Cisco CCNA Practice Test (200-301)
Cisco Certified Network Associate
Use the form below to configure your Cisco CCNA Practice Test (200-301). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Cisco CCNA 200-301 Information
The Cisco Certified Network Associate (CCNA) certification is one of the most recognized credentials in the networking industry. It is designed to validate foundational knowledge and skills in networking, which are essential for IT professionals working with Cisco systems. The CCNA exam, identified as 200-301, covers a wide range of networking topics and prepares individuals for roles such as network administrator, network engineer, and help desk technician.
The CCNA certification focuses on essential networking concepts like IP connectivity, IP services, network fundamentals, security, and automation. Additionally, it introduces key aspects of programmability and automation that reflect the growing importance of these technologies in modern network environments. Candidates for the CCNA exam should ideally have some practical networking experience, although formal prerequisites are not required. Cisco recommends having a year of experience in implementing and administering Cisco solutions, which helps candidates grasp the topics covered in the exam more effectively. You can explore the certification in more detail on the official CCNA page from Cisco.
The exam is available in multiple languages, including English and Japanese, ensuring global accessibility. With a duration of 120 minutes, candidates will face approximately 100-120 questions, covering a range of topics from networking fundamentals to security and automation. The format includes multiple-choice questions, drag-and-drop exercises, and simulations, which test both theoretical understanding and practical skills. The passing score typically falls between 800 and 850 out of a maximum of 1,000 points, although the exact score required to pass may vary depending on the version of the exam and its difficulty level at the time.
Preparation for the CCNA requires comprehensive study due to the breadth of topics covered in the exam. Cisco offers official study materials and practice exams, and there are various online platforms that provide training courses and hands-on labs. Cisco's own training resources and career path guide, available in the Cisco Career Path PDF, provide detailed information on the skills needed and the certification roadmap.
The CCNA certification is part of Cisco's career certifications program, which offers a clear progression for those looking to advance their networking skills. After obtaining the CCNA, professionals can pursue more specialized certifications, such as Cisco Certified Network Professional (CCNP), which delve deeper into specific technologies and job roles.
Maintaining a CCNA certification requires renewal every three years. This can be achieved by retaking the current version of the exam or advancing to a higher-level Cisco certification. As networking technology continues to evolve, staying certified ensures that professionals remain up-to-date with the latest trends and best practices.
The CCNA is an essential stepping stone for anyone looking to build a career in networking. It opens doors to various job opportunities and serves as a foundation for further specialization. Cisco remains a dominant player in the networking field, and its certifications are respected worldwide, making the CCNA a valuable credential for professionals seeking to validate their skills and enhance their career prospects. More information can be found directly on Cisco's official certifications page.

Free Cisco CCNA 200-301 Practice Test
- 20 Questions
- Unlimited
- Network FundamentalsNetwork AccessIP ConnectivityIP ServicesSecurity FundamentalsAutomation and Programmability
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
A network engineer needs to configure Network Address Translation (NAT) on a router to translate multiple internal private IP addresses to a pool of public IP addresses provided by the ISP. The public address pool ranges from 209.165.200.226 to 209.165.200.230 with a netmask of 255.255.255.248. Which command should the engineer use to define the NAT pool?
ip nat inside source static 192.168.1.1 209.165.200.226
ip nat pool NET_POOL 209.165.200.226 209.165.200.230 netmask 255.255.255.248
ip nat inside source list 1 pool NET_POOL overload
ip nat pool NET_POOL 209.165.200.225 209.165.200.229 netmask 255.255.255.248
Answer Description
The command ip nat pool NET_POOL 209.165.200.226 209.165.200.230 netmask 255.255.255.248
correctly defines a NAT pool named 'NET_POOL' with the specified starting and ending IP addresses and netmask. This pool is then used to translate internal private IP addresses to the public IP addresses when configuring NAT.
'ip nat pool NET_POOL 209.165.200.225 209.165.200.229 netmask 255.255.255.248' is incorrect because it specifies an incorrect IP range (209.165.200.225 to 209.165.200.229) that doesn't match the given public address pool.
'ip nat inside source list 1 pool NET_POOL overload' is incorrect because it applies NAT translation using an access list and a pool but does not define the NAT pool itself.
'ip nat inside source static 192.168.1.1 209.165.200.226' is incorrect because it configures a static NAT translation for a single IP address rather than defining a pool for multiple addresses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a NAT pool in networking?
What does the 'netmask' parameter do in a NAT pool configuration?
What is the difference between dynamic NAT and static NAT?
When a Cisco router selects the best route to a destination network, which component of the routing table entry reflects its selection criteria?
Gateway of last resort
Administrative distance and metric
Network prefix and mask
Next hop address
Answer Description
The administrative distance and metric in a routing table entry indicate the route's trustworthiness and cost, respectively. Administrative distance represents the reliability of the routing protocol source, and metric indicates the path's cost. Routers use these values to select the most preferred route among multiple entries to the same destination. The other options do not directly influence the route selection process. The network prefix and mask define the destination network, the gateway of last resort is used when no specific route matches, and the next hop address specifies where to forward the packet but does not determine route preference.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is administrative distance in routing?
What is a metric in routing, and how does it affect path selection?
How do administrative distance and metrics work together for route selection?
A network administrator is setting up a static route on a router to reach a remote network. Which address should be specified as the next hop in the static route configuration?
The IP address of the remote network's default gateway
The IP address of the remote network's destination host
The IP address of the router's own outgoing interface
The IP address of the adjacent router's interface on the connected network segment
Answer Description
The next hop in a static route should be the IP address of the neighboring router's interface that is directly connected to the local router. This tells the router where to send packets destined for the remote network. Using the adjacent router's interface ensures that packets are forwarded to the next device in the path. Specifying the remote network's default gateway or destination host is incorrect because those addresses are not directly reachable from the local router. Using the router's own outgoing interface is also incorrect, as it does not provide a forwarding path to another device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why must the next hop in a static route be the adjacent router's interface?
What happens if the router's own outgoing interface is used in the static route?
How does a static route differ from a dynamic route in determining the next hop?
A network engineer needs to prevent plaintext passwords from being displayed in the configuration file of a Cisco router. Which command should be applied to achieve this?
enable secret cisco
service password-encryption
password encryption aes
username admin secret cisco
Answer Description
The service password-encryption
command encrypts all plaintext passwords in the configuration file using a Cisco proprietary encryption algorithm. This helps in protecting the passwords from being easily read if someone views the configuration file. The enable secret
command sets an encrypted password for privileged access but does not encrypt other plaintext passwords in the configuration. The username admin secret cisco
command creates an encrypted password for a specific user but doesn't affect existing plaintext passwords. The password encryption aes
command is not a valid Cisco IOS command for encrypting passwords.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What type of encryption does the 'service password-encryption' command use?
Does 'service password-encryption' affect existing encrypted passwords?
What is the difference between 'enable secret' and 'service password-encryption'?
As a network engineer, you need to display detailed information about the neighboring devices connected to your switch using a vendor-neutral, industry-standard discovery protocol. Which command should you use to accomplish this?
show mac address-table
show lldp interface
show lldp neighbors detail
show cdp neighbors detail
Answer Description
The correct command to display detailed information about neighboring devices discovered through the Link Layer Discovery Protocol (LLDP) is show lldp neighbors detail. This command provides comprehensive details about each LLDP neighbor, including system name, port ID, capabilities, and more. The show cdp neighbors detail command is used for Cisco Discovery Protocol (CDP), which is proprietary to Cisco devices. The show lldp interface command displays LLDP parameters for the interfaces but does not provide neighbor details. The show mac address-table command displays the MAC addresses learned on the switch but does not provide discovery protocol information.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is LLDP, and why is it considered vendor-neutral?
How does the 'show lldp neighbors detail' command differ from 'show lldp interface'?
How is LLDP different from CDP in network environments?
In a broadcast network running OSPF, which criterion is most significant in determining the election of the Designated Router (DR)?
The router with the lowest MAC address on the interface
The router with the highest interface priority value
The router with the longest uptime in the network
The router with the highest Router ID
Answer Description
In OSPF broadcast networks, the primary factor for electing the Designated Router (DR) is the interface priority value assigned to each router. The router with the highest interface priority becomes the DR. If multiple routers have the same highest priority, the router with the highest Router ID is selected. Interface priority is configurable and allows network administrators to influence DR election, making it the most significant criterion in the selection process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an OSPF Designated Router (DR)?
What is the role of interface priority in DR election?
What is the significance of the Router ID in DR elections?
Which capability is provided by a Layer 3 switch but not by a Layer 2 switch?
Learning source MAC addresses and populating a CAM table
Adding and interpreting IEEE 802.1Q VLAN tags on trunk links
Routing traffic between different IP subnets by using Switched Virtual Interfaces (SVIs)
Forwarding frames within the same VLAN based on destination MAC address
Answer Description
Layer 3 switches include hardware and software to inspect Layer 3 information (IP addresses) and maintain routing tables, allowing them to route traffic between separate IP subnets or VLANs via Switched Virtual Interfaces (SVIs). A Layer 2 switch cannot perform this routing; it can only forward frames within a single subnet based on MAC addresses. Functions such as MAC learning, VLAN tagging, and basic frame forwarding are common to both types of switches.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Layer 3 switch?
What is the role of Switched Virtual Interfaces (SVIs)?
How is routing performed on a Layer 3 switch different from a router?
The IT department of a company wants to secure its wireless network against potential threats and ensure the strongest level of protection for its users. Which wireless security protocol should they implement to achieve this?
WPA
WPA3
WEP
WPA2
Answer Description
WPA3 provides the strongest level of security among the listed wireless security protocols. It introduces advanced encryption and authentication methods that offer better protection against modern threats. WEP and WPA have significant vulnerabilities and are considered insecure. While WPA2 is still commonly used and provides strong security, WPA3 includes enhancements that address weaknesses in WPA2 and offers improved safeguards against attacks such as offline dictionary attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is WPA3 considered more secure than WPA2?
What are the vulnerabilities of WEP and WPA?
What is an offline dictionary attack, and how does WPA3 prevent it?
When a router learns multiple routes to the same destination network through the same routing protocol, which component does it use to determine the preferred path?
Prefix length
Administrative distance
Next hop
Metric
Answer Description
The router uses the metric to determine the preferred path among multiple routes learned via the same routing protocol. The metric is a value that represents the cost or distance to reach a destination; lower metrics indicate more preferred paths. Administrative distance is used to compare routes from different routing protocols, not within the same protocol. Prefix length is relevant when routes have different network masks, but in this case, the destinations are the same. Next hop refers to the immediate next router in the path and does not influence the selection among multiple paths learned from the same protocol.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a metric in routing?
How does administrative distance differ from metric?
When are prefix lengths considered in route selection?
A network administrator has been given the IPv6 address block 2001:db8:1234::/48. They need to create 256 equal-sized subnets from this block with maximum usable hosts in each block. What prefix length should they use for each subnet?
/64
/52
/60
/56
Answer Description
To create 256 subnets from a /48 IPv6 network, the administrator must allocate 8 additional bits for subnetting because 2^8 equals 256. Adding these 8 bits to the original /48 results in a /56 prefix length for each subnet. This allows for 256 subnets, each with a significant number of host addresses. The other options either provide too few subnets or unnecessarily limit the number of host addresses per subnet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the /48 in the IPv6 address block mean?
How does adding 8 bits to the prefix length create 256 subnets?
How many hosts are available in each /56 subnet?
As a network administrator, you are tasked with configuring RouterA to forward packets destined for networks not in its routing table to the next-hop IP address 192.168.1.1. Which command should you use in global configuration mode to set this up for IPv4 traffic?
ip route 0.0.0.0 0.0.0.0 192.168.1.1
ip route any any 192.168.1.1
ip default-gateway 192.168.1.1
ip route 0.0.0.0 255.255.255.255 192.168.1.1
Answer Description
To configure a default route in IPv4 on a Cisco router, you use the command ip route 0.0.0.0 0.0.0.0 192.168.1.1
. The 0.0.0.0 0.0.0.0
specifies a destination network of all zeros with a subnet mask of all zeros, which matches any IPv4 address not found in the routing table. This tells the router to forward packets destined for unknown networks to the next-hop IP address 192.168.1.1
. The other options are incorrect because:
ip route 0.0.0.0 255.255.255.255 192.168.1.1
defines a route to a specific host address0.0.0.0
, not a default route.ip default-gateway 192.168.1.1
is used on devices without IP routing enabled, such as switches, and is not appropriate when IP routing is active.ip route any any 192.168.1.1
is not a valid Cisco IOS command for configuring routes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is 'ip route 0.0.0.0 0.0.0.0 192.168.1.1' the correct syntax for a default route?
What happens if a default route is not configured on a router?
How does 'ip default-gateway' differ from a default route?
Which command should be applied to a Cisco router's VTY lines to allow only encrypted remote management sessions?
transport input all
login local
transport input ssh
password cisco
Answer Description
To ensure that a Cisco router's VTY lines accept only encrypted remote management sessions, the command transport input ssh
is used. This command restricts the VTY lines to accept only SSH connections, which are encrypted, and rejects unencrypted protocols like Telnet. Using transport input all
would allow all types of connections, including insecure ones. The command login local
enables local authentication but doesn't specify the encryption of the remote sessions. Setting a password with the password
command is necessary for authentication but doesn't enforce the use of encrypted connections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSH, and how is it different from Telnet?
What are Cisco VTY lines, and why are they important?
How does the `transport input ssh` command improve security?
In a RESTful API, which HTTP method is typically used to create a new resource on the server?
GET
DELETE
PUT
POST
Answer Description
The HTTP POST method is mapped to the Create operation in CRUD. When a client sends a POST request to the appropriate endpoint, the server processes the request body and adds a new resource, usually returning HTTP status code 201 (Created) and a Location header pointing to the new resource. Other verbs serve different CRUD purposes: GET retrieves resources (Read), PUT or PATCH update them (Update), and DELETE removes them (Delete).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does CRUD stand for in the context of APIs?
What is the difference between POST and PUT in RESTful APIs?
What is the significance of HTTP status codes in RESTful APIs?
What command sets a login message displayed before user authentication?
banner motd
Answer Description
The banner motd
command configures a "Message of the Day" banner, often used to display legal warnings or informational messages when users access the device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the 'banner motd' command do?
When would you typically use an MOTD banner?
Are there other types of banners besides 'MOTD' on Cisco devices?
A network administrator has enabled Dynamic ARP Inspection (DAI) on a switch to mitigate ARP spoofing attacks. For DAI to function correctly and validate ARP packets on untrusted ports in a DHCP environment, which of the following components is essential?
The upstream router's routing table
A static ARP access control list (ACL)
The switch's Content-Addressable Memory (CAM) table
The DHCP snooping binding table
Answer Description
Dynamic ARP Inspection (DAI) relies on the DHCP snooping binding table to validate the binding between a host's MAC address and its assigned IP address. When an ARP packet arrives on an untrusted port, DAI intercepts it and checks against the MAC-to-IP mappings in the DHCP snooping table. If no valid binding exists, the ARP packet is dropped. The CAM table is used for Layer 2 forwarding decisions based on MAC addresses and ports. While static ARP ACLs can be used with DAI, they are typically for non-DHCP environments. The routing table is a Layer 3 construct used for forwarding IP packets between networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the DHCP snooping binding table?
How does Dynamic ARP Inspection (DAI) validate ARP packets?
Why are static ARP ACLs less commonly used with DAI in DHCP environments?
Which command should be used in line configuration mode to set a password that controls access to the console line on a Cisco device?
enable password [password]
password [password]
service password-encryption
enable secret [password]
Answer Description
The password [password]
command is used within line configuration mode to set the password required to access a specific line, such as the console line (line console 0
). This command defines the password that users must enter when connecting to that line. The enable password [password]
and enable secret [password]
commands set passwords for privileged EXEC mode access, not for line access. The service password-encryption
command encrypts passwords in the device's configuration but does not set any passwords.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is line configuration mode?
How does the `enable secret` command differ from the `password` command in line configuration mode?
What does the `service password-encryption` command do?
What command displays a summary of all configured interfaces?
show ip interface brief
sh ip int br
show ip int br
sh ip int brief
Answer Description
This command provides a concise overview of interface statuses, IP addresses, and whether interfaces are operational. It is often used for troubleshooting and verification.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What information does 'show ip interface brief' provide?
What does 'line protocol' mean in the output of this command?
How is this command different from 'show interfaces'?
What command enables port security on an interface?
switchport port-security
Answer Description
Port security restricts the devices that can connect to a port based on their MAC addresses, enhancing network security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is port security used for?
How does the switch enforce port security using MAC addresses?
Can port security be configured to allow multiple devices on one port?
Which command configures a static inside source NAT mapping of an internal IP address 192.168.1.10 to an external IP address 203.0.113.10 on a Cisco router?
ip nat inside source dynamic 192.168.1.10 203.0.113.10
ip nat pool 192.168.1.10 203.0.113.10
ip nat inside source static 192.168.1.10 203.0.113.10
ip nat outside source static 192.168.1.10 203.0.113.10
Answer Description
The correct command is 'ip nat inside source static 192.168.1.10 203.0.113.10', which establishes a static mapping between the inside local address and the inside global address. The 'ip nat outside source' command is used for translating external addresses to internal addresses, which is not applicable here. The 'ip nat inside source dynamic' command is used for dynamic NAT configurations, not static mappings.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between inside local and inside global addresses in NAT?
When should you use static NAT instead of dynamic NAT?
What happens if you incorrectly configure 'ip nat outside source' instead of 'ip nat inside source'?
During the initial setup of a Catalyst 9300 switch you run the command show vlan brief and notice that every interface is listed under VLAN 1 (default). Regarding this default VLAN on Cisco switches, which statement is correct?
It is assigned by default to all ports and cannot be deleted.
It is used only for management traffic.
It is designated for voice traffic.
It can be removed to enhance security.
Answer Description
The default VLAN on Cisco switches is VLAN 1. All switch ports belong to VLAN 1 out of the box, and VLAN 1 cannot be deleted from the VLAN database. Control protocols such as CDP, STP, VTP, and DTP are always carried on VLAN 1, even if user traffic is pruned. Voice traffic is normally placed in a separate voice VLAN; security best practices advise keeping user data off VLAN 1, but the VLAN itself cannot be removed; and VLAN 1 is not limited to management-only traffic unless you explicitly configure it that way.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is CDP and why does it use the default VLAN?
What is STP and how does it interact with VLAN 1?
Why is it a security best practice to avoid using the default VLAN for user traffic?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.