200-301 domain

Security Fundamentals

Use this page to practise 200-301 Security Fundamentals practice questions. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.

121 questions

Focused practice

Start a Security Fundamentals session

All sessions draw only from this domain. Pick a length or try interactive practice with inline explanations.

Start 20-question practice session →

What the exam tests

What to know about Security Fundamentals

Security Fundamentals questions test whether you can apply the concept in context, not just recognise a definition.

How the topic appears in realistic exam-style scenarios.

Which detail in the question changes the correct answer.

How to eliminate plausible but wrong options.

How to connect the question back to the wider exam objective.

Question index

All Security Fundamentals questions (121)

Click any question to see the full explanation, or start a practice session above.

1

A router interface applies this ACL inbound: 10 deny tcp any any eq 80 20 permit ip any any A user reports that web browsing to a server by IP address fails, but ping works. Which statement best explains the behavior?

2

A switch has DHCP snooping enabled, but users still experience IP-to-MAC spoofing attacks. Which additional feature should be considered to help address that specific problem?

3

What does switchport port-security primarily protect against on an access port?

4

In AAA, what does the second A stand for?

5

Which ACL type can filter using source and destination IP addresses as well as TCP or UDP port numbers?

6

Which wireless security method is considered strongest among these choices for modern enterprise WLAN deployments?

7

Which feature helps prevent a rogue DHCP server from handing out addresses on a campus switch network?

8

A network engineer successfully logs in to a router, but cannot enter configuration mode because the command is rejected by policy. Which AAA function is controlling this behavior?

9

Which switch security feature uses DHCP snooping bindings to validate ARP packets and help stop ARP spoofing?

10

An ACL permits only tcp 10.10.10.0/24 host 192.0.2.10 eq 443 and has no other permit entries. What happens to an ICMP echo request from 10.10.10.5 to 192.0.2.10?

11

What problem does DHCP snooping help prevent?

12

Which port-security violation mode drops frames from unauthorized MAC addresses but keeps the interface up and does not send an SNMP trap or syslog message?

13

Why is SSH preferred over Telnet for remote device administration?

14

In AAA, which function determines what an authenticated user is allowed to do after login?

15

Why is Telnet generally discouraged for network device administration?

16

As a general rule, where should an extended ACL be placed?

17

A switchport is configured for 802.1X authentication. What is the usual role of the RADIUS server in that design?

18

A switch has DHCP snooping enabled and Dynamic ARP Inspection enabled on VLAN 30. A printer with a static IP on VLAN 30 cannot communicate because its ARP packets are being dropped. What is the best fix?

19

Which security concept gives a user only the permissions required to perform assigned tasks and nothing more?

20

What does the confidentiality objective of the CIA triad focus on?

21

Dynamic ARP Inspection is most effective at preventing which attack?

22

What is the main purpose of an allowlist-based firewall policy compared with a denylist-based one?

23

Why is multifactor authentication generally stronger than password-only access?

24

Which two features commonly strengthen access-switch security for user-facing ports? (Choose two.)

25

A switch port is configured with port security using these commands: switchport port-security switchport port-security maximum 2 switchport port-security violation restrict switchport port-security mac-address sticky A user unplugs a company laptop and connects a different unauthorized device. The interface stays up/up, but the new device has no connectivity. Which statement best explains what happened?

26

An engineer wants users to get fast link-up on access ports but also wants the switch to disable a port if another switch is connected and sends BPDUs. Which combination of features best meets that requirement?

27

Users in 10.10.10.0/24 must be prevented from reaching the web server at 172.16.1.10 over HTTP, but all other traffic should be allowed. Which ACL entry should appear first in the ACL?

28

A host at 192.168.50.10/24 needs to send traffic to 192.168.60.20. Which MAC address will it normally place in the Ethernet destination field for the first frame?

29

What does the second 'A' in AAA stand for?

30

Users on the inside network can browse the web, but return traffic is failing for some sessions. Based on the configuration, which change is required to make PAT work correctly?

31

An administrator wants to permit SSH management access but block Telnet access to a device. Which statement best reflects that design goal?

32

Match each security concept to its most accurate purpose.

33

Which security concept is most closely associated with ensuring data has not been altered in an unauthorized way?

34

Which two statements accurately describe ACL behavior on Cisco devices?

35

A company wants to reduce the chance that unused switch ports can be exploited. Which action best aligns with that goal?

36

Which statement best describes the purpose of accounting in AAA?

37

A switch should disable an edge port immediately if a BPDU is received on it. Which feature is intended for that specific behavior?

38

Which two actions are reasonable examples of basic device-hardening practice?

39

Match each security term to its most accurate meaning.

40

Which statement best explains why SSH is preferred over Telnet for remote administration?

41

Which term in the CIA triad refers to ensuring systems and data remain accessible when needed?

42

Match each AAA component or related term to its most accurate meaning.

43

Which two statements accurately describe basic WLAN security at the CCNA level?

44

Which statement best describes confidentiality in the CIA triad?

45

A device allows remote access, but the administrator wants stronger protection than plain usernames and passwords alone. Which statement best reflects that goal at a conceptual level?

46

Match each security concept to its most accurate role.

47

Which statement best describes the purpose of authorization in AAA?

48

An engineer wants remote administrative access to remain available but also wants session contents protected in transit. Which management choice best supports that goal?

49

Which statement best describes why disabling unused switch ports is considered a hardening measure?

50

Match each remote-management concept to its most accurate description.

51

Match each security term to the question it most directly answers.

52

What is the main security benefit of using the principle of least privilege?

53

Which statement best describes why a management network should prefer SSH over Telnet?

54

Match each security control idea to its most accurate purpose.

55

Which statement best describes integrity in the CIA triad?

56

Which statement best describes why least privilege is useful even for trusted users?

57

A switchport is configured with sticky MAC learning and a maximum secure MAC value of 2. What is the main benefit of sticky learning in this situation?

58

Match each access-control concept to its most accurate meaning.

59

Which statement best explains the purpose of confidentiality in the CIA triad?

60

Which statement best explains the security value of SSH for device management?

61

Match each security principle or control to its most accurate meaning.

62

Match each security-related term to its most accurate meaning.

63

Which statement best describes why least privilege is useful for administrative accounts?

64

Which statement best describes why SSH is safer than Telnet for remote administration?

65

A company wants unauthorized devices plugged into unused wall ports to have as little chance of gaining access as possible. Which action most directly supports that goal?

66

Match each basic security term to its most accurate meaning.

67

Match each access-control term to its most accurate meaning.

68

Why is administratively shutting down unused switch ports considered a useful hardening practice?

69

Which statement best describes the security value of least privilege?

70

Match each management or monitoring concept to its most accurate role.

71

Why is shutting down unused switch ports considered a useful hardening measure?

72

Which statement best describes availability in the CIA triad?

73

Match each term to the question it most directly answers.

74

Which statement best explains why SSH is safer than Telnet for remote management?

75

Why is administratively shutting down unused switch ports considered a useful hardening measure?

76

Users in 10.10.10.0/24 must be prevented from reaching the web server at 172.16.1.10 over HTTP, but all other traffic should be allowed. Which ACL entry best matches the requirement?

77

Match each ACL-related term to its most accurate description.

78

What is the main reason extended ACLs are often placed closer to the source of the traffic being filtered?

79

Match each security concept to its most accurate meaning.

80

An ACL is intended to block Telnet from 10.1.1.0/24 to router VTY access while still allowing SSH from the same subnet. Which statement best explains why an extended ACL is appropriate here?

81

Which statement best explains why an ACL that lacks a needed permit statement can block legitimate traffic even if no explicit deny for that traffic exists?

82

What is the main effect of the implicit deny at the end of an ACL?

83

A standard ACL and an extended ACL are both available for a design. Which requirement most strongly indicates that an extended ACL is needed?

84

A security policy requires that only one management subnet be able to initiate SSH to a router. Which approach most directly supports that requirement?

85

Why is disabling unused services on network devices considered a sound security practice?

86

An administrator wants to block all Telnet access to a router’s VTY lines and allow only SSH. Which change most directly supports that goal?

87

Match each management-plane security item to its most accurate purpose.

88

An administrator wants to allow HTTPS traffic from a source subnet to a server but deny all Telnet traffic from that same subnet to the same server. Which ACL capability is required to express that policy accurately?

89

A router allows SSH management from anywhere on the internal network. A new policy requires that only the management subnet 10.50.50.0/24 be allowed to initiate SSH to the device. Which approach best enforces that requirement?

90

Which statement best explains why using SSH alone is not always enough for strong management-plane security?

91

Which statement best explains why least privilege remains important even when administrators already use SSH and named accounts?

92

Which two statements accurately describe good management-plane security practice on network devices?

93

An administrator wants to prevent a specific subnet from using Telnet to reach network devices, while still allowing SSH from that same subnet. What is the strongest reason a standard ACL is not enough by itself?

94

A security team wants device administrators to log in with individual named accounts instead of sharing one generic admin account. Which security objective does that most directly improve?

95

Match each security control or idea to its most accurate purpose.

96

An administrator wants to prevent users from browsing to one specific web server while still allowing them to reach other web destinations. Which ACL design principle is most important here?

97

Which statement best explains why named user accounts plus logging provide better security operations than a shared admin account without activity records?

98

Which statement best describes why layered controls are preferred for administrative access instead of relying on only one mechanism?

99

Which statement best describes why authorization is different from authentication in AAA?

100

Which statement best describes why accounting in AAA is useful even when authentication and authorization are already configured?

101

Which statement best describes why administrative access should ideally come from a dedicated management subnet rather than from general user subnets?

102

Which two statements accurately describe why SSH is preferred over Telnet for device administration?

103

A switch is configured with DHCP snooping and Dynamic ARP Inspection. Hosts suddenly lose connectivity after changing IP settings manually. Which explanation is strongest?

104

An engineer is allowed to log in to a router but cannot enter configuration mode. Which AAA function most directly explains that outcome?

105

Which statement best explains why secure transport, identity verification, permission control, and logging are all useful together in device administration?

106

Which two statements accurately describe why logs and accounting records both matter in secure operations?

107

A device administrator can log in securely over SSH, but the organization still insists on restricting source IP ranges and keeping detailed logs. Which statement best explains that decision?

108

Based on the exhibit, what is the most likely reason PAT is not working correctly?

109

Which two statements accurately describe the purpose of least privilege in administration and operations?

110

Based on the exhibit, which ACL entry should be placed first to block HTTP from 10.10.10.0/24 to the web server while allowing all other traffic?

111

Which statement best describes why named accounts plus logging are stronger together than either control alone?

112

Based on the exhibit, why is the ACL not meeting the requirement to block only HTTPS traffic to the server?

113

Which two statements accurately describe the value of source restriction on administrative access?

114

Which statement best describes why source restriction does not replace the need for strong authentication?

115

Which two statements accurately describe why least privilege and source restriction work well together for administrative access?

116

A user can authenticate successfully to a network device but is denied access to certain commands. Which statement best explains the situation?

117

Based on the exhibit, why is the ACL blocking more traffic than intended?

118

Based on the exhibit, why does the ACL still allow HTTPS traffic from the branch subnet to the server?

119

Which two statements accurately describe the value of named administrative accounts?

120

Which two statements accurately describe why source restriction and logging are often used together for administrative access?

121

Based on the exhibit, why is this ACL failing to block only SSH traffic from the branch subnet to the router?

Watch out for

Common Security Fundamentals exam traps

  • Answering from memory before reading the full scenario.
  • Missing a constraint such as cost, availability, security, scope or command context.
  • Choosing a broad answer when the question asks for the most specific fix.
  • Ignoring why the wrong options are tempting.

Frequently asked questions

What does the Security Fundamentals domain cover on the 200-301 exam?
Security Fundamentals questions test whether you can apply the concept in context, not just recognise a definition.
How many questions are in this domain?
This page lists all 121 Security Fundamentals questions in the 200-301 question bank. The actual exam draws from this domain proportionally to its weighting in the official exam blueprint.
What is the best way to practise this domain?
Start with a short focused session (10 questions) to identify gaps, then use the interactive practice page to work through explanations. Repeat with a longer session once the weak areas feel solid.
Can I practise only Security Fundamentals questions?
Yes — the session launcher on this page filters questions to this domain only. Choose any session length or try the interactive practice page for inline explanations.