Vivid of 200 125 ccna v3 0 download materials and training materials for Cisco certification for IT specialist, Real Success Guaranteed with Updated ccna 200 125 syllabus pdf dumps vce Materials. 100% PASS CCNA Cisco Certified Network Associate CCNA (v3.0) exam Today!
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 200-125 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 200-125 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/200-125-exam-dumps.html
P.S. Vivid 200-125 training materials are available on Google Drive, GET MORE: https://drive.google.com/open?id=1h4WwjNBP_fjjnxXJLxNgPsEiO-cPwGBa
New Cisco 200-125 Exam Dumps Collection (Question 5 - Question 14)
Q1. Refer to the exhibit.
The network administrator normally establishes a Telnet session with the switch from host
A. However, host A is unavailable. The administrator's attempt to telnet to the switch from host B fails, but pings to the other two hosts are successful. What is the issue?
A. Host B and the switch need to be in the same subnet.
B. The switch interface connected to the router is down.
C. Host B needs to be assigned an IP address in VLAN 1.
D. The switch needs an appropriate default gateway assigned.
E. The switch interfaces need the appropriate IP addresses assigned.
Answer: D
Explanation:
Ping was successful form host B to other hosts because of intervlan routing configured on router. But to manage switch via telnet the VLAN32 on the switch needs to be configured interface vlan32 along with ip address and its appropriate default-gateway address.
Since VLAN1 interface is already configure on switch Host A was able to telnet switch.
Q2. Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)
A. Emergencies
B. Alerts
C. Critical
D. Errors
E. Warnings
Answer: A,B,C,D
Explanation:
The Message Logging is divided into 8 levels as listed below: Level Keyword Description
0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist 6 informational Informational messages
7 debugging Debugging messages
The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the u201clogging console levelu201d command, that level and all the higher levels will be displayed. For example, by using the u201clogging console warningsu201d command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.
Q3. CORRECT TEXTA corporation wants to add security to its network. The requirements are:
u2711 Host B should be able to use a web browser (HTTP) to access the Finance Web Server.
u2711 Other types of access from host B to the Finance Web Server should be blocked.
u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
u2711 All hosts in the Core and on local LAN should be able to access the Public Web Server.
You have been tasked to create and apply anumbered access listto a single outbound interface. This access list can contain no more thanthreestatements that meet these requirements.
Access to the router CLI can be gained by clicking on the appropriate host.
u2711 All passwords have been temporarily set to u201cciscou201d.
u2711 The Core connection uses an IP address of 198.18.132.65.
u2711 The computers in the Hosts LAN have been assigned addresses of 192.168.201.1
u2013 192.168.201.254.
u2711 host A 192.168.201.1
u2711 host B 192.168.201.2
u2711 host C 192.168.201.3
u2711 host D 192.168.201.4
u2711 The Finance Web Server has been assigned an address of 172.22.237.17.
u2711 The Public Web Server in the Server LAN has been assigned an address of 172.22.237.18.
Answer:
Please check the below explanation for all details.
Explanation:
We should create an access-list and apply it to the interface that is connected to the Server LAN because it can filter out traffic from both S2 and Core networks. To see which interface this is, use the u201cshow ip interface briefu201d command:
From this, we know that the servers are located on the fa0/1 interface, so we will place our numbered access list here in the outbound direction.
Corp1#configure terminal
Our access-list needs to allow host B u2013 192.168125.2 to the Finance Web Server 172.22.109.17 via HTTP (port 80), so our first line is this:
Corp1(config)#access-list 100 permit tcp host 192.168.125.2 host 172.22.109.17 eq 80
Then, our next two instructions are these:
u2711 Other types of access from host B to the Finance Web Server should be blocked.
u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
This can be accomplished with one command (which we need to do as our ACL needs to
be no more than 3 lines long), blocking all other access to the finance web server:
Corp1(config)#access-list 100 deny ip any host 172.22.109.17
Our last instruction is to allow all hosts in the Core and on the local LAN access to the Public Web Server (172.22.109.18)
Corp1(config)#access-list 100 permit ip host 172.22.109.18 any Finally, apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface fa0/1
Corp1(config-if)#ip access-group 100 out
Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core networks.
To verify, just click on host B to open its web browser. In the address box type http://172.22.109.17 to check if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it.
Click on other hosts (A, C and D) and check to make sure you canu2021t access Finance Web Server from these hosts. Then, repeat to make sure they can reach the public server at 172.22.109.18. Finally, save the configuration
Corp1(config-if)#end
Corp1#copy running-config startup-config
Q4. Refer to the exhibit.
A network administrator configures a new router and enters the copy startup-config running-config command on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enters the system configuration dialog as shown. What is the cause of the problem?
A. The network administrator failed to save the configuration.
B. The configuration register is set to 0x2100.
C. The boot system flash command is missing from the configuration.
D. The configuration register is set to 0x2102.
E. The router is configured with the boot system startup command.
Answer: A
Explanation:
The u201cSystem Configuration Dialogu201d appears only when no startup configuration file is found. The network administrator has made a mistake because the command u201ccopy startup-config running-configu201d will copy the startup config (which is empty) over the running config (which is configured by the administrator). So everything configured was deleted.
Note: We can tell the router to ignore the start-up configuration on the next reload by setting the register to 0u00d72142. This will make the u201cSystem Configuration Dialogu201d appear at the next reload.
Q5. An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?
A. IP address: 192.168.20.14
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.9
B. IP address: 192.168.20.254
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.20.1
C. IP address: 192.168.20.30
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.25
D. IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.17
E. IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.25
Answer: C
Explanation:
For the 192.168.20.24/29 network, the usable hosts are 192.168.24.25 (router) u2013 192.168.24.30 (used for the sales server).
Q6. Which type of EIGRP route entry describes a feasible successor?
A. a backup route, stored in the routing table
B. a primary route, stored in the routing table
C. a backup route, stored in the topology table
D. a primary route, stored in the topology table
Answer: C
Explanation:
EIGRP uses the Neighbor Table to list adjacent routers. The Topology Table list all the learned routers to destination whilst the Routing Table contains the best route to a destination, which is known as the Successor. The Feasible Successor is a backup route to a destination which is kept in the Topology Table.
Q7. Refer to the exhibit.
The Lakeside Company has the internetwork in the exhibit. The administrator would like to reduce the size of the routing table on the Central router. Which partial routing table entry in the Central router represents a route summary that represents the LANs in Phoenix but no additional subnets?
A. 10.0.0.0/22 is subnetted, 1 subnets
D 10.0.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
B. 10.0.0.0/28 is subnetted, 1 subnets
D 10.2.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
C. 10.0.0.0/30 is subnetted, 1 subnets
D 10.2.2.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
D. 10.0.0.0/22 is subnetted, 1 subnets
D 10.4.0.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
E. 10.0.0.0/28 is subnetted, 1 subnets
D 10.4.4.0 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
F. 10.0.0.0/30 is subnetted, 1 subnets
D 10.4.4.4 [90/20514560] via 10.2.0.2, 6w0d, Serial0/1
Answer: D
Explanation:
The 10.4.0.0/22 route includes 10.4.0.0/24, 10.4.1.0/24, 10.4.2.0/24 and 10.4.3.0/24 networks only.
Q8. Refer to the exhibit.
At the end of an RSTP election process, which access layer switch port will assume the discarding role?
A. Switch3, port fa0/1
B. Switch3, port fa0/12
C. Switch4, port fa0/11
D. Switch4, port fa0/2
E. Switch3, port Gi0/1
F. Switch3, port Gi0/2
Answer: C
Explanation:
In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4.
Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior to another if it has:
1. A lower Root Bridge ID
2. A lower path cost to the Root
3. A lower Sending Bridge ID
4. A lower Sending Port ID
These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role).
Q9. Refer to the exhibit.
C-router is to be used as a "router-on-a-stick" to route between the VLANs. All the interfaces have been properly configured and IP routing is operational. The hosts in the VLANs have been configured with the appropriate default gateway. What is true about this configuration?
A. These commands need to be added to the configuration: C-router(config)# router eigrp 123
C-router(config-router)# network 172.19.0.0
B. These commands need to be added to the configuration: C-router(config)# router ospf 1
C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0
C. These commands need to be added to the configuration: C-router(config)# router rip
C-router(config-router)# network 172.19.0.0
D. No further routing configuration is required.
Answer: D
Explanation:
Since all the same router (C-router) is the default gateway for all three VLANs, all traffic destined to a different VLA will be sent to the C-router. The C-router will have knowledge of all three networks since they will appear as directly connected in the routing table. Since the C-router already knows how to get to all three networks, no routing protocols need to be configured.
Q10. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server
Answer: C,E
Explanation:
The following locations can be configured as a source for the IOS image:
1. + Flash (the default location)
2. + TFTP server
3. + ROM (used if no other source is found)
4. (Please read the explanation of Question 4 for more information)