Want to Pass 200-125 Exam In Next HOURS? Get it now →
August 2, 2018

[Up to date] cisco ccna 200 125

We provide real ccna 200 125 torrent exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco ccna 200 125 pdf Exam quickly & easily. The 200 125 ccna PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco ccna routing and switching 200 125 pdf dumps pdf and vce product and material, you can easily pass the 200 125 ccna v3 0 exam.

P.S. Top Quality 200-125 prep are available on Google Drive, GET MORE: https://drive.google.com/open?id=1G0OQvn58oVaFHU8QUjdLariF4zPSu0BB


New Cisco 200-125 Exam Dumps Collection (Question 11 - Question 20)

New Questions 11

Refer to the exhibit.

Given this output for SwitchC, what should the network administrator's next action be?

A. Check the trunk encapsulation mode for SwitchC's fa0/1 port.

B. Check the duplex mode for SwitchC's fa0/1 port.

C. Check the duplex mode for SwitchA's fa0/2 port.

D. Check the trunk encapsulation mode for SwitchA's fa0/2 port.

Answer: C

Explanation:

Here we can see that this port is configured for full duplex, so the next step would be to check the duplex setting of the port on the other switch. A mismatched trunk encapsulation would not result in input errors and CRC errors.


New Questions 12

Refer to the exhibit.

The speed of all serial links is E1 and the speed of all Ethernet links is 100 Mb/s. A static route will be established on the Manchester router to direct traffic toward the Internet over the most direct path available. What configuration on the Manchester router will establish a route toward the Internet for traffic that originates from workstations on the Manchester LAN?

A. ip route 0.0.0.0 255.255.255.0 172.16.100.2

B. ip route 0.0.0.0 0.0.0.0 128.107.1.1

C. ip route 0.0.0.0 255.255.255.252 128.107.1.1

D. ip route 0.0.0.0 0.0.0.0 172.16.100.1

E. ip route 0.0.0.0 0.0.0.0 172.16.100.2

F. ip route 0.0.0.0 255.255.255.255 172.16.100.2

Answer: E

Explanation:

We use default routing to send packets with a remote destination network not in the routing table to the next-hop router. You should generally only use default routing on stub networksu2014those with only one exit path out of the network.

According to exhibit, all traffic towards Internet that originates from workstations should forward to Router R1.

Syntax for default route is:

ip route <Remote_Network> <Netmask> <Next_Hop_Address>.


New Questions 13

Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)

A. Set the IP gateway to be used by the network.

B. Perform host discovery used DHCPDISCOVER message.

C. Configure IP address parameters from DHCP server to a host.

D. Provide an easy management of layer 3 devices.

E. Monitor IP performance using the DHCP server.

F. Assign and renew IP address from the default pool.

Answer: C,F

Explanation:

The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure devices that are connected to a network (known as hosts) so they can communicate on that network using the Internet Protocol (IP). It involves clients and a server operating in a client-server model. DHCP servers assigns IP addresses from a pool of addresses and also assigns other parameters such as DNS and default gateways to hosts.


New Questions 14

Refer to the topology shown in the exhibit.

Which three ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.)

A. Switch A - Fa0/0

B. Switch A - Fa0/1

C. Switch B - Fa0/0

D. Switch B - Fa0/1

E. Switch C - Fa0/0

F. Switch C - Fa0/1

Answer: B,C,D

Explanation:

This question is to check the spanning tree election problem.

1. First, select the root bridge, which can be accomplished by comparing the bridge ID, the smallest will be selected. Bridge-id= bridge priority + MAC address. The three switches in the figure all have the default priority, so we should compare the MAC address, it is easy to find that SwitchB is the root bridge.

2. Select the root port on the non-root bridge, which can be completed through comparing root path cost. The smallest will be selected as the root port.

3. Next, select the Designated Port. First, compare the path cost, if the costs happen to be the same, then compare the BID, still the smallest will be selected. Each link has a DP. Based on the exhibit above, we can find DP on each link. The DP on the link between SwitchA and SwitchC is SwitchA'Fa0/1, because it has the smallest MAC address.

Topic 7, Routing Technologies

664.A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?

A. a directly connected interface with an address of 192.168.10.254/24

B. a static route to network 192.168.10.0/24

C. a RIP update for network 192.168.10.0/24

D. an OSPF update for network 192.168.0.0/16

E. a default route with a next hop address of 192.168.10.1

F. a static route to network 192.168.10.0/24 with a local serial interface configured as the next hop


New Questions 15

Refer to the exhibit.

Which WAN protocol is being used?

A. ATM

B. HDLC

C. Frame Relay

D. PPP

Answer: C

Explanation:

This question is to examine the show int command.

According to the information provided in the exhibit, we can know that the data link protocol used in this network is the Frame Relay protocol.

u201cLMI enq sentu2026u201d


New Questions 16

What are three benefits of implementing VLANs? (Choose three.)

A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic.

B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure.

C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.

D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.

E. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size.

F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain.

G. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.

Answer: A,C,D

Explanation:

Benefits of VLANs

VLAN is a network structure which allows users to communicate while in different locations by sharing one multicast domain and a single broadcast. They provide numerousnetworkingbenefits and have become popular in the market. For instance, it helps reduce administrative costs when users are geographically dispersed.

1. Inexpensive

The popularity of VLANs is due to the fact that changes, adds, and moves can be attained simply by making necessary configurations on the VLAN port. Time-consuming, re- addressing, and host reconfigurations is now a thing of the past, because network configuration can be made at ease when need arises.

2. Better management

A VLAN typically solve the scalability issues that exist in a large network by breaking the main domain into several VLAN groups or smaller broadcast configurations, thereby encourage better control of multicast traffic as well as broadcast domains.

3. Improves network security

High-security can be positioned in different VLAN groups to ensure that non-members

cannot receive their broadcasts. On the other hand, a router is added and workgroups relocated into centralized locations.

4. Enhances performance

A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.

5. Segment multiple networks

VLANs are typically used to achieve multiple purposes. They are popularly used to reduce broadcast traffic. Each VLAN creates a separate, smaller broadcast domain.

6. Better administration

VLANs facilitate grouping of multiple geographical stations. When VLAN users move to another physical location, the network does not have to be configured.


New Questions 17

A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?

A. Router# show ip eigrp adjacency

B. Router# show ip eigrp topology

C. Router# show ip eigrp interfaces

D. Router# show ip eigrp neighbors

Answer: D

Explanation:

Below is an example of the show ip eigrp neighbors command. The retransmit interval (Smooth Round Trip Timer u2013 SRTT) and the queue counts (Q count, which shows the number of queued EIGRP packets) for the adjacent routers are listed:


New Questions 18

CORRECT TEXTA corporation wants to add security to its network. The requirements are:

u2711 Host B should be able to use a web browser (HTTP) to access the Finance Web Server.

u2711 Other types of access from host B to the Finance Web Server should be blocked.

u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.

u2711 All hosts in the Core and on local LAN should be able to access the Public Web Server.

You have been tasked to create and apply anumbered access listto a single outbound interface. This access list can contain no more thanthreestatements that meet these requirements.

Access to the router CLI can be gained by clicking on the appropriate host.

u2711 All passwords have been temporarily set to u201cciscou201d.

u2711 The Core connection uses an IP address of 198.18.132.65.

u2711 The computers in the Hosts LAN have been assigned addresses of 192.168.201.1

u2013 192.168.201.254.

u2711 host A 192.168.201.1

u2711 host B 192.168.201.2

u2711 host C 192.168.201.3

u2711 host D 192.168.201.4

u2711 The Finance Web Server has been assigned an address of 172.22.237.17.

u2711 The Public Web Server in the Server LAN has been assigned an address of 172.22.237.18.

Answer:

Please check the below explanation for all details.

Explanation:

We should create an access-list and apply it to the interface that is connected to the Server LAN because it can filter out traffic from both S2 and Core networks. To see which interface this is, use the u201cshow ip interface briefu201d command:

From this, we know that the servers are located on the fa0/1 interface, so we will place our numbered access list here in the outbound direction.

Corp1#configure terminal

Our access-list needs to allow host B u2013 192.168125.2 to the Finance Web Server 172.22.109.17 via HTTP (port 80), so our first line is this:

Corp1(config)#access-list 100 permit tcp host 192.168.125.2 host 172.22.109.17 eq 80

Then, our next two instructions are these:

u2711 Other types of access from host B to the Finance Web Server should be blocked.

u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.

This can be accomplished with one command (which we need to do as our ACL needs to

be no more than 3 lines long), blocking all other access to the finance web server:

Corp1(config)#access-list 100 deny ip any host 172.22.109.17

Our last instruction is to allow all hosts in the Core and on the local LAN access to the Public Web Server (172.22.109.18)

Corp1(config)#access-list 100 permit ip host 172.22.109.18 any Finally, apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface fa0/1

Corp1(config-if)#ip access-group 100 out

Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core networks.

To verify, just click on host B to open its web browser. In the address box type http://172.22.109.17 to check if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it.

Click on other hosts (A, C and D) and check to make sure you canu2019t access Finance Web Server from these hosts. Then, repeat to make sure they can reach the public server at 172.22.109.18. Finally, save the configuration

Corp1(config-if)#end

Corp1#copy running-config startup-config


New Questions 19

Which port state is introduced by Rapid-PVST?

A. learning

B. listening

C. discarding

D. forwarding

Answer: C

Explanation:

PVST+ is based on IEEE802.1D Spanning Tree Protocol (STP). But PVST+ has only 3 port states (discarding, learning and forwarding) while STP has 5 port states (blocking, listening, learning, forwarding and disabled). So discarding is a new port state in PVST+.


New Questions 20

Refer to the exhibit.

Which of these statements correctly describes the state of the switch once the boot process has been completed?

A. As FastEthernet0/12 will be the last to come up, it will be blocked by STP.

B. Remote access management of this switch will not be possible without configuration change.

C. More VLANs will need to be created for this switch.

D. The switch will need a different IOS code in order to support VLANs and STP.

Answer: B

Explanation:

Notice the line, which says u201cInterface VLAN1, changed state to administratively downu201d. This shows that VLAN1 is shut down. Hence remote management of this switch is not possible unless VLAN1 is brought back up. Since VLAN1 is the only interface shown in the output, you have to assume that no other VLAN interface has been configured with an IP Address.



see more http://www.ubraindumps.com/200-125-dumps/

100% Up to the minute Cisco 200-125 Questions & Answers shared by Certifytools, Get HERE: https://www.certifytools.com/200-125-exam.html (New 889 Q&As)