A Complete Guide to ccna 200 125 dumps

200-125 Guide

200-125 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 200-125
  • Product Name CCNA Cisco Certified Network Associate CCNA (v3.0)
  • Questions and Answers
  • 635 Q&As
  • Last Updated
  • Nov 06,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

A Complete Guide to ccna 200 125 dumps

Ucertify offers free demo for ccna 200 125 torrent exam. "CCNA Cisco Certified Network Associate CCNA (v3.0)", also known as ccna 200 125 ebook exam, is a Cisco Certification. This set of posts, Passing the Cisco ccna 200 125 syllabus exam, will help you answer those questions. The ccna 200 125 Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco 200 125 ccna book exams and revised by experts!

Q41.  - (Topic 6)

Which item represents the standard IP ACL?

A. access-list 110 permit ip any any

B. access-list 50 deny 192.168.1.1 0.0.0.255

C. access list 101 deny tcp any host 192.168.1.1

D. access-list 2500 deny tcp any host 192.168.1.1 eq 22

Answer: B

Explanation:

The standard access lists are ranged from 1 to 99 and from 1300 to 1999 so only access list 50 is a standard access list.


Q42.  - (Topic 4)

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?

A. IETF

B. ANSI Annex D

C. Q9333-A Annex A

D. HDLC

Answer: A

Explanation:

Cisco supports two Frame Relay encapsulation types: the Cisco encapsulation and the IETF Frame Relay encapsulation, which is in conformance with RFC 1490 and RFC 2427. The former is often used to connect two Cisco routers while the latter is used to connect a Cisco router to a non-Cisco router. You can test with your Cisco router when typing the command Router(config-if)#encapsulation frame-relay ? on a WAN link. Below is the output of this command (notice Cisco is the default encapsulation so it is not listed here, just press Enter to use it).

Note: Three LMI options are supported by Cisco routers are ansi, Cisco, and Q933a. They

represent the ANSI Annex D, Cisco, and ITU Q933-A (Annex A) LMI types, respectively. HDLC is a WAN protocol same as Frame-Relay and PPP so it is not a Frame Relay encapsulation type.


Q43.  - (Topic 5)

How many bits are contained in each field of an IPv6 address?

A. 24

B. 4

C. 8

D. 16

Answer: D

Explanation:

An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.


Q44.  - (Topic 8)

If the primary root bridge experiences a power loss, which switch takes over?

A. switch 0004.9A1A.C182

B. switch 00E0.F90B.6BE3

C. switch 00E0.F726.3DC6

D. switch 0040.0BC0.90C5

Answer: A


Q45.  - (Topic 7)

What are the benefits of using Netflow? (Choose three.)

A. Network, Application & User Monitoring

B. Network Planning

C. Security Analysis

D. Accounting/Billing

Answer: A,C,D

Explanation:

NetFlow traditionally enables several key customer applications including:

+ Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns

associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

+ Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.


Q46.  - (Topic 4)

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?

A. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# no shut

B. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation ppp

Main(config-if)# no shut

C. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation frame-relay

Main(config-if)# authentication chap Main(config-if)# no shut

D. Main(config)# interface serial 0/0

Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ietf

Main(config-if)# no shut

Answer: B

Explanation:

With serial point to point links there are two options for the encapsulation. The default, HDLC, is Cisco proprietary and works only with other Cisco routers. The other option is PPP which is standards based and supported by all vendors.


Q47.  - (Topic 5)

You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?

A. 10.188.31.0/26 

B. 10.188.31.0/25 

C. 10.188.31.0/28 

D. 10.188.31.0/27 

E. 10.188.31.0/29

Answer: D

Explanation:

Each subnet has 30 hosts < 32 = 25 so we need a subnet mask which has at least 5 bit 0s

-> /27. Also the question requires the maximum number of subnets (which minimum the number of hosts-per-subnet) so /27 is the best choice.


Q48.  - (Topic 8)

Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.)

A. duplex mismatches on Ethernet segments in the same VLAN

B. multiple errors on switchport interfaces

C. congestion on the switch inband path

D. a failing NIC in an end device

E. an overloaded shared segment

Answer: A,C 

Explanation: Collision Domains

A collision domain is an area of a single LAN where end stations contend for access to the network because all end stations are connected to a shared physical medium. If two connected devices transmit onto the media at the same time, a collision occurs. When a collision occurs, a JAM signal is sent on the network, indicating that a collision has occurred and that devices should ignore any fragmented data associated with the collision. Both sending devices back off sending their data for a random amount and then try again if the medium is free for transmission. Therefore, collisions effectively delay transmission of

data, lowering the effective throughput available to a device. The more devices that are attached to a collision domain, the greater the chances of collisions; this results in lower bandwidth and performance for each device attached to the collision domain. Bridges and switches terminate the physical signal path of a collision domain, allowing you to segment separate collision domains, breaking them up into multiple smaller pieces to provide more bandwidth per user within the new collision domains formed.


Q49.  - (Topic 4)

What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)

A. They create split-horizon issues.

B. They require a unique subnet within a routing domain.

C. They emulate leased lines.

D. They are ideal for full-mesh topologies.

E. They require the use of NBMA options when using OSPF.

Answer: B,C

Explanation:

Subinterfaces are used for point to point frame relay connections, emulating virtual point to point leased lines. Each subinterface requires a unique IP address/subnet. Remember, you cannot assign multiple interfaces in a router that belong to the same IP subnet.

Topic 5, Infrastructure Services

190.  - (Topic 5)

What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?

A. B514 : 82C3 : 0029 : EC7A : EC72

B. B514 : 82C3 :: 0029 : EC7A : EC72

C. B514 : 82C3 : 0029 :: EC7A : 0000 : EC72

D. B514 : 82C3 :: 0029 : EC7A : 0 : EC72

Answer: D

Explanation:

There are two ways that an IPv6 address can be additionally compressed: compressing leading zeros and substituting a group of consecutive zeros with a single double colon (::). Both of these can be used in any number of combinations to notate the same address. It is important to note that the double colon (::) can only be used once within a single IPv6 address notation. So, the extra 0’s can only be compressed once.


Q50.  - (Topic 8)

Which routing protocol has the smallest default administrative distance?

A. IBGP

B. OSPF

C. IS-IS

D. EIGRP

E. RIP

Answer: D

Explanation: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/15986-admin-distance.html

Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports:

Route Source

Default Distance Values

Connected interface 0

Static route 1

Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5

External Border Gateway Protocol (BGP) 20

Internal EIGRP 90

IGRP 100 OSPF 110

Intermediate System-to-Intermediate System (IS-IS) 115

Routing Information Protocol (RIP) 120

Exterior Gateway Protocol (EGP) 140

On Demand Routing (ODR) 160

External EIGRP 170

Internal BGP 200

Unknown* 255


To know more about the 200-125, click here.

Tagged as : Cisco 200-125 Dumps, Download 200-125 pdf, 200-125 VCE, 200-125 pass4sure, examcollection 200-125