Cisco Certified Network Associate Exam
Exam Number 200-120 CCNA
Associated Certifications CCNA Routing and Switching
Duration 90 Minutes (50-60 questions)
Available Languages English, Japanese
Register Pearson VUE
CCNA Composite Exam: The 200-120 CCNAX is the composite exam associated with the Cisco CCNA Routing and Switching certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices: Accelerated (CCNAX) course. This exam tests a candidate’s knowledge and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network. The topics include all the areas covered under ICND 1 and ICND2 Exams.
Cisco Certified Network Associate v2 (200-120)
The 200-120 composite CCNA v2 exam is a 1.5 hour test with 50 – 60 questions. The 200-120 CCNA exam is the composite exam associated with the CCNA Routing and Switching certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 course. This exam tests a candidate’s knowledge and skills required to install, operate, and troubleshoot a small to medium-size enterprise branch network. The topics include all the areas covered under the 200-120 CCNA exam.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
Need CCENT, CCNA or CCNP Study Tools to prepare for your exams? A Cisco Learning Network Premium Subscription is the ultimate resource for CCENT, CCNA Routing and Switching, and CCNP self-study.
1.0 Operation of IP Data Networks 5%
1.1 Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
1.2 Select the components required to meet a given network specification
1.3 Identify common applications and their impact on the network
1.4 Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
1.5 Predict the data flow between two hosts across a network
1.6 Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
2.0 LAN Switching Technologies 20%
2.1 Determine the technology and media access control method for Ethernet networks
2.2 Identify basic switching concepts and the operation of Cisco switches
2.2.a Collision Domains
2.2.b Broadcast Domains
2.2.c Ways to switch
2.2.c [i] Store
2.2.c [ii] Forward
2.2.c [iii] Cut through
2.2.d CAM Table
2.3 Configure and verify initial switch configuration including remote access management
2.3.b mgmt IP address
2.3.c IP default-gateway
2.3.d local user and password
2.3.e enable secret password
2.3.f console and VTY logins
2.3.h service password encryption
2.3.i copy run start
2.4 Verify network status and switch operation using basic utilities such as
2.5 Describe how VLANs create logically separate networks and the need for routing between them
2.5.a Explain network segmentation and basic traffic management concepts
2.6 Configure and verify VLANs
2.7 Configure and verify trunking on Cisco switches
2.7.a dtp (topic)
2.8 Identify enhanced switching technologies
2.9 Configure and verify PVSTP operation
2.9.a Describe root bridge election
2.9.b Spanning tree mode
3.0 IP Addressing (IPv4/IPv6) 5%
3.1 Describe the operation and necessity of using private and public IP addresses for IPv4 addressing
3.2 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
3.3 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4
3.4.a dual stack
3.5 Describe IPv6 addresses
3.5.a global unicast
3.5.c link local
3.5.d unique local
3.5.e eui 64
4.0 IP Routing Technologies 20%
4.1 Describe basic routing concepts
4.1.a packet forwarding
4.1.b router lookup process
4.1.c Process Switching/Fast Switching/CEF
4.2 Configure and verify utilizing the CLI to set basic Router configuration
4.2.b local user and password
4.2.c enable secret password
4.2.d console and VTY logins
4.2.f service password encryption
4.2.g Interface IP Address
4.2.g [i] loopback
4.2.j copy run start
4.3 Configure and verify operation status of a device interface
4.4 Verify router configuration and network connectivity using
4.4.a [i] extended
4.4.e sh cdp neighbors
4.5 Configure and verify routing configuration for a static or default route given specific routing requirements
4.6 Differentiate methods of routing and routing protocols
4.6.a Static versus Dynamic
4.6.b Link state versus Distance Vector
4.6.c next hop
4.6.d ip routing table
4.6.e Passive Interfaces (how they work)
4.6.f Admin Distance
4.6.g split horizon
4.7 Configure and verify OSPF
4.7.a Benefit of single area
4.7.b Configure OSPv2
4.7.c Configure OSPv3
4.7.d Router ID
4.7.e Passive Interface
4.7.f Discuss multi-area OSPF
4.7.g Understand LSA types and purpose
4.8 Configure and verify interVLAN routing (Router on a stick)
4.8.a sub interfaces
4.8.b upstream routing
4.9 Configure SVI interfaces
4.10 Manage Cisco IOS Files
4.10.a Boot Preferences
4.10.b Cisco IOS Images (15)
4.10.c [i] Show license
4.10.c [ii] Change license
4.11 Configure and verify EIGRP (single AS)
4.11.a Feasible Distance/Feasible Successors/Administrative distance
4.11.b Feasibility condition
4.11.c Metric composition
4.11.d Router ID
4.11.e auto summary
4.11.f Path Selection
4.11.g Load Balancing
4.11.g [i] Unequal
4.11.g [ii] Equal
5.0 IP Services 10%
5.1 Configure and verify DHCP (IOS Router)
5.1.a Configuring router interfaces to use DHCP
5.1.b DHCP options (basic overview and functionality)
5.1.c Excluded addresses
5.1.d Lease time
5.2 Describe the types, features, and applications of ACLs
5.2.a standard (editing and sequence numbers)
5.2.e Log option
5.3 Configure and verify ACLs in a network environment
5.3.c Log option
5.4 Identify the basic operation of NAT
5.4.d 1 to 1
5.4.f source addressing
5.4.g one way NAT
5.5 Configure and verify NAT for given network requirements
5.6 Configure and verify NTP as a client.
5.7 Recognize High availability (FHRP)
5.8 Configure and verify syslog
5.8.a Utilize Syslog Output
5.9 Describe SNMP v2 and v3
6.0 Network Device Security 10%
6.1 Configure and verify network device security features
6.1.a Device password security
6.1.b enable secret versus enable
6.1.c.1 disable telnet
6.1.e physical security
6.1.f service password
6.1.g Describe external authentication methods
6.2 Configure and verify Switch Port Security
6.2.a Sticky mac
6.2.b MAC address limitation
6.2.d violation modes
6.2.d [i] err disable
6.2.d [ii] shutdown
6.2.d [iii] protect restrict
6.2.e shutdown unused ports
6.2.f err disable recovery
6.2.g assign unused ports in unused VLANs
6.2.h putting Native VLAN to other than VLAN 1
6.3 Configure and verify ACLs to filter network traffic
6.4 Configure and verify ACLs to limit telnet and SSH access to the router
7.0 Troubleshooting 20%
7.1 Troubleshoot and correct common problems associated with IP addressing and host configurations
7.2 Troubleshoot and resolve VLAN problems
7.2.a Identify that VLANs are configured
7.2.b Verify port membership correct
7.2.c Correct IP address configured
7.3 Troubleshoot and resolve trunking problems on Cisco switches
7.3.a Verify correct trunk states
7.3.b Verify correct encapsulation configured
7.3.c Correct VLANs allowed
7.4 Troubleshoot and resolve ACL issues
7.4.a Verify statistics
7.4.b Verify permitted networks
7.4.c Verify direction
7.4.c [i] Interface
7.5 Troubleshoot and resolve Layer 1 problems
7.5.e Dropped packets
7.5.f Late collisions
7.5.g Input/output errors
7.6 Identify and correct common network problems
7.7 Troubleshoot and resolve spanning tree operation issues
7.7.a Verify root switch
7.7.b Verify priority
7.7.c Verify mode is correct
7.7.d Verify port states
7.8 Troubleshoot and resolve routing issues
7.8.a Verify routing is enabled (sh IP protocols)
7.8.b Verify routing table is correct
7.8.c Verify correct path selection
7.9 Troubleshoot and resolve OSPF problems
7.9.a Verify neighbor adjacencies
7.9.b Verify Hello and Dead timers
7.9.c Verify OSPF area
7.9.d Verify interface MTU
7.9.e Verify network types
7.9.f Verify neighbor states
7.9.g Review OSPF topology table
7.10 Troubleshoot and resolve EIGRP problems
7.10.a Verify neighbor adjacencies
7.10.b Verify AS number
7.10.c Verify load balancing
7.10.d Split horizon
7.11 Troubleshoot and resolve interVLAN routing problems
7.11.a Verify connectivity
7.11.b Verify encapsulation
7.11.c Verify subnet
7.11.d Verify native VLAN
7.11.e Port mode trunk status
7.12 Troubleshoot and resolve WAN implementation issues
7.12.a Serial interfaces
7.12.b Frame relay
7.13 Monitor NetFlow statistics
7.14 TS EtherChannel problems
8.0 WAN Technologies 10%
8.1 Identify different WAN technologies
8.1.a Metro ethernet
8.1.c Cellular 3g/4g
8.1.h Frame relay
8.2 Configure and verify a basic WAN serial connection
8.3 Configure and verify a PPP connection between Cisco routers
8.4 Configure and verify Frame Relay on Cisco routers
8.5 Implement and troubleshoot PPPoE
Refer to the exhibit:
What will Router1 do when it receives the data frame shown? (Choose three.)
A. Router1 will strip off the source MAC address and replace it with the MAC address
B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.
C. Router1 will strip off the destination MAC address and replace it with the MAC address
D. Router1 will strip off the destination IP address and replace it with the IP address of
E. Router1 will forward the data packet out interface FastEthernet0/1.
F. Router1 will forward the data packet out interface FastEthernet0/2.
Remember, the source and destination MAC changes as each router hop along with the TTL
being decremented but the source and destination IP address remain the same from source to
Refer to the exhibit.
Which three statements correctly describe Network Device A? (Choose three.)
A. With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a
unique IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to
communicate with each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to
communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.
If Subnet Mask is 255.255.255.128 the hosts vary from x.x.x.0 – x.x.x.127 & x.x.x.128- x.x.x.255,so
the IP Addresses of 2 hosts fall in different subnets so each interface needs an IP an address so
that they can communicate each other.
If Subnet Mask is 255.255.255.0 the 2 specified hosts fall in different subnets so they need a
Layer 3 device to communicate.
If Subnet Mask is 255.255.254.0 the 2 specified hosts are in same subnet so are in network
address and can be accommodated in same Layer 2 domain and can communicate with each
other directly using the Layer 2 address.
Which layer in the OSI reference model is responsible for determining the availability of the
receiving program and checking to see if enough resources exist for that communication?
This question is to examine the OSI reference model.
The Application layer is responsible for identifying and establishing the availability of the intended
communication partner and determining whether sufficient resources for the intended
Which of the following describes the roles of devices in a WAN? (Choose three.)
A. A CSU/DSU terminates a digital local loop.
B. A modem terminates a digital local loop.
C. A CSU/DSU terminates an analog local loop.
D. A modem terminates an analog local loop.
E. A router is commonly considered a DTE device.
F. A router is commonly considered a DCE device.
The idea behind a WAN is to be able to connect two DTE networks together through a DCE
network. The network’s DCE device (includes CSU/DSU) provides clocking to the DTE-connected
interface (the router’s serial interface).
A modem modulates outgoing digital signals from a computer or other digital device to analog
signals for a conventional copper twisted pair telephone line and demodulates the incoming
analog signal and converts it to a digital signal for the digital device. A CSU/DSU is used between
two digital lines –
For more explanation of answer D, in telephony the local loop (also referred to as a subscriber
line) is the physical link or circuit that connects from the demarcation point of the customer
premises to the edge of the carrier or telecommunications service provider’s network. Therefore a
modem terminates an analog local loop is correct.
Refer to the exhibit.
Host A pings interface S0/0 on router 3. What is the TTL value for that ping?
From the CCNA ICND2 Exam book: “Routers decrement the TTL by 1 every time they forward a
packet; if a router decrements the TTL to 0, it throws away the packet. This prevents packets from
rotating forever.” I want to make it clear that before the router forwards a packet, the TTL is still
remain the same. For example in the topology above, pings to S0/1 and S0/0 of Router 2 have the
The picture below shows TTL values for each interface of each router and for Host B. Notice that
Host A initializes ICMP packet with a TTL of 255:
A network administrator is verifying the configuration of a newly installed host by establishing an
FTP connection to a remote server. What is the highest layer of the protocol stack that the network
administrator is using for this operation?
F. data link
FTP belongs to Application layer and it is also the highest layer of the OSI model.
Refer to the exhibit.
After HostA pings HostB, which entry will be in the ARP cache of HostA to support this
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
E. Exhibit E
F. Exhibit F
When a host needs to reach a device on another subnet, the ARP cache entry will be that of the
Ethernet address of the local router (default gateway) for the physical MAC address. The
destination IP address will not change, and will be that of the remote host (HostB).
A network interface port has collision detection and carrier sensing enabled on a shared twisted
pair network. From this statement, what is known about the network interface port?
A. This is a 10 Mb/s switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.
Modern Ethernet networks built with switches and full-duplex connections no longer utilize
CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or
A receiving host computes the checksum on a frame and determines that the frame is damaged.
The frame is then discarded. At which OSI layer did this happen?
D. data link
The Data Link layer provides the physical transmission of the data and handles error notification,
network topology, and flow control. The Data Link layer formats the message into pieces, each
called a data frame, and adds a customized header containing the hardware destination and
source address. Protocols Data Unit (PDU) on Datalink layer is called frame. According to this
question the frame is damaged and discarded which will happen at the Data Link layer.
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)
A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
The Application Layer (Layer 7) refers to communications services to applications and is the
interface between the network and the application. Examples include. Telnet, HTTP, FTP, Internet
browsers, NFS, SMTP gateways, SNMP, X.400 mail, and FTAM.
The Presentation Layer (Layer 6) defining data formats, such as ASCII text, EBCDIC text, binary,
BCD, and JPEG. Encryption also is defined as a presentation layer service. Examples include.
JPEG, ASCII, EBCDIC, TIFF, GIF, PICT, encryption, MPEG, and MIDI.
The Session Layer (Layer 5) defines how to start, control, and end communication sessions. This
includes the control and management of multiple bidirectional messages so that the application
can be notified if only some of a series of messages are completed. This allows the presentation
layer to have a seamless view of an incoming stream of data. The presentation layer can be
presented with data if all flows occur in some cases. Examples include. RPC, SQL, NFS, NetBios
names, AppleTalk ASP, and DECnet SCP
The Transport Layer (Layer 4) defines several functions, including the choice of protocols. The
most important Layer 4 functions are error recovery and flow control. The transport layer may
provide for retransmission, i.e., error recovery, and may use flow control to prevent unnecessary
congestion by attempting to send data at a rate that the network can accommodate, or it might not,
depending on the choice of protocols. Multiplexing of incoming data for different flows to
applications on the same host is also performed. Reordering of the incoming data stream when
packets arrive out of order is included. Examples include. TCP, UDP, and SPX.
The Network Layer (Layer 3) defines end-to-end delivery of packets and defines logical
addressing to accomplish this. It also defines how routing works and how routes are learned; and
how to fragment a packet into smaller packets to accommodate media with smaller maximum
transmission unit sizes. Examples include. IP, IPX, AppleTalk DDP, and ICMP. Both IP and IPX
define logical addressing, routing, the learning of routing information, and end-to-end delivery
rules. The IP and IPX protocols most closely match the OSI network layer (Layer 3) and are called
Layer 3 protocols because their functions most closely match OSI’s Layer 3.
The Data Link Layer (Layer 2) is concerned with getting data across one particular link or medium.
The data link protocols define delivery across an individual link. These protocols are necessarily
concerned with the type of media in use. Examples includE. IEEE 802.3/802.2, HDLC, Frame
Relay, PPP, FDDI, ATM, and IEEE 802.5/802.2.