CCNA 200-301 Practice Exam: 120 Questions Covering All Topics (2025 Edition)

         


Are you preparing for the CCNA 200-301 exam in 2025? We've got you covered! Below is a complete set of 120 CCNA multiple-choice practice questions that comprehensively cover all domains of the official CCNA exam blueprint. Test your knowledge and identify areas where you need more focus. Answers are provided at the end of the blog.


Network Fundamentals (20 Questions)

  1. What is the purpose of the OSI model?
    A. Encrypt data for security
    B. Provide a framework for network communication
    C. Allocate IP addresses
    D. Define routing protocols

  2. Which layer of the OSI model is responsible for logical addressing?
    A. Transport
    B. Data Link
    C. Network
    D. Application

  3. Which cable type is used for long-distance, high-bandwidth network connections?
    A. Coaxial
    B. Fiber optic
    C. Twisted pair
    D. HDMI

  4. What protocol is used to dynamically assign IP addresses to devices?
    A. DNS
    B. ARP
    C. DHCP
    D. ICMP

  5. Which of the following is a private IP address?
    A. 172.32.0.1
    B. 192.168.1.1
    C. 8.8.8.8
    D. 169.254.1.1

  6. What does a MAC address identify?
    A. A logical device
    B. A physical device
    C. A domain name
    D. A subnet mask

  7. Which command is used to test network connectivity?
    A. telnet
    B. netstat
    C. ping
    D. traceroute

  8. Which protocol resolves domain names to IP addresses?
    A. DHCP
    B. DNS
    C. FTP
    D. SNMP

  9. What is the default subnet mask for a Class C IP address?
    A. 255.0.0.0
    B. 255.255.0.0
    C. 255.255.255.0
    D. 255.255.255.255

  10. What is the function of ARP?
    A. Assign IP addresses
    B. Resolve domain names
    C. Resolve IP to MAC addresses
    D. Transfer files

  11. Which layer is responsible for end-to-end communication?
    A. Application
    B. Data Link
    C. Network
    D. Transport

  12. What is the maximum number of IP addresses in a /24 subnet?
    A. 254
    B. 256
    C. 255
    D. 253

  13. What is the purpose of subnetting?
    A. Increase the number of routers
    B. Divide a network into smaller logical segments
    C. Expand the IP address range
    D. Connect networks to the internet

  14. What is the binary equivalent of decimal 192?
    A. 11000001
    B. 11000000
    C. 10000000
    D. 11111111

  15. Which device connects different networks together?
    A. Switch
    B. Access point
    C. Router
    D. Bridge

  16. What protocol is used for web traffic?
    A. SMTP
    B. FTP
    C. HTTP
    D. SNMP

  17. Which device uses MAC addresses to forward data?
    A. Router
    B. Firewall
    C. Switch
    D. Hub

  18. What does TTL in an IP packet stand for?
    A. Time to Life
    B. Time to Live
    C. Transport to Live
    D. Transmission to Layer

  19. Which IPv6 address is a loopback address?
    A. ::1
    B. fe80::
    C. ff00::
    D. 2001::

  20. What is the primary purpose of a VLAN?
    A. Encrypt traffic
    B. Connect different locations
    C. Segment networks logically
    D. Increase bandwidth


Network Access (20 Questions)

  1. What device operates at Layer 2 of the OSI model?
    A. Router
    B. Switch
    C. Firewall
    D. Repeater

  2. Which port security action drops unauthorized traffic but doesn’t log?
    A. Restrict
    B. Shutdown
    C. Protect
    D. Monitor

  3. What is the default VLAN on a Cisco switch?
    A. VLAN 5
    B. VLAN 10
    C. VLAN 1
    D. VLAN 100

  4. What does a trunk port do?
    A. Blocks all traffic
    B. Assigns IP addresses
    C. Carries multiple VLANs
    D. Encrypts frames

  5. What command enables an interface on a switch?
    A. no switchport
    B. enable port
    C. activate interface
    D. no shutdown

  6. Which command assigns a port to VLAN 10?
    A. switchport vlan 10
    B. switchport access vlan 10
    C. vlan access 10
    D. assign vlan 10

  7. What protocol is used for loop prevention?
    A. VLAN
    B. IPSEC
    C. STP
    D. ARP

  8. What is the function of a root bridge?
    A. Assign MAC addresses
    B. Determine the best path in STP
    C. Provide DNS services
    D. Route packets

  9. What happens when a port is in err-disabled state?
    A. It continues forwarding
    B. It shuts down
    C. It restarts
    D. It blocks only STP

  10. What is a collision domain?
    A. An area with Wi-Fi signals
    B. A network segment where data collisions can occur
    C. A server room
    D. A firewall zone

  11. Which VLANs are allowed by default on a trunk port?
    A. None
    B. All
    C. VLAN 1
    D. Only configured VLANs

  12. Which STP state does a switch port enter first?
    A. Blocking
    B. Listening
    C. Learning
    D. Forwarding

  13. What is the purpose of VTP?
    A. Encrypt VLANs
    B. Manage STP
    C. Propagate VLAN info
    D. Route VLANs

  14. What is a broadcast domain?
    A. The entire internet
    B. The area a broadcast packet can reach
    C. A subnet
    D. A DMZ

  15. What causes broadcast storms?
    A. Routing loops
    B. DNS misconfigurations
    C. Loops without STP
    D. Incorrect IPs

  16. What is BPDU used for?
    A. To send DHCP offers
    B. To detect loops
    C. To encrypt packets
    D. To resolve IPs

  17. What is the role of PortFast?
    A. Slows port initialization
    B. Speeds up STP convergence
    C. Prevents VLANs
    D. Blocks unknown frames

  18. Which STP port state allows frame forwarding?
    A. Listening
    B. Learning
    C. Forwarding
    D. Blocking

  19. What does the command show mac address-table do?
    A. Displays IP addresses
    B. Displays MAC to port mapping
    C. Displays routes
    D. Displays STP paths

  20. What is a trunk port typically used for?
    A. Connecting PCs
    B. Connecting to the internet
    C. Connecting switches
    D. Connecting firewalls

  21. IP Connectivity (20 Questions)

    1. What is the function of a routing table?
      A. Filter traffic
      B. Store VLANs
      C. Determine best path to networks
      D. Assign IP addresses

    2. Which routing protocol is distance-vector based?
      A. OSPF
      B. EIGRP
      C. RIP
      D. BGP

    3. Which command shows IP routing table?
      A. show ip interface brief
      B. show running-config
      C. show ip route
      D. show interfaces

    4. What is the administrative distance of a directly connected route?
      A. 0
      B. 1
      C. 90
      D. 110

    5. What does the 'C' in a routing table stand for?
      A. Connected
      B. Cached
      C. Computed
      D. Configured

    6. What metric does OSPF use to determine the best path?
      A. Hop count
      B. Bandwidth
      C. Delay
      D. Cost

    7. Which protocol supports VLSM?
      A. RIP v1
      B. RIP v2
      C. IPX
      D. RARP

    8. What is the purpose of a default route?
      A. Send all unknown traffic to a gateway
      B. Block outside traffic
      C. Provide DNS
      D. Encrypt data

    9. Which command enables a router interface?
      A. enable interface
      B. no shutdown
      C. activate port
      D. bringup interface

    10. What does the command ip route 0.0.0.0 0.0.0.0 do?
      A. Blocks all traffic
      B. Configures DNS
      C. Sets a default route
      D. Sets an IP address

    11. What type of address is 127.0.0.1?
      A. Broadcast
      B. Loopback
      C. Private
      D. Public

    12. Which command shows interface status and IP?
      A. show ip interface brief
      B. show running-config
      C. show vlan
      D. show protocols

    13. What is the purpose of routing protocols?
      A. Provide encryption
      B. Manage VLANs
      C. Share route info between routers
      D. Block traffic

    14. What type of protocol is OSPF?
      A. Link-state
      B. Distance-vector
      C. Hybrid
      D. Static

    15. Which command configures RIP on a router?
      A. router eigrp 1
      B. router ospf 1
      C. router rip
      D. enable rip

    16. Which protocol uses DUAL algorithm?
      A. RIP
      B. EIGRP
      C. OSPF
      D. BGP

    17. What is route summarization?
      A. Creating static routes
      B. Combining multiple routes into one
      C. Assigning MAC addresses
      D. Preventing loops

    18. What is the purpose of split horizon?
      A. Improve bandwidth
      B. Prevent routing loops
      C. Provide encryption
      D. Configure NAT

    19. What is the administrative distance of RIP?
      A. 100
      B. 90
      C. 120
      D. 110

    20. What does OSPF use to form adjacencies?
      A. Ping
      B. Hello packets
      C. Traceroute
      D. BPDUs


    IP Services (20 Questions)

    1. What is NAT used for?
      A. Routing
      B. Assigning IPs
      C. Translating private IPs to public
      D. Encrypting data

    2. Which protocol uses UDP port 53?
      A. DHCP
      B. DNS
      C. FTP
      D. SMTP

    3. Which DHCP message is sent by a client first?
      A. DHCPDISCOVER
      B. DHCPOFFER
      C. DHCPREQUEST
      D. DHCPACK

    4. What is the purpose of SNMP?
      A. Secure access
      B. Monitor network devices
      C. Encrypt data
      D. Assign IP addresses

    5. Which type of NAT maps one private IP to one public IP?
      A. PAT
      B. Static NAT
      C. Dynamic NAT
      D. Overload

    6. What does the ip nat inside command specify?
      A. Outbound interface
      B. Inside local interface
      C. Outside global interface
      D. NAT pool

    7. Which protocol is used for email sending?
      A. POP3
      B. SMTP
      C. IMAP
      D. HTTP

    8. What port does HTTP use?
      A. 443
      B. 22
      C. 80
      D. 110

    9. What is the function of FTP?
      A. Email transfer
      B. Web access
      C. File transfer
      D. Encryption

    10. Which command verifies NAT translation?
      A. show ip nat translations
      B. show nat config
      C. show ip route
      D. show interfaces

    11. What is a benefit of DHCP?
      A. Reduces network load
      B. Automates IP address assignment
      C. Blocks traffic
      D. Improves security

    12. Which DHCP message is sent by the server to offer an IP?
      A. DHCPDISCOVER
      B. DHCPACK
      C. DHCPNAK
      D. DHCPOFFER

    13. What is the function of DNS?
      A. Translate IPs to MACs
      B. Route traffic
      C. Assign IPs
      D. Resolve domain names

    14. Which command configures a static NAT entry?
      A. ip nat static inside
      B. ip nat inside source static
      C. nat enable static
      D. set static nat

    15. What port does HTTPS use?
      A. 21
      B. 25
      C. 443
      D. 80

    16. What is the function of PAT?
      A. Assign DNS addresses
      B. Translate many IPs to one
      C. Block unauthorized access
      D. Configure VLANs

    17. What does SNMP stand for?
      A. Secure Network Management Protocol
      B. Simple Network Monitoring Protocol
      C. Simple Network Management Protocol
      D. Secure NetMap Protocol

    18. Which device typically provides DHCP service?
      A. Switch
      B. Router
      C. Access point
      D. Repeater

    19. What is the benefit of DNS?
      A. Reduces bandwidth
      B. Blocks IPs
      C. Easy access to websites via names
      D. Prevents collisions

    20. What is the NAT term for a private IP?
      A. Inside local
      B. Inside global
      C. Outside local
      D. Outside global

      Security Fundamentals (20 Questions)

      1. What does AAA stand for in network security?
        A. Authentication, Authorization, Accounting
        B. Authorization, Authentication, Allocation
        C. Advanced Access Accounting
        D. Authorized Audit Access

      2. What is the purpose of a firewall?
        A. Speed up network traffic
        B. Encrypt all transmissions
        C. Block or allow traffic based on rules
        D. Create VLANs

      3. What type of attack is a phishing attack?
        A. Physical attack
        B. Social engineering attack
        C. Brute force attack
        D. Spoofing attack

      4. What is the purpose of a VPN?
        A. Provide wireless access
        B. Secure remote connection
        C. Assign IP addresses
        D. Filter spam

      5. What is a characteristic of strong passwords?
        A. Easy to remember
        B. Common dictionary words
        C. Mix of letters, numbers, and symbols
        D. Your name or birthday

      6. Which security feature prevents broadcast storms?
        A. ACLs
        B. DHCP snooping
        C. Port security
        D. BPDU Guard

      7. What does SSH provide?
        A. Unsecured terminal access
        B. Encrypted remote access
        C. File transfer only
        D. VPN tunneling

      8. What is the default port for HTTPS?
        A. 443
        B. 80
        C. 22
        D. 25

      9. What is a benefit of using ACLs?
        A. Dynamic routing
        B. Traffic filtering
        C. IP addressing
        D. NAT translation

      10. What is the main function of a DMZ in networking?
        A. Encrypt data
        B. Protect internal network
        C. Block malware
        D. Assign IPs

      11. Which protocol encrypts user credentials?
        A. Telnet
        B. FTP
        C. SSH
        D. HTTP

      12. What is spoofing?
        A. Encrypting data
        B. Faking an identity
        C. Monitoring traffic
        D. Flooding the network

      13. What is a good practice when configuring wireless security?
        A. Use WEP
        B. Disable SSID broadcasting
        C. Use open authentication
        D. Share password with everyone

      14. What type of traffic does an ACL control?
        A. Routing updates
        B. Broadcast traffic
        C. IP packet traffic
        D. VLAN frames

      15. What is a brute-force attack?
        A. Physically breaking a server
        B. Guessing passwords repeatedly
        C. Spoofing packets
        D. Modifying headers

      16. What is the function of port security on a switch?
        A. Block all unknown IPs
        B. Allow only specific MAC addresses
        C. Filter DNS requests
        D. Configure static routes

      17. What tool helps prevent MAC flooding attacks?
        A. DNSSEC
        B. ACLs
        C. Port security
        D. NAT

      18. What is the purpose of DHCP snooping?
        A. Block rogue DHCP servers
        B. Monitor DNS queries
        C. Encrypt DHCP traffic
        D. Enable NAT

      19. What is the default port for SSH?
        A. 80
        B. 23
        C. 22
        D. 25

      20. What type of security threat is malware?
        A. Natural disaster
        B. Hardware failure
        C. Software attack
        D. User error


      Automation and Programmability (10 Questions)

      1. What is a benefit of network automation?
        A. Increase errors
        B. Manual configuration
        C. Reduce human error
        D. More complex commands

      2. What is an API?
        A. Automatic Process Interface
        B. Application Programming Interface
        C. Advanced Programming Instruction
        D. Automatic Peripheral Integration

      3. What is a JSON file?
        A. A router configuration
        B. A file system
        C. A data exchange format
        D. A routing protocol

      4. Which language is commonly used for network automation?
        A. SQL
        B. C++
        C. Python
        D. COBOL

      5. Which term refers to a controller-based network model?
        A. TCP/IP
        B. SDN
        C. HTTP
        D. LAN

      6. What does REST stand for in REST APIs?
        A. Routing Encrypted Secure Transfer
        B. Representational State Transfer
        C. Redundant Stateful Tracking
        D. Remote Event System Tool

      7. What is the function of Cisco DNA Center?
        A. Basic routing
        B. Manual IP assignment
        C. Network automation and assurance
        D. Web browsing

      8. Which tool is used for network automation testing?
        A. Telnet
        B. Ansible
        C. FTP
        D. Traceroute

      9. What is the purpose of a network model like YANG?
        A. Measure throughput
        B. Model configuration data
        C. Speed up routing
        D. Scan for malware

      10. What type of API is RESTful?
        A. CLI-based
        B. GUI-based
        C. Web-based
        D. Token-only


      Wireless Fundamentals (10 Questions)

      1. What is the standard for wireless LANs?
        A. IEEE 802.3
        B. IEEE 802.11
        C. IEEE 802.15
        D. IEEE 802.1D

      2. What does SSID stand for?
        A. Secure Server Identifier
        B. Shared System Identifier
        C. Service Set Identifier
        D. Single Signal ID

      3. What frequency does 802.11ac use?
        A. 2.4 GHz
        B. 3.4 GHz
        C. 5 GHz
        D. 6 GHz

      4. What causes interference in wireless networks?
        A. DHCP
        B. Firewalls
        C. Microwave ovens
        D. Static routing

      5. Which encryption method is most secure for wireless?
        A. WEP
        B. WPA2
        C. WPA
        D. Open

      6. What is a BSSID?
        A. Base Station Serial ID
        B. Broadcast Service Set Identifier
        C. Basic Service Set Identifier
        D. Backup Signal Set ID

      7. Which mode connects wireless clients to a wired network?
        A. Ad-hoc
        B. Infrastructure
        C. Mesh
        D. Bridge

      8. What is the maximum theoretical speed of 802.11ac?
        A. 300 Mbps
        B. 1.3 Gbps
        C. 600 Mbps
        D. 54 Mbps

      9. Which device connects wireless devices in a home?
        A. Switch
        B. Access Point
        C. Hub
        D. Firewall

      10. What is roaming in wireless networks?
        A. Using mobile data
        B. Changing Wi-Fi passwords
        C. Moving between APs without dropping connection
        D. Static IP assignment                                                                                          Comment for answers

Comments

Popular posts from this blog

Best Cybersecurity TV Series, Documentaries, and Web Shows

The Easiest Roadmap to a Cybersecurity & Ethical Hacking Career

Key Takeaways from Yesterday’s Session