Want to Pass 200-125 Exam In Next HOURS? Get it now →
November 18, 2018

Get Smart with ccna 200 125 syllabus

Proper study guides for Up to date Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) certified begins with Cisco ccna 200 125 pdf preparation products which designed to deliver the Virtual cisco ccna 200 125 questions by making you pass the 200 125 ccna test at your first time. Try the free 125 200 demo right now.

P.S. Virtual 200-125 testing software are available on Google Drive, GET MORE: https://drive.google.com/open?id=1h4WwjNBP_fjjnxXJLxNgPsEiO-cPwGBa

New Cisco 200-125 Exam Dumps Collection (Question 4 - Question 13)

Question No: 4

Refer to the exhibit.

The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)

A. Configure the gateway on Host A as

B. Configure the gateway on Host B as

C. Configure the IP address of Host A as

D. Configure the IP address of Host B as

E. Configure the masks on both hosts to be

F. Configure the masks on both hosts to be

Answer: B,D


The switch 1 is configured with two VLANs: VLAN1 and VLAN2. The IP information of member Host A in VLAN1 is as follows: Address :

Mask :

Gateway :

The IP information of member Host B in VLAN2 is as follows: Address :

Mask :

Gateway :

The configuration of sub-interface on router 2 is as follows: Fa0/0.1 -- VLAN1

Fa0/0.2 -- VLAN2

It is obvious that the configurations of the gateways of members in VLAN2 and the associated network segments are wrong. The layer3 addressing information of Host B should be modified as follows:

Address : 10.1.2.X Mask :

Question No: 5

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link.

The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?

A. The OSPF area is not configured properly.

B. The priority on R1 should be set higher.

C. The cost on R1 should be set higher.

D. The hello and dead timers are not configured properly.

E. A backup designated router needs to be added to the network.

F. The OSPF process ID numbers must match.

Answer: D


In OSPF, the hello and dead intervals must match and here we can see the hello interval is set to 5 on R1 and 10 on R2. The dead interval is also set to 20 on R1 but it is 40 on R2.

Question No: 6

CORRECT TEXTA network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.

The task is to create and apply an access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted.

Access to the router CLI can be gained by clicking on the appropriate host. All passwords have been temporarily set to "cisco".

The Core connection uses an IP address of

The computers in the Hosts LAN have been assigned addresses of -

u2711 host A

u2711 host B

u2711 host C

u2711 host D

The servers in the Server LAN have been assigned addresses of -

The Finance Web Server is assigned an IP address of


Select the console on Corp1 router Configuring ACL

Corp1>enable Corp1#configure terminal

comment: To permit only Host C ({source addr} to access finance server address ( {destination addr} on port number 80 (web) Corp1(config)#access-list 100 permit tcp host host eq 80 comment: To deny any source to access finance server address (

{destination addr} on port number 80 (web)

Corp1(config)#access-list 100 deny tcp any host eq 80

comment: To permit ip protocol from any source to access any destination because of the implicit deny any any statement at the end of ACL.

Corp1(config)#access-list 100 permit ip any any Applying the ACL on the Interface

comment: Check show ip interface brief command to identify the interface type and number by checking the IP address configured.

Corp1(config)#interface fa 0/1

If the ip address configured already is incorrect as well as the subnet mask. This should be corrected in order ACL to work

type this commands at interface mode :

no ip address 192.x.x.x 255.x.x.x (removes incorrect configured ipaddress and subnet mask)

Configure Correct IP Address and subnet mask:

ip address ( range of address specified going to server is given as - )

Comment: Place the ACL to check for packets going outside the interface towards the

finance web server.

Corp1(config-if)#ip access-group 100 out Corp1(config-if)#end

Important: To save your running config to startup before exit. Corp1#copy running-config startup-config

Verifying the Configuration:

Step1: show ip interface brief command identifies the interface on which to apply access list.

Step2: Click on each host A, B, C, & D. Host opens a web browser page, Select address box of the web browser and type the ip address of finance web server ( to test whether it permits /deny access to the finance web Server.

Step 3: Only Host C ( has access to the server. If the other host can also access then maybe something went wrong in your configuration. Check whether you configured correctly and in order.

Step 4: If only Host C ( can access the Finance Web Server you can click on NEXT button to successfully submit the ACL SIM.

Question No: 7


Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

The loopback interfaces on R4 with the IP addresses of,, and are not appearing in the routing table of R5. Why are the interfaces missing?

A. The interfaces are shutdown, so they are not being advertised.

B. R4 has been incorrectly configured to be in another AS, so it does not peer with R5.

C. Automatic summarization is enabled, so only the network is displayed.

D. The loopback addresses haven't been advertised, and the network command is missing on R4.

Answer: B


For an EIGRP neighbor to form, the following must match:

- Neighbors must be in the same subnet

- K values

- AS numbers

- Authentication method and key strings

Here, we see that R4 is configured for EIGRP AS 2, when it should be AS 1.

Question No: 8

Which two of these statements are true of IPv6 address representation? (Choose two.)

A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.

B. A single interface may be assigned multiple IPv6 addresses of any type.

C. Every IPv6 interface contains at least one loopback address.

D. The first 64 bits represent the dynamically created interface ID.

E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.

Answer: B,C


u2711 A single interface may be assigned multiple addresses of any type (unicast, anycast, multicast).

u2711 Every IPv6-enabled interface must contain at least one loopback and one link-local


u2711 Optionally, every interface can have multiple unique local and global addresses.

Reference: IPv6 Addressing at a Glance u2013 Cisco PDF

Question No: 9

What levels will be trapped if the administrator executes the command router(config)# logging trap 4 (Choose four)

A. Emergency

B. Notice

C. Alert

D. Error

E. Warning

Answer: A,C,D,E


The Message Logging is divided into 8 levels as listed below: Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

If you specify a level with the u201clogging trap levelu201d command, that level and all the higher levels will be logged. For example, by using the u201clogging trap 4 command, all the logging of emergencies, alerts, critical, errors, warnings will be logged.

Question No: 10

Refer to the exhibit.

An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?

A. no ip access-class 102 in

B. no ip access-class 102 out

C. no ip access-group 102 in

D. no ip access-group 102 out

E. no ip access-list 102 in

Answer: D


The u201cip access-groupu201d is used to apply and ACL to an interface. From the output shown, we know that the ACL is applied to outbound traffic, so u201cno ip access-group 102 outu201d will remove the effect of this ACL.

Question No: 11


Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.

An OSPF neighbor adjacency is not formed between R3 in the main office and R6 in the Branch3 office. What is causing the problem?

A. There is an area ID mismatch.

B. There is a PPP authentication issue; the username is not configured on R3 and R6.

C. There is an OSPF hello and dead interval mismatch.

D. The R3 router ID is configured on R6.

Answer: D


Using the show running-config command we see that R6 has been incorrectly configured with the same router ID as R3 under the router OSPF process.

Question No: 12

What are two benefits of using NAT? (Choose two.)

A. NAT facilitates end-to-end communication when IPsec is enabled.

B. NAT eliminates the need to re-address all hosts that require external access.

C. NAT conserves addresses through host MAC-level multiplexing.

D. Dynamic NAT facilitates connections from the outside of the network.

E. NAT accelerates the routing process because no modifications are made on the packets.

F. NAT protects network security because private networks are not advertised.

Answer: B,F


By not revealing the internal IP addresses, NAT adds some security to the inside network -

> F is correct.

NAT has to modify the source IP addresses in the packets -> E is not correct.

Connection from the outside of the network through a u201cNATu201d network is more difficult than a more network because IP addresses of inside hosts are hidden -> C is not correct.

In order for IPsec to work with NAT we need to allow additional protocols, including Internet Key Exchange (IKE), Encapsulating Security Payload (ESP) and Authentication Header (AH) -> more complex -> A is not correct.

By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re- address the inside hosts -> B is correct.

NAT does conserve addresses but not through host MAC-level multiplexing. It conserves addresses by allowing many private IP addresses to use the same public IP address to go to the Internet -> C is not correct.

Question No: 13

You are working in a data center environment and are assigned the address range You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?






Answer: D


Each subnet has 30 hosts < 32 = 25 so we need a subnet mask which has at least 5 bit 0s

-> /27. Also the question requires the maximum number of subnets (which minimum the number of hosts-per-subnet) so /27 is the best choice.

see more http://www.ubraindumps.com/200-125-dumps/

P.S. Easily pass 200-125 Exam with 2passeasy Virtual Dumps & pdf vce, Try Free: https://www.2passeasy.com/dumps/200-125/ (889 New Questions)