Cisco CCNA Practice Test (200-301)
Cisco Certified Network Associate
Use the form below to configure your Cisco CCNA Practice Test (200-301). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Cisco CCNA 200-301 Information
The Cisco Certified Network Associate (CCNA) certification is one of the most recognized credentials in the networking industry. It is designed to validate foundational knowledge and skills in networking, which are essential for IT professionals working with Cisco systems. The CCNA exam, identified as 200-301, covers a wide range of networking topics and prepares individuals for roles such as network administrator, network engineer, and help desk technician.
The CCNA certification focuses on essential networking concepts like IP connectivity, IP services, network fundamentals, security, and automation. Additionally, it introduces key aspects of programmability and automation that reflect the growing importance of these technologies in modern network environments. Candidates for the CCNA exam should ideally have some practical networking experience, although formal prerequisites are not required. Cisco recommends having a year of experience in implementing and administering Cisco solutions, which helps candidates grasp the topics covered in the exam more effectively. You can explore the certification in more detail on the official CCNA page from Cisco.
The exam is available in multiple languages, including English and Japanese, ensuring global accessibility. With a duration of 120 minutes, candidates will face approximately 100-120 questions, covering a range of topics from networking fundamentals to security and automation. The format includes multiple-choice questions, drag-and-drop exercises, and simulations, which test both theoretical understanding and practical skills. The passing score typically falls between 800 and 850 out of a maximum of 1,000 points, although the exact score required to pass may vary depending on the version of the exam and its difficulty level at the time.
Preparation for the CCNA requires comprehensive study due to the breadth of topics covered in the exam. Cisco offers official study materials and practice exams, and there are various online platforms that provide training courses and hands-on labs. Cisco's own training resources and career path guide, available in the Cisco Career Path PDF, provide detailed information on the skills needed and the certification roadmap.
The CCNA certification is part of Cisco's career certifications program, which offers a clear progression for those looking to advance their networking skills. After obtaining the CCNA, professionals can pursue more specialized certifications, such as Cisco Certified Network Professional (CCNP), which delve deeper into specific technologies and job roles.
Maintaining a CCNA certification requires renewal every three years. This can be achieved by retaking the current version of the exam or advancing to a higher-level Cisco certification. As networking technology continues to evolve, staying certified ensures that professionals remain up-to-date with the latest trends and best practices.
The CCNA is an essential stepping stone for anyone looking to build a career in networking. It opens doors to various job opportunities and serves as a foundation for further specialization. Cisco remains a dominant player in the networking field, and its certifications are respected worldwide, making the CCNA a valuable credential for professionals seeking to validate their skills and enhance their career prospects. More information can be found directly on Cisco's official certifications page.

Free Cisco CCNA 200-301 Practice Test
- 20 Questions
- Unlimited
- Network FundamentalsNetwork AccessIP ConnectivityIP ServicesSecurity FundamentalsAutomation and Programmability
Which action is considered a Cisco-recommended security best practice for handling unused access ports on a Catalyst switch?
Leave unused ports in VLAN 1 so that CDP and STP monitoring remains functional.
Configure each unused port as a dynamic trunk port so it can automatically negotiate when a device is connected.
Set the native VLAN on each unused port to VLAN 1 and enable PortFast to speed STP convergence.
Place each unused port in an unused VLAN that is not allowed on trunk links, and administratively shut down the port.
Answer Description
The recommended approach is to move every unused port into an unused (parking) VLAN that does not traverse any trunk links and then administratively shut the port. This prevents a rogue device from gaining access via default VLAN 1, which carries control protocols such as CDP, STP, VTP, and others. Leaving the port in VLAN 1, making it a dynamic trunk, or enabling PortFast on VLAN 1 all expose the network to potential attacks or misconfigurations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a 'parking VLAN' and why is it important for unused switch ports?
Why should unused ports be shut down administratively?
What are the risks of leaving unused ports in VLAN 1?
You are redesigning the perimeter security of a small enterprise. Management requires a single device capable of performing deep packet inspection, identifying and controlling applications regardless of port, and providing an integrated intrusion-prevention capability. Which device best meets these requirements?
Next-generation firewall
Router
Traditional firewall
Layer 3 switch
Answer Description
A next-generation firewall (NGFW) combines stateful inspection with deep packet inspection, application awareness and control, and an integrated intrusion-prevention system. These combined functions allow one device to detect and block sophisticated threats at the application layer. Traditional firewalls perform only stateful inspection, routers and Layer-3 switches focus on routing and switching, and therefore none of them provide the full DPI, application control, and IPS feature set found in an NGFW.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is deep packet inspection (DPI) and why is it important?
What does application awareness mean in the context of a next-generation firewall?
How does an Intrusion Prevention System (IPS) integrated into a next-generation firewall work?
A network administrator needs to prevent traffic from network 10.0.0.0/8 from reaching network 192.168.1.0/24 while allowing all other traffic. Which configuration method should the administrator use to achieve this?
Implement a standard ACL applied near the destination network.
Implement a time-based ACL applied on any interface.
Implement a standard ACL applied close to the source network.
Implement an extended ACL applied close to the source network.
Answer Description
To block traffic from a specific source network to a specific destination network, an extended access control list (ACL) should be used because it can filter traffic based on both source and destination IP addresses. Applying the extended ACL close to the source network prevents unwanted traffic from traversing the network, conserving bandwidth and resources. Standard ACLs filter only on source IP addresses and cannot specify destination addresses, making them unsuitable for this task. Time-based ACLs add time conditions but are unnecessary here since there is no time-based requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an extended ACL, and how does it differ from a standard ACL?
Why is it more efficient to apply an extended ACL close to the source network?
What is a time-based ACL, and in what scenarios would it be used?
In a router's routing table, which route is used to forward packets when there is no specific route to the destination network?
The route with the longest prefix match
A directly connected route
The default route
The route with the lowest administrative distance
Answer Description
The default route is used by the router when it receives a packet destined for a network that is not in its routing table. This route acts as a Gateway of last resort, providing a path for traffic to unknown networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a default route in networking?
What is the role of the Gateway of Last Resort?
How is the default route configured on a router?
When a router has multiple routing table entries matching a destination IP address, how does it decide which route to use?
It selects the route with the lowest routing protocol metric.
It selects the route with the lowest administrative distance.
It selects the route from the most preferred routing protocol.
It selects the route with the longest subnet mask.
Answer Description
A router makes forwarding decisions based on the most specific match, which corresponds to the route with the longest subnet mask. The longer the subnet mask, the more specific the route is to the destination IP address. Administrative distance and routing protocol metrics are used when multiple routes have the same prefix length; however, the router first looks for the most specific match regardless of these values.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does a longer subnet mask provide a more specific route?
What happens if two routes have the same subnet mask?
How does a router handle a case where no routing table entry matches a destination IP address?
An enterprise needs to identify and block sophisticated application-layer threats while maintaining visibility into applications and users. Which device is best suited for this purpose?
Traditional firewall
Next-generation firewall
Router with Access Control Lists (ACLs)
Layer 2 switch
Answer Description
Next-generation firewalls are designed to inspect traffic at the application layer, providing deep packet inspection and the ability to identify and control applications regardless of port or protocol. They offer advanced threat detection and prevention capabilities, including blocking sophisticated application-layer threats while maintaining visibility into applications and users. Layer 2 switches operate at the data link layer and lack these security features. Routers with Access Control Lists (ACLs) can filter traffic based on IP addresses and ports but cannot inspect application-layer data. Traditional firewalls provide basic stateful packet inspection but do not offer the advanced application-layer visibility and control provided by next-generation firewalls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a next-generation firewall and a traditional firewall?
What is deep packet inspection, and how does it work?
How do Access Control Lists (ACLs) differ from the capabilities of a next-generation firewall?
You are configuring an IPv6 network for a company that needs to send data from one server to multiple clients simultaneously, such as streaming stock market data to various terminals across the network. To ensure efficient delivery without unnecessary network traffic duplication, which IPv6 address type should be used?
Unicast addresses
Link-local addresses
Multicast addresses
Anycast addresses
Answer Description
In this scenario, multicast addresses should be used. IPv6 multicast addresses allow a single packet to be delivered to multiple interfaces identified by the multicast address, enabling efficient one-to-many communication without duplicating traffic for each recipient. This conserves bandwidth and reduces network load. Unicast addresses are used for one-to-one communication, anycast addresses deliver packets to the nearest of multiple interfaces (one-to-nearest), and link-local addresses are used for communication within the same network segment and do not support efficient one-to-many distribution.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main use of an IPv6 multicast address?
How does a multicast address differ from an anycast address in IPv6?
What are link-local addresses, and why are they not suitable for multicast communication?
Which of the following best describes the primary purpose of the Simple Network Management Protocol (SNMP) in routine network operations?
It provides a secure remote command-line interface to configure network devices.
It allows network-management systems to read and write management information (MIB variables) for monitoring and configuring devices.
It establishes encrypted VPN tunnels that protect user data between sites.
It securely transfers IOS images and configuration files between devices.
Answer Description
SNMP is an application-layer protocol that enables network-management systems to collect and modify management information (MIB variables) on routers, switches, servers, and other devices. It is used for monitoring status, gathering statistics, and (with appropriate permissions) changing configuration parameters. SNMP does not provide an interactive command-line session; secure remote shell access is provided by protocols such as SSH. File transfers are handled by protocols like TFTP or FTP, and VPN tunnels rely on technologies such as IPsec or SSL.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are MIB variables in SNMP?
How does SNMP differ from SSH?
What is the difference between SNMP and TFTP?
After connecting several new devices to the network, users report that they are unable to access resources. The devices have IP addresses in the 169.254.x.x range. Which network service is not functioning properly?
SNMP
NAT
DHCP
DNS
Answer Description
Devices assign themselves IP addresses in the 169.254.x.x range, known as Automatic Private IP Addressing (APIPA), when they cannot obtain an IP address from a Dynamic Host Configuration Protocol (DHCP) server. This indicates that the DHCP service is not functioning properly, as it is responsible for automatically providing IP configuration to devices on the network. Domain Name System (DNS) translates domain names to IP addresses but does not assign IP addresses to devices. Network Address Translation (NAT) allows multiple devices on a private network to access external networks using a single public IP address but does not affect initial IP address assignment. Simple Network Management Protocol (SNMP) is used for network management and monitoring and is unrelated to IP address assignment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is APIPA and why is it used?
What is the primary function of a DHCP server?
How does a device get an IP address from a DHCP server?
In an OSPF network configured with a point-to-point network type, which statement accurately describes how routers establish neighbor relationships?
Routers form adjacencies without electing a designated router.
Routers wait to elect a backup router before forming adjacencies.
Routers elect a designated router before forming adjacencies.
A designated router is elected, and adjacencies are formed with it.
Answer Description
In OSPF point-to-point networks, routers form adjacencies directly with each other without electing a Designated Router (DR). This is because there are only two routers on the link, eliminating the need for a DR/BDR election process. The other options are incorrect because DR/BDR elections occur in multi-access network types, such as broadcast or non-broadcast networks, where multiple routers need to manage adjacency relationships efficiently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why don't OSPF point-to-point networks require a Designated Router (DR)?
What is the difference between OSPF point-to-point and broadcast network types?
How does OSPF determine the network type for a specific interface?
As a network administrator, you need to configure a static route on your router to direct traffic destined only for the specific IP address 203.0.113.5 to use the next-hop IP address 198.51.100.1. Which command would you use to accomplish this?
ip route 203.0.113.5 0.0.0.0 198.51.100.1
ip route 203.0.113.0 255.255.255.0 198.51.100.1
ip route 203.0.113.5 255.255.255.255 198.51.100.1
ip route 0.0.0.0 0.0.0.0 198.51.100.1
Answer Description
To configure a static route to a specific host, the ip route command is used with the destination IP address, a subnet mask of 255.255.255.255 (signifying a single host route), and the next-hop IP address. Therefore, the correct command is ip route 203.0.113.5 255.255.255.255 198.51.100.1.
Using a subnet mask of 255.255.255.0 creates a network route for the entire 203.0.113.0/24 network, not just the single IP. A subnet mask of 0.0.0.0 defines a default route and does not specify a single host. Therefore, the other options do not correctly configure a static host route to the specific IP address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is the subnet mask 255.255.255.255 used for a single host route?
What happens if you use 255.255.255.0 instead of 255.255.255.255 for the subnet mask in this static route?
What is the role of the next-hop IP address in a static route?
A small office network uses a Catalyst 2960 Layer 2 switch with VLAN 10 for users and VLAN 20 for printers. Hosts in one VLAN must be able to reach the other, but the 2960 must remain in Layer 2 mode. Which action will enable this inter-VLAN communication?
Apply the switchport access vlan 10 and switchport access vlan 20 commands to the same access port.
Activate PortFast on all access ports assigned to VLAN 10 and VLAN 20.
Enable VTP pruning on the switch's trunk ports.
Configure a single physical interface on an external router as an 802.1Q trunk and create subinterfaces for VLAN 10 and VLAN 20 (router-on-a-stick).
Answer Description
Because a Catalyst 2960 is a Layer 2-only switch, it cannot route between VLANs. The simplest way to provide inter-VLAN connectivity is to use the router-on-a-stick method: connect a single physical router interface to the switch as an 802.1Q trunk, then create one subinterface per VLAN and assign each an IP address from the corresponding subnet. The router receives tagged traffic, makes a Layer 3 routing decision, and sends the packet back on the trunk with the appropriate VLAN tag. Features such as VTP pruning, assigning two VLANs to the same access port, or enabling PortFast do not perform routing and therefore do not allow hosts in different VLANs to communicate.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'router-on-a-stick' mean in networking?
Why can't a Catalyst 2960 switch perform inter-VLAN routing?
What is the purpose of 802.1Q tagging in VLAN communication?
A small business owner requires a simple networking device that provides both wired and wireless connectivity for their home office with minimal setup. Which device BEST meets these needs?
A standalone Layer 2 switch
A router with integrated switch and wireless capabilities
A next-generation firewall appliance
A dedicated wireless controller
Answer Description
A router with integrated switch and wireless capabilities is the best choice for a SOHO environment needing minimal configuration and support for both wired and wireless devices. It combines routing, switching, and wireless functions into a single device, making it cost-effective and easy to set up. A standalone Layer 2 switch only provides connectivity for wired devices and lacks routing and wireless features. A dedicated wireless controller is unnecessary complexity for a small network and typically manages multiple access points in larger enterprise setups. A next-generation firewall appliance focuses on advanced security and does not offer the integrated wireless and switching functionalities required.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key features of a router with integrated switch and wireless capabilities?
Why isn’t a Layer 2 switch suitable for this setup?
What is the role of a wireless controller, and why isn’t it needed here?
An enterprise data center is experiencing scalability challenges and inefficient east-west traffic flow with its current three-tier network architecture. The network engineers are looking to redesign the network to enhance scalability, reduce latency, and improve redundancy. Which network topology architecture should they consider implementing?
Two-tier architecture
WAN architecture
Small office/home office (SOHO) architecture
Spine-leaf architecture
Answer Description
They should consider implementing a spine-leaf architecture. The spine-leaf design is specifically tailored for data centers that require high scalability and efficient east-west traffic flow. In this topology, every leaf switch connects to every spine switch, ensuring consistent latency and bandwidth. This structure enhances scalability by allowing easy addition of spine or leaf switches without significant reconfiguration. Two-tier architectures may not provide the necessary scalability and performance improvements. SOHO architectures are intended for small office/home office environments and are unsuitable for large data centers. WAN architectures focus on wide area connectivity rather than internal data center design.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is east-west traffic in a data center?
How does the spine-leaf architecture improve scalability?
Why is the spine-leaf architecture better for redundancy?
Which statement accurately describes the relationship between the control plane and data plane in a software-defined networking (SDN) architecture?
The data plane is centralized in a controller, while each switch retains its own distributed control plane.
The control plane is logically centralized in a controller, and switches in the data plane forward traffic based on the controller's instructions.
Each network device runs both the control and data planes locally, making independent forwarding decisions.
Both control and data planes are centralized on the same server, and network devices act only as passive transceivers.
Answer Description
In an SDN architecture the control functions (routing, path selection, policy enforcement) are moved out of the individual switches and routers and placed in a logically centralized controller. The controller issues flow-table entries and other forwarding rules to the data-plane devices. Those devices, sometimes called forwarding elements, simply apply the rules and do not make independent forwarding decisions. This separation allows administrators to program and automate the network from one place. Choices that keep the control plane distributed, place the data plane in the controller, or centralize both planes on a single server contradict the SDN model and are therefore incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the control plane in an SDN architecture?
What is the data plane in an SDN architecture?
Why is the separation of control and data planes important in SDN?
An organization needs to allow multiple internal hosts in the 192.168.1.0/24 network to access the internet using a range of external addresses from 203.0.113.10 to 203.0.113.20. Which method should be configured on their router to achieve this?
Enable address translation overload using the router's interface address
Implement port address translation using a single external address
Configure dynamic address translation with a pool of external addresses
Set up static address translation for each internal host
Answer Description
Configuring dynamic address translation with a pool of external addresses allows multiple internal private IP addresses to be translated to a range of public IP addresses. This meets the requirement of utilizing a specified range of public IPs for multiple hosts. Setting up static address translation would require a one-to-one mapping for each host, which is not efficient for a large internal network. Implementing port address translation (PAT) uses a single public IP address to translate multiple internal addresses by differentiating them using port numbers, which does not meet the requirement of utilizing a range of public IPs. Enabling address translation overload using the router's interface address also uses a single IP address and is not suitable in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Dynamic Address Translation (Dynamic NAT)?
How does Dynamic NAT differ from Static NAT?
When would you use Dynamic NAT instead of PAT (Port Address Translation)?
When configuring a new WLAN on a Cisco Wireless LAN Controller (WLC) using the GUI, which security option should you select to enable enterprise-level authentication using user credentials?
WPA2 Enterprise
Open
WEP
WPA2 Personal
Answer Description
The correct choice is WPA2 Enterprise because it utilizes 802.1X authentication with a RADIUS server, allowing each user to authenticate with unique credentials. WPA2 Personal uses a pre-shared key suitable for small networks but not ideal for enterprise environments. WEP is an outdated and insecure protocol, and Open provides no authentication or encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is 802.1X authentication?
What is a RADIUS server and how does it work?
How does WPA2 Enterprise differ from WPA2 Personal?
Which Quality of Service mechanism limits the traffic rate by discarding packets that exceed the specified bandwidth?
Marking
Traffic Shaping
Queuing
Traffic Policing
Answer Description
Traffic Policing enforces a maximum rate by dropping packets that exceed the configured bandwidth limit. Unlike Traffic Shaping, which buffers excess packets to smooth out traffic bursts, Traffic Policing does not delay packets but instead discards them to prevent network congestion. Queuing and Marking do not involve discarding packets based on bandwidth limits.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between Traffic Policing and Traffic Shaping?
How does Traffic Policing prevent network congestion?
When would you use Traffic Policing instead of Traffic Shaping?
A network engineer is analyzing the spanning tree configuration on a switch running Rapid PVST+. They observe that one of the switch's interfaces connected to another switch is in a discarding state and is acting as a backup for forwarding data if necessary. What is the role of this port in the Rapid PVST+ spanning tree topology?
It is the designated port and forwards traffic on its segment.
It has a misconfigured duplex setting that could cause it to block traffic.
It is in the learning state and may start forwarding traffic.
It is an alternate port, providing a backup path to the root bridge and blocking traffic to prevent loops.
Answer Description
In Rapid PVST+, a port that is in the discarding state and serves as a backup path to the root bridge is known as an alternate port. The alternate port provides redundancy by being available if the root port fails, but it remains in the discarding state to prevent switching loops. The learning state is a transitional state where the port prepares to forward traffic, but in this scenario, the port is not indicated to be transitioning. A port with a misconfigured duplex setting may cause connectivity issues but does not define a specific spanning tree role or state. A designated port forwards traffic on its segment and would be in the forwarding state, not discarding.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between an alternate port and a root port in Rapid PVST+?
What is the purpose of the discarding state in the Rapid PVST+ protocol?
How does Rapid PVST+ improve upon traditional Spanning Tree Protocol (STP)?
As a network engineer overseeing a large network with numerous devices, you find that manual configuration updates are causing inconsistencies and network issues. How can implementing network automation help in this scenario?
It enables consistent configuration updates across devices, reducing errors.
It eliminates the need for any network management oversight.
It increases the complexity of managing network devices manually.
It slows down the deployment of configuration changes.
Answer Description
By using scripts or controller-based workflows to push standardized templates and validate results, automation ensures all devices receive identical, tested settings in seconds. Removing ad-hoc, per-device CLI typing eliminates the typos and omissions that commonly break spanning tree, routing, or access-control policies. Consequently, configuration drift is minimized, mean-time-to-deploy is shortened, and overall network reliability and security improve.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network automation in the context of IT networking?
How does network automation reduce human errors in configuration?
Can network automation scale to manage large networks effectively?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.