Your success in Cisco ccna 200 125 dumps is our sole target and we develop all our ccna 200 125 ebook braindumps in a way that facilitates the attainment of this target. Not only is our ccna 200 125 dumps study material the best you can find, it is also the most detailed and the most updated. ccna 200 125 Practice Exams for Cisco CCNA Routing and Switching 200 125 ccna v3 0 are written to the highest standards of technical accuracy.
P.S. Certified 200-125 bundle are available on Google Drive, GET MORE: https://drive.google.com/open?id=1tmPuPMdbI90mJvs8j7thMAwqkALcwK_i
New Questions 13
Refer to the exhibit.
All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)
A. Network A - 172.16.3.48/26
B. Network A - 172.16.3.128/25
C. Network A - 172.16.3.192/26
D. Link A - 172.16.3.0/30
E. Link A - 172.16.3.40/30
F. Link A - 172.16.3.112/30
Answer: B,D
Explanation:
Only a /30 is needed for the point to point link and sine the use of the ip subnet-zero was used, 172.16.3.0/30 is valid. Also, a /25 is required for 120 hosts and again
172.16.3.128/25 is the best, valid option.
New Questions 14
Refer to the exhibit.
Which address and mask combination represents a summary of the routes learned by EIGRP?
A. 192.168.25.0 255.255.255.240
B. 192.168.25.0 255.255.255.252
C. 192.168.25.16 255.255.255.240
D. 192.168.25.16 255.255.255.252
E. 192.168.25.28 255.255.255.240
F. 192.168.25.28 255.255.255.252
Answer: C
Explanation:
The binary version of 20 is 10100. The binary version of 16 is 10000. The binary version of 24 is 11000. The binary version of 28 is 11100.
The subnet mask is /28. The mask is 255.255.255.240.
Note:
From the output above, EIGRP learned 4 routes and we need to find out the summary of them:
+ 192.168.25.16
+ 192.168.25.20
+ 192.168.25.24
+ 192.168.25.28
-> The increment should bE. 28 u2013 16 = 12 but 12 is not an exponentiation of 2 so we must
choose 16 (24). Therefore the subnet mask is /28 (=1111 1111.1111 1111.1111
1111.11110000) = 255.255.255.240.
So, the best answer should be 192.168.25.16 255.255.255.240.
New Questions 15
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.)
A. the amount of available ROM
B. the amount of available flash and RAM memory
C. the version of the bootstrap software present on the router
D. show version
E. show processes
F. show running-config
Answer: B,D
Explanation:
When upgrading a new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the u201cshow versionu201d command.
New Questions 16
CORRECT TEXTA corporation wants to add security to its network. The requirements are:
u2711 Host B should be able to use a web browser (HTTP) to access the Finance Web Server.
u2711 Other types of access from host B to the Finance Web Server should be blocked.
u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
u2711 All hosts in the Core and on local LAN should be able to access the Public Web Server.
You have been tasked to create and apply anumbered access listto a single outbound interface. This access list can contain no more thanthreestatements that meet these requirements.
Access to the router CLI can be gained by clicking on the appropriate host.
u2711 All passwords have been temporarily set to u201cciscou201d.
u2711 The Core connection uses an IP address of 198.18.132.65.
u2711 The computers in the Hosts LAN have been assigned addresses of 192.168.201.1
u2013 192.168.201.254.
u2711 host A 192.168.201.1
u2711 host B 192.168.201.2
u2711 host C 192.168.201.3
u2711 host D 192.168.201.4
u2711 The Finance Web Server has been assigned an address of 172.22.237.17.
u2711 The Public Web Server in the Server LAN has been assigned an address of 172.22.237.18.
Answer:
Please check the below explanation for all details.
Explanation:
We should create an access-list and apply it to the interface that is connected to the Server LAN because it can filter out traffic from both S2 and Core networks. To see which interface this is, use the u201cshow ip interface briefu201d command:
From this, we know that the servers are located on the fa0/1 interface, so we will place our numbered access list here in the outbound direction.
Corp1#configure terminal
Our access-list needs to allow host B u2013 192.168125.2 to the Finance Web Server 172.22.109.17 via HTTP (port 80), so our first line is this:
Corp1(config)#access-list 100 permit tcp host 192.168.125.2 host 172.22.109.17 eq 80
Then, our next two instructions are these:
u2711 Other types of access from host B to the Finance Web Server should be blocked.
u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
This can be accomplished with one command (which we need to do as our ACL needs to
be no more than 3 lines long), blocking all other access to the finance web server:
Corp1(config)#access-list 100 deny ip any host 172.22.109.17
Our last instruction is to allow all hosts in the Core and on the local LAN access to the Public Web Server (172.22.109.18)
Corp1(config)#access-list 100 permit ip host 172.22.109.18 any Finally, apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface fa0/1
Corp1(config-if)#ip access-group 100 out
Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core networks.
To verify, just click on host B to open its web browser. In the address box type http://172.22.109.17 to check if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it.
Click on other hosts (A, C and D) and check to make sure you canu2021t access Finance Web Server from these hosts. Then, repeat to make sure they can reach the public server at 172.22.109.18. Finally, save the configuration
Corp1(config-if)#end
Corp1#copy running-config startup-config
New Questions 17
Which command enables RSTP on a switch?
A. spanning-tree uplinkfast
B. spanning-tree mode rapid-pvst
C. spanning-tree backbonefast
D. spanning-tree mode mst
Answer: B
Explanation:
Rapid Spanning Tree Protocol (RSTP) is an enhancement of the original STP 802.1D protocol. The RSTP 802.1w protocol is an IEEE open implementation. Cisco has its own proprietary implementation of RSTP, that includes the benefits of its Per-VLAN spanning tree protocols, called Rapid-PVST+.
To activate the Rapid-PVST+ protocol: switch(config)#spanning-tree mode rapid-pvst
New Questions 18
Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over Fast Ethernet?
A. 802.3ad
B. 802.1w
C. 802.1D
D. 802.1Q
Answer: D
Explanation:
Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol for negotiating trunking on a link between two devices and for negotiating the type of trunking encapsulation (802.1Q) to be used.
New Questions 19
Which parameter or parameters are used to calculate OSPF cost in Cisco routers?
A. Bandwidth
B. Bandwidth and Delay
C. Bandwidth, Delay, and MTU
D. Bandwidth, MTU, Reliability, Delay, and Load
Answer: A
Explanation:
The well-known formula to calculate OSPF cost is Cost = 108/ Bandwidth
New Questions 20
What is the default administrative distance of OSPF?
A. 90
B. 100
C. 110
D. 120
Answer: C
Explanation:
Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value.
Default Distance Value Table
This table lists the administrative distance default values of the protocols that Cisco supports:
Route Source
Default Distance Values
Connected interface 0
Static route 1
Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5
External Border Gateway Protocol (BGP) 20
Internal EIGRP 90
IGRP 100 OSPF 110
Intermediate System-to-Intermediate System (IS-IS) 115
Routing Information Protocol (RIP) 120
Exterior Gateway Protocol (EGP) 140
On Demand Routing (ODR) 160
External EIGRP 170
Internal BGP 200
Unknown* 255
New Questions 21
What two things will a router do when running a distance vector routing protocol? (Choose two.)
A. Send periodic updates regardless of topology changes.
B. Send entire routing table to all routers in the routing domain.
C. Use the shortest-path algorithm to the determine best path.
D. Update the routing table based on updates from their neighbors.
E. Maintain the topology of the entire network in its database.
Answer: A,D
Explanation:
Distance means how far and Vector means in which direction. Distance Vector routing protocols pass periodic copies of routing table to neighbor routers and accumulate distance vectors. In distance vector routing protocols, routers discover the best path to destination from each neighbor. The routing updates proceed step by step from router to router.
New Questions 22
What are three benefits of implementing VLANs? (Choose three.)
A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure.
C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.
E. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size.
F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain.
G. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.
Answer: A,C,D
Explanation:
Benefits of VLANs
VLAN is a network structure which allows users to communicate while in different locations by sharing one multicast domain and a single broadcast. They provide numerousnetworkingbenefits and have become popular in the market. For instance, it helps reduce administrative costs when users are geographically dispersed.
1. Inexpensive
The popularity of VLANs is due to the fact that changes, adds, and moves can be attained simply by making necessary configurations on the VLAN port. Time-consuming, re- addressing, and host reconfigurations is now a thing of the past, because network configuration can be made at ease when need arises.
2. Better management
A VLAN typically solve the scalability issues that exist in a large network by breaking the main domain into several VLAN groups or smaller broadcast configurations, thereby encourage better control of multicast traffic as well as broadcast domains.
3. Improves network security
High-security can be positioned in different VLAN groups to ensure that non-members
cannot receive their broadcasts. On the other hand, a router is added and workgroups relocated into centralized locations.
4. Enhances performance
A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
5. Segment multiple networks
VLANs are typically used to achieve multiple purposes. They are popularly used to reduce broadcast traffic. Each VLAN creates a separate, smaller broadcast domain.
6. Better administration
VLANs facilitate grouping of multiple geographical stations. When VLAN users move to another physical location, the network does not have to be configured.
Recommend!! Get the Certified 200-125 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-200-125/ (New 889 Q&As Version)