getcertified4sure.com

Super ways to 200 125 ccna




It is impossible to pass Cisco ccna 200 125 ebook exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed Cisco cisco 200 125 practice questions. You will get a surprising result by our Rebirth CCNA Cisco Certified Network Associate CCNA (v3.0) practice guides.

Q11.  - (Topic 5)

Refer to the exhibit.

A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)

A. host A IP address: 192.168.1.79

B. host A IP address: 192.168.1.64

C. host A default gateway: 192.168.1.78

D. host B IP address: 192.168.1.128

E. host B default gateway: 192.168.1.129

F. host B IP address: 192.168.1.190

Answer: A,C,F

Explanation:

It’s a “router-on-a-stick” configuration. Which means each host in the VLAN must corresponds with the VLAN configured on the sub-interfaces.

VLAN 10 is configured on fa0/0.10 and VLAN 20 on fa0/0.20. So each hosts in VLAN 10 must use fa0/0.10 IP address as their default gateway, each hosts must also be in the same subnet as fa0/0.10 IP – same with hosts in VLAN 20.

So find out the usable IP addresses on each sub-interfaces – for 192.168.1.78 /27: 192.168.1.65 – .94 and for 192.168.1.130 /26: 192.168.1.128 – .190.

Host A (using port 6 – VLAN 10) must use IP 192.168.1.79, default gateway 192.168.1.78. Host B (using port 9 – VLAN 20) must use IP 192.168.1.190, default gateway

192.168.1.130.


Q12.  - (Topic 8)

How does a router handle an incoming packet whose destination network is missing from the routing table?

A. it discards the packet.

B. it broadcasts the packet to each network on the router.

C. it routes the packet to the default route.

D. it broadcasts the packet to each interface on the router.

Answer: A


Q13.  - (Topic 5)

Refer to the exhibit.

What is the cause of the Syslog output messages?

A. The EIGRP neighbor on Fa0/1 went down due to a failed link.

B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.

C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.

D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

Answer: C

Explanation:

The first lines of the message show that a configuration change was made, and that the fa0/1 interface changed to a state of administratively down. This can only be done by issuing the shutdown command. The last line indicates that this caused an EIGRP neighbor adjacency to go down.


Q14.  - (Topic 8)

Which two statements about northbound and southbound APIs are true? (Choose two.)

A. Only southbound APIs allow program control of the network.

B. Only northbound APIs allow program control of the network.

C. Only southbound API interfaces use a Service Abstraction Layer.

D. Only northbound API interfaces use a Service Abstraction Layer.

E. Both northbound and southbound API interfaces use a Service Abstraction Layer.

F. Both northbound and southbound APIs allow program control of the network.

Answer: B,C


Q15. DRAG DROP - (Topic 7)

A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning with the lowest layer, drag each procedure on the left to its proper category on the right.

Answer:

Explanation:

The question asks us to “begin with the lowest layer” so we have to begin with Layer 1: verify physical connection; in this case an Ethernet cable connection. For your information, “verify Ethernet cable connection” means that we check if the type of connection (crossover, straight-through, rollover…) is correct, the RJ45 headers are plugged in, the signal on the cable is acceptable…

Next we “verify NIC operation”. We do this by simply making a ping to the loopback interface 127.0.0.1. If it works then the NIC card (layer 1, 2) and TCP/IP stack (layer 3) are working properly.

Verify IP configuration belongs to layer 3. For example, checking if the IP can be assignable for host, the PC’s IP is in the same network with the gateway…

Verifying the URL by typing in your browser some popular websites like google.com, microsoft.com to assure that the far end server is not down (it sometimes make we think we can’t access to the Internet). We are using a URL so this step belongs to layer 7 of the OSI model.


Q16.  - (Topic 7)

What command visualizes the general NetFlow data on the command line?

A. show ip flow export

B. show ip flow top-talkers

C. show ip cache flow

D. show mls sampling

E. show mls netflow ip

Answer: C

Explanation:

The following is an example of how to visualize the NetFlow data using the CLI. There are three methods to visualize the data depending on the version of Cisco IOS Software. The traditional show command for NetFlow is "show ip cache flow" also available are two forms of top talker commands. One of the top talkers commands uses a static configuration to view top talkers in the network and another command called dynamic top talkers allows real-time sorting and aggregation of NetFlow data. Also shown is a show MLS command to view the hardware cache on the Cisco Catalyst 6500 Series Switch.

The following is the original NetFlow show command used for many years in Cisco IOS Software. Information provided includes packet size distribution; basic statistics about number of flows and export timer setting, a view of the protocol distribution statistics and the NetFlow cache.

The “show ip cache flow” command displays a summary of the NetFlow accounting statistics.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.html


Q17.  - (Topic 8)

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

A. NAT

B. NTP

C. RFC 1631

D. RFC 1918

Answer: A


Q18.  - (Topic 5)

In a GLBP network, who is responsible for the ARP request?

A. AVF

B. AVG

C. Active Router

D. Standby Router

Answer: B

Explanation:

Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address.

The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.

Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html


Q19.  - (Topic 8)

Which MAC protocol sets a random timer to reattempt communication?

A. IEEE 802.1x

B. RARP

C. CSMA/CA

D. CSMA/CD

Answer: D


Q20.  - (Topic 6)

A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which

two ACL statements, when combined, would you use to accomplish this task? (Choose two.)

A. access-list 10 permit ip 192.168.146.0 0.0.1.255

B. access-list 10 permit ip 192.168.147.0 0.0.255.255

C. access-list 10 permit ip 192.168.148.0 0.0.1.255

D. access-list 10 permit ip 192.168.149.0 0.0.255.255

E. access-list 10 permit ip 192.168.146.0 0.0.0.255

F. access-list 10 permit ip 192.168.146.0 255.255.255.0

Answer: A,C

Explanation:

“access-list 10 permit ip 192.168.146.0 0.0.1.255” would allow only the 192.168.146.0 and

192.168.147.0 networks, and “access-list 10 permit ip 192.168.148.0 0.0.1.255” would allow only the 192.168.148.0 and 192.168.149.0 networks.

Topic 7, Infrastructure Management