200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

It is impossible to pass Cisco ccna 200 125 ebook exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed Cisco cisco 200 125 practice questions. You will get a surprising result by our Most recent CCNA Cisco Certified Network Associate CCNA (v3.0) practice guides.

P.S. Top Quality 200-125 braindumps are available on Google Drive, GET MORE: https://www.slideshare.net/reinigerodp/certleader-200-125examquestionsmaterials


New Cisco 200-125 Exam Dumps Collection (Question 11 - Question 20)

Q1. What is the effect of using the service password-encryption command?

A. Only the enable password will be encrypted.

B. Only the enable secret password will be encrypted.

C. Only passwords configured after the command has been entered will be encrypted.

D. It will encrypt the secret password and remove the enable secret password from the configuration.

E. It will encrypt all current and future passwords.

Answer: E

Explanation:

Enable vty, console, AUX passwords are configured on the Cisco device. Use the show run command to show most passwords in clear text. If the service password-encryption is used, all the passwords are encrypted. As a result, the security of device access is improved.


Q2. Which three statements about Syslog utilization are true? (Choose three.)

A. Utilizing Syslog improves network performance.

B. The Syslog server automatically notifies the network administrator of network problems.

C. A Syslog server provides the storage space necessary to store log files without using router disk space.

D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.

E. Enabling Syslog on a router automatically enables NTP for accurate time stamping.

F. A Syslog server helps in aggregation of logs and alerts.

Answer: C,D,F

Explanation:

The Syslog sender sends a small (less than 1KB) text message to the Syslog receiver. The Syslog receiver is commonly called "syslogd," "Syslog daemon," or "Syslog server." Syslog messages can be sent via UDP (port 514) and/or TCP (typically, port 5000). While there are some exceptions, such as SSL wrappers, this data is typically sent in clear text over the network. A Syslog server provides the storage space necessary to store log files without using router disk space.

In general, there are significantly more Syslog messages available within IOS as compared to SNMP Trap messages. For example, a Cisco Catalyst 6500 switch running Cisco IOS Software Release 12.2(18)SXF contains about 90 SNMP trap notification messages, but has more than 6000 Syslog event messages.

System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a UNIX-style syslog service. A syslog service accepts messages and stores them in files, or prints them according to a simple configuration file.

Reference:http://www.cisco.com/c/en/us/products/collateral/services/high-availability/white_paper_c11-557812.html


Q3. A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured?

A. the port-channel 1 interface

B. the highest number member interface

C. all member interfaces

D. the lowest number member interface

Answer: A

Explanation:

To create an EtherChannel interface and assign its IP address and subnet mask, use the following steps beginning in global configuration mode:

Command Purpose Step 1

Router(config)#interface port-channelchannel-number

Router(config-if)#

Creates the EtherChannel interface. You can configure up to 16 FECs and 1 GEC on the Catalyst 2948G-L3 and up to 4 GECs on the Catalyst 4908G-L3.

Step 2

Router(config-if)#ip addressip-address subnet-mask

Assigns an IP address and subnet mask to the EtherChannel interface.

Step 3 Router(config-if)#exit Router(config)#

Exits this mode. Optionally, you can remain in interface configuration mode and enable other supported interface commands to meet

The IP address is assigned to the port channel interface, not the underlying physical member interfaces.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2948gand4908g/12-0_7_w5_15d/configuration/guide/config/ether_ch.html


Q4. What is a valid HSRP virtual MAC address?

A. 0000.5E00.01A3

B. 0007.B400.AE01

C. 0000.0C07.AC15

D. 0007.5E00.B301

Answer: C

Explanation:

With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IP address. There are two version of HSRP.

+ With HSRP version 1, the virtual routeru2021s MAC address is 0000.0c07.ACxx , in which xx is the HSRP group.

+ With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group.

Note: Another case is HSRP for IPv6, in which the MAC address range from 0005.73A0.0000 through 0005.73A0.0FFF.


Q5. Which command enables RSTP on a switch?

A. spanning-tree uplinkfast

B. spanning-tree mode rapid-pvst

C. spanning-tree backbonefast

D. spanning-tree mode mst

Answer: B

Explanation:

Rapid Spanning Tree Protocol (RSTP) is an enhancement of the original STP 802.1D protocol. The RSTP 802.1w protocol is an IEEE open implementation. Cisco has its own proprietary implementation of RSTP, that includes the benefits of its Per-VLAN spanning tree protocols, called Rapid-PVST+.

To activate the Rapid-PVST+ protocol: switch(config)#spanning-tree mode rapid-pvst


Q6. What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C

Explanation:

Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.

After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA is copied and forwarded to every neighbor except the one that sent the LSA.


Q7. Refer to the exhibit.

All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)

A. Network A - 172.16.3.48/26

B. Network A - 172.16.3.128/25

C. Network A - 172.16.3.192/26

D. Link A - 172.16.3.0/30

E. Link A - 172.16.3.40/30

F. Link A - 172.16.3.112/30

Answer: B,D

Explanation:

Only a /30 is needed for the point to point link and sine the use of the ip subnet-zero was used, 172.16.3.0/30 is valid. Also, a /25 is required for 120 hosts and again

172.16.3.128/25 is the best, valid option.


Q8. The network administrator cannot connect to Switch1 over a Telnet session, although the hosts attached to Switch1 can ping the interface Fa0/0 of the router.

Given the information in the graphic and assuming that the router and Switch2 are configured properly, which of the following commands should be issued on Switch1 to correct this problem?

A. Switch1(config)# line con0 Switch1(config-line)# password cisco Switch1(config-line)#login

B. Switch1(config)# interface fa0/1

Switch1(config-if)# ip address 192.168.24.3 255.255.255.0

C. Switch1(config)# ip default-gateway 192.168.24.1

D. Switch1(config)# interface fa0/1 Switch1(config-if)# duplex full

Switch1(config-if)# speed 100

E. Switch1(config)# interface fa0/1 Switch1(config-if)# switchport mode trunk

Answer: C

Explanation:

Since we know hosts can reach the router through the switch, we know that connectivity, duplex. Speed, etc. are good. However, for the switch itself to reach networks outside the local one, the ip default-gateway command must be used.


Q9. Refer to the exhibit.

What is the meaning of the term dynamic as displayed in the output of the show frame- relay map command shown?

A. The Serial0/0 interface is passing traffic.

B. The DLCI 100 was dynamically allocated by the router.

C. The Serial0/0 interface acquired the IP address of 172.16.3.1 from a DHCP server.

D. The DLCI 100 will be dynamically changed as required to adapt to changes in the Frame Relay cloud.

E. The mapping between DLCI 100 and the end station IP address 172.16.3.1 was learned

through Inverse ARP.

Answer: E

Explanation:

Inverse Address Resolution Protocol (Inverse ARP) was developed to provide a mechanism for dynamic DLCI to Layer 3 address maps. Inverse ARP works much the same way Address Resolution Protocol (ARP) works on a LAN. However, with ARP, the device knows the Layer 3 IP address and needs to know the remote data link MAC address. With Inverse ARP, the router knows the Layer 2 address which is the DLCI, but needs to know the remote Layer 3 IP address.

When using dynamic address mapping, Inverse ARP requests a next-hop protocol address for each active PVC. Once the requesting router receives an Inverse ARP response, it updates its DLCI-to-Layer 3 address mapping table. Dynamic address mapping is enabled by default for all protocols enabled on a physical interface. If the Frame Relay environment supports LMI autosensing and Inverse ARP, dynamic address mapping takes place automatically. Therefore, no static address mapping is required.


Q10. What are the possible trunking modes for a switch port? (Choose three.)

A. transparent

B. auto

C. on

D. desirable

E. client

F. forwarding

Answer: B,C,D

Explanation:

These are the different types of trunk modes:

u2711 ON: This mode puts the port into permanent trunk mode and negotiates to convert the link into a trunk link. The port becomes a trunk port even if the adjacent port does not agree to the change.

u2711 OFF: This mode puts the port into permanent non-trunk mode and negotiates to convert the link into a non-trunk link. The port becomes a non-trunk port even if the adjacent port does not agree to the change.

u2711 Desirable: This mode causes the port to actively attempt to convert the link into a trunk link. The port becomes a trunk port if the adjacent port is set to on, desirable, or auto mode.

u2711 Auto: This mode enables the port to convert the link into a trunk link. The port becomes a trunk port if the adjacent port is set to on or desirable mode. This is the default mode for Fast and Gigabit Ethernet ports.

u2711 Nonegotiate: This mode puts the port into permanent trunk mode, but does not allow the port to generate Dynamic Trunking Protocol (DTP) frames. The adjacent port must be configured manually as a trunk port to establish a trunk link.


Recommend!! Get the Top Quality 200-125 dumps in VCE and PDF From Certifytools, Welcome to download: https://www.certifytools.com/200-125-exam.html (New 890 Q&As Version)