Examples of ccna routing and switching 200 125

200-125 Guide

200-125 Exam Royal Pack (In Stock.)

 
  • Cisco
  • Exam Number/Code 200-125
  • Product Name CCNA Cisco Certified Network Associate CCNA (v3.0)
  • Questions and Answers
  • 635 Q&As
  • Last Updated
  • Nov 06,2018
  • List Price
  • $128.99
  • Price
  • Today 49.99 USD

Free TrialVersion: demo Buy Now 50% OFF

Examples of ccna routing and switching 200 125

Master the ccna 200 125 torrent CCNA Cisco Certified Network Associate CCNA (v3.0) content and be ready for exam day success quickly with this Actualtests ccna 200 125 syllabus book. We guarantee it!We make it a reality and give you real ccna 200 125 ebook questions in our Cisco 125 200 braindumps.Latest 100% VALID Cisco ccna 200 125 syllabus Exam Questions Dumps at below page. You can use our Cisco 125 200 braindumps and pass your exam.

Q111.  - (Topic 5)

The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that can be supported on each LAN if the organization is using one class C address block?

A. 8

B. 6

C. 30

D. 32

E. 14

F. 16

Answer: C

Explanation:

Since there is one class C network that means 256 total IP addresses. Since we need 7 LAN blocks and we cannot use the first one (subnet 0) we take 256/8=32 hosts. However, since we need to reserve the network and broadcast addresses for each of these subnets, only 30 total IP addresses are usable.


Q112.  - (Topic 5)

A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)

A. informational

B. emergency

C. warning

D. critical

E. debug

F. error

Answer: B,D,F

Explanation:

The Message Logging is divided into 8 levels as listed below:

Level Keyword Description 0

emergencies System is unusable 1

alerts

Immediate action is needed 2

critical

Critical conditions exist 3

errors

Error conditions exist 4

warnings

Warning conditions exist 5

notification

Normal, but significant, conditions exist 6

informational Informational messages 7

debugging Debugging messages

If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged. For example, by using the “logging trap 3 command, all the logging of emergencies, alerts, critical, and errors, will be logged.


Q113. CORRECT TEXT - (Topic 6)

A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.

The task is to create and apply an access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted.

Access to the router CLI can be gained by clicking on the appropriate host. All passwords have been temporarily set to "cisco".

The Core connection uses an IP address of 198.18.196.65.

The computers in the Hosts LAN have been assigned addresses of 192.168.33.1 - 192.168.33.254

✑ host A 192.168.33.1

✑ host B 192.168.33.2

✑ host C 192.168.33.3

✑ host D 192.168.33.4

The servers in the Server LAN have been assigned addresses of 172.22.242.17 - 172.22.242.30.

The Finance Web Server is assigned an IP address of 172.22.242.23.

Answer: 

Select the console on Corp1 router Configuring ACL

Corp1>enable Corp1#configure terminal

comment: To permit only Host C (192.168.33.3){source addr} to access finance server address (172.22.242.23) {destination addr} on port number 80 (web) Corp1(config)#access-list 100 permit tcp host 192.168.33.3 host 172.22.242.23 eq 80 comment: To deny any source to access finance server address (172.22.242.23)

{destination addr} on port number 80 (web)

Corp1(config)#access-list 100 deny tcp any host 172.22.242.23 eq 80

comment: To permit ip protocol from any source to access any destination because of the implicit deny any any statement at the end of ACL.

Corp1(config)#access-list 100 permit ip any any Applying the ACL on the Interface

comment: Check show ip interface brief command to identify the interface type and number by checking the IP address configured.

Corp1(config)#interface fa 0/1

If the ip address configured already is incorrect as well as the subnet mask. This should be corrected in order ACL to work

type this commands at interface mode :

no ip address 192.x.x.x 255.x.x.x (removes incorrect configured ipaddress and subnet mask)

Configure Correct IP Address and subnet mask:

ip address 172.22.242.30 255.255.255.240 ( range of address specified going to server is given as 172.22.242.17 - 172.22.242.30 )

Comment: Place the ACL to check for packets going outside the interface towards the

finance web server.

Corp1(config-if)#ip access-group 100 out Corp1(config-if)#end

Important: To save your running config to startup before exit. Corp1#copy running-config startup-config

Verifying the Configuration:

Step1: show ip interface brief command identifies the interface on which to apply access list.

Step2: Click on each host A, B, C, & D. Host opens a web browser page, Select address box of the web browser and type the ip address of finance web server (172.22.242.23) to test whether it permits /deny access to the finance web Server.

Step 3: Only Host C (192.168.33.3) has access to the server. If the other host can also access then maybe something went wrong in your configuration. Check whether you configured correctly and in order.

Step 4: If only Host C (192.168.33.3) can access the Finance Web Server you can click on NEXT button to successfully submit the ACL SIM.


Q114.  - (Topic 5)

A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme? (Choose two.)

A. 255.255.255.0

B. 255.255.255.128

C. 255.255.252.0

D. 255.255.255.224

E. 255.255.255.192

F. 255.255.248.0

Answer: B,E

Explanation:

Subnetting is used to break the network into smaller more efficient subnets to prevent excessive rates of Ethernet packet collision in a large network. Such subnets can be arranged hierarchically, with the organization's network address space (see also Autonomous System) partitioned into a tree-like structure. Routers are used to manage traffic and constitute borders between subnets.

A routing prefix is the sequence of leading bits of an IP address that precede the portion of the address used as host identifier. In IPv4 networks, the routing prefix is often expressed as a "subnet mask", which is a bit mask covering the number of bits used in the prefix. An IPv4 subnet mask is frequently expressed in quad-dotted decimal representation, e.g., 255.255.255.0 is the subnet mask for the 192.168.1.0 network with a 24-bit routing prefix (192.168.1.0/24).


Q115.  - (Topic 5)

Which three statements about Syslog utilization are true? (Choose three.)

A. Utilizing Syslog improves network performance.

B. The Syslog server automatically notifies the network administrator of network problems.

C. A Syslog server provides the storage space necessary to store log files without using router disk space.

D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.

E. Enabling Syslog on a router automatically enables NTP for accurate time stamping.

F. A Syslog server helps in aggregation of logs and alerts.

Answer: C,D,F

Explanation:

The Syslog sender sends a small (less than 1KB) text message to the Syslog receiver. The Syslog receiver is commonly called "syslogd," "Syslog daemon," or "Syslog server." Syslog messages can be sent via UDP (port 514) and/or TCP (typically, port 5000). While there are some exceptions, such as SSL wrappers, this data is typically sent in clear text over the network. A Syslog server provides the storage space necessary to store log files without using router disk space.

In general, there are significantly more Syslog messages available within IOS as compared to SNMP Trap messages. For example, a Cisco Catalyst 6500 switch running Cisco IOS Software Release 12.2(18)SXF contains about 90 SNMP trap notification messages, but has more than 6000 Syslog event messages.

System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a UNIX-style syslog service. A syslog service accepts messages and stores them in files, or prints them according to a simple configuration file.

Reference: http://www.cisco.com/c/en/us/products/collateral/services/high-availability/white_paper_c11-557812.html


Q116.  - (Topic 5)

What are three benefits of GLBP? (Choose three.)

A. GLBP supports up to eight virtual forwarders per GLBP group.

B. GLBP supports clear text and MD5 password authentication between GLBP group members.

C. GLBP is an open source standardized protocol that can be used with multiple vendors.

D. GLBP supports up to 1024 virtual routers.

E. GLBP can load share traffic across a maximum of four routers.

F. GLBP elects two AVGs and two standby AVGs for redundancy.

Answer: B,D,E


Q117.  - (Topic 3)

If IP routing is enabled, which two commands set the gateway of last resort to the default gateway? (Choose two.)

A. ip default-gateway 0.0.0.0

B. ip route 172.16.2.1 0.0.0.0 0.0.0.0

C. ip default-network 0.0.0.0

D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1

E. ip route 0.0.0.0 0.0.0.0 172.16.2.1

Answer: C,E

Explanation:

Both the “ip default-network” and “ip route 0.0.0.0 0.0.0.0 (next hop)” commands can be used to set the default gateway in a Cisco router.


Q118.  - (Topic 8)

Which MTU size can cause a baby giant error?

A. 1500

B. 9216

C. 1600

D. 1518

Answer: C

Explanation: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/29805-175.html


Q119.  - (Topic 5)

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

A. SNMPv3 enhanced SNMPv2 security features.

B. SNMPv3 added the Inform protocol message to SNMP.

C. SNMPv2 added the Inform protocol message to SNMP.

D. SNMPv3 added the GetBulk protocol messages to SNMP.

E. SNMPv2 added the GetBulk protocol message to SNMP.

F. SNMPv2 added the GetNext protocol message to SNMP.

Answer: A,C,E

Explanation:

SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct.

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.

Note: These two messages are carried over SNMPv3.


Q120.  - (Topic 8)

Which statement about switch access ports is true?

A. They drop packets with 802.1Q tags.

B. A VLAN must be assigned to an access port before it is created.

C. They can receive traffic from more than one VLAN with no voice support

D. By default, they carry traffic for VLAN 10.

Answer: A

Explanation:

"If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that port drops the packet without learning its MAC source address."


To know more about the 200-125, click here.

Tagged as : Cisco 200-125 Dumps, Download 200-125 pdf, 200-125 VCE, 200-125 pass4sure, examcollection 200-125