200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

It is more faster and easier to pass the Cisco ccna 200 125 book exam by using Printable Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) questuins and answers. Immediate access to the Renewal ccna 200 125 book Exam and find the same core area ccna 200 125 torrent questions with professionally verified answers, then PASS your exam with a high score now.

P.S. Printable 200-125 training materials are available on Google Drive, GET MORE: https://drive.google.com/open?id=1h4WwjNBP_fjjnxXJLxNgPsEiO-cPwGBa


New Cisco 200-125 Exam Dumps Collection (Question 15 - Question 24)

Q15. Refer to the exhibit.

A technician has installed SwitchB and needs to configure it for remote access from the management workstation connected to SwitchA. Which set of commands is required to accomplish this task?

A. SwitchB(config)# interface FastEthernet 0/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown

B. SwitchB(config)# interface vlan 1

SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0

SwitchB(config-if)# ip default-gateway 192.168.8.254 255.255.255.0 SwitchB(config-if)# no shutdown

C. SwitchB(config)# ip default-gateway 192.168.8.254 SwitchB(config)# interface vlan 1

SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown

D. SwitchB(config)# ip default-network 192.168.8.254 SwitchB(config)# interface vlan 1

SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown

E. SwitchB(config)# ip route 192.168.8.254 255.255.255.0 SwitchB(config)# interface FastEthernet 0/1

SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown

Answer: C

Explanation:

To remote access to SwitchB, it must have a management IP address on a VLAN on that

switch. Traditionally, we often use VLAN 1 as the management VLAN (but in fact it is not secure).

In the exhibit, we can recognize that the Management Workstation is in a different subnet from the SwitchB. For intersubnetwork communication to occur, you must configure at least one default gateway. This default gateway is used to forward traffic originating from the switch only, not to forward traffic sent by devices connected to the switch.


Q16. What are three advantages of VLANs? (Choose three.)

A. VLANs establish broadcast domains in switched networks.

B. VLANs utilize packet filtering to enhance network security.

C. VLANs provide a method of conserving IP addresses in large networks.

D. VLANs provide a low-latency internetworking alternative to routed networks.

E. VLANs allow access to network services based on department, not physical location.

F. VLANs can greatly simplify adding, moving, or changing hosts on the network.

Answer: A,E,F

Explanation:

VLAN technology is often used in practice, because it can better control layer2 broadcast to improve network security. This makes network more flexible and scalable.

Packet filtering is a function of firewall instead of VLAN.


Q17. Which two options are valid WAN connectivity methods? (Choose two.)

A. PPP

B. WAP

C. DSL

D. L2TPv3

E. Ethernet

Answer: A,C

Explanation:

The Point-to-Point Protocol (PPP) provides a standard method for transporting multi- protocol datagrams over point-to-point links. PPP was originally emerged as an encapsulation protocol for transporting IP traffic between two peers. It is a data link layer protocol used for WAN connections.

DSL is also considered a WAN connection, as it can be used to connect networks, typically when used with VPN technology.


Q18. Which statement describes the process ID that is used to run OSPF on a router?

A. It is globally significant and is used to represent the AS number.

B. It is locally significant and is used to identify an instance of the OSPF database.

C. It is globally significant and is used to identify OSPF stub areas.

D. It is locally significant and must be the same throughout an area.

Answer: B

Explanation:

The Process ID for OSPF on a router is only locally significant and you can use the same number on each router, or each router can have a different number-it just doesn't matter. The numbers you can use are from 1 to 65,535. Don't get this confused with area numbers, which can be from 0 to 4.2 billion.


Q19. Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

A. RSA

B. L2TP

C. IPsec

D. PPTP

Answer: C

Explanation:

IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPSec can be used to protect one or more data flows between IPSec peers.


Q20. Which three elements must be used when you configure a router interface for VLAN trunking? (Choose three.)

A. one physical interface for each subinterface

B. one IP network or subnetwork for each subinterface

C. a management domain for each subinterface

D. subinterface encapsulation identifiers that match VLAN tags

E. one subinterface per VLAN

F. subinterface numbering that matches VLAN tags

Answer: B,D,E

Explanation:

This scenario is commonly called a router on a stick. A short, well written article on this operation can be found here: http://www.thebryantadvantage.com/RouterOnAStickCCNACertificationExamTutorial.htm


Q21. Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

A. SNMPv3 enhanced SNMPv2 security features.

B. SNMPv3 added the Inform protocol message to SNMP.

C. SNMPv2 added the Inform protocol message to SNMP.

D. SNMPv3 added the GetBulk protocol messages to SNMP.

E. SNMPv2 added the GetBulk protocol message to SNMP.

F. SNMPv2 added the GetNext protocol message to SNMP.

Answer: A,C,E

Explanation:

SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct.

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.

Note: These two messages are carried over SNMPv3.


Q22. Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.)

A. show interface trunk

B. show interface interface

C. show ip interface brief

D. show interface vlan

E. show interface switchport

Answer: A,E

Explanation:

Example output from these two commands: SW3#show interface trunk

Port Mode Encapsulation Status Native vlan Fa0/19 auto n-802.1q trunking 1

Fa0/20 auto n-802.1q trunking 1 Fa0/21 auto n-802.1q trunking 1 Fa0/22 auto n-802.1q trunking 1 Port Vlans allowed on trunk Fa0/19 1-4094

Fa0/20 1-4094

Fa0/21 1-4094

Fa0/22 1-4094

SW1#show interface fast 0/2 switchport Name: Fa0/2

Switchport: Enabled

Administrative Mode: dynamic desirable Operational Mode: down

Administrative Trunking Encapsulation: dot1q Negotiation of TrunkinG. On

Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Voice VLAN: none


Q23. Which two statistics appear in show frame-relay map output? (Choose two.)

A. the number of BECN packets that are received by the router

B. the value of the local DLCI

C. the number of FECN packets that are received by the router

D. the status of the PVC that is configured on the router

E. the IP address of the local router

Answer: B,D

Explanation:

Sample u201cshow frame-relay mapu201d output: R1#sh frame map

Serial0/0 (up): ip 10.4.4.1dlci 401(0x191,0x6410), dynamic, broadcast,,status defined, active

Serial0/0 (up): ip 10.4.4.3dlci 403(0x193,0x6430), dynamic, broadcast,,status defined, active

Serial0/0 (up): ip 10.4.4.4dlci 401(0x191,0x6410), static, CISCO,status defined, active


Q24. When a router undergoes the exchange protocol within OSPF, in what order does it pass through each state?

A. exstart state > loading state > exchange state > full state

B. exstart state > exchange state > loading state > full state

C. exstart state > full state > loading state > exchange state

D. loading state > exchange state > full state > exstart state

Answer: B

Explanation:

When OSPF adjacency is formed, a router goes through several state changes before it becomes fully adjacent with its neighbor. Those states are defined in the OSPF RFC 2328, section 10.1. The states are (in order) Down, Attempt, Init, 2-Way, Exstart, Exchange, Loading, and Full.

Reference:http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first- ospf/13685-13.html


Recommend!! Get the Printable 200-125 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-200-125/ (New 889 Q&As Version)