we provide Certified Cisco 125 200 exam cost which are the best for clearing 200 125 ccna test, and to get certified by Cisco CCNA Cisco Certified Network Associate CCNA (v3.0). The ccna 200 125 ebook Questions & Answers covers all the knowledge points of the real ccna 200 125 torrent exam. Crack your Cisco cisco 200 125 Exam with latest dumps, guaranteed!
P.S. Certified 200-125 bundle are available on Google Drive, GET MORE: https://drive.google.com/open?id=1OzZ4eFC1XI8L79-k0OIZGdrxMXtPVcLb
Question No: 1
What command sequence will configure a router to run OSPF and add network 10.1.1.0/24 to area 0?
A. router ospf area 0
network 10.1.1.0 255.255.255.0 area 0
B. router ospf
network 10.1.1.0 0.0.0.255
C. router ospf 1
network 10.1.1.0 0.0.0.255 area 0
D. router ospf area 0
network 10.1.1.0 0.0.0.255 area 0
E. router ospf
network 10.1.1.0 255.255.255.0 area 0
F. router ospf 1
network 10.1.1.0 0.0.0.255
Answer: C
Explanation:
u2711 Enabling OSPF
SUMMARY STEPS
1.enable 2.configureterminal 3.router ospfprocess-id
4.networkip-addresswildcard-maskareaarea-id 5.end
DETAILED STEPS
Command or Action Purpose
Step 1 Enable
Example:
Device> enable
Enables privileged EXEC mode.
u2711 Enter your password if prompted.
Step 2 Configureterminal
Example:
Device# configure terminal Enters global configuration mode.
Step 3
router ospfprocess-id
Example:
Device(config)# router ospf 109
Enables OSPF routing and enters router configuration mode.
Step 4
Networkip-addresswildcard-maskareaarea-id
Example:
Device(config-router)# network 192.168.129.16 0.0.0.3 area 0
Defines an interface on which OSPF runs and defines the area ID for that interface.
Step 5 End
Example:
Device(config-router)# end
Exits router configuration mode and returns to privileged EXEC mode.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/12-4t/iro-12-4t-book/iro-cfg.html#GUID-588D1301-F63C-4DAC-BF1C-C3735EB13673
Question No: 2
Refer to the exhibit.
For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)
A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.
B. Router1 is acting as a TFTP server for other routers.
C. Router1 cannot locate a valid IOS image in flash memory.
D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E. Cisco routers will first attempt to load an image from TFTP for management purposes.
Answer: A,C
Explanation:
The loading sequence of CISCO IOS is as follows: Booting up the router and locating the Cisco IOS
1. POST (power on self-test)
2. Bootstrap code executed
3. Check Configuration Register value (NVRAM) which can be modified using the config- register command
0 = ROM Monitor mode 1 = ROM IOS
2 - 15 = startup-config in NVRAM
4. Startup-config filE. Check for boot system commands (NVRAM)
If boot system commands in startup-config
a. Run boot system commands in order they appear in startup-config to locate the IOS
b. [If boot system commands fail, use default fallback sequence to locate the IOS (Flash, TFTP, ROM)?]
If no boot system commands in startup-config use the default fallback sequence in locating the IOS:
a. Flash (sequential)
b. TFTP server (netboot)
c. ROM (partial IOS) or keep retrying TFTP depending upon router model
5. If IOS is loaded, but there is no startup-config file, the router will use the default fallback sequence for locating the IOS and then it will enter setup mode or the setup dialogue.
Question No: 3
Which command displays CPU utilization?
A. show protocols
B. show process
C. show system
D. show version
Answer: B
Explanation:
The u201cshow processu201d (in fact, the full command is u201cshow processesu201d) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted).
A more friendly way to check the CPU utilization is the command u201cshow processes cpu historyu201d, in which the total CPU usage on the router over a period of time: one minute, one hour, and 72 hours are clearly shown:
+ The Y-axis of the graph is the CPU utilization.
+ The X-axis of the graph is the increment within the period displayed in the graph.
For example, from the last graph (last 72 hours) we learn that the highest CPU utilization within 72 hours is 37% about six hours ago.
Question No: 4
Which two benefits are provided by creating VLANs? (Choose two.)
A. added security
B. dedicated bandwidth
C. provides segmentation
D. allows switches to route traffic between subinterfaces
E. contains collisions
Answer: A,C
Explanation:
AVLAN is a switched network that is logically segmented on an organizational basis, by
functions, project teams, or applications rather than on a physical or geographical basis. Security:
VLANs also improve security by isolating groups. High-security users can be grouped into a VLAN, possible on the same physical segment, and no users outside that VLAN can communicate with them.
LAN Segmentation
VLANs allow logical network topologies to overlay the physical switched infrastructure such that any arbitrary collection of LAN ports can be combined into an autonomous user group or community of interest. The technology logically segments the network into separate Layer 2 broadcast domains whereby packets are switched between ports designated to be within the same VLAN. By containing traffic originating on a particular LAN only to other LANs in the same VLAN, switched virtual networks avoid wasting bandwidth.
Question No: 5
Refer to the exhibit.
Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?
A. The router will forward packets from R3 to R2 to R1.
B. The router will forward packets from R3 to R1 to R2.
C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1.
D. The router will forward packets from R3 to R1.
Answer: C
Explanation:
From the routing table we learn that network 192.168.10.0/30 is learned via 2 equal-cost paths (192.168.10.9 &192.168.10.5) -> traffic to this network will be load-balancing.
Question No: 6
Refer to the exhibit.
Which WAN protocol is being used?
A. ATM
B. HDLC
C. Frame Relay
D. PPP
Answer: C
Explanation:
This question is to examine the show int command.
According to the information provided in the exhibit, we can know that the data link protocol used in this network is the Frame Relay protocol.
u201cLMI enq sentu2026u201d
Question No: 7
A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)
A. informational
B. emergency
C. warning
D. critical
E. debug
F. error
Answer: B,D,F
Explanation:
The Message Logging is divided into 8 levels as listed below:
Level Keyword Description 0
emergencies System is unusable 1
alerts
Immediate action is needed 2
critical
Critical conditions exist 3
errors
Error conditions exist
4
warnings
Warning conditions exist 5
notification
Normal, but significant, conditions exist 6
informational Informational messages 7
debugging Debugging messages
If you specify a level with the u201cloggingtrap levelu201d command, that level and all the higher levels will be logged. For example, by using the u201clogging trap 3 command, all the logging of emergencies, alerts, critical, and errors, will be logged.
Question No: 8
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?
A. the OSPF route
B. the EIGRP route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes
Answer: B
Explanation:
When one route is advertised by more than one routing protocol, the router will choose to use the routing protocol which has lowest Administrative Distance. The Administrative Distances of popular routing protocols are listed below:
Question No: 9
Which two statements about static NAT translations are true? (Choose two.)
A. They allow connections to be initiated from the outside.
B. They require no inside or outside interface markings because addresses are statically defined.
C. They are always present in the NAT table.
D. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
Answer: A,C
Explanation:
Static NAT is to map a single outside IP address to a single inside IP address. This is typically done to allow incoming connections from the outside (Internet) to the inside. Since these are static, they are always present in the NAT table even if they are not actively in use.
Question No: 10
Which two of these statements regarding RSTP are correct? (Choose two.)
A. RSTP cannot operate with PVST+.
B. RSTP defines new port roles.
C. RSTP defines no new port states.
D. RSTP is a proprietary implementation of IEEE 802.1D STP.
E. RSTP is compatible with the original IEEE 802.1D STP.
Answer: B,E
Explanation:
When network topology changes, rapid spanning tree protocol (IEEE802.1W, referred to as RSTP) will speed up significantly the speed to re-calculate spanning tree. RSTP not only defines the role of other ports: alternative port and backup port, but also defines status of 3 ports: discarding status, learning status, forwarding status.
RSTP is 802.1D standard evolution, not revolution. It retains most of the parameters, and makes no changes.
Recommend!! Get the Certified 200-125 dumps in VCE and PDF From Certifytools, Welcome to download: https://www.certifytools.com/200-125-exam.html (New 889 Q&As Version)