more than seven collision domains, the device in the highlighted box
 must not create any further collision domains. A hub is a device that has all its ports in the same collision domain and
 will not create any further collision domains in the topology.
A bridge or switch cannot be the correct option because these will also add collision domains.
 In the exhibit, the router has two ports with active links, which will result in two broadcast domains. Because the
 scenario states there are no more than two broadcast domains, the device in the highlighted box must not be a router.
 Routers are used to segment broadcast domains.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe characteristics of network topology architectures
References:
 Cisco > Product Support > Switches > Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide,
 12.2(25)EW > Chapter: Understanding and Configuring VLANs
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                  3/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Which of the following statements are true of Class C IP addresses? (Choose all that apply.)
   A) The first three octets represent the entire network portion of the address.
   B) The first octet represents the entire network portion of the address.
C) The value of the first binary place in the first octet must be 0.
   D) The decimal values of the first octet can range from 1 to 126.
   E) The decimal values of the first octet can range from 192 to 223.
F) The value of the first two binary places in the first octet must be 11.
Explanation
      The decimal values of the first octet can range from 192 to 223.
      The first three octets represent the entire network portion of the address.
      The value of the first two binary places in the first octet must be 11.
      The decimal values of the first octet can range from 128 to 191.
      The first two octets represent the entire network portion of the address.
      The value of the first two binary places in the first octet must be 10.
      The decimal values of the first octet can range from 1 to 126.
      The first octet represents the entire network portion of the address.
      The value of the first binary place in the first octet must be 0.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Configure and verify IPv4 addressing and subnetting
References:
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Configure IP Addresses and
 Unique Subnets for New Users > Document ID: 13788
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             4/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 You have recently been hired as a network administrator. After starting your new job, you discover that the network
 devices are not being monitored on a regular basis. You need to deploy a technology or protocol that will provide this
 service.
A) SMTP
B) DHCP
   C) SNMP
   D) DNS
Explanation
 You would deploy Simple Network Management Protocol (SNMP) to monitor network devices. It uses port 161 to
 communicate. Information about a managed device's resources and activity is defined by a series of objects and is
 contained by a managed device's Management Information Base (MIB). SNMP management software can request
 each of the MIB objects from an SNMP agent, referred to as an SNMP walk. Different SNMP messages can be sent,
 including:
 Syslog messages and SNMP traps trigger notification messages that can be sent via e-mail and SMS. A syslog server
 receives, and stores log messages sent from syslog clients. A syslog client sends logging information to a syslog server.
 A syslog server ensures that a network administrator can review device error information from a central location.
 Simple Mail Transfer Protocol (SMTP) is used for e-mail. Dynamic Host Configuration Protocol (DHCP) is used to
 dynamically assign IP addresses. Domain Name System (DNS) is used to manage IP addresses to host name
 mappings.
 Objective:
 IP Services
 Sub-Objective:
 Explain the function of SNMP in network operations
References:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             5/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Cisco > Cisco Prime Infrstructure 3.2 User Guide > Monitor Device and Network Health and Performance
Cisco > Monitor Device and Network Health and Performance (PDF)
 The company you work for has a large number of employees who are considered a mobile workforce. These
 employees need to access resources on the LAN from their home or while traveling. Which of the following
 tunneling/VPN solutions would be the most appropriate in this situation?
A) IPsec
B) PPTP
   C) Remote access
   D) Site to site
Explanation
 A remote-access VPN allows geographically dispersed users to access the intranet or other company resources. It is
 ideal for a mobile workforce.
 A site-to-site VPN allows an organization to connect two or more remote offices so that it appears as if they are local to
 each other. It can also be used for partner connections.
 IPsec is the encryption protocol used in secure VPN connections. While IPsec may be used, it has nothing to do with
 the type of VPN deployed.
 Point-to-Point Tunneling Protocol (PPTP) uses an initial public Internet connection and creates a second connection
 (tunnel) through which VPN traffic is managed. A VPN can use PPTP, but this protocol does not affect the type of VPN
 deployed.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Describe IPSec remote access and site-to-site VPNs
References:
Cisco Community > Technology and Support > Security > Ipsec Tunnel Mode Vs Transport Mode
AT&T Cybersecurity > Level Blue > Blog > Security Essentials > Secure Remote Access Explained
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              6/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 You need to configure Network Address Translation (NAT) to allow users access to the Internet. There are 62 private
 hosts that need Internet access using the private network 10.4.3.64 /26, and all of them will be translated into the public
 IP address of the serial interface.
Which of the following NAT configurations will allow all 62 hosts to have simultaneous Internet access?
Explanation
 A successful NAT configuration requires the creation of an access control list (ACL) to identify the private IP addresses
 that will be translated, as well as an ip nat inside source command to dictate what public IP addresses will be used for
 translation. Cisco uses the term "inside local" for IP addresses prior to translation, and "inside global" for public IP
 addresses after translation.
 The access-list 1 permit 10.4.3.64 0.0.0.63 command correctly identifies the private host network of 10.4.3.64 /26,
 consisting of 62 hosts.
      inside: indicates that packets received on the inside (private) interface will be translated
      list 1: specifies that access list 1 will be used to determine which private IP addresses will be translated
      interface serial 0: specifies that NAT will translate private IP addresses into the IP address of the serial 0 interface
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                  7/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
       overload: allows NAT to reuse the IP address of the serial interface for all private IP addresses, providing them
       simultaneous access to the Internet.
 The correct wildcard mask is critical to ensuring that the access list allows translation of all LAN devices. For example, if
 a private LAN used the 192.168.9.0/24 network and 167 devices were present in the network, the correct wildcard mask
 would be 0.0.0.255. If you used an incorrect wildcard mask, such as 0.0.0.3, only the 192.168.9.0/30 network would be
 allowed translation (only the IP addresses 192.18.9.1 and 192.168.19.2). Of the 167 devices, 165 would not receive
 translation.
 The overload keyword is required in this configuration since there are more private IP addresses (62) than there are
 public IP addresses (one). Overload activates NAT overloading, often called Port Address Translation (PAT), and
 assigns each private IP address a unique, dynamic source port in router memory to track connections. If the overload
 keyword were not included in the NAT configuration, only one private host could access the Internet at a time.
 An alternate solution would involve the creation of a pool of public IP addresses on the NAT router and applying the
 access control list to the NAT pool, using the following commands:
 The first command creates a NAT pool with six public IP addresses on subnet 201.52.4.16/29, which will be used for
 translation. The second command then ties access list 1 to the NAT pool and specifies overload so that the six public
 addresses can be reused as often as necessary, allowing all of the private IP addresses simultaneous Internet access.
 In both of these examples, dynamic mapping is used. Without dynamic mapping, it is not possible for computers from
 outside the network to establish a connection with computers inside the network unless a static mapping between the
 private IP address and the public IP address is established on the NAT device.
 A common alternative approach is to use public IP addresses in the DMZ rather than private IP addresses, and to place
 any computers than must be accessed from outside the network in the DMZ. In this case, NAT is not required between
 the DMZ devices and the Internet. Even if public IP addresses are used in the DMZ, if the addresses undergo NAT
 translation, connections from outside the network will not be possible.
 When NAT is used to translate a public IP address (or addresses) to private IP addresses, the NAT process is ONLY
 implemented on the router that connects the network to the Internet. This is because private IP addresses are not
 routable to the Internet and translation must occur where the network connects to the Internet.
The following command sets are incorrect because they both involve the creation of a NAT pool:
and
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                 8/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The scenario states you must use the IP address of the serial interface as the public address. Also, the ip nat inside
 source command is configured in global configuration mode, not interface configuration mode. Finally, access control
 lists require inverse masks (such as 0.0.0.63). CIDR notation (as in POOLNAME 10.4.3.64 /26) is not allowed.
 The following command set is incorrect because access control lists require inverse masks (such as 0.0.0.63) and
 CIDR notation (/26) is not allowed:
Also, the ip nat inside source command is configured in global configuration mode, not interface configuration mode.
 Objective:
 IP Services
 Sub-Objective:
 Configure and verify inside source NAT using static and pools
References:
 Cisco > Product Support > Routers > IP Addressing: NAT Configuration Guide, Cisco IOS Release 15M&T > Chapter:
 Configuring NAT for IP Address Conservation
Which statement best describes the function of Hot Standby Router Protocol (HSRP)?
   C) HSRP defines a frame-tagging scheme that allows end stations to use any router
       as a gateway.
   D) HSRP defines a set of routers that represent one virtual, fault-tolerant router.
Explanation
 Hot Standby Router Protocol (HSRP) is specified by RFC 2281. The primary function of HSRP is to define a set of
 routers that work together to represent one virtual, fault-tolerant router. Thus, redundancy is provided in the event that
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               9/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
any one of the routers fails. HSRP can be configured on the following interface types:
      Routed ports
      Switched virtual interfaces (SVI)
      Etherchannel port channels
 HSRP does use a single IP address to represent a group of routers, but this does not fully describe the function of
 HSRP.
 HSRP does not provide round-robin gateway selection. HSRP uses router priority to select a primary and standby
 router.
 HSRP does not define a frame-tagging scheme that allows end stations to use any router as a gateway. End stations
 use the virtual IP address of a group of HSRP routers as the default gateway.
 Objective:
 IP Connectivity
 Sub-Objective:
 Describe the purpose, functions, and concepts of first hop redundancy protocol
References:
 Cisco > Support > Technology Support > IP Application Services > Troubleshooting TechNotes > Understand the Hot
 Standby Router Protocol Features and Functionality > Document ID: 9234
 Cisco > Support > Technology Support > IP Application Services > Technology Q&A > Review Hot Standby Router
 Protocol (HSRP): FAQ > Document ID: 9281
 Cisco > Product Support > Switches > Catalyst 3560 Software Configuration Guide, Release 12.2(52)SE > Chapter:
 Configuring HSRP
Which subnet is IP address 172.16.5.2 /23 a member of, and what is the broadcast address for that subnet?
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             10/116
11/14/24, 2:49 PM                                                                  200-301 Exam Simulation
 The IP address 172.16.5.2 /23 is a member of subnet 172.16.4.0 and has the broadcast address of 172.16.5.255. The
 valid host range is between 172.16.4.1 and 172.16.5.254.
 Calculations:
 Perform the AND operation between the IP address and the netmask to obtain the subnet ID:
 Address = 10101100.00010000.00000101.00000010
 Netmask = 11111111.11111111.11111110.00000000
 -------------------------------------------------------------------------------
 Subnetwork ID = 10101100.00010000.00000100.00000000
Convert the binary version of the network ID to dotted decimal format, 172.16.4.0.
 To obtain the broadcast address, replace the last 9 host bits (32 - 23 = 9 bits) of the network address. It yields the
 following:
 Objective:
 Network Fundamentals
 Sub-Objective:
 Configure and verify IPv4 addressing and subnetting
References:
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Configure IP Addresses and
 Unique Subnets for New Users > Document ID: 13788 > Understand IP Addresses
 Cisco > Technology Support > IP Addressing Services > Troubleshooting TechNotes > Configure Subnet Zero and All-
 Ones Subnet > Document ID: 13711
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                  11/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
show run
 atlanta#show running-config
 Building configuration...
 !
 version 12.1
 service timestamps debug datetime msec
 service timestamps log datetime msec
 no service password-encryption
 !
 hostname atlanta
 !
 !
 !
 !
 interface Ethernet0
 no ip address
 !
 interface Serial0/0
 ip address 172.16.1.1 255.255.255.240
 encapsulation frame-relay
 no fair-qeue
 interface Serial0/1
 ip address 192.168.5.1 255.255.255.252
 encapsulation ppp
 interface Serial0/2
 ip address 192.168.5.5 255.255.255.252
 encapsulation ppp
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           12/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
end
 Which of the serial connections on the Atlanta router are configured to use an encapsulation method that is compatible
 with non-Cisco routers? (Choose all that apply.)
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                          13/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
   A) S0/3
   B) S0/1
C) S0/2
D) S0/0
Explanation
 The interfaces S0/1 and S0/2 are both configured to use PPP as the encapsulation type. This type is compatible with
 non-Cisco routers. The specification of PPP can be seen on line 3 of the output of the show run command executed on
 both interfaces:
 interface Serial0/1
 ip address 192.168.5.1 255.255.255.252
 encapsulation ppp
 interface Serial0/2
 ip address 192.168.5.5 255.255.255.252
 encapsulation ppp
 ppp authentication chap
 When this specification is missing in the same output, it is an indication that the interface is using the default HDLC.
 The Cisco version of HDLC is NOT compatible with the HDLC encapsulation method used by non-Cisco routers.
 Therefore, PPP, which is cross platform compatible, should be used when connecting to non-Cisco routers.
 The following output of the show run command demonstrates what the output would look like on S0/1 when PPP is not
 in use.
 interface Serial0/2
 ip address 192.168.5.5 255.255.255.252
 The S0/0 interface is using frame relay encapsulation, as is shown in line three of the output from the show run
 command:
 interface Serial0/0
 ip address 172.16.1.1 255.255.255.240
 encapsulation frame−relay
 The compatibility of the frame relay encapsulation with non-Cisco routers is dependent on the encapsulation version
 specified. It can be set as either Cisco or IETF. If IETF is specified, the encapsulation is compatible with non-Cisco
 routers. If Cisco is specified, it is not. In the second line for each entry in the output of the show frame-relay map, it
 can be seen that Cisco was specified:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                  14/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The S0/3 interface is not compatible with non-Cisco routers because it is using HDLC. The use of HDLC is indicated by
 the absence of the encapsulation frame relay statement in its section of the show run command, as shown below:
interface Serial0/3
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe characteristics of network topology architectures
References:
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                    15/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
[output omitted]
Given:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           16/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The network team has struggled to maintain VPN connections between the main office and the branch offices. A
 requirement to use IPsec on the connections has added to their difficulty. Their main frustration is the need to
 reconfigure the main office connection with every new VPN connection required. Which technology would allow them to
 configure the main office only once, even if more offices that require VPN connections are subsequently added?
B) IPSec tunnels
Explanation
 Cisco Dynamic Multipoint Virtual Private Network (DMVPN) enables you to configure a single mGRE tunnel interface in
 the main office with a single IPsec profile to manage all spoke routers. While it requires a hub and spoke configuration,
 it allows for IPSec to be immediately triggered, creating a point-to-point GRE tunnel whenever new spokes are added
 without requiring any IPsec peering configuration in the main office.
 IPsec VTIs allow you to configure a virtual interface to which you can apply features. Features for clear-text packets are
 configured on the VTI. Features for encrypted packets are applied on the physical outside interface. When IPsec VTIs
 are used, you can separate the application of features such as NAT, ACLs, and QoS and apply them to clear-text or
 encrypted text, or both. When crypto maps are used, there is no simple way to apply encryption features to the IPsec
 tunnel.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            17/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Cisco IPSec Virtual Tunnel Interface (VTI) allows for the configuration of IPsec interfaces without the need to statically
 map IPsec sessions to a physical interface. The IPsec tunnel endpoint is associated with an actual (virtual) interface.
 This feature does not allow for configuring the main office only once, even if more offices that require VPN connections
 are later added.
 GRE over IPsec tunnels can also be used in a hub and spoke configuration, but they would require static tunnels
 between the main office and each branch. GRE over IPsec tunnels do not allow for configuring the main office only
 once, even if more offices that require VPN connections are later added.
 IPSec tunnels running in tunnel mode are always an option for branch office connections, but they must be configured
 individually. They do not allow for configuring the main office only once, even if more offices that require VPN
 connections are later added.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Describe IPSec remote access and site-to-site VPNs
References:
Cisco > Support > Configuring Dynamic Multipoint Virtual Private Networks
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
show run
 atlanta#show running-config
 Building configuration...
 !
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              18/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 version 12.1
 service timestamps debug datetime msec
 service timestamps log datetime msec
 no service password-encryption
 !
 hostname atlanta
 !
 !
 !
 !
 interface Ethernet0
 no ip address
 !
 interface Serial0/0
 ip address 172.16.1.1 255.255.255.240
 encapsulation frame-relay
 no fair-qeue
 interface Serial0/1
 ip address 192.168.5.1 255.255.255.252
 encapsulation ppp
 interface Serial0/2
 ip address 192.168.5.5 255.255.255.252
 encapsulation ppp
 ppp authentication chap
 interface Serial0/3
 ip address 192.168.5.9 255.255.255.252
 !
 !
 router rip
 version 2
 network 172.16.1.0
 network 192.168.0.0
 no auto-summary
 !
 line con 0
 exec-timeout 0 0
 transport input none
 line aux 0
 line vty 0 4
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                             19/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 no login
 !
end
 When the Atlanta router sends a packet and the Layer 2 address in the header is 501, what IP address will be placed in
 the packet header?
A) 172.16.1.4
     B) 172.16.1.2
     C) 172.16.1.1
D) 172.16.1.3
Explanation
 The IP address172.16.1.3 will be placed in the packet header if the Layer 2 address in the header is 501e. Line 1 of the
 output of the show frame-relay map command indicates that the DLCI associated with the IP address 172.16.1.3 is
 501. DLCI 501 is associated with the router in LA.
 The IP address 172.16.1.1 is the IP address assigned to the S0/0 interface on the Atlanta router as indicated by the
 output of the show run command below:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              20/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 interface Serial0/0
 ip address 172.16.1.1 255.255.255.240
 encapsulation frame−relay
 The IP address 172.16.1.2 is associated with DLCI 401, as shown in the output of the show frame-relay map
 command. DLCI 401 is associated with the router in NY.
 The IP address 172.16.1.4 is associated with DLCI 301, as shown in the output of the show frame-relay map
 command below. DLCI 301 is associated with the router in Dallas:
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe characteristics of network topology architectures
References:
Cisco > Support > Cisco IOS Wide-Area Networking Command Reference > frame-relay map
You wish to configure Secure Shell (SSH) support on your router so that incoming VTY connections are secure.
Which of the following commands must be configured? (Choose all that apply.)
A) ip access-group
D) ip domain-name
Explanation
 Secure Shell (SSH) provides a secure alternative to Telnet for remote management of a Cisco devices. Configuring
 SSH support on a Cisco router involves a minimum of three commands:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            21/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
      ip domain-name [domain-name]: configures the DNS of the router (global configuration mode)
      crypto key generate rsa: generates a cryptographic key to be used with SSH (global configuration mode)
      transport input ssh: allows SSH connections on the router's VTY lines (VTY line configuration mode)
 The transport input ssh command allows only SSH connectivity to the router and prevents clear-text Telnet
 connections. To enable both SSH and Telnet, you would use the transport input ssh telnet command.
 The ip access-group command is incorrect because this command is used to activate an access control list (ACL) on
 an interface and does not pertain to SSH.
 The service config command is incorrect because this command is used to automatically configure routers from a
 network server and does not pertain to SSH.
 Objective:
 IP Services
 Sub-Objective:
 Configure network devices for remote access using SSH
References:
 Cisco > Support > Technology Support > Secure Shell (SSH) > Troubleshooting TechNotes > Configure SSH on
 Routers and Switches > Document ID: 4145
A) Lightweight mode
   B) WGB
   C) Autonomous mode
D) Ad hoc mode
Explanation
 Lightweight access point protocol (LWAPP)-enabled access points operate in lightweight mode. LWAPP is a protocol
 used to allow centralized management of APs. The management components are removed from the APs, and a WLAN
 controller provides a single point of management. This controller coordinates WLAN access, managing the load on the
 APs and user movement between APs. Upon starting, an LWAPP-enabled access point must obtain an IP address. It
 can then discover the controller using DHCP, DNS, or a subnet broadcast. When multiple wireless controllers are
 detected by an AP, it chooses to associate with the controller that has the fewest existing associated APs.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            22/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Individually configured APs that operate without central management are operating in autonomous mode. This would be
 the opposite of lightweight mode, which is made possible by LWAPP. Autonomous access points can be upgraded to
 lightweight. If they are upgraded, they will only function in conjunction with a WLAN controller. Moreover, when an
 autonomous access point is upgraded to lightweight, the console port only provides read access to the unit.
 A wireless gateway bridge (WGB) is used to connect a computer without a wireless network card to a wireless network,
 but not separate WLANs. The WGB can connect up to eight computers to a WLAN. The WGB connects to the root AP
 through a wireless interface.
 Ad hoc is a WLAN mode used for peer-to-peer connectivity. Ad hoc mode allows wireless-enabled computers to
 communicate with each other without having an AP involved.
 Objective:
 Network Access
 Sub-Objective:
 Describe Cisco Wireless Architectures and AP modes
References:
 Cisco > Support > Technology Support > Wireless LAN (WLAN) > Troubleshooting TechNotes > Cisco Wireless
 Devices Association Matrix > Document ID: 19242 > LWAPP APs Association
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                23/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
show interfaces
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                24/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Based on this command, which interfaces on R2 will participate in OSPF? (Choose two.)
A) S3
   B) S1
   C) S2
D) E0
E) S0
Explanation
 The Serial0 and Serial1 interfaces will participate in OSPF. The network command uses a wildcard mask to describe
 the network and therefore the interfaces to be included. If an interface is in the network described by the network and
 mask, then it will participate in OSPF.
 The command R2(config-router)# network 192.168.10.0 0.0.0.63 area 0 describes a network that starts at
 192.168.10.0 and goes to 192.168.10.63 The octets with a 0 in the wildcard mask must match the octets of the
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            25/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 network statement exactly (192.168.10). The range of allowable values in the last octet starts where the network
 statement starts at 192.18.10.0. You will add the value in the last octet of the mask to arrive at the end point of the
 range, which is 192.168.10.63. Therefore, the range of allowable addresses is 192.168.10.1 - 192.168.10.62.
 The two interfaces that fall in the range are Serial0 (192.168.10.1) and Serial1 (192.168.10.60) as indicated by the
 output of the show ip interface brief command executed on R2:
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
Cisco Support > Cisco IOS IP Routing: OSPF Command Reference > network area
 You install a second NIC in your Linux computer. Then you log on to the computer as root. You want to configure the
 new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0.
Which command should you issue at a command prompt to configure the NIC?
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                 26/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 On a Linux computer, you would use the ifconfig command to configure a network interface card (NIC). The first NIC
 in a Linux computer is typically named eth0, and the second NIC is named eth1. Therefore, you should log on to the
 Linux computer as root, which is also known as the superuser, and issue the command ifconfig eth1 192.168.0.1
 netmask 255.255.255.0 up to configure the second NIC. The 192.168.0.1 portion of the command configures the IP
 address for the NIC, the netmask 255.255.255.0 portion of the command configures the subnet mask for the NIC,
 and the up portion of the command activates the NIC. A similar procedure would be used on a UNIX computer.
 The command ifconfig eth0 192.168.0.1 subnet 255.255.255.0 up is not properly configured; the command
 uses the term subnet rather than the proper term netmask, and the command would attempt to configure eth0 rather
 than eth1.
 The ipconfig command can be used on Microsoft computers to view the TCP/IP protocol stack, but ipconfig cannot
 be used to configure a NIC.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
References:
Which Cisco switch features are designed to work together to mitigate ARP spoofing attacks? (Choose two.)
A) DAI
B) 802.1x
C) Port security
D) DHCP snooping
Explanation
 Dynamic ARP inspection (DAI) and DHCP snooping are Cisco features designed to work together to mitigate Address
 Resolution Protocol (ARP) spoofing attacks. DAI validates ARP packets in a network. It determines the validity of an
 ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP snooping database. This
 capability protects the network from some man-in-the-middle attacks. The following global configuration command
 instructs the switch to intercept, log, and discard packets with invalid IP-to-MAC address bindings for the specified
 VLANs:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               27/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 When configuring DAI, ports are configured as either trusted or untrusted. DAI forwards all packets received on a
 trusted interface without checks but intercepts all packets on an untrusted port.
 DHCP snooping creates an IP address-to-MAC address database that DAI uses to validate ARP packets. It compares
 the MAC address and IP address in ARP packets and only permits the traffic if the addresses match. This eliminates
 attackers spoofing MAC addresses. The following command enables DHCP MAC address verification:
 DHCP Authorized ARP can also be used to mitigate ARP spoofing. When implemented, the server assigns an IP
 address to a client and creates a static mapping. The DHCP server then sends periodic ARPs to clients to make sure
 that the clients are still active. Clients respond with an ARP reply. Unauthorized clients cannot respond to these periodic
 ARPs. The unauthorized ARP responses are blocked at the DHCP server.
 DHCP snooping is also used to define ports as trusted for DHCP server connections. The purpose of DHCP snooping is
 to mitigate DHCP spoofing attacks. DHCP snooping can be used to determine what ports are able to send DHCP
 server packets, such as DHCPOFFER, DHCPACK, and DHCPNAK. It can also cache the MAC address-to-IP address
 mapping for clients receiving DHCP addresses from a valid DHCP server.
 Port security is a method of only permitting specified MAC addresses access to a switch port. This can be used to
 define what computer or device can be connected to a port, but it does not eliminate ARP spoofing.
 802.1x is a method of determining authentication before permitting access to a switch port. This is useful in restricting
 who can connect to the switch, but it does not inspect ARP packets.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
References:
 Cisco > Product Support > Switches > Catalyst 6500 Release 12.2SXF and Rebuilds Software Configuration Guide >
 Chapter: Dynamic ARP Inspection (DAI)
 Cisco > Product Support > Cisco IOS and NX-OS Software > Cisco IOS IP Addressing Services Command Reference
 > ip arp inspection vlan
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              28/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Which of the following concepts makes the deployment of automation and the programmability of networks possible?
A) APIs
B) SNMP
C) CLI
D) PXE
Explanation
 Application programming interfaces (APIs) make it possible to communicate beneficially with software in a system, both
 in interrogating the system and giving it directions.
 Simple Network Management Protocol (SNMP) has been used in the past to accomplish crude automation, but it is not
 as efficient or scalable as using APIs.
 The command line interface (CLI) is the classic method of communicating with devices, but it does not offer any
 significant automation capabilities.
 While a pre-execution environment (PXE) might be used to automate a system’s onboarding process, which could be a
 part of an automation process, it is not what makes the deployment of automation and programmability of networks
 possible.
 Objective:
 Automation and Programmability
 Sub-Objective:
 Explain how automation impacts network management
References:
PCskull > Business > 4 Business Process Automation Benefits and Its Impact
 You are the network administrator for your company. The Chief Technical Officer of the company is looking for a routing
 solution that satisfies the following requirements:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            29/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
A) Dynamic routing
B) Hybrid routing
   C) Public routing
   D) Static routing
Explanation
 The static routing technique matches the criteria given in this scenario. Static routing is a process of manually entering
 routes into a routing table. Static routes are not recommended for large networks because static routes are manually
 configured on the router. However, if a single link is used to connect an enterprise to an Internet Service Provider (ISP),
 then static routing is the best option.
 The dynamic routing option is incorrect because route updates consume bandwidth and overhead. While the scenario
 is not concerned with routing protocol overhead, it states that there should be no bandwidth consumption by route
 advertisements.
Hybrid routing and public routing are not valid routing techniques in Cisco terminology.
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify IPv4 and IPv6 static routing
References:
 Cisco > Support > Switches > Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide, Release 5.x >
 Chapter: Configuring Static Routing
 Cisco Press > Articles > Cisco Network Technology > General Networking > Cisco Networking Academy's Introduction
 to Routing Dynamically > Dynamic versus Static Routing
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                  30/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
show interfaces
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                31/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
R3 and R4 are not forming an OSPF adjacency. What is preventing this from happening?
Explanation
 The problem is that the hello and dead timer values do not match. Before two OSPF routers can form an adjacency,
 they must be set with matching hello and dead timers. R4 is set for Hello 10, Dead 30 and R3 is set for Hello 5,
 Dead 40. This can be seen in the output of the show ip ospf interface commands:
and
 The IP addresses are correct. The E0 interface on R4 and the E1 interface on R3 are both in the 10.10.10.0/24
 network.
The area numbers do match. They are both set for Area 0.
It is not required for the OSPF process IDs to match. They are locally significant only.
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                       33/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Cisco > Support > Technology Support > IP Routing > Technology Q&A > What Does the show ip ospf interface
 Command Reveal? > Document ID: 13689
 Recently you had a serious problem with a router and contacted TAC. They told you a core dump of the system would
 have been helpful in diagnosing the issue. You would like to configure the router to make a full copy of the memory
 image the next time the router experiences the type of issue that can generate a core dump.
A) HTTP
B) Flash disk
C) RCP
D) TFTP
Explanation
 A core dump cannot be sent to a location using HTTP. The four supported methods for dumping a copy of the router's
 memory image are:
      TFTP
      FTP
      RCP
      Flash disk
To use File Transfer Protocol (FTP) to configure a core dump, execute the following commands:
To use Trivial File Transfer Protocol (TFTP) to configure a core dump, execute the following commands:
To use remote copy protocol (RCP) to configure a core dump, execute the following commands:
Finally, to send a core dump to a Flash drive, execute the following commands:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             34/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 IP Services
 Sub-Objective:
 Describe the capabilities and function of TFTP/FTP in the network
References:
 Cisco > Support > Cisco IOS Basic System Management Command Reference > exception dumpCisco > Support >
 Cisco IOS Basic System Management Command Reference > exception protocolCisco > Support > Cisco IOS Basic
 System Management Command Reference > exception crashinfo file
A) SwitchA
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            35/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
B) SwitchB
Explanation
 SwitchA will become the root bridge. The bridge ID, also known as the switch ID, is used to elect the root bridge in a
 redundant network topology. The bridge ID has two components:
 The switch with the lowest bridge ID is selected as the root bridge. If the same priority number is configured on two or
 more switches in the network, the switch with the lowest MAC address will become the root. Bridge Protocol Data Units
 (BPDUs) communicate the details of the switch with the lowest bridge ID in the network. The election process for the
 root bridge takes place every time there is a topology change in the network. A topology change may occur due to the
 failure of a root bridge or the addition of a new switch in the network. The root bridge originates BPDUs every two
 seconds, which are propagated by other switches throughout the network. BPDUs are used as keepalives between
 switches, and if a switch stops receiving BPDUs from a neighboring switch for ten intervals (20 seconds), it will assume
 a designated role for the network segment.
 Neither SwitchB nor SwitchC will become the root bridge. Although both have an equal priority value to SwitchA
 (32768), the MAC addresses of SwitchB and SwitchC are higher than that of SwitchA.
 The root bridge can be determined with the information given. If the diagram did not indicate MAC addresses, then the
 root bridge would not be able to be determined, since the priorities are equal.
 Objective:
 Network Access
 Sub-Objective:
 Interpret basic operations of Rapid PVST+ Spanning Tree Protocol
References:
 Cisco > Support > Technology Support > Spanning Tree Protocol > Troubleshooting TechNotes > Understand and
 Configure STP on Catalyst Switches > Document ID: 5234
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             36/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
You need to configure a WLAN with WPA PSK security. On which configuration tab of the WLAN should you do this?
A) Security
B) QoS
C) Advanced
D) General
Explanation
 Enabling WPA PSK is done on the Security tab of the WLAN as shown below. The exact setting where this is specified
 is in the drop down box next to Auth Key Mgmt.
While the General tab is used to map WPA2 to an interface, as shown below, it is not where the PSK is specified.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                          37/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
The Advanced tab is where settings such as Management Frame Protection (MFP) is performed, as highlighted below:
The QoS tab is used to enable and manage QoS, as shown below:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                    38/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify WLAN within the GUI using WPA2 PSK
References:
 Cisco > Product Support > Wireless > Cisco Wireless LAN Controller Configuration Guide, Release 7.3 > Chapter:
 Using the Web-Browser and CLI Interfaces
C) Create VLANs.
Explanation
 Northbound APIs are used to communicate from network controllers to their management software. The software-
 defined networking (SDN) northbound interface is in the management plane and is used to manage the SDN controller,
 performing functions such as:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            39/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
      creating VLANs
      polling the health of the network
      obtaining a list of network devices
 The southbound interface, on the other hand, is used to send and receive information to and from the routers, switches,
 and APIs that are managed by the SDN controller. Communicating with network devices is the job of the southbound
 interface, not the northbound.
 Objective:
 Automation and Programmability
 Sub-Objective:
 Describe controller-based, software defined architecture (overlay, underlay, and fabric)
References:
 Cisco Learning Network > CCNA Certification Community > What is the difference between Northbound and
 Southbound Interfaces?
Cisco Press > Articles > Software-Defined Networking Security and Network Programmability
 Your company has a corporate-wide Windows Server network using the TCP/IP protocol. Several users are
 complaining that their computers are getting IP address conflicts.
Explanation
 A Dynamic Host Configuration Protocol (DHCP) server dynamically assigns IP addresses to DHCP clients. This
 ensures that each client receives a valid and unique IP address, preventing IP address conflicts.
 None of the other options is correct. Increasing the TCP window size can be used to help alleviate network bandwidth
 issue. Manually configuring the IP addresses on each computer is more likely to cause IP address conflicts. Changing
 the MAC address for each NIC may not be possible, depending on the configuration of the NIC. Even if you can change
 the MAC address, this will have no effect on IP address conflicts.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            40/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 IP Services
 Sub-Objective:
 Explain the role of DHCP and DNS within the network
References:
Microsoft Learn > Windows Server > Dynamic Host Configuration Protocol (DHCP)
 You are configuring Open Shortest Path First (OSPF) protocol for IPv6 on Router5. The router has two interfaces, which
 have been configured as follows:
S0/0 - 192.168.5.1/24
S0/1 - 10.0.0.6/8
 You would like OSPF to route IPv6 only on the S0/0 network. It should not route for IPv6 on the S0/1 network. The
 process ID you have chosen to use is 25. You do not want to apply an IPv6 address yet.
Which of the following command sets would enable OSPF for IPv6 as required?
   A) Router5(config)#ipv6 unicast-routing
       Router5(config)#ipv6 ospf 25
       Router5(config-rtr)#router-id 1.1.1.1
   B) Router5(config)#ipv6 ospf 25
       Router5(config)# network 192.168.5.0
   C) Router5(config)#ipv6 ospf 25
       Router5(config)#router-id 192.168.5.1
   D) Router5(config)#ipv6 unicast-routing
       Router5(config)#ipv6 router ospf 25
       Router5(config-rtr)#router-id 1.1.1.1
       Router5(config)#interface S0/0
       Router5(config-if)#ipv6 ospf 25 area 0
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            41/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Router5(config)#ipv6 unicast-routing
 Router5(config)#ipv6 router ospf 25
 Router5(config-rtr)#router-id 1.1.1.1
 Router5(config)#interface S0/0
 Router5(config-if)#ipv6 ospf 25 area 0
 The first line enables IPv6 routing with the ipv6 unicast-routing command. The second line enables OSPF routing for
 IPv6 with the ipv6 router ospf command. The third assigns a necessary router ID (which was chosen at random) with
 the router-id command. The last two lines enable OSPF for area 0 on the correct interface.
 The following command set is incorrect because it does not enable OSPF routing for IPv6, assign a necessary router
 ID, or enable OSPF for area 0 on the proper interface:
 Router5(config)#ipv6 ospf 25
 Router5(config)# network 192.168.5.0
 This command set also displays incorrect use of the network command. The network command would be used with
 OSPF v2.
 The following command set fails to enable OSPF routing for IPv6, assign a necessary router ID, or enable OSPF for
 area 0 on the correct interface:
 Router5(config)#ipv6 ospf 25
 Router5(config)#router-id 192.168.5.1
 It also assigns the router ID under global configuration mode, rather than under router ospf 25 configuration mode
 as required.
The following command set fails to enable OSPF for area 0 on the proper interface:
 Router5(config)#ipv6 unicast-routing
 Router5(config)#ipv6 ospf 25
 Router5(config-rtr)#router-id 1.1.1.1
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
Cisco > Support > Cisco IOS IPv6 Command Reference > ipv6 unicast-routing
Cisco > Support > Cisco IOS IPv6 Command Reference > ipv6 ospf area
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                       42/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
D) show ip trust
Explanation
 The command show ip dhcp snooping is used to verify trusted DHCP ports. This command is used to verify which
 ports are intended to have DHCP servers connected to them.
 DHCP snooping creates an IP address to MAC address database that is used by Dynamic ARP Inspection (DAI) to
 validate ARP packets. It compares the MAC address and IP address in ARP packets, and only permits the traffic if the
 addresses match. This eliminates attackers that are spoofing MAC addresses.
 DHCP snooping is used to define ports as trusted for DHCP server connections. The purpose of DHCP snooping is to
 mitigate DHCP spoofing attacks. DHCP snooping can be used to determine what ports are able to send DHCP server
 packets, such as DHCPOFFER, DHCPACK, and DHCPNAK. DHCP snooping can also cache the MAC address to IP
 address mapping for clients receiving DHCP addresses from a valid DHCP server.
MLS QOS has no bearing on DHCP services, so show mls qos is not correct.
The other commands are incorrect because they have invalid syntax.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
References:
 Cisco > Product Support > Cisco IOS and NX-OS Software > Cisco IOS IP Addressing Services Command Reference
 > show ip dhcp snooping
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            43/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
A) Private VLAN
B) Port security
C) VACL
D) 802.1x
Explanation
802.1x requires AAA to be configured on the switch. 802.1x uses AAA authentication to control access to the port.
 Objective:
 Network Access
 Sub-Objective:
 Describe network device management access (Telnet, SSH, HTTP, HTTPS, console, TACACS+/RADIUS, and cloud
 managed )
References:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            44/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 According to the diagram, which of the following route types would be advisable to configure on the ISP router with
 respect to the LAN connection?
A) Static route
C) RIP
D) Default route
Explanation
 The best solution would be a static route that summarizes all of the networks in the LAN and points to the WAN
 interface of R1. This configuration would prevent the ISP router from needing a route to all subnets in the company
 LAN, thereby reducing the size of its routing table.
 A default route would not be advisable on the ISP router with respect to its connection to the LAN. Default routes should
 be used to reduce the entries in the routing table in the following instances:
      The network contains a stub router, which is a router that has a single connection to the rest of the network
      whereby all traffic must go in that direction regardless of the network.
      The network contains a router that acts as the connection to the Internet or ISP for the network.
 In either case, the purpose of a default route is to leverage the fact that all traffic must go in a certain direction,
 regardless of its destination. Placing a default route in the table ensures that traffic destined for a network not in the
 routing table is automatically sent in this direction, which eliminates the need for specific routes to all destinations.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                    45/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 A gateway of last resort is created when you set a default route in a router. Therefore, if the ISP router does not need a
 default route, it does not need a gateway of last resort.
 A RIP route should not be placed on the ISP router. RIP is an interior gateway protocol (IGP). ISP routers and other
 routers on the Internet use exterior gateway protocols (EGP) such as BGP.
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify IPv4 and IPv6 static routing
References:
Explanation
 A converged network is a combination of voice, video, and data traffic. Network convergence is a migration from
 maintaining multiple service-specific networks, namely data, voice, and video, to a single IP-based network. All services
 are delivered on the same network, reducing infrastructure costs. Despite the benefits that network convergence
 provides, it is highly susceptible to network delays, especially for real-time traffic.
      Bandwidth: As all the voice and video networks are combined into one universally converged network, bandwidth
      capacity becomes a priority.
      Packet loss: When links become congested, packets will be dropped. Voice and video traffic are intolerant of
      dropped packets.
      Delay: Delay represents the time it takes for packets to traverse the network and reach their destinations. While
      some delay is expected, delay increases when links are over-subscribed.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                46/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Voice and video traffic are intolerant of high or variable delays. A packet that arrives late is no better than a packet that
 does not arrive. Delays can be variable or fixed.
 Fixed delays are constant and mostly induced by the computing software of the hardware devices, such as processing
 delays and packetization delay.
Variable delays, known as jitter, cause problems for voice and video.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe characteristics of network topology architectures
References:
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                    47/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
[output omitted]
Given:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                48/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Review the output provided on SW2 for the EtherChannel configuration between SW1 and SW2. Which column is used
 to indicate the physical interface in the bundle that will be used for a specific flow of traffic?
A) Load
B) Port
C) Index
D) EC State
Explanation
 The Load column has hex values that will be decoded into binary by the switch to determine which specific physical
 interface in the bundle should be used by a specific traffic flow. The choice of interface will also be influenced by the
 load-balancing algorithm being used by the switch, which is configurable.
 The Index column simply indicates the number given to each physical interface in the bundle. It has no meaning with
 respect to choosing a physical link by a flow.
The Port column specifies the interface ID of each physical interface in the bundle.
The EC State column indicates the operational status of each physical interface in the bundle.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               49/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 Network Access
 Sub-Objective:
 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
References:
 Cisco > Support > Technology Support > EtherChannel > EtherChannel Between Catalyst 3550/3560/3750 Series
 Switches and Catalyst Switches Running Cisco IOS System Software Configuration Example > Document ID: 12033
 You are creating a wireless network for your company. You need to implement a wireless protocol that provides
 maximum security while providing support for older wireless clients.
Explanation
 You should implement WPA. WPA was created to fix core problems with WEP. WPA is designed to work with older
 wireless clients while implementing the 802.11i standard. WAP is the default protocol used by most wireless networks
 and devices. However, because WAP can access Web pages and scripts, there is great opportunity for malicious code
 to damage a system. WAP does not provide maximum security. It is considered the weakest wireless protocol.
 WPA3 is more secure than WPA or WPA2 but it cannot support older wireless clients. While WPA2 was a significant
 increase in security over WPA, WPA3 makes additional improvements over WPA2, including:
      WPA3-Personal, unlike WPA2-Personal which uses pre-shared keys (passphrases), utilizes a process called
      Simultaneous Authentication of Equals (SAE) in which the station and access point authenticate one another by
      proving to each other that they have a key. This produces a master key (PMK) which, while shared between the
      two, is never sent. So, should a hacker capture the packets used, the original key or the generated master key
      cannot be derived.
      WPA3-Enterprise includes a new 192-bit security level based on the NSA’s requirements for environments requiring
      greater security. It also only allows GCMP-256 encryption.
 WEP is the security standard for wireless networks and devices that use encryption to protect data. However, WEP
 does have weaknesses and is not as secure as WPA or WPA2. WPA2 implements the 802.11i standard completely.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             50/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Therefore, it does not support the use of older wireless cards. Identification and WPA2 are considered the best
 combination for securing a wireless network.
 There are three versions of WPA: WPA, WPA2, and WPA3. WPA uses Temporal Key Integrity Protocol (TKIP) for
 encryption. WPA2 uses CCM Mode Protocol (CCMP) for encryption. WPA, WPA2 and WPA3 can operate in two modes:
 Personal and Enterprise. Because CCMP uses AES, TKIP is considered weaker than CCMP. The Personal mode uses
 a 256-bit key and is referred to as WPA-Personal or WPA-Pre-shared Key (WPA-PSK) and WPA2-Personal or WPA2-
 PSK, depending on which version of WPA you implement. The Enterprise mode is designed for enterprise networks and
 uses Extensible Authentication Protocol (EAP) for authentication. This mode is referred to as WPA-Enterprise or WPA-
 802.1x and WPA2-Enterprise or WPA2-802.1x, depending on which version of WPA you implement. WPA-Enterprise is
 more secure than WPA2-PSK.
 If you need to implement a secure wireless authentication method that uses a remote RADIUS server for
 authentication, you should implement Lightweight Extensible Authentication Protocol (LEAP) or Protected Extensible
 Authentication Protocol (PEAP). Of these two protocols, PEAP is considered the most secure.
 When deploying a WPA2-Enterprise wireless network, you will need to install a digital certificate on the authentication
 server. When choosing between PSK, Enterprise, and Open modes, the highest security is offered by Enterprise. The
 next highest is PSK. You should never choose Open mode because it provides no security whatsoever.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Describe wireless security protocols (WPA, WPA2, and WPA3)
References:
What attack can be prevented by keeping the native VLAN of the trunk ports different from the user VLANs?
A) Steganography
B) Data exfiltration
C) Double tagging
D) Masquerading
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            51/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Double tagging is an attack that allows a malicious individual to access a VLAN for which they are not a member.
 Double-tagging attacks can be prevented by changing the native VLAN on all trunk ports to an unused VLAN ID.
 Steganography is not an attack and cannot be prevented by keeping the native VLAN of the trunk ports different from
 the user VLANs. Steganography is the process of removing bits of information from a graphic and replacing it with data
 that you want to hide. This swapping does not typically have a noticeable effect on the graphic but allows the sender to
 hide data that can be extracted later by means of the same application used to insert it into the graphic. The best
 defense against steganography is to periodically scan PCs for questionable software. The presence of steganography
 software on any system should be prohibited unless it is specifically required for business purposes.
 Data exfiltration is the extracting of data from a network in an unauthorized manner and cannot be prevented by
 keeping the native VLAN of the trunk ports different from the user VLANs. Its behavior can be discovered with data loss
 prevention (DLP) software, if present. If it is not present, data exfiltration may only be reported when it falls into the
 wrong hands. When it occurs, the best course of action is to identify the source of the disclosure if possible and then
 take disciplinary action.
 Masquerading is the process of pretending to be another and cannot be prevented by keeping the native VLAN of the
 trunk ports different from the user VLANs. The term also refers to the process where a single public IP address is used
 by all interior devices when accessing the Internet. This is done by deploying network address translation (NAT).
 Objective:
 Network Access
 Sub-Objective:
 Configure and verify interswitch connectivity
References:
 You are considering an implementation of WPA on your WLAN using the GUI. Which of the following versions requires
 a RADIUS server and uses TKIP encryption?
A) WPA-Enterprise
B) WPA3-Personal
C) WPA2-Personal
D) WPA PSK
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                    52/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 WPA-Enterprise requires a RADIUS server and uses TKIP encryption. There are three versions of WPA: WPA, WPA2,
 and WPA3. Moreover, the three versions can be run in two modes, Personal and Enterprise.
The following table describes the characteristics of WPA, WPA2, and WPA3 as they operate in the two modes:
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify WLAN within the GUI using WPA2 PSK
References:
TechTarget > Networking > Wireless security: WEP, WPA, WPA2 and WPA3 differences
 Which of the following features is used with the ip nat inside command to translate multiple devices in the internal
 network to a single address in the IP address pool?
A) Static
B) Overload
C) Override
D) Dynamic
Explanation
 The overload keyword, when specified with the ip nat inside command, translates multiple devices in the internal
 network to a single address in the IP address pool.
For example:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                             53/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 In this example, the NAT pool named "test" only has a range of one address. Another variation of this command is as
 follows:
 This command configures NAT to overload on the address assigned to the serial 0 interface. When this variation is
 used, the command uses a list named “3” to determine the addresses in the pool
 With static NAT, translation mappings are created statically and are placed in the translation tables regardless of
 whether there is traffic flowing.
 With dynamic NAT, the translation mappings table is populated as the required traffic flows through NAT-enabled
 devices.
 Objective:
 IP Services
 Sub-Objective:
 Configure and verify inside source NAT using static and pools
References:
 Cisco > Support > Technology Support > IP Addressing Services > Troubleshooting TechNotes > Configure Network
 Address Translation > Document ID: 13772 > Quick Start Steps to Configure and Deploy NAT
 Cisco > Support > Cisco IOS and NX-OS Software > Cisco IOS IP Addressing Services Command Reference > ip nat
 source
Which of the following are types of Internet Protocol version 6 (IPv6) addresses? (Choose three.)
A) Anycast
B) Unicast
C) Multicast
D) Dual-cast
E) Broadcast
Explanation
 Unicast addresses are used to define a single destination interface. A packet sent to a unicast address is delivered to
 the specific interface.
 Multicast addresses are used to define a group of hosts. When a packet is sent to a multicast address, it is delivered to
 all the hosts identified by that address. Multicast addresses begin with the prefix FF00::/8 and the second octet
 identifies the range over which the multicast address is propagated. Some special case IPv6 multicast addresses are:
 Anycast addresses are used to identify a set of devices. These addresses are also assigned to more than one interface
 belonging to different nodes. A packet sent to an anycast address is delivered to just one of the interfaces, based on
 which one is closest. For example, if an anycast address is assigned to a set of routers, one in India and another in the
 U.S., the users in the U.S. will be routed to U.S. routers and the users in India will be routed to a server located in India.
 The broadcast option is incorrect because these types of addresses are not supported by IPv6. Broadcast functionality
 is provided by multicast addressing.
The dual-cast option is incorrect because this is not a valid Cisco address type.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe IPv6 address types
References:
Cisco Press > Articles > IPv6 Address Representation and Address Types
 You need to ensure that your company's security awareness training includes examples of social engineering attacks.
 Which of the following is an example of a social engineering attack?
A) A Trojan horse
B) A backdoor
C) An e-mail hoax
D) A logic bomb
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                55/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 An e-mail hoax is also referred to as a social engineering attack. An e-mail hoax is an e-mail message that contains a
 false warning about a potential virus infection. As well-meaning users forward an e-mail hoax to other users, resulting in
 increased e-mail traffic that can seriously deplete the amount of bandwidth available on a network. Most network-bound
 viruses are spread by e-mail. Hoaxes target a broad set of victims. While e-mail hoaxes work through forwarding, social
 media hoaxes work through sharing on your social media site. An example is a social media post to a fake free software
 link or to a video. In most cases, the object is to obtain the victim's contact list.
 A logic bomb is a program that is designed to destroy network resources when a specified event occurs. A backdoor is
 an unguarded pathway into a network. A Trojan horse is a program that seems innocuous but contains malicious code
 that can damage network resources or provide hackers with a pathway into a network.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
References:
Email Hoax
Which of the following commands will configure a router to use DNS for hostname resolution?
A) ip dns server
B) ip name-server
C) ip dns primary
D) ip domain lookup
Explanation
 The ip domain lookup command configures the device to use DNS for hostname resolution. It must be accompanied
 by a command that specifies the location of the DNS server, which is done with the ip name-server command.
 The ip dns primary command is used to configure the device as the primary DNS name server for a domain (zone)
 and as the Start of Authority (SOA) record source, which designates the start of a zone.
The ip dns server command is used to make the device a DNS server.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             56/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 IP Services
 Sub-Objective:
 Explain the role of DHCP and DNS within the network
References:
Cisco > Support > IP Addressing: DNS Configuration Guide, Cisco IOS Release 15M&T > Chapter: Configuring DNS
   A) Router
   B) Controller
C) Switch
D) DNA center
Explanation
The Cisco DNA center can offload a number of functions from the controller(s). These include:
Policy
Design
Provisioning
Assurance.
 When using Cisco DNA Center-enabled device management, the controllers, under the direction of the Cisco DNA
 center, manage the physical devices (routers, switches, etc.)
 Objective:
 Automation and Programmability
 Sub-Objective:
 Recognize the capabilities of configuration management mechanisms such as Ansible and Terraform
References:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            57/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Cisco > Products & Services > Cloud and Systems Management > Cisco Catalyst Center > Data Sheets > Cisco DNA
 Center 2.3.5 Data Sheet
 Which protocol allows the network to fully utilize standby routers in a redundancy group without additional
 administrative burden?
A) VRRP
B) GLBP
C) IRDP
D) HSRP
Explanation
 Gateway Load Balancing Protocol (GLBP) allows the network to fully utilize standby routers in a redundancy group.
 Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple gateways. It also allows for
 router load balancing from a segment without using different host configurations as in HSRP.
 Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) provide gateway redundancy,
 but only one router in a group can forward traffic for a redundancy group. The bandwidth and resources associated with
 the non-actively forwarding routers are wasted. GLBP allows this wasted bandwidth and resources to be utilized by
 providing automatic selection and the use of multiple available gateways to destinations.
 ICMP Router Discovery Protocol (IRDP) is an extension of the Internet Control Message Protocol (ICMP) that allows
 routers to advertise useful routes. IRDP does not require hosts to recognize routing protocols, nor does it require
 manual configuration.
 Objective:
 IP Connectivity
 Sub-Objective:
 Describe the purpose, functions, and concepts of first hop redundancy protocol
References:
 Cisco > Products and Services > Cisco IOS and NX-OS Software > Cisco GLBP Load Balancing Options > Document
 ID: 1474267833434262
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             58/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
In the given exhibit, which combination shows the components of a bridge ID used for Spanning Tree Protocol (STP)?
A) 3
B) 2
   C) 1
   D) 4
Explanation
 The bridge ID, also known as the switch ID, is used to elect the root bridge in a redundant network topology. The bridge
 ID has two components:
 The switch with the lowest bridge ID is elected as the root bridge. If the same priority number is configured on two or
 more switches in the network, the switch with the lowest MAC address will become the root.
 Bridge Protocol Data Units (BPDUs) communicate the details of the switch with the lowest bridge ID in the network. The
 election process for the root bridge takes place every time there is a topology change in the network. A topology change
 may occur due to the failure of a root bridge or the addition of a new switch in the network. The root bridge originates
 BPDUs every two seconds, which are propagated by other switches throughout the network. BPDUs are used as
 keepalives between switches. If a switch stops receiving BPDUs from a neighboring switch for ten intervals (20
 seconds), it will assume a designated role for the network segment.
 The combinations of the remaining options are incorrect because Virtual LAN (VLAN) numbers and serial numbers are
 not components of a bridge ID.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              59/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 Network Access
 Sub-Objective:
 Interpret basic operations of Rapid PVST+ Spanning Tree Protocol
References:
Spanning Tree Protocol – Part 3: Bridge ID, Priority, System ID Extension & Root Bridge Election Process
 When Workstation 1 sends a packet to the FTP server, in how many different frames will the packet be encapsulated as
 it is sent across the Internetwork?
A) 4
B) 3
C) 2
D) 1
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            60/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Explanation
 Since Workstation 1 and the FTP server are in the same network (the 10.6.5.0/24 network), Workstation 1 will
 encapsulate the packet in a frame with its own MAC address in the source MAC address field. It will place the MAC
 address of the FTP server (which it will learn via an ARP broadcast) in the destination MAC address field. Then the
 frame will be transferred through the switch with no changes to the FTP server. Therefore, in this instance it will use a
 single frame.
 Multiple frames are only used when the packet needs to cross routers on its way to the destination. Although the source
 and destination IP addresses remain the same regardless of the number of routers the packet crosses, each router will
 change the source MAC address field to the MAC address of its sending interface and the destination MAC address to
 the MAC address of the next hop router. Each time this is done, a new frame is created.
For example, if Workstation 1 sent a packet to Server 20, three frames would be created as follows:
The switches will change neither field but will simply switch the frame to the port where the MAC address is located.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe switching concepts
References:
Which of the following APIs is used to communicate from a network controller to its appropriate management software?
A) JSON
B) Northbound API
C) None of these
D) Southbound API
Explanation
 Northbound APIs are used to communicate from network controllers to their management software.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              61/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 When management software makes changes to component configurations, southbound APIs push the changes to the
 actual components, such as switches, routers, and wireless access points. The communication travels in the opposite
 direction to northbound APIs.
 JSON is an incorrect option. JavaScript Object Notation (JSON) is a data format used with APIs but is not an API itself.
 It is an easier format to work with than eXtensible Markup Language (XML). JSON stores data in key-value pairs. Each
 JSON object begins and ends with curly braces {}, as indicated below:
 {
     “type”:           “Cisco ASR 2001-X Router”,
     “family”:            “Routers”,
     “location”:             “Eternia”
 }
 In the example above, you can see that JSON allows data to be stored as a key (type) with an associated value (Cisco
 ASR 2001-X Router).
 Application programming interfaces (APIs) allow you to communicate with and configure a network. You use APIs to
 access various components of a network using software and can configure them if required. Two commonly used APIs
 when working with Cisco networks are northbound and southbound APIs. The following illustrates how they operate:
[APPLICATIONS]
↑↓ Northbound APIs
[CONTROLLERS]
↑↓ Southbound APIs
[DATA PLANE]
 The Cisco Catalyst Center (formerly the Cisco DNA Center) provides a graphical user interface (GUI) that allows you to
 manage network controllers. When you log into a network controller using the GUI in order to manage the network, the
 information exchange is done using a northbound REST-based API.
 Objective:
 Automation and Programmability
 Sub-Objective:
 Describe controller-based, software defined architecture (overlay, underlay, and fabric)
References:
Cisco Catalyst Center Platform APIs and Integrations Overview. - Cisco Catalyst Center 2.3.7 - Cisco DevNet
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           62/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Foundation Topics: Introduction to Software-Defined Networking > Software-Defined Networking Security and Network
 Programmability | Cisco Press
In the network exhibit below, the routers are running OSPF and are set to the default configurations.
What would be the effect of configuring a loopback interface on RouterA with an address of 192.168.1.50/24?
Explanation
 Configuring a loopback interface on RouterA with an address of 192.168.1.50/24 would cause RouterA to become the
 designated router (DR). The DR is determined by the router with the highest interface priority number. If the priority
 numbers are tied, then the router with the highest router ID (RID) becomes the DR.
 The default priority number is 1 and can be configured as high as 255. Changing the priority to 0 would make the router
 ineligible to become the DR or the backup designated router (BDR). The ip ospf priority # command is used to
 manually configure a priority on a specific interface.
 Router IDs are determined first by the highest loopback IP address, followed by the highest IP address on an active
 physical interface. Thus, in the case of a priority tie, the router with the highest loopback IP address will have the
 highest RID and will become the DR for the network segment.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                63/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The current Router ID for a router can be determined by executing the show ip interface brief command. In the
 sample output of the show ip interface brief command below, the RID will be 10.108.200.5.
 Neither RouterB nor RouterC will be the DR because the IP addresses on their physical interfaces are lower than
 192.168.1.50/24.
RouterA will not be the backup designated router. Since it is the DR, it cannot also be the BDR.
RouterC will not be the BDR because its IP address is lower than that of RouterB. RouterB will be the BDR.
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Understand Open Shortest Path
 First (OSPF) - Design Guide > Document ID: 7039 > DR Election
 A server on your network contains several virtual servers. However, it contains a single NIC. Which statement MOST
 likely describes the communication from this server?
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            64/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Explanation
 When a server contains several virtual servers with a single network interface card (NIC), it is most likely to transmit
 data from multiple IP addresses. It could also transmit data from a single IP address, but with each virtual server using
 a different port number.
 This server does not transmit data from multiple MAC addresses. Because a MAC address is the physical address for
 the NIC, this server only uses a single MAC address.
 Virtual servers can be implemented using either IPv4 or IPv6. The number of NICs used in a virtual server has no effect
 on which IP version should be used.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Explain virtualization fundamentals (server virtualization, containers, and VRFs)
References:
 You have been asked to troubleshoot the NTP configuration of a router named R70. After executing the show run
 command, you receive the following partial output of the command that shows the configuration relevant to NTP:
A) The time zone is set to 8 hours less than Pacific Standard time.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               65/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Explanation
 The router will send NTP broadcasts on its E0/0 interface. The command ntp broadcast, when executed under an
 interface, instructs the router to send NTP broadcast packets on the interface. Any devices on the network that are set
 with the ntp broadcast client command on any interface will be listening for these NTP broadcasts. While the clients
 will not respond in any way, they will use the information in the NTP broadcast packets to synchronize their clocks with
 the information.
 The time zone is not set to 8 hours less than Pacific Standard Time. The value “-8” in the command clock timezone
 PST -8 represents the number of hours of offset from UTC time, not from the time zone stated in the clock timezone
 command.
 The router will not listen for NTP broadcasts on the interface E0/0. The ntp broadcast command, when executed under
 an interface, instructs the router to send NTP broadcast packets on the interface. To set the interface to listen and use
 NTP broadcasts, you would execute the ntp broadcast client command on the interface.
 The router will not periodically update its software clock. The command ntp update-calendar configures the system to
 update its hardware clock from the software clock at periodic intervals.
 Objective:
 IP Services
 Sub-Objective:
 Configure and verify NTP operating in a client and server mode
References:
Cisco > Support > Setting Time and Calendar Services > Configuring NTP
Which of the following is NOT true of the impact of automation on network management?
Explanation
 The automation of certain tasks can remove the personal touch, which many users prefer. For example, while an
 automatic password reset process may reduce time spent by technicians performing this process, it may also lead to
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             66/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 It is true that the use of automation, especially when applied to security functions, can lead to complacency on the part
 of technicians.
 It is also true that automation can reduce costs, but that is not always a given. Analyzing and confirming cost reductions
 should occur before deployment.
 As automation eliminates the need for certain tasks to be performed manually, IT roles may require changes when
 automation is introduced.
 Objective:
 Automation and Programmability
 Sub-Objective:
 Explain how automation impacts network management
References:
PCskull > Business > 4 Business Process Automation Benefits and Its Impact
Below is the output of the show ip route command from one of your routers:
R66#show ip route
 .....
 1.0.0.0/30 is subnetted, 4 subnets
 C 1.1.1.0 is directly connected, FastEthernet0/1
 O 1.1.1.4 [110/2] via 1.1.1.2, 00:10:04, FastEthernet0/1
 O 1.1.1.8 [110/2] via 1.1.1.13, 00:10:04, FastEthernet0/0
 C 1.1.1.12 is directly connected, FastEthernet0/0
 172.16.0.0/24 is subnetted, 4 subnets
 C 172.16.0.0 is directly connected, Ethernet0/0/0
 O 172.16.1.0 [110/11] via 1.1.1.2, 00:10:04, FastEthernet0/1
 O 172.16.2.0 [110/12] via 1.1.1.13, 00:09:24, FastEthernet0/0
  [110/12] via 1.1.1.2, 00:09:24, FastEthernet0/1
 O 172.16.3.0 [110/11] via 1.1.1.13, 00:10:04, FastEthernet0/0
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             67/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
C) EIGRP cost
D) OSPF cost
Explanation
 The value “110” represents the administrative distance of the route, which in this case was learned by OSPF. OSPF
 routes are always indicated by an “O” to the left of the route details. The two values in brackets in each route entry
 indicate the administrative distance on the left of the forward slash. The value to the right of the slash is the cost of the
 route. Therefore, [110/2] represents an administrative distance of 110 and a cost of 2.
 The value of “110” does not represent EIGRP administrative distance because the route was not learned from EIGRP. If
 it were, the route would have a “D” to the left of the route details. Moreover, the default administrative distance of EIGRP
 is 90, not 110.
 The values do not represent OSPF cost. The cost value is on the right side of the forward slash within the brackets in
 each route entry. For example, the route entry O              1.1.1.4 [110/2] via 1.1.1.2, 00:10:04, FastEthernet0/1
 indicates an OSPF cost of 2.
 The values do not represent an EIGRP cost. First, if it were an EIGRP route, the route would have a “D” to the left of the
 route details. Moreover, the cost value is located within the square brackets to the right of the forward slash in each
 route entry. The only cost values shown in the table are 2, 11, and 12.
 Objective:
 IP Connectivity
 Sub-Objective:
 Interpret the components of routing table
References:
Cisco > Support > Cisco IOS IP Routing: Protocol-Independent Command Reference > show ip route
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > What is Administrative Distance? >
 Document ID: 15986
Which of the following commands sets the local router to serve as an authoritative time source?
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                 68/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
A) ntp server
B) ntp peer
C) ntp master
D) ntp authenticate
Explanation
The ntp master command sets the local router to serve as an authoritative time source.
 The ntp server command is used to specify an external time source that the local router should use as its time
 source.
 The ntp authenticate command is used to enable the authentication of time source to which the local router has
 been configured to use. It is the first step in a process that must also include the specification of a hashing algorithm
 and a key, both of which must match on the time source.
 The ntp peer command is used to configure the local router to synchronize a peer or to be synchronized by a peer. It
 does not make the local router authoritative as a time source like the ntp master command does.
 Objective:
 IP Services
 Sub-Objective:
 Configure and verify NTP operating in a client and server mode
References:
Cisco > Support > Cisco IOS Basic System Management Command Reference > ntp master
 Two Catalyst switches on a LAN are connected to each other with redundant links and have Spanning Tree Protocol
 (STP) disabled. What problem could occur from this configuration?
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               69/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The configuration in the scenario may cause broadcast storms. When there are redundant links between two switches,
 it is recommended that you enable Spanning Tree Protocol (STP) to avoid switching loops or broadcast storms. Loops
 occur when there is more than one path between two switches. STP allows only one active path at a time, thus
 preventing loops. A broadcast storm occurs when the network is plagued with constant broadcasts. When the switches
 have redundant links, the resulting loops would generate more broadcasts, eventually resulting in a complete blockage
 of available bandwidth that could bring the entire network down. This situation is referred to as a broadcast storm.
 The option stating that all ports on both switches may change to a forwarding state is incorrect. Forwarding is a port
 state that is available when using STP. When STP is disabled, the switch cannot change the STP states of its ports.
 The option stating that the switches will not forward VLAN Trunking Protocol (VTP) information is incorrect. Enabling or
 disabling STP does not have a direct effect on VTP messages.
 Objective:
 Network Access
 Sub-Objective:
 Interpret basic operations of Rapid PVST+ Spanning Tree Protocol
References:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                70/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
A) show ip process
C) show ip route
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                             71/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
D) show ip protocols
Explanation
 The show ip protocols command is used to view the current state of active routing protocols. This command is issued
 from Privileged EXEC mode. It has the following syntax:
 The output was not produced by the command show ip process or the show ip routing process. The show ip
 routing process and show ip process commands are incorrect because these are not valid Cisco IOS commands.
 The output was not produced by the command show ip route. The show ip route command is used to view the
 current state of the routing table. An example of its output is shown below:
 router>show ip route
 Codes: C - connected O - OSPF i - IS-IS
 S - static IA - inter area L1 - level-1
 B - BGP E1 - external type 1 L2 - level-2
 E2 - external type 2
 * - candidate default
 m - route's metric
 w - route's weight
 S 0.0.0.0/0 directly connected to null 0
 C 6.1.1.64/28 directly connected to ethernet 1
 C 6.1.1.80/28 directly connected to ethernet 2
 C 6.1.1.96/28 directly connected to ethernet 3
 C 6.1.1.112/28 directly connected to ethernet 4
 S 11.1.0.0/16 via 10.5.0.1 [w:0 m:0]
 C 11.5.0.0/16 directly connected to ethernet 0
 S 127.0.0.0/8 directly connected to null 0
 Objective:
 IP Connectivity
 Sub-Objective:
 Interpret the components of routing table
References:
Cisco > Support > Cisco IOS IP Routing: Protocol-Independent Command Reference > show ip protocols
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                      72/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 You administer your company's 100Base-TX Ethernet network. TCP/IP is the networking protocol used on the network.
 You want the routers on the network to send you notices when they have exceeded specified performance thresholds.
Which protocol should you use to enable the routers to send the notices?
A) SNMP
B) SMTP
   C) Telnet
   D) ARP
Explanation
 You would use Simple Network Management Protocol (SNMP) to enable the routers to notify you when they exceed
 specified performance thresholds. SNMP is a protocol in the TCP/IP protocol suite that enables the collection of data
 about various devices connected to a TCP/IP network, including bridges, hubs, and routers. Each SNMP-compatible
 device has a Management Information Base (MIB) database that defines the type of information that can be collected
 about the device. You can also configure SNMP traps to analyze network performance and network problems. A trap is
 a message that an SNMP-compatible device sends when the device has exceeded a performance threshold. You can
 configure SNMP to send traps to the network management software you are using, to your e-mail address, or to
 another destination.
 SNMP works at the Application layer of the OSI model. SNMP monitors are pieces of software that actually monitor
 managed devices. This software must be applied at the device level.
 Address Resolution Protocol (ARP) is used on a TCP/IP network to resolve IP addresses to media access control
 (MAC) addresses. TCP/IP uses IP addresses to identify hosts, whereas Ethernet uses MAC addresses to identify
 network nodes. For Ethernet and TCP/IP to interoperate, a host's IP address must be resolved to a MAC address. You
 cannot use ARP to notify you when network devices have exceeded performance thresholds. ARP works at the
 Network layer of the OSI model.
 Simple Mail Transfer Protocol (SMTP) is used to transfer e-mail messages from e-mail clients to e-mail servers. SMTP
 is also used to transfer e-mail messages between e-mail servers. SMTP will not send traps when network devices have
 exceeded performance thresholds. SMTP works at the Application layer of the OSI model.
 Telnet is a terminal emulation protocol. You can use Telnet to establish a remote session with a server and to issue
 commands on a server. Telnet client software provides you with a text-based interface and a command line from which
 you can issue commands on a server that supports the Telnet protocol. Telnet will not send notices when network
 devices have exceeded established performance thresholds. Telnet works at the Application layer of the OSI model.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              73/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 IP Services
 Sub-Objective:
 Explain the function of SNMP in network operations
References:
Explanation
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            74/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 An IP address needs to be configured on the FastEthernet interface. Dynamic Host Configuration Protocol (DHCP) is
 used to dynamically provide IP network configurations to workstations as they are booted up. DHCP minimizes network
 administration overload, allowing devices to be added to the network with little or no manual configuration.
 The router configuration in the scenario has created a DHCP address pool called POOLNAME. The network statement in
 the exhibit, network 10.2.10.0 255.255.255.0, identifies the range of IP addresses that the pool will provide to host
 systems (10.2.10.0 /24). However, a DHCP pool can only provide IP addresses over a subnet to which it is directly
 connected. Because neither of the interfaces in the exhibit has an IP address on the 10.2.10.0 /24 subnet, the solution
 is to assign the FastEthernet0/0 interface the IP address specified in the default-router statement, 10.2.10.254 /24.
The IP address on the serial interface has no impact on the DHCP pool.
 The default-router statement is correctly providing the IP address that DHCP hosts will use as their default gateway.
 The problem is not with the default-router statement, but with the lack of a correct IP address assigned to the
 FastEthernet0/0 interface.
 The NAT configuration in the exhibit has no impact on the DHCP pool. If the NAT pool were not large enough, the result
 would be that some of the hosts would be able to get to the Internet and others would not. For example, the output
 shown below indicates that there are fourteen addresses in the pool (205.2.1.1 to 205.2.1.14). If the network contained
 30 computers, only fourteen would be able to use the Internet at the same time because of the number of public
 addresses in the pool:
 Objective:
 IP Services
 Sub-Objective:
 Configure and verify DHCP client and relay
References:
 Cisco > Support > Cisco IOS and NX-OS Software > IP Addressing: DHCP Configuration Guide, Cisco IOS XE Release
 3SE (Catalyst 3850 Switches) > Chapter: Configuring the Cisco IOS DHCP Server > Configuring DHCP Address Pools
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             75/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
   A) TCP segment
   B) IP header
C) UDP datagram
D) HTTP header
Explanation
 The data structure pictured in the graphic is a UDP datagram. It uses a header (not shown) that contains the source
 and destination MAC addresses. It has very little overhead as compared to the TCP segmented (shown later in this
 explanation) as any transmission that uses UDP is not provided the services of TCP.
 It is not a TCP segment, which has much more overhead (shown below). The TCP header contains fields for sequence
 number, acknowledgment number, and window size. These fields are not found in a UDP header because UDP
 provides none of the services that require use of these fields. That is, UDP cannot re-sequence packets that arrive out
 of order, nor does UDP acknowledge receipt (thus the term non-guaranteed to describe UDP). Furthermore, since UDP
 does not acknowledge packets, there is no need to manage the window size. The window size refers to the number of
 packets that can be received without an acknowledgment.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           76/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 It is not an IP header. An IP header contains fields for the source and destination IP address. The IP header, like the
 UDP segment, does not contain fields for sequence number, acknowledgment number, and window size. These fields
 are not found in an IP header because IP provides none of the services that require use of these fields. IP provides
 best-effort user data. This does not cause a delivery problem, however, as IP relies on TCP to provide those services
 when the transmission is a unicast.
An HTTP header does not include fields for HTTP requests and responses.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Compare TCP to UDP
References:
 You administer a TCP/IP network. You want to enable the hosts on your network to be automatically configured with IP
 configurations, such as IP address, subnet mask, and default gateway address. The IP configurations should be leased
 to the clients for a limited time.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              77/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
A) HTTP
B) IPP
C) BOOTP
D) SMTP
E) DHCP
Explanation
 You would use Dynamic Host Configuration Protocol (DHCP) to automatically configure the hosts on your network with
 IP configurations. DHCP was designed to automatically configure frequently moved, fully boot-capable computers, such
 as laptop computers, with IP configurations. You can use DHCP to configure such IP settings as IP address, subnet
 mask, and default gateway address. Typically, DHCP information is leased to a client for a limited period. DHCP clients
 usually release DHCP information when they are shut down. When a DHCP client retrieves IP configurations from a
 DHCP server, the DHCP client is not necessarily configured with the same IP configurations as on previous occasions.
 Bootstrap Protocol (BOOTP) is a host configuration protocol that was designed before DHCP. BOOTP was designed to
 configure diskless workstations with IP configurations. BOOTP does not lease IP configurations as DHCP does.
 Instead, a BOOTP server permanently assigns IP configurations to a BOOTP client. When a BOOTP client is started,
 the BOOTP server always assigns the same IP configurations to the BOOTP client.
 Hypertext Transfer Protocol (HTTP) is used to transfer Web pages on a TCP/IP network. Simple Mail Transfer Protocol
 (SMTP) is used to transfer e-mail messages on a TCP/IP network. Internet Printing Protocol (IPP) is used to enable
 network printing through a TCP/IP network such as the Internet. HTTP, SMTP, and IPP are not used to automatically
 configure hosts on a TCP/IP network with IP settings.
 Objective:
 IP Services
 Sub-Objective:
 Explain the role of DHCP and DNS within the network
References:
 Cisco > Product Support > Cisco IOS and NX-OS Software > IP Addressing: DHCP Configuration Guide, Cisco IOS XE
 Release 3SE (Catalyst 3850 Switches) > Chapter: Configuring the Cisco IOS DHCP Server
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            78/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The company you work for has a large number of employees who work in offices in Atlanta and Boston. You would like
 to implement an access solution whereby all systems in the two offices appear local to one another. Which of the
 following tunneling/VPN solutions would be the most appropriate in this situation?
A) PPTP
B) Remote access
C) Site to site
D) IPsec
Explanation
 A site-to-site VPN allows an organization to connect two or more remote offices so that it appears as if they are local to
 each other. It can also be used for partner connections.
 A remote-access VPN allows geographically dispersed users to access the intranet or other company resources. It is
 ideal for a mobile workforce.
 IPsec is the encryption protocol used in secure VPN connections. While IPsec may be used, it has nothing to do with
 the type of VPN deployed.
 Point-to-Point Tunneling Protocol (PPTP) uses an initial public Internet connection and creates a second connection
 (tunnel) through which VPN traffic is managed. A VPN can use PPTP, but this protocol does not affect the type of VPN
 deployed.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Describe IPSec remote access and site-to-site VPNs
References:
Cisco Community > Technology and Support > Security > Ipsec Tunnel Mode Vs Transport Mode
AT&T Cybersecurity > Level Blue > Blog > Security Essentials > Secure Remote Access Explained
Which statement best describes the interaction between a workstation and an HSRP virtual router?
   A) The workstation must have the real IP address of one of the HSRP routers
       defined as its default gateway.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             79/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
B) The workstation sends packets to the active router's real MAC address.
   C) The active HSRP router replies to the workstation's ARP request with the
       virtual router's MAC address.
   D) The workstation must support IRDP in order to switch to the alternate router in an
       HSRP group.
Explanation
 The active HSRP router replies to the workstation's ARP request with the HSRP virtual MAC address. The HSRP virtual
 router presents a consistently available router to the end user, reachable by a single unique, virtual MAC address. Only
 the active router responds to frames destined to this virtual MAC address, which identifies the HSRP group.
 The primary function of Hot Standby Router Protocol (HSRP) is to define a set of routers that work together to represent
 one virtual, fault-tolerant router. Thus, redundancy is provided in the event that one of the routers fails. An HSRP group
 consists of an active router and a standby router, which together present the appearance of a virtual router. The active
 router is elected from the routers configured to belong to the HSRP group. The virtual router's MAC address identifies
 the virtual router, and the end user will send packets to that destination MAC address. The end-user device will send an
 ARP request using the known IP address of its default gateway to discover the virtual router's MAC address. Only the
 active router will respond to the ARP request. The active router will then forward packets sent to the virtual router. The
 standby router monitors the status of the HSRP group and assumes packet-forwarding responsibilities of the virtual
 router if the active router fails.
 Neither the workstation nor any other device is required to support ICMP Router Discovery Protocol (IRDP) in order to
 implement an HSRP virtual router. An IRDP-compliant device (RFC 1256) listens for IRDP hello messages, which
 advertise default routes.
 It is not required for the workstation to know the actual IP address of any of the routers in the group. The end-user
 device will send an ARP request using the known IP address of its default gateway to discover the virtual router's MAC
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                   80/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
address.
 The workstation does not send packets to the active router's real MAC address. It will send packets to the virtual
 router's MAC address.
 Objective:
 IP Connectivity
 Sub-Objective:
 Describe the purpose, functions, and concepts of first hop redundancy protocol
References:
 Cisco > Support > Technology Support > IP Application Services > Troubleshooting TechNotes > Understand the Hot
 Standby Router Protocol Features and Functionality > Document ID: 9234
 Cisco > Support > Technology Support > IP Application Services > Technology Q&A > Review Hot Standby Router
 Protocol (HSRP): FAQ > Document ID: 9281
 Cisco > Product Support > Switches > Catalyst 3560 Software Configuration Guide, Release 12.2(52)SE > Chapter:
 Configuring HSRP
An associate creates the following access list that she plans to apply to an interface on a router:
 What type of traffic could cause this ACL to place a heavy load on the CPU of the router, and what command could be
 used to reduce the impact of the ACL? (Choose two.)
Explanation
 There are two contributors to the CPU load increase from ACL logging: process switching of packets that match log-
 enabled access control entries (ACEs), and the generation and transmission of the log messages. To reduce the impact
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            81/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 of process switched traffic, the ip access-list logging interval command can be used. The interval is specified in
 milliseconds and represents how often a single packet is process switched. While the messages in the generated log
 entries may not be as comprehensive after this command is executed, the counter values that are generated by the
 show access-list and show ip-access list commands will still be accurate.
 Packets that are not process switched (CEF switched and fast switched) will examined or accounted for in the logging,
 so they are not the source of the problem.
 The ip access-list log-update threshold command is used to configure how often syslog messages are generated
 and sent after the initial packet match. While this would be a beneficial command to run, as it addresses the second
 source of CPU congestion that is the sending of the syslog messages, that was not listed as a traffic type option.
 Therefore, this would not be a solution to the issue presented by packet switched traffic.
 The logging rate limit command also will reduce the impact of log generation and transmission on the CPU, but again,
 it does not address the issue presented by process switched traffic.
 Objective:
 IP Services
 Sub-Objective:
 Describe the use of syslog features including facilities and severity levels
References:
Cisco > Support > Cisco IOS Security Command Reference > ip access-list
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            82/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Which of the following statements describes why the two routers are NOT forming an OSPF neighbor adjacency?
Explanation
 The output shows that the router IDs for RTR78 and RTR79 are the same value, which should not be the case. One of
 the two routers has been misconfigured with the other router's ID. This will prevent an OSPF neighbor adjacency from
 forming.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                        83/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The process IDs do not have to match. It does not matter whether they match or not because the process ID is only
 locally significant on the device.
 The administrative distance is not misconfigured in the output. Both routers are using the default OSPF administrative
 distance of 110.
 If the reference bandwidths do not match, it will affect the calculation of the path cost, but it will not prevent an
 adjacency from forming.
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Troubleshoot OSPF Neighbor
 Problems > Document ID: 13699 > Typical Reasons for OSPF Neighbor Problems
Which two features do Cisco routers offer to mitigate distributed denial-of-service (DDoS) attacks? (Choose two.)
A) Flow control
B) Scatter tracing
C) Rate limiting
E) Anti-DDoS guard
Explanation
 Cisco routers use access control lists (ACLs) and blackholing features to help mitigate distributed denial-of-service
 (DDoS) attacks. A DoS attack is an attack in which legitimate users are denied access to networks, systems, or
 resources. One of the most common DoS attacks is the DDoS attack, which is executed by using multiple hosts to flood
 the network or send requests to a resource. The difference between DoS and DDoS is that in a DoS attack, an attacker
 uses a single host to send multiple requests, whereas in DDoS attacks, multiple hosts are used to perform the same
 task.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                 84/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
      ACLs: Filter unwanted traffic, such as traffic that spoofs company addresses or is aimed at Windows control ports.
      However, an ACL is not effective when network address translation (NAT) is implemented in the network.
      Rate limiting: Minimizes and controls the rate of bandwidth used by incoming traffic.
      Traffic-flow reporting: Creates a baseline for the network that is compared with the network traffic flow, helping you
      detect any intrusive network or host activity.
      Apart from these features offered by Cisco routers, the following methods can also be used to mitigate DDoS
      attacks:
      Using a firewall, you can block or permit traffic entering a network.
      The systems vulnerable to attacks can be shifted to another location or a more secure LAN.
      Intrusion Detection Systems (IDS), such as Network Intrusion Detection Systems (NIDS) and Host Intrusion
      Detection Systems (HIDS), can be implemented to detect intrusive network or host activity such as a DoS attack,
      and raise alerts when any such activity is detected.
 Anti-DDoS guard and scatter tracing are incorrect because these features are not offered by Cisco routers to mitigate
 DDoS attacks.
Flow control is incorrect because flow control is used to prevent the loss of traffic between two devices.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify access control lists
References:
Given the following output, which statements can be determined to be true? (Choose three.)
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               85/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
C) This router is neither the DR nor the BDR for the Fa0/1 subnet.
   D) The DR for the network connected to Fa0/0 has an interface priority greater
       than 2.
Explanation
 The show ip ospf neighbor command displays a list of all OSPF routers with which you have established a neighbor
 relationship. The following describes the command output:
 This indicates that the interface priority of neighbor 192.168.45.2 is 2. The default OSPF interface priority is 1 and the
 highest interface priority determines the designated router (DR) for a subnet. This same line reveals that this neighbor
 is currently the backup designated router (BDR) for this segment, which indicates that another router became the DR. It
 can then be assumed that the DR router has an interface priority higher than 2. (The router serving the DR function is
 not present in the truncated sample output.)
 This output indicates that router 192.168.90.3 is the DR, and router 192.168.90.1 is the BDR for this network. Since
 there can only be one DR and BDR per segment, this indicates that the local router is neither the DR nor the BDR.
 (OSPF considers these as DROther routers.)
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               86/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The fact that multiple DRs are listed in this output indicates that RouterA2 is connected to more than one multiaccess
 segment, since each segment will elect a DR.
 It cannot be determined if this router is the DR for subnet 10.1.0.0. The output indicates that router 192.168.45.2 is the
 BDR for this network, but with the truncated output it cannot be determined if this router is the DR.
 The DR for the network connected to Fa0/1 does not have a router ID of 10.5.5.2. The Address field of the show ip
 ospf neighbor command indicates the IP address of the neighbor's interface, not the router ID of the neighbor.
 The DR for the serial subnet is not 192.168.85.1 since point-to-point serial interfaces do not elect DRs and BDRs. This
 is indicated by the output below:
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
Cisco > Support > Cisco IOS IP Routing: OSPF Command Reference > show ip ospf neighbor
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Understand Open Shortest Path
 First (OSPF) - Design Guide > Document ID: 7039 > DR Election
To enable users to access the FTP server from the Internet, which service must be operational on which device?
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              87/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
B) NAT on R2
C) NAT on R1
D) DHCP on R1
Explanation
 Network Address Translation (NAT) must be operational on the R1 router. The computers on the LAN side of R1,
 including the FTP server, are using a private IP address range (10.6.5.0/24). To allow access to the FTP server from the
 Internet, the private IP address of the FTP server (10.6.5.108/24) must be converted to a public IP address. NAT can
 perform this translation and should be operational on the router that connects the LAN where the FTP server is located
 to the Internet, which in this case is R1.
 NAT does not need to be running on R2. Both of the interfaces on R2 are using public IP addresses, so no translation is
 necessary. Moreover, configuring R2 would not help users connect to the FTP server since R1 is the router that
 connects the LAN where the FTP server is located to the Internet.
 Making DHCP operational on R1 would not help. DHCP provides address configurations to both local and remote
 clients but cannot perform the translation required in this scenario.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                          88/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Making VLAN Trunking Protocol (VTP) operational on the switch would not provide any translation. This protocol is
 used to communicate VLAN information among multiple switches.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe private IPv4 addressing
References:
 You want to configure password policies that ensure password strength. Which password setting most affects a
 password's strength?
   A) Password complexity
   B) Password lockout
C) Password age
D) Password history
Explanation
 Password complexity is the most important setting to ensure password strength. Password complexity allows you to
 configure which characters should be required in a password to reduce the possibility of dictionary or brute force
 attacks. A typical password complexity policy would force the user to incorporate numbers, letters, and special
 characters. Both uppercase and lowercase letters can be required. A password that uses a good mix, such as
 Ba1e$23q, is more secure than a password that only implements parts of these requirements, such as My32birthday,
 NewYears06, and John$59. Note that password complexity rules are less effective when users make common
 character substitutions in dictionary words, such as zero for O, @ for a, and 3 for E.
 Password age, sometimes referred to as password expiration, allows you to configure the minimum or maximum
 number of days before a user is required to change the user's password. It is a good security practice to enforce a
 password age of 30 to 60 days. Some companies force users to change their passwords monthly or quarterly. This
 interval should be determined based on how critical the information is and on how frequently passwords are used.
 Password history allows you to configure how many new passwords must be created before an old one can be reused.
 This setting enhances security by allowing the administrators to ensure that old passwords are not being reused
 continually. Passwords that are used repeatedly are sometimes referred to as rotating passwords.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             89/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Password lockout allows you to configure the number of invalid logon attempts that can occur before an account is
 locked. Usually, this password lockout policy also allows you to configure the number of days that the account remains
 in this state. In some cases, you may want to configure the account lockout policy so that an administrator must be
 contacted to re-enable the account.
      Password reuse - specifies whether users can reuse old passwords. In most cases, this setting allows you to
      configure the number of previous passwords that will be retained. In this case, an old password can be reused if it
      is old enough to no longer be retained. For example, if you must change your password every 30 days and your
      system is configured to remember the last 6 passwords, then you will be able to reuse a password 6 months after it
      is no longer used.
      Password length - specifies the minimum number of characters that must be included in the user's password.
 The use of strong passwords will help to prevent password cracking, which is the process of cracking the password
 using a dictionary or brute force attack. A security administrator should periodically test the strength of user passwords.
 The best method for testing is to copy the user password database to a stand-alone server and use a password-
 cracking program against the database.
 Recent NIST password guideline changes are favoring password length over password complexity. Based on these
 guidelines, a longer password of random words should be favored over a complex password that is shorter in length.
 However, password length was not one of the options given.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Describe security password policies elements, such as management, complexity, and password alternatives (multifactor
 authentication, certificates, and biometrics)
References:
What Cisco Catalyst switch feature can be used to define ports as trusted for DHCP server connections?
   A) 802.1x
   B) Private VLANs
C) DHCP snooping
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              90/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
D) Port security
Explanation
 DHCP snooping is used to define ports as trusted for DHCP server connections. The purpose of DHCP snooping is to
 mitigate DHCP spoofing attacks. DHCP spoofing is an attack that can be used to force user traffic through an attacking
 device. This is accomplished by an attacker responding to DHCP queries from users. Eliminating the response from the
 correct DHCP server would make this more effective, but if the attacker's response gets to the client first, the client will
 accept it.
 The DHCP response from the attacker will include a different gateway or DNS server address. If they define a different
 gateway, the user traffic will be forced to travel through a device controlled by the attacker. This will allow the attacker to
 capture traffic and gain company information. If the attacker changes the DNS server in the response, they can use
 their own DNS server to force traffic to selected hosts to go to a device they control. Again, this would allow the attacker
 to capture traffic and gain information.
 DHCP snooping can be used to determine what ports are able to send DHCP server packets, such as DHCPOFFER,
 DHCPACK, and DHCPNAK, from the company DHCP server. DHCP snooping can also cache the MAC address to IP
 address mapping for clients receiving DHCP addresses from a valid DHCP server.
 When specifying trusted ports, access ports on edge switches should be configured as untrusted, with the exception of
 any ports that may have company DHCP servers connected. Only ports where DHCP traffic is expected should be
 trusted. Most certainly, ports in any area of the network where attacks have been detected should be configured as
 untrusted.
Some additional parameters that can be used with the ip dhcp snooping command are:
      switch(config)# ip dhcp snooping verify mac-address - this command enables DHCP MAC address
      verification.
      switch(config)# ip dhcp snooping information option allow-untrusted - this command enables
      untrusted ports to accept incoming DHCP packets with option 82 information. DHCP option 82 is used to identify
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                 91/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
the location of a DHCP relay agent operating on a subnet remote to the DHCP server.
 When DHCP snooping is enabled, no other relay agent-related commands are available. The disabled commands
 include:
 Private VLANs are a method of protecting or isolating different devices on the same port and VLAN. A VLAN can be
 divided into private VLANs, where some devices are able to access other devices, and some are completely isolated
 from others. This was designed so service providers could keep customers on the same port isolated from each other,
 even if the customers had the same Layer 3 networks.
 Port security is a method of only permitting specified MAC addresses access to a switch port. This can be used to
 define what computer or device can be connected to a port, but not to limit which ports can have DHCP servers
 connected to them.
 802.1x is a method of determining authentication before permitting access to a switch port. This is useful in restricting
 who can connect to the switch, but it cannot control which ports are permitted to have a DHCP server attached to it.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
References:
 Cisco > Product Support > Switches > Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide,
 12.2(20)EW > Chapter: Configuring DHCP Snooping and IP Source Guard > Configuring DHCP Snooping on the
 Switch
 Cisco > Product Support > Switches > Cisco IOS IP Addressing Services Command Reference > ip dhcp
 snoopingCisco > Product Support > Switches > Cisco IOS IP Addressing Services Command Reference > ip dhcp relay
 information option
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              92/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
A) Improved morale
   B) Improved security
   C) Efficiency
D) Scalability
Explanation
 Automation is not always enthusiastically embraced by employees, especially if they view it as a threat to their job
 security.
Automation does increase scalability by allowing managers to handle larger and more complex networks more easily.
Automation does increase efficiency by typically performing manual tasks more quickly.
 Automation does improve security because it can perform manual security tasks such as monitoring log files in real time
 and automating responses to network threats.
 Objective:
 Automation and Programmability
 Sub-Objective:
 Explain how automation impacts network management
References:
PCskull > Business > 4 Business Process Automation Benefits and Its Impact
 Click and drag the command(s) used to configure passwords on a Cisco router to their appropriate purposes. (Not all
 options will be used.)
Explanation
 enable secret john: The enable secret command is used to configure an encrypted password, which provides
 privileged administrative access to the IOS using the password "John". It is always advisable to configure an enable
 secret password. If an enable secret password is not configured and a console TTY password is configured, then a
 remote user can gain privileged administrative access from a remote VTY session which poses a risk to network
 security.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              93/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
enable password john: The enable password command is used to configure an unencrypted password.
 To set a user mode password, which is one that you are prompted for when you connect to the router rather than when
 you try to execute the enable command, enter the line at which you want it effective (either line console 0, line aux 0, or
 line vty 0 4) and then password <password>. An example of setting the user mode password for both the console and
 the telnet connections are shown below:
 Router(config)#Line console 0
 Router(config-line)#login
 Router(config-line)#password cisco
 Router(config)#Line vty 0 4
 Router(config-line)#login
 Router(config-line)#password cisco
 Also be aware that as executed above the password will not be encrypted without the execution of the service
 password-encryption command prior to creating the passwords.
 privilege level: This command is used to configure the privilege level assigned to a particular line in, such as the
 terminal or console line
 privilege mode level level command-string: This command would be used to configure a particular privilege level
 and assign commands available at that level.
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify device access control using local passwords
References:
 Cisco > Support > Technology Support > IP Addressing Services > Troubleshooting TechNotes > Cisco Guide to
 Harden Cisco IOS Devices > Document ID: 13608 > Password Management
When configuring a WLAN with WPA PSK security, on which configuration tab would you map WPA2 to an interface?
   A) QoS
   B) General
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                              94/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
   C) Security
   D) Advanced
Explanation
The General tab is used to map WPA2 to an interface, as shown in the graphic.
The Security tab of the WLAN is used to enable WPA PSK, as shown in the graphic.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                             95/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The Advanced tab is where settings such as Management Frame Protection (MFP) are configured, as highlighted in the
 graphic.
The QoS tab is used to enable and manage QoS, as shown in the graphic.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                     96/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify WLAN within the GUI using WPA2 PSK
References:
 Cisco > Support > Wireless > Cisco Wireless LAN Controller Software > Configuration Guides > Cisco Wireless LAN
 Controller Configuration Guide, Release 7.3 > Chapter: Using the Web-Browser and CLI Interfaces
 What command would you run to prevent the last available IP address in the scope from being allocated to a host via
 DHCP?
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            97/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Explanation
 In this scenario, you would run the ip dhcp excluded-address 10.1.0.253 command in global configuration mode to
 prevent DHCP allocation of the last available IP address in the scope. The ip dhcp excluded-address command is
 used to prevent DHCP from handing out IP addresses that are already statically configured on your network. The
 command can include a single IP address to exclude or an entire range, such as:
 The command above would block the entire range of 10.1.0.100 through 10.1.0.125 from being allocated by DHCP. If
 the next IP address in sequence to be assigned would have been 10.1.0.100, DHCP will skip the range and assign
 10.1.0.126 as the next host address.
 You would not execute ip dhcp excluded-address 10.1.0.254. This is the address of the router, and it will
 automatically be excluded.
The other commands are incorrect because they are not valid Cisco IOS commands.
 Objective:
 IP Services
 Sub-Objective:
 Configure and verify DHCP client and relay
References:
 Cisco > Support > IP Addressing: DHCP Configuration Guide, Cisco IOS Release 15SY > Chapter: Configuring the
 Cisco IOS DHCP Server > Excluding IP Addresses
 Cisco Press > Articles > Cisco Networking Academy > CCNP 1: Advanced IP Addressing Management > DHCP and
 Easy IP
Which statement is NOT true regarding Internet Control Message Protocol (ICMP)?
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            98/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Explanation
 ICMP does NOT provide reliable transmission of data in an Internet Protocol (IP) environment. The Transmission
 Control Protocol (TCP) is used to provide reliable transmission of data in an IP environment.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Compare TCP to UDP
References:
 Server 20 is returning requested data to Workstation 1. What command(s) need to be configured on R2 for the data to
 be returned successfully? (Choose all that apply. Each correct answer is a complete solution.)
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            99/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
Explanation
 To route data to the 10.6.5.0/24 network, R2 can be configured in one of two ways. First, it can be configured with a
 route statement that sends all traffic for the 10.6.5.0 network to the next hop, which is the S0 interface of R1
 (215.56.3.60). That configuration is accomplished with the ip route 10.6.5.0 255.255.255.0 215.56.3.60 command.
 Second, because the network where Server 20 is located has only one path to any other network (through R2), you
 could configure a default route on R2 that sends all traffic to networks not in the routing table to R1. To do so, execute
 the ip route 0.0.0.0 0.0.0.0 S0 command.
 The command ip route 0.0.0.0 0.0.0.0 10.6.5.20 creates a default route using the address of Workstation 1. That
 network (10.6.5.0/24) will not be in the routing table of R2, so packets to any network that is not in the routing table
 would be dropped.
 The command ip route 10.6.5.0 255.255.255.0 10.6.5.1 creates a route to the 10.6.5.0 network but uses the Fa0/2
 interface of R1 as the next hop. The next hop is the S0 interface of R1, not the Fa0/2.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                  100/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify IPv4 and IPv6 static routing
References:
Cisco > Support > Cisco IOS IP Routing: Protocol-Independent Command Reference > ip route
What is often the weakest link in the security chain, and represents the largest vulnerability?
   A) Embedded systems
   B) End-of-life systems
   C) Lack of vendor support
D) Untrained users
Explanation
 Untrained users are often the most vulnerable point in the organization and represent the biggest vulnerability. It is
 impossible for users to adhere to an organization's information security polices if they are not aware of them. It is also
 impossible for the user to implement a security procedure without being trained in how to do so. Without the proper user
 training, even the most sophisticated defense an organization can purchase may be rendered useless.
 Keeping end-of-life systems active in the network, such as running an outdated operating system, can create system-
 wide vulnerabilities. As an example, new malware attacks would be particularly effective on systems that are running
 Windows XP after Microsoft discontinued security updates for it.
 Embedded systems are smaller computer systems, perhaps even a chip, which are used as component of a larger
 system. They may be used in industrial controls, smart homes, manufacturing, and even printers. Consider the impact
 of a networked printer that does not have the appropriate security controls updated on the firmware.
 Lack of vendor support can be particularly harmful. A vendor should be responsible for providing security updates for
 issues that are discovered. Failure of the vendor to do so provides an attacker with the opportunity to exploit a system
 vulnerability.
 Objective:
 Security Fundamentals
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                                101/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Sub-Objective:
 Describe security program elements (user awareness, training, and physical access control)
References:
 Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to
 "cisco"?
Explanation
 The enable password command is used to set the local password to control access to privileged levels. This command
 is executed on the global configuration mode, as in router(config)# enable password cisco. The syntax of the
 command is:
      level level: An optional parameter to set the privilege level at which the password applies. The default value is 15.
      password: Specifies the password that is used to enter enable mode.
      encryption-type: An optional parameter to specify the algorithm used to encrypt the password.
      encrypted-password: Specifies the encrypted password that is copied from another router configuration.
 The router# enable secret cisco command is incorrect because the enable secret command must be executed from
 global configuration mode, not privileged EXEC mode. In fact, this is the password for which you will be prompted when
 you attempt to enter privilege exec mode.
The line password command is incorrect because this command is not a valid Cisco IOS command.
 The router(config-router)# enable password cisco command is incorrect because the enable password command
 must be entered in global configuration mode.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             102/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Objective:
 Security Fundamentals
 Sub-Objective:
 Configure and verify device access control using local passwords
References:
Cisco > Support > Cisco IOS Security Command Reference > enable password
 Cisco > Support > Cisco IOS Security Configuration Guide, Securing User Services, Release 12.4 > Chapter:
 Configuring Security with Passwords, Privilege Levels, and Login Usernames for CLI Sessions on Networking Devices
What is the easiest way to force a specific switch to become the primary spanning-tree root bridge for a VLAN?
Explanation
 The spanning-tree root bridge is the bridge with the lowest bridge ID. The bridge ID is a value calculated from the
 bridge priority and the bridge MAC address. Therefore, lowering the spanning-tree priority value lowers the bridge ID,
 which can force the switch to become the root bridge.
 The easiest way to force a specific switch to become the spanning-tree root bridge for a VLAN is to lower its priority
 using the spanning-tree vlan vlan_id priority priority command. For example, the following command will
 configure the switch as the root bridge for VLAN 10:
 The priority value of 4096 is used by convention. It could be set to any value as long as it is lower than any other switch
 in the VLAN. The priority value 4096 is typically used when forcing the placement of the root bridge, and 8192 is used
 to force placement of the secondary root bridge. These values work because the default priority value for switches is
 32768.
 Raising the port-cost value of an interface on the switch interface is an effective way to reduce the likelihood
 that spanning tree allows the interface to enter the forwarding state. However, it does not affect the placement of the
 root bridge.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                             103/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Likewise, lowering the port cost of an interface is an effective way to increase the likelihood that spanning tree allows
 the interface to enter the forwarding state.. However, it does not affect the placement of the root bridge.
 Objective:
 Network Access
 Sub-Objective:
 Interpret basic operations of Rapid PVST+ Spanning Tree Protocol
References:
Configuring STP
What command disables 802.1x authentication on a port and permits traffic without authentication?
Explanation
 The command dot1x port-control force-authorized is used to disable 802.1x on a port and permit traffic without
 authentication. Dot1x ports are in one of two states: authorized or unauthorized. Authorized ports permit user traffic to
 flow through the port. This state usually follows successful authentication. Unauthorized ports only permit authorization
 traffic to flow through the port.
 Usually, a port begins in an unauthorized state. A user is then allowed to exchange AAA authentication traffic with the
 port. Once the user has been authenticated successfully, the port is changed to the authorized state and the user is
 permitted to use the port normally.
 Normal use of 802.1x has the port configured with the dot1x port-control auto statement. This places the port in an
 unauthorized state until successful authentication. After successful authentication, the port is changed to the authorized
 state.
 When 802.1x is initially configured, the default port control of the ports is force-authorized. This forces the port to be in
 the authorized state without successful authentication. This setting disables the need for authentication and permits all
 traffic.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               104/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The force-unauthorized keyword configures the port as an unauthorized port regardless of authentication traffic. A port
 configured with this key word would not permit user traffic, not even authentication traffic.
The command dot1x port-control disable is not a valid command due to incorrect syntax.
 Objective:
 Network Access
 Sub-Objective:
 Describe network device management access (Telnet, SSH, HTTP, HTTPS, console, TACACS+/RADIUS, and cloud
 managed )
References:
 Cisco > Support > Switches > Catalyst 6500 Series Release 15.0SY Software Configuration Guide > Security >
 Chapter: IEEE 802.1X Port-Based Authentication
Cisco > Support > Cisco IOS Security Command Reference > dot1x port-control
 Yesterday one of your associates made some changes to the syslog configuration on the router R69. Today, while
 working on the router you received this syslog message:
Based on this output, which of the following commands did the associate execute?
B) logging console 4
C) service sequence-numbers
Explanation
 The associate must have executed the service sequence-numbers command during his changes. This command
 instructs the syslog system to add a sequence number to each message, which can help to organize a timeline when
 messages are sent to a syslog server from various sources.
 The associate could not have executed the service timestamps log command. This command enables time stamps
 on log messages, showing the time since the system was rebooted. If this had been done, a time stamp similar to the
 following would have been added to the message:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           105/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The associate could not have executed the service timestamps log datetime msec command. This command
 enables time stamps on log messages, showing the time since the system was rebooted in milliseconds. If this had
 been done, a time stamp similar to the following would have been added to the message:
 The associate could not have executed the logging console 4 command. This command instructs the syslog system
 to only display messages of levels 4, 3, 2 and 1 in severity. Since the message displayed is a level 5 message, this
 command could not have been executed.
 Objective:
 IP Services
 Sub-Objective:
 Describe the use of syslog features including facilities and severity levels
References:
 Cisco > Product Support > Switches > Catalyst 4500 Series Switch Software Configuration Guide, IOS XE 3.7.xE and
 IOS 15.2(3)Ex > Chapter: Configuring System Message Logging > System Log Message Format
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               106/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
show interfaces
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                             107/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
   A) 192.168.10.1
   B) 192.168.10.126
   C) 192.168.5.1
   D) 192.200.60.5
Explanation
 The router ID of R2 is 192.200.60.5. The OSPF Router ID is the highest IP address of a loopback interface, if one is
 configured. If a loopback interface is not configured, then the OSPF RID is the highest IP address of any physical
 interface. Because R2 has a loopback interface, and its address is 192.200.60.5, then that is the Router ID of R2.
You can verify this from the output of the show ip interface brief command given on R2:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                            108/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 The other IP addresses all belong to physical interfaces in R2, and all are less than the IP address of the loopback
 interface anyway.
 Objective:
 IP Connectivity
 Sub-Objective:
 Configure and verify single area OSPFv2
References:
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Troubleshooting Duplicate Router
 IDs with OSPF > Document ID: 23862 > Router ID
 Click on each of the scenario headings to expand or collapse its content. You must read the entire scenario in order to
 answer the question below.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               109/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
show interfaces
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                             110/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 R3 and the router named Remote are connected with a point-to-point leased line. The two routers cannot
 communicate. What is the problem?
Explanation
 The encapsulations do not match. R3 is set to use HDLC and Remote is set to use PPP. These settings must match, or
 communications cannot occur. You can see these settings in the show interfaces command for the two routers:
and
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                     111/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
There is no problem with the IP addresses. Both addresses are in the 20.0.0.0/8 subnet.
LMI types are used only with Frame Relay connections, so that is not an issue.
Loopback addresses are not required to be set for this link to function.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Describe characteristics of network topology architectures
References:
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           112/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
   A) 255.255.255.0
   B) 255.255.224.0
   C) 255.255.240.0
   D) 255.255.252.0
Explanation
 The IP addresses of the two interfaces that are in the network between R1 and R2 are 215.56.3.60/24 (the R1 S0
 interface) and 215.56.3.5/24 (the R2 S0 interface). Both of these have a 24-bit mask, which is 255.255.255.0.
 The mask is not 255.255.240.0. That denotes a 20-bit mask and would be indicated with a /20 notation at the end of
 each IP address.
 The mask is not 255.255.224.0. That denotes a 19-bit mask and would be indicated with a /19 notation at the end of
 each IP address.
 The mask is not 255.255.252.0. That denotes a 22-bit mask and would be indicated with a /22 notation at the end of
 each IP address.
 Objective:
 Network Fundamentals
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                        113/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Sub-Objective:
 Configure and verify IPv4 addressing and subnetting
References:
 Cisco > Support > Technology Support > IP Routing > Troubleshooting TechNotes > Configure IP Addresses and
 Unique Subnets for New Users > Document ID: 13788
Which Cisco command will display the version and configuration data for Secure Shell (SSH)?
   A) show ssh
   B) show ip ssh
   C) debug ip ssh
   D) debug ssh
Explanation
 The show ip ssh command is used to display the version and configuration data for SSH on a Cisco router. The
 following is sample output of the show ip ssh command:
 router#show ip ssh
 SSH Enabled - version 1.5
 Authentication timeout: 120 secs; Authentication retries: 2
 This show ip ssh command output displays the enabled status of the SSH protocol, the retries parameter (configured
 at two attempts), and the timeout of 120 seconds.
The following message will appear when the show ip ssh command is issued and SSH has been disabled:
 To enable SSH, include the transport input SSH command when configuring authentication on a line. For example, the
 configuration of a Cisco network device to use SSH on incoming communications via the virtual terminal ports, with a
 specified password, is shown in the partial output of the show run command below:
 line vty 0 4
 password 7 030752180500
 login
 transport input ssh
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                           114/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 It is important to note the login command on the third line of the above output which is critical for security. This
 command instructs the device to prompt for a username and password using SSH. If this line reads no login, SSH
 might be otherwise be correctly configured, but the device will never prompt for the username and password.
 The show ssh command will display the status of the SSH connections on the router. The following is sample output
 from the show ssh command:
The debug ip ssh command is used to display debug messages for SSH.
 Objective:
 IP Services
 Sub-Objective:
 Configure network devices for remote access using SSH
References:
Cisco > Support > Cisco IOS Security Command Reference > show ip ssh
A switch is powered up and the system LED is amber. Which of the following describes this situation?
Explanation
 The system LED indicates the overall health of the switch. The LED should turn solid green after a successful Power
 On Self-Test (POST). An amber system LED indicates that there is a system-wide failure in the switch.
High utilization will not cause the system LED to turn amber.
 An amber system LED indicates a general switch malfunction. It does not indicate that the switch is performing
 normally.
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210                                               115/116
11/14/24, 2:49 PM                                                            200-301 Exam Simulation
 Port security violations will not cause the system LED to be amber. The system LED is used to identify the overall
 health of the switch.
 Objective:
 Network Fundamentals
 Sub-Objective:
 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
References:
 Cisco > Product Support > Switches > Catalyst 2960 Switch Hardware Installation Guide > Chapter: Product Overview
 > LEDs
Hewlett Packard Enterprise > Cisco Catalyst 2960 Series Switch - Monitoring and Troubleshooting Using LEDs
https://www.kaplanlearn.com/education/test/print/98791994?testId=317575210 116/116