getcertified4sure.com

Quick Guide: ccna 200 125 syllabus




We provide real ccna routing and switching 200 125 pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco ccna 200 125 syllabus Exam quickly & easily. The ccna 200 125 ebook PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 200 125 ccna book dumps pdf and vce product and material, you can easily pass the ccna 200 125 exam.

Q51.  - (Topic 8)

Scenario:

You are a junior network engineer for a financial company, and the main office network is experiencing network issues. Troubleshoot the network issues.

Router R1 connects the main office to the internet, and routers R2 and R3 are internal routers.

NAT is enabled on router R1.

The routing protocol that is enabled between routers R1, R2 and R3 is RIPv2.

R1 sends the default route into RIPv2 for the internal routers to forward internet traffic to R1.

You have console access on R1, R2 and R3 devices. Use only show commands to troubleshoot the issues.

Users complain that they are unable to reach internet sites. You are troubleshooting internet connectivity problem at main office. Which statement correctly identifies the problem on Router R1?

A. Interesting traffic for NAT ACL is incorrectly configured.

B. NAT configurations on the interfaces are incorrectly configured

C. NAT translation statement incorrectly configured.

D. Only static NAT translation configured for the server, missing Dynamic NAT or Dynamic NAT overloading for internal networks.

Answer: B


Q52.  - (Topic 8)

Refer to the exhibit.

What is the effect of the given configuration?

A. It configures an inactive switch virtual interface.

B. It configures an active management interface.

C. It configures the native VLAN.

D. It configures the default VLAN.

Answer: A


Q53.  - (Topic 3)

What are two benefits of using a single OSPF area network design? (Choose two.)

A. It is less CPU intensive for routers in the single area.

B. It reduces the types of LSAs that are generated.

C. It removes the need for virtual links.

D. It increases LSA response times.

E. It reduces the number of required OSPF neighbor adjacencies.

Answer: B,C

Explanation:

OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement). The link types are as follows:

•LSA Type 1: Router LSA

•LSA Type 2: Network LSA

•LSA Type 3: Summary LSA

•LSA Type 4: Summary ASBR LSA

•LSA Type 5: Autonomous system external LSA

•LSA Type 6: Multicast OSPF LSA

•LSA Type 7: Not-so-stubby area LSA

•LSA Type 8: External attribute LSA for BGP

If all routers are in the same area, then many of these LSA types (Summary ASBR LSA, external LSA, etc) will not be used and will not be generated by any router.

All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non- backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. Virtual links are not ideal and should really only be used for temporary network solutions or migrations. However, if all locations are in a single OSPF area this is not needed.


Q54.  - (Topic 4)

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?

A. defines the destination IP address that is used in all broadcast packets on DCLI 202

B. defines the source IP address that is used in all broadcast packets on DCLI 202

C. defines the DLCI on which packets from the 192.168.1.2 IP address are received

D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address

Answer: D

Explanation:

This command identifies the DLCI that should be used for all packets destined to the 192.168.1.2 address. In this case, DLCI 202 should be used.


Q55.  - (Topic 3)

Which two are advantages of static routing when compared to dynamic routing? (Choose two.)

A. Configuration complexity decreases as network size increases.

B. Security increases because only the network administrator may change the routing table.

C. Route summarization is computed automatically by the router.

D. Routing tables adapt automatically to topology changes.

E. An efficient algorithm is used to build routing tables, using automatic updates.

F. Routing updates are automatically sent to neighbors.

G. Routing traffic load is reduced when used in stub network links.

Answer: B,G

Explanation:

Since static routing is a manual process, it can be argued that it is more secure (and more prone to human errors) since the network administrator will need to make changes to the routing table directly. Also, in stub networks where there is only a single uplink connection, the load is reduced as stub routers just need a single static default route, instead of many routes that all have the same next hop IP address.


Q56.  - (Topic 4)

Which PPP subprotocol negotiates authentication options?

A. NCP

B. ISDN

C. SLIP

D. LCP

E. DLCI

Answer: D

Explanation:

The PPP Link Control Protocol (LCP) is documented in RFC 1661. LPC negotiates link and PPP parameters to dynamically configure the data link layer of a PPP connection. Common LCP options include the PPP MRU, the authentication protocol, compression of PPP header fields, callback, and multilink options.


Q57.  - (Topic 5)

What are three benefits of GLBP? (Choose three.)

A. GLBP supports up to eight virtual forwarders per GLBP group.

B. GLBP supports clear text and MD5 password authentication between GLBP group members.

C. GLBP is an open source standardized protocol that can be used with multiple vendors.

D. GLBP supports up to 1024 virtual routers.

E. GLBP can load share traffic across a maximum of four routers.

F. GLBP elects two AVGs and two standby AVGs for redundancy.

Answer: B,D,E


Q58.  - (Topic 7)

Refer to the exhibit.

A network administrator attempts to ping Host2 from Host1 and receives the results that are shown. What is the problem?

A. The link between Host1 and Switch1 is down.

B. TCP/IP is not functioning on Host1

C. The link between Router1 and Router2 is down.

D. The default gateway on Host1 is incorrect.

E. Interface Fa0/0 on Router1 is shutdown.

F. The link between Switch1 and Router1 is down.

Answer: C

Explanation:

Host1 tries to communicate with Host2. The message destination host unreachable from Router1 indicates that the problem occurs when the data is forwarded from Host1 to Host2. According to the topology, we can infer that the link between Router1 and Router2 is down.


Q59.  - (Topic 8)

Which feature is configured by setting a variance that is at least two times the metric?

A. equal cost load balancing

B. unequal cost load balancing

C. Path selection

D. path count

Answer: B


Q60.  - (Topic 7)

What are the benefits of using Netflow? (Choose three.)

A. Network, Application & User Monitoring

B. Network Planning

C. Security Analysis

D. Accounting/Billing

Answer: A,C,D

Explanation:

NetFlow traditionally enables several key customer applications including:

+ Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns

associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

+ Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.