200-301 domain
Security Fundamentals
Use this page to practise 200-301 Security Fundamentals practice questions. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.
Focused practice
Start a Security Fundamentals session
All sessions draw only from this domain. Pick a length or try interactive practice with inline explanations.
Start 20-question practice session →What the exam tests
What to know about Security Fundamentals
Security Fundamentals questions test whether you can apply the concept in context, not just recognise a definition.
How the topic appears in realistic exam-style scenarios.
Which detail in the question changes the correct answer.
How to eliminate plausible but wrong options.
How to connect the question back to the wider exam objective.
Question index
All Security Fundamentals questions (121)
Click any question to see the full explanation, or start a practice session above.
A router interface applies this ACL inbound: 10 deny tcp any any eq 80 20 permit ip any any A user reports that web browsing to a server by IP address fails, but ping works. Which statement best explains the behavior?
2A switch has DHCP snooping enabled, but users still experience IP-to-MAC spoofing attacks. Which additional feature should be considered to help address that specific problem?
3What does switchport port-security primarily protect against on an access port?
4In AAA, what does the second A stand for?
5Which ACL type can filter using source and destination IP addresses as well as TCP or UDP port numbers?
6Which wireless security method is considered strongest among these choices for modern enterprise WLAN deployments?
7Which feature helps prevent a rogue DHCP server from handing out addresses on a campus switch network?
8A network engineer successfully logs in to a router, but cannot enter configuration mode because the command is rejected by policy. Which AAA function is controlling this behavior?
9Which switch security feature uses DHCP snooping bindings to validate ARP packets and help stop ARP spoofing?
10An ACL permits only tcp 10.10.10.0/24 host 192.0.2.10 eq 443 and has no other permit entries. What happens to an ICMP echo request from 10.10.10.5 to 192.0.2.10?
11What problem does DHCP snooping help prevent?
12Which port-security violation mode drops frames from unauthorized MAC addresses but keeps the interface up and does not send an SNMP trap or syslog message?
13Why is SSH preferred over Telnet for remote device administration?
14In AAA, which function determines what an authenticated user is allowed to do after login?
15Why is Telnet generally discouraged for network device administration?
16As a general rule, where should an extended ACL be placed?
17A switchport is configured for 802.1X authentication. What is the usual role of the RADIUS server in that design?
18A switch has DHCP snooping enabled and Dynamic ARP Inspection enabled on VLAN 30. A printer with a static IP on VLAN 30 cannot communicate because its ARP packets are being dropped. What is the best fix?
19Which security concept gives a user only the permissions required to perform assigned tasks and nothing more?
20What does the confidentiality objective of the CIA triad focus on?
21Dynamic ARP Inspection is most effective at preventing which attack?
22What is the main purpose of an allowlist-based firewall policy compared with a denylist-based one?
23Why is multifactor authentication generally stronger than password-only access?
24Which two features commonly strengthen access-switch security for user-facing ports? (Choose two.)
25A switch port is configured with port security using these commands: switchport port-security switchport port-security maximum 2 switchport port-security violation restrict switchport port-security mac-address sticky A user unplugs a company laptop and connects a different unauthorized device. The interface stays up/up, but the new device has no connectivity. Which statement best explains what happened?
26An engineer wants users to get fast link-up on access ports but also wants the switch to disable a port if another switch is connected and sends BPDUs. Which combination of features best meets that requirement?
27Users in 10.10.10.0/24 must be prevented from reaching the web server at 172.16.1.10 over HTTP, but all other traffic should be allowed. Which ACL entry should appear first in the ACL?
28A host at 192.168.50.10/24 needs to send traffic to 192.168.60.20. Which MAC address will it normally place in the Ethernet destination field for the first frame?
29What does the second 'A' in AAA stand for?
30Users on the inside network can browse the web, but return traffic is failing for some sessions. Based on the configuration, which change is required to make PAT work correctly?
31An administrator wants to permit SSH management access but block Telnet access to a device. Which statement best reflects that design goal?
32Match each security concept to its most accurate purpose.
33Which security concept is most closely associated with ensuring data has not been altered in an unauthorized way?
34Which two statements accurately describe ACL behavior on Cisco devices?
35A company wants to reduce the chance that unused switch ports can be exploited. Which action best aligns with that goal?
36Which statement best describes the purpose of accounting in AAA?
37A switch should disable an edge port immediately if a BPDU is received on it. Which feature is intended for that specific behavior?
38Which two actions are reasonable examples of basic device-hardening practice?
39Match each security term to its most accurate meaning.
40Which statement best explains why SSH is preferred over Telnet for remote administration?
41Which term in the CIA triad refers to ensuring systems and data remain accessible when needed?
42Match each AAA component or related term to its most accurate meaning.
43Which two statements accurately describe basic WLAN security at the CCNA level?
44Which statement best describes confidentiality in the CIA triad?
45A device allows remote access, but the administrator wants stronger protection than plain usernames and passwords alone. Which statement best reflects that goal at a conceptual level?
46Match each security concept to its most accurate role.
47Which statement best describes the purpose of authorization in AAA?
48An engineer wants remote administrative access to remain available but also wants session contents protected in transit. Which management choice best supports that goal?
49Which statement best describes why disabling unused switch ports is considered a hardening measure?
50Match each remote-management concept to its most accurate description.
51Match each security term to the question it most directly answers.
52What is the main security benefit of using the principle of least privilege?
53Which statement best describes why a management network should prefer SSH over Telnet?
54Match each security control idea to its most accurate purpose.
55Which statement best describes integrity in the CIA triad?
56Which statement best describes why least privilege is useful even for trusted users?
57A switchport is configured with sticky MAC learning and a maximum secure MAC value of 2. What is the main benefit of sticky learning in this situation?
58Match each access-control concept to its most accurate meaning.
59Which statement best explains the purpose of confidentiality in the CIA triad?
60Which statement best explains the security value of SSH for device management?
61Match each security principle or control to its most accurate meaning.
62Match each security-related term to its most accurate meaning.
63Which statement best describes why least privilege is useful for administrative accounts?
64Which statement best describes why SSH is safer than Telnet for remote administration?
65A company wants unauthorized devices plugged into unused wall ports to have as little chance of gaining access as possible. Which action most directly supports that goal?
66Match each basic security term to its most accurate meaning.
67Match each access-control term to its most accurate meaning.
68Why is administratively shutting down unused switch ports considered a useful hardening practice?
69Which statement best describes the security value of least privilege?
70Match each management or monitoring concept to its most accurate role.
71Why is shutting down unused switch ports considered a useful hardening measure?
72Which statement best describes availability in the CIA triad?
73Match each term to the question it most directly answers.
74Which statement best explains why SSH is safer than Telnet for remote management?
75Why is administratively shutting down unused switch ports considered a useful hardening measure?
76Users in 10.10.10.0/24 must be prevented from reaching the web server at 172.16.1.10 over HTTP, but all other traffic should be allowed. Which ACL entry best matches the requirement?
77Match each ACL-related term to its most accurate description.
78What is the main reason extended ACLs are often placed closer to the source of the traffic being filtered?
79Match each security concept to its most accurate meaning.
80An ACL is intended to block Telnet from 10.1.1.0/24 to router VTY access while still allowing SSH from the same subnet. Which statement best explains why an extended ACL is appropriate here?
81Which statement best explains why an ACL that lacks a needed permit statement can block legitimate traffic even if no explicit deny for that traffic exists?
82What is the main effect of the implicit deny at the end of an ACL?
83A standard ACL and an extended ACL are both available for a design. Which requirement most strongly indicates that an extended ACL is needed?
84A security policy requires that only one management subnet be able to initiate SSH to a router. Which approach most directly supports that requirement?
85Why is disabling unused services on network devices considered a sound security practice?
86An administrator wants to block all Telnet access to a router’s VTY lines and allow only SSH. Which change most directly supports that goal?
87Match each management-plane security item to its most accurate purpose.
88An administrator wants to allow HTTPS traffic from a source subnet to a server but deny all Telnet traffic from that same subnet to the same server. Which ACL capability is required to express that policy accurately?
89A router allows SSH management from anywhere on the internal network. A new policy requires that only the management subnet 10.50.50.0/24 be allowed to initiate SSH to the device. Which approach best enforces that requirement?
90Which statement best explains why using SSH alone is not always enough for strong management-plane security?
91Which statement best explains why least privilege remains important even when administrators already use SSH and named accounts?
92Which two statements accurately describe good management-plane security practice on network devices?
93An administrator wants to prevent a specific subnet from using Telnet to reach network devices, while still allowing SSH from that same subnet. What is the strongest reason a standard ACL is not enough by itself?
94A security team wants device administrators to log in with individual named accounts instead of sharing one generic admin account. Which security objective does that most directly improve?
95Match each security control or idea to its most accurate purpose.
96An administrator wants to prevent users from browsing to one specific web server while still allowing them to reach other web destinations. Which ACL design principle is most important here?
97Which statement best explains why named user accounts plus logging provide better security operations than a shared admin account without activity records?
98Which statement best describes why layered controls are preferred for administrative access instead of relying on only one mechanism?
99Which statement best describes why authorization is different from authentication in AAA?
100Which statement best describes why accounting in AAA is useful even when authentication and authorization are already configured?
101Which statement best describes why administrative access should ideally come from a dedicated management subnet rather than from general user subnets?
102Which two statements accurately describe why SSH is preferred over Telnet for device administration?
103A switch is configured with DHCP snooping and Dynamic ARP Inspection. Hosts suddenly lose connectivity after changing IP settings manually. Which explanation is strongest?
104An engineer is allowed to log in to a router but cannot enter configuration mode. Which AAA function most directly explains that outcome?
105Which statement best explains why secure transport, identity verification, permission control, and logging are all useful together in device administration?
106Which two statements accurately describe why logs and accounting records both matter in secure operations?
107A device administrator can log in securely over SSH, but the organization still insists on restricting source IP ranges and keeping detailed logs. Which statement best explains that decision?
108Based on the exhibit, what is the most likely reason PAT is not working correctly?
109Which two statements accurately describe the purpose of least privilege in administration and operations?
110Based on the exhibit, which ACL entry should be placed first to block HTTP from 10.10.10.0/24 to the web server while allowing all other traffic?
111Which statement best describes why named accounts plus logging are stronger together than either control alone?
112Based on the exhibit, why is the ACL not meeting the requirement to block only HTTPS traffic to the server?
113Which two statements accurately describe the value of source restriction on administrative access?
114Which statement best describes why source restriction does not replace the need for strong authentication?
115Which two statements accurately describe why least privilege and source restriction work well together for administrative access?
116A user can authenticate successfully to a network device but is denied access to certain commands. Which statement best explains the situation?
117Based on the exhibit, why is the ACL blocking more traffic than intended?
118Based on the exhibit, why does the ACL still allow HTTPS traffic from the branch subnet to the server?
119Which two statements accurately describe the value of named administrative accounts?
120Which two statements accurately describe why source restriction and logging are often used together for administrative access?
121Based on the exhibit, why is this ACL failing to block only SSH traffic from the branch subnet to the router?
Watch out for
Common Security Fundamentals exam traps
- ▸Answering from memory before reading the full scenario.
- ▸Missing a constraint such as cost, availability, security, scope or command context.
- ▸Choosing a broad answer when the question asks for the most specific fix.
- ▸Ignoring why the wrong options are tempting.
Frequently asked questions
- What does the Security Fundamentals domain cover on the 200-301 exam?
- Security Fundamentals questions test whether you can apply the concept in context, not just recognise a definition.
- How many questions are in this domain?
- This page lists all 121 Security Fundamentals questions in the 200-301 question bank. The actual exam draws from this domain proportionally to its weighting in the official exam blueprint.
- What is the best way to practise this domain?
- Start with a short focused session (10 questions) to identify gaps, then use the interactive practice page to work through explanations. Repeat with a longer session once the weak areas feel solid.
- Can I practise only Security Fundamentals questions?
- Yes — the session launcher on this page filters questions to this domain only. Choose any session length or try the interactive practice page for inline explanations.