★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 200-125 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/200-125-dumps.html


Q1.  - (Topic 8)

On which type of port can switches interconnect for multi-VLAN communication?

A. interface port

B. access port

C. switch port

D. trunk port

Answer: D


Q2.  - (Topic 5)

Which statement is correct regarding the operation of DHCP?

A. A DHCP client uses a ping to detect address conflicts.

B. A DHCP server uses a gratuitous ARP to detect DHCP clients.

C. A DHCP client uses a gratuitous ARP to detect a DHCP server.

D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

E. If an address conflict is detected, the address is removed from the pool for an amount of time configurable by the administrator.

F. If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted.

Answer: D

Explanation:

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

(Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html)


Q3.  - (Topic 8)

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Answer: A

Explanation:

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.


Q4.  - (Topic 6)

Refer to the exhibit.

The following commands are executed on interface fa0/1 of 2950Switch. 2950Switch(config-if)# switchport port-security

2950Switch(config-if)# switchport port-security mac-address sticky 2950Switch(config-if)# switchport port-security maximum 1

The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two.)

A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.

B. Only host A will be allowed to transmit frames on fa0/1.

C. This frame will be discarded when it is received by 2950Switch.

D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.

E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.

F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1.

Answer: B,D

Explanation:

The configuration shown here is an example of port security, specifically port security using sticky addresses. You can use port security with dynamically learned and static MAC addresses to restrict a port's ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. When you assign secure MAC addresses to a secure port, the port does not forward ingress traffic that has source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the device attached to that port has the full bandwidth of the port.

Port security with sticky MAC addresses provides many of the same benefits as port security with static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security with sticky MAC addresses retains dynamically learned MAC addresses during a link-down condition.


Q5.  - (Topic 3)

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C

Explanation:

Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.

After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA

is copied and forwarded to every neighbor except the one that sent the LSA.


Q6.  - (Topic 7)

Refer to the exhibit.

An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?

A. data link layer

B. application layer

C. access layer

D. session layer

E. network layer

Answer: E

Explanation:

The command ping uses ICMP protocol, which is a network layer protocol used to propagate control message between host and router. The command ping is often used to verify the network connectivity, so it works at the network layer.


Q7.  - (Topic 3)

Which command would you use on a Cisco router to verify the Layer 3 path to a host?

A. tracert address

B. traceroute address

C. telnet address

D. ssh address

Answer: B

Explanation:

In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. Traceroute proceeds unless all (three) sent packets are lost more than twice, then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.


Q8.  - (Topic 7)

Refer to the exhibit.

If the devices produced the given output, what is the cause of the EtherChannel problem?

A. SW1's Fa0/1 interface is administratively shut down.

B. There is an encapsulation mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

C. There is an MTU mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

D. There is a speed mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

Answer: D

Explanation:

You must configure all interfaces in an EtherChannel to operate at the same speeds and duplex modes. Based on the output shown, SW1 is configured to run at 10Mb while SW2 is operating at 100 Mb.


Q9.  - (Topic 3)

What OSPF command, when configured, will include all interfaces into area 0?

A. network 0.0.0.0 255.255.255.255 area 0

B. network 0.0.0.0 0.0.0.0 area 0

C. network 255.255.255.255 0.0.0.0 area 0

D. network all-interfaces area 0

Answer: A

Explanation:

Example 3-1 displays OSPF with a process ID of 1 and places all interfaces configured with an IP address in area 0. The network command network 0.0.0.0 255.255.255.255 area 0 dictates that you do not care (255.255.255.255) what the IP address is, but if an IP address is enabled on any interface, place it in area 0.

Example 3-1 Configuring OSPF in a Single Area

router ospf 1

network 0.0.0.0 255.255.255.255 area 0

Reference: http://www.ciscopress.com/articles/article.asp?p=26919&seqNum=3


Q10.  - (Topic 8)

when you troubleshoot an IPv4 connectivity issue on a router, which three router configuration checks you must perform?

A. Verify that the router interface IP address IP address is correct.

B. Verify that the DNS is configured correctly.

C. Verify that the router and the host use the same subnet mask.

D. Verify that the router firmware is up-to-date.

E. Verify that a default route is configured.

F. Verify that the route appears in the routing table

Answer: A,B,F