Shortcuts To 200-125(1 to 10)


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 200-125 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 200-125 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/200-125-exam-dumps.html

Q1.  - (Topic 5)

What will happen if a private IP address is assigned to a public interface connected to an ISP?

A. Addresses in a private range will not be routed on the Internet backbone.

B. Only the ISP router will have the capability to access the public network.

C. The NAT process will be used to translate this address to a valid IP address.

D. A conflict of IP addresses happens, because other public routers can use the same range.

Answer: A

Explanation:

Private RFC 1918 IP addresses are meant to be used by organizations locally within their own network only, and cannot be used globally for Internet use.


Q2.  - (Topic 7)

Scenario

Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

The loopback interfaces on R4 with the IP addresses of 10.4.4.4/32, 10.4.4.5/32, and 10.4.4.6/32 are not appearing in the routing table of R5. Why are the interfaces missing?

A. The interfaces are shutdown, so they are not being advertised.

B. R4 has been incorrectly configured to be in another AS, so it does not peer with R5.

C. Automatic summarization is enabled, so only the 10.0.0.0 network is displayed.

D. The loopback addresses haven't been advertised, and the network command is missing on R4.

Answer: B

Explanation:

For an EIGRP neighbor to form, the following must match:

- Neighbors must be in the same subnet

- K values

- AS numbers

- Authentication method and key strings

Here, we see that R4 is configured for EIGRP AS 2, when it should be AS 1.

Topic 8, Mixed Questions

316.  - (Topic 8)

Two hosts are attached to a switch with the default configuration. Which statement about the configuration is true?

A. IP routing must be enabled to allow the two hosts to communicate.

B. The two hosts are in the same broadcast domain.

C. The switch must be configured with a VLAN to allow the two hosts to communicate.

D. Port security prevents the hosts from connecting to the switch.

Answer: A

Explanation: IP routing must be enables to allow the two hosts to communicate with each other with default configuration.

http://www.cisco.com/c/en/us/support/docs/lan-switching/inter-vlan-routing/41860-howto-L3-intervlanrouting.html


Q3.  - (Topic 5)

What are three components that comprise the SNMP framework? (Choose three.)

A. MIB

B. agent

C. set

D. AES

E. supervisor

F. manager

Answer: A,B,F

Explanation:

The SNMP framework consists of three parts:

•An SNMP manager — The system used to control and monitor the activities of network devices using SNMP.

•An SNMP agent — The software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. Cisco Nexus 1000V supports the agent and MIB. To enable the SNMP agent, you must define the relationship between the manager and the agent.

•A managed information base (MIB) — The collection of managed objects on the SNMP agent.

SNMP is defined in RFCs 3411 to 3418.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3/s ystem_management/configuration/guide/n1000v_system/n1000v_system_10snmp.html


Q4.  - (Topic 8)

Which command can you use to set the hostname on a switch?

A. switch-mdf-c1(config)#hostname switch-mdf1

B. switch-mdf-c1>hostname switch-mdf1

C. switch-mdf-c1#hostname switch-mdf1

D. switch-mdf-c1(config-if)#hostname switch-mdf1

Answer: A


Q5.  - (Topic 4)

Refer to the exhibit.

What is the meaning of the term dynamic as displayed in the output of the show frame- relay map command shown?

A. The Serial0/0 interface is passing traffic.

B. The DLCI 100 was dynamically allocated by the router.

C. The Serial0/0 interface acquired the IP address of 172.16.3.1 from a DHCP server.

D. The DLCI 100 will be dynamically changed as required to adapt to changes in the Frame Relay cloud.

E. The mapping between DLCI 100 and the end station IP address 172.16.3.1 was learned through Inverse ARP.

Answer: E

Explanation:

Inverse Address Resolution Protocol (Inverse ARP) was developed to provide a mechanism for dynamic DLCI to Layer 3 address maps. Inverse ARP works much the same way Address Resolution Protocol (ARP) works on a LAN. However, with ARP, the device knows the Layer 3 IP address and needs to know the remote data link MAC address. With Inverse ARP, the router knows the Layer 2 address which is the DLCI, but needs to know the remote Layer 3 IP address.

When using dynamic address mapping, Inverse ARP requests a next-hop protocol address for each active PVC. Once the requesting router receives an Inverse ARP response, it updates its DLCI-to-Layer 3 address mapping table. Dynamic address mapping is enabled by default for all protocols enabled on a physical interface. If the Frame Relay environment supports LMI autosensing and Inverse ARP, dynamic address mapping takes place automatically. Therefore, no static address mapping is required.


Q6.  - (Topic 5)

A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet.

Which ACL can be used?

A. standard

B. extended

C. dynamic

D. reflexive

Answer: C

Explanation:

We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS+ or RADIUS server. The configuration of dynamic ACL can be read here: http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524. shtml


Q7.  - (Topic 8)

In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three.)

A. Unlike IPv4 headers, IPv6 headers have a fixed length.

B. IPv6 uses an extension header instead of the IPv4 Fragmentation field.

C. IPv6 headers eliminate the IPv4 Checksum field.

D. IPv6 headers use the Fragment Offset field in place of the IPv4 Fragmentation field.

E. IPv6 headers use a smaller Option field size than IPv4 headers.

F. IPv6 headers use a 4-bit TTL field, and IPv4 headers use an 8-bit TTL field.

Answer: A,B,C


Q8.  - (Topic 3)

What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router?

A. 2

B. 8

C. 16

D. unlimited

Answer: B

Explanation:

maximum-paths (OSPF)

To control the maximum number of parallel routes that Open Shortest Path First (OSPF) can support, use the maximum-paths command.

Syntax Description

maximum

Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16 routes.

Command Default

8 paths


Q9.  - (Topic 6)

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Answer: D,E

Explanation:

It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces ->

We cannot physically secure a virtual interface because it is “virtual” ->.

To apply an access list to a virtual terminal interface we must use the “access-class” command. The “access-group” command is only used to apply an access list to a physical interface -> C is not correct.

The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login.


Q10.  - (Topic 8)

Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable auto mode?

A. trunk

B. access

C. dynamic desirable

D. dynamic auto

Answer: C