Q51. DRAG DROP - (Topic 3)
Drag the Cisco default administrative distance to the appropriate routing protocol or route. (Not all options are used.)
Q52. - (Topic 6)
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.)
A. SW1#show port-secure interface FastEthernet 0/12
B. SW1#show switchport port-secure interface FastEthernet 0/12
C. SW1#show running-config
D. SW1#show port-security interface FastEthernet 0/12
E. SW1#show switchport port-security interface FastEthernet 0/12
We can verify whether port security has been configured by using the “show running- config” or “show port-security interface” for more detail. An example of the output of “show port-security interface” command is shown below:
Q53. - (Topic 5)
What levels will be trapped if the administrator executes the command router(config)# logging trap 4 (Choose four)
The Message Logging is divided into 8 levels as listed below: Level Keyword Description
0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist 6 informational Informational messages
7 debugging Debugging messages
If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged. For example, by using the “logging trap 4 command, all the logging of emergencies, alerts, critical, errors, warnings will be logged.
Q54. - (Topic 8)
Which configuration command can you apply to a router so that its local interface becomes active if all other routers in the group fail?
A. Router(config)#standby 1 preempt
B. No additional configuration is required
C. Router(config)#standby 1 Priority 250
D. Router(config)#standby 1 track Ethernet
Q55. - (Topic 4)
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?
IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPSec can be used to protect one or more data flows between IPSec peers.
Q56. CORRECT TEXT - (Topic 7)
Central Florida Widgets recently installed a new router in their office. Complete the network installation by performing the initial router configurations and configuring R1PV2 routing using the router command line interface (CLI) on the RC.
Configure the router per the following requirements: Name of the router is R2
Enable. secret password is cisco
The password to access user EXEC mode using the console is cisco2 The password to allow telnet access to the router is cisco3
IPV4 addresses must be configured as follows:
Ethernet network 126.96.36.199/27 - router has fourth assignable host address in subnet Serial network is 192.0.2.176/28 - router has last assignable host address in the subnet. Interfaces should be enabled.
Router protocol is RIPV2
In practical examinations, please note the following, the actual information will prevail.
1. Name or the router is xxx
2. Enable. secret password is xxx
3. Password In access user EXEC mode using the console is xxx
4. The password to allow telnet access to the router is xxx
5. IP information
Router>enable Router#config terminal Router(config)#hostname R2 R2(config)#enable secret Cisco 1 R2(config)#line console 0
R2(config-line)#password Cisco 2 R2(config-line)#exit R2(config)#line vty 0 4
R2(config-line)#password Cisco 3 R2(config-line)#login
R2(config-line)#exit R2(config)#interface faO/0
R2(config-if)#ip address 188.8.131.52 255.255.255.224 R2(config)#interface s0/0/0
R2(config-if)#ip address 192.0.2.190 255.255.255.240 R2(config-if)#no shutdown
R2(config-if)#exit R2(config)#router rip R2(config-router)#version 2
R2(config-router)#end R2#copy run start
Q57. DRAG DROP - (Topic 7)
A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning with the lowest layer, drag each procedure on the left to its proper category on the right.
The question asks us to “begin with the lowest layer” so we have to begin with Layer 1: verify physical connection; in this case an Ethernet cable connection. For your information, “verify Ethernet cable connection” means that we check if the type of connection (crossover, straight-through, rollover…) is correct, the RJ45 headers are plugged in, the signal on the cable is acceptable…
Next we “verify NIC operation”. We do this by simply making a ping to the loopback interface 127.0.0.1. If it works then the NIC card (layer 1, 2) and TCP/IP stack (layer 3) are working properly.
Verify IP configuration belongs to layer 3. For example, checking if the IP can be assignable for host, the PC’s IP is in the same network with the gateway…
Verifying the URL by typing in your browser some popular websites like google.com, microsoft.com to assure that the far end server is not down (it sometimes make we think we can’t access to the Internet). We are using a URL so this step belongs to layer 7 of the OSI model.
Q58. - (Topic 5)
Refer to the exhibit.
What is the cause of the Syslog output messages?
A. The EIGRP neighbor on Fa0/1 went down due to a failed link.
B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.
C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.
D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.
The first lines of the message show that a configuration change was made, and that the fa0/1 interface changed to a state of administratively down. This can only be done by issuing the shutdown command. The last line indicates that this caused an EIGRP neighbor adjacency to go down.
Q59. - (Topic 4)
The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?
A. This command should be executed from the global configuration mode.
B. The IP address 10.121.16.8 is the local router port used to forward data.
C. 102 is the remote DLCI that will receive the information.
D. This command is required for all Frame Relay configurations.
E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.
Broadcast is added to the configurations of the frame relay, so the PVC supports broadcast, allowing the routing protocol updates that use the broadcast update mechanism to be forwarded across itself.
Q60. - (Topic 8)
Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable auto mode?
C. dynamic desirable
D. dynamic auto
To know more about the 200-125, click here.