Want to know Exambible ccna 200 125 Exam practice test features? Want to lear more about Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) certification experience? Study Accurate Cisco ccna 200 120 vs 200 125 answers to Improve 200 125 ccna book questions at Exambible. Gat a success with an absolute guarantee to pass Cisco ccna 200 125 book (CCNA Cisco Certified Network Associate CCNA (v3.0)) test on your first attempt.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 200-125 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 200-125 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/200-125-exam-dumps.html
Q31. - (Topic 3)
On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?
A. a router with subinterfaces configured on the physical interface that is connected to the switch
B. a router with an IP address on the physical interface connected to the switch
C. a switch with an access link that is configured between the switches
D. a switch with a trunk link that is configured between the switches
Answer: A
Explanation:
Different VLANs can't communicate with each other, they can communicate with the help of Layer3 router. Hence, it is needed to connect a router to a switch, then make the sub- interface on the router to connect to the switch, establishing Trunking links to achieve communications of devices which belong to different VLANs.
When using VLANs in networks that have multiple interconnected switches, you need to use VLAN trunking between the switches. With VLAN trunking, the switches tag each frame sent between switches so that the receiving switch knows to what VLAN the frame belongs. End user devices connect to switch ports that provide simple connectivity to a single VLAN each. The attached devices are unaware of any VLAN structure.
By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch.
Here is the example of configuring the router for inter-vlan communication
RouterA(config)#int f0/0.1 RouterA(config-subif)#encapsulation ? dot1Q IEEE 802.1Q Virtual LAN
RouterA(config-subif)#encapsulation dot1Q or isl VLAN ID RouterA(config-subif)# ip address x.x.x.x y.y.y.y
Q32. - (Topic 8)
Refer to the exhibit.
You have discovered that computers on the 192 168 10 0/24 network can ping their default gateway, but they cannot connect to any resources on a remote network Which reason for the problem is most likely true?
A. The 192.168.12 0/24 network is missing from OSPF
B. The OSPF process ID is incorrect
C. The OSPF area number is incorrect.
D. An ARP table entry is missing for 192.168.10.0.
E. A VLAN number is incorrect for 192.168.10.0.
Answer: C
Q33. - (Topic 5)
Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)
A. Emergencies
B. Alerts
C. Critical
D. Errors
E. Warnings
Answer: A,B,C,D
Explanation:
The Message Logging is divided into 8 levels as listed below: Level Keyword Description
0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist 6 informational Informational messages
7 debugging Debugging messages
The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be
displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.
Q34. - (Topic 8)
Which component of the Cisco SDN solution serves as the centralized management system?
A. Cisco OpenDaylight
B. Cisco ACI
C. Cisco APIC
D. Cisco IWAN
Answer: B
Explanation:
Cisco ACI is a comprehensive SDN architecture. This policy-based automation solution supports a business-relevant application policy language, greater scalability through a distributed enforcement system, and greater network visibility. These benefits are achieved through the integration of physical and virtual environments under one policy model for networks, servers, storage, services, and security.
Q35. - (Topic 8)
If the primary root bridge experiences a power loss, which switch takes over?
A. switch 0004.9A1A.C182
B. switch 00E0.F90B.6BE3
C. switch 00E0.F726.3DC6
D. switch 0040.0BC0.90C5
Answer: A
Q36. - (Topic 8)
On which type of device is every port in the same collision domain?
A. a router
B. a Layer 2 switch
C. a hub
Answer: C
Explanation: Collision domainA collision domain is, as the name implies, a part of a
network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. The packets collide and both devices must send the packets again, which reduces network efficiency. Collisions are often in a hub environment, because each port on a hub is in the same collision domain. By contrast, each port on a bridge, a switch or a router is in a separate collision domain.
Q37. - (Topic 5)
Refer to the exhibit.
The Bigtime router is unable to authenticate to the Littletime router. What is the cause of the problem?
A. The usernames are incorrectly configured on the two routers.
B. The passwords do not match on the two routers.
C. CHAP authentication cannot be used on a serial interface.
D. The routers cannot be connected from interface S0/0 to interface S0/0.
E. With CHAP authentication, one router must authenticate to another router. The routers cannot be configured to authenticate to each other.
Answer: B
Explanation:
With CHAP authentication, the configured passwords must be identical on each router. Here, it is configured as little123 on one side and big123 on the other.
Q38. - (Topic 8)
What is the danger of the permit any entry in a NAT access list?
A. It can lead to overloaded resources on the router.
B. It can cause too many addresses to be assigned to the same interface.
C. It can disable the overload command.
D. It prevents the correct translation of IP addresses on the inside network.
Answer: A
Q39. - (Topic 5)
Refer to the exhibit.
What is the most appropriate summarization for these routes?
A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24
Answer: B
Explanation:
The 10.0.0.0/22 subnet mask will include the 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 networks, and only those four networks.
Q40. - (Topic 5)
How many bits are contained in each field of an IPv6 address?
A. 24
B. 4
C. 8
D. 16
Answer: D
Explanation:
An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
