Actualtests offers free demo for 200 125 cisco exam. "CCNA Cisco Certified Network Associate CCNA (v3.0)", also known as 125 200 exam, is a Cisco Certification. This set of posts, Passing the Cisco 200 125 ccna book exam, will help you answer those questions. The ccna 200 125 torrent Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco ccna 200 125 dumps exams and revised by experts!
P.S. 100% Correct 200-125 testing material are available on Google Drive, GET MORE: https://drive.google.com/open?id=1kYtwvDfK3CIMnjUzKdkde8F69Zg0NhM8
Question No: 15
Which command displays CPU utilization?
A. show protocols
B. show process
C. show system
D. show version
Answer: B
Explanation:
The u201cshow processu201d (in fact, the full command is u201cshow processesu201d) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted).
A more friendly way to check the CPU utilization is the command u201cshow processes cpu historyu201d, in which the total CPU usage on the router over a period of time: one minute, one hour, and 72 hours are clearly shown:
+ The Y-axis of the graph is the CPU utilization.
+ The X-axis of the graph is the increment within the period displayed in the graph.
For example, from the last graph (last 72 hours) we learn that the highest CPU utilization within 72 hours is 37% about six hours ago.
Question No: 16
Refer to the exhibit.
Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?
A. 255.255.255.0
B. 255.255.254.0
C. 255.255.252.0
D. 255.255.248.0
Answer: B
Explanation:
310 hosts < 512 = 29-> We need a subnet mask of 9 bits 0 -> 1111 1111.1111 1111.1111
1110.0000 0000 -> 255.255.254.0
Question No: 17
What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)
A. reduced cost
B. better throughput
C. broadband incompatibility
D. increased security
E. scalability
F. reduced latency
Answer: A,D,E
Explanation:
IPsec offer a number of advantages over point to point WAN links, particularly when multiple locations are involved. These include reduced cost, increased security since all traffic is encrypted, and increased scalability as s single WAN link can be used to connect to all locations in a VPN, where as a point to point link would need to be provisioned to each location.
Question No: 18
What are the alert messages generated by SNMP agents called?
A. TRAP
B. INFORM
C. GET
D. SET
Answer: A,B
Explanation:
A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that theyu2021re unacknowledged so you donu2021t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.
Question No: 19
Which two of these are characteristics of the 802.1Q protocol? (Choose two.)
A. It is used exclusively for tagging VLAN frames and does not address network reconvergence following switched network topology changes.
B. It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.
C. It is a Layer 2 messaging protocol which maintains VLAN configurations across networks.
D. It includes an 8-bit field which specifies the priority of a frame.
E. It is a trunking protocol capable of carrying untagged frames.
Answer: B,E
Explanation:
802.1Q protocol, or Virtual Bridged Local Area Networks protocol, mainly stipulates the realization of the VLAN. 802.1Q is a standardized relay method that inserts 4 bytes field into the original Ethernet frame and re-calculate the FCS. 802.1Q frame relay supports two types of frame: marked and non-marked. Non-marked frame carries no VLAN identification information.
Question No: 20
VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?
A. The command is rejected.
B. The port turns amber.
C. The command is accepted and the respective VLAN is added to vlan.dat.
D. The command is accepted and you must configure the VLAN manually.
Answer: C
Explanation:
The u201cswitchport access vlan 3u201d will put that interface as belonging to VLAN 3 while also updated the VLAN database automatically to include VLAN 3.
Question No: 21
Refer to the exhibit.
Switch port FastEthernet 0/24 on ALSwitch1 will be used to create an IEEE 802.1Q- compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached?
A. VLANs have not been created yet.
B. An IP address must be configured for the port.
C. The port is currently configured for access mode.
D. The correct encapsulation type has not been configured.
E. The u201cno shutdownu201d command has not been entered for the port.
Answer: C
Explanation:
According to the output shown the switchport (layer 2 Switching) is enabled and the port is in access mode. To make a trunk link the port should configured as a trunk port, not an access port, by using the following command: (Config-if)#switchport mode trunk.
Question No: 22
Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.)
A. Router(config)# router ospf 0
B. Router(config)# router ospf 1
C. Router(config)# router ospf area 0
D. Router(config-router)# network 192.168.16.0 0.0.0.255 0
E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0
F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0
Answer: B,E
Explanation:
In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> but To configure OSPF, we need a wildcard in the u201cnetworku201d statement, not a subnet mask. We also need to assgin an area to this process ->.
Question No: 23
Refer to the exhibit.
A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?
A. 192.168.1.56/26
B. 192.168.1.56/27
C. 192.168.1.64/26
D. 192.168.1.64/27
Answer: C
Explanation:
A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62
6 bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet. 8bits+ 8bits+ 8bits + 2bits = /26
/26 bits subnet is 24bits + 11000000 = 24bits + 192 256 u2013 192 = 64
0 -63
64 u2013 127
Question No: 24
Refer to the exhibit.
The speed of all serial links is E1 and the speed of all Ethernet links is 100 Mb/s. A static route will be established on the Manchester router to direct traffic toward the Internet over the most direct path available. What configuration on the Manchester router will establish a route toward the Internet for traffic that originates from workstations on the Manchester LAN?
A. ip route 0.0.0.0 255.255.255.0 172.16.100.2
B. ip route 0.0.0.0 0.0.0.0 128.107.1.1
C. ip route 0.0.0.0 255.255.255.252 128.107.1.1
D. ip route 0.0.0.0 0.0.0.0 172.16.100.1
E. ip route 0.0.0.0 0.0.0.0 172.16.100.2
F. ip route 0.0.0.0 255.255.255.255 172.16.100.2
Answer: E
Explanation:
We use default routing to send packets with a remote destination network not in the routing table to the next-hop router. You should generally only use default routing on stub networksu2014those with only one exit path out of the network.
According to exhibit, all traffic towards Internet that originates from workstations should forward to Router R1.
Syntax for default route is:
ip route <Remote_Network> <Netmask> <Next_Hop_Address>.