It is impossible to pass Cisco cisco ccna 200 125 exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed Cisco ccna 200 125 study guide practice questions. You will get a surprising result by our Renewal CCNA Cisco Certified Network Associate CCNA (v3.0) practice guides.

Q16.  - (Topic 7)

What are three reasons to collect Netflow data on a company network? (Choose three.)

A. To identify applications causing congestion.

B. To authorize user network access.

C. To report and alert link up / down instances.

D. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.

E. To detect suboptimal routing in the network.

F. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

Answer: A,D,F

Explanation:

NetFlow facilitates solutions to many common problems encountered by IT professionals.

+ Analyze new applications and their network impact

Identify new application network loads such as VoIP or remote site additions.

+ Reduction in peak WAN traffic

Use NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network top talkers.

+ Troubleshooting and understanding network pain points

Diagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command line interface or reporting tools. -> D is correct.

+ Detection of unauthorized WAN traffic

Avoid costly upgrades by identifying the applications causing congestion. -> A is correct.

+ Security and anomaly detection

NetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars.

+ Validation of QoS parameters

Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.-> F is correct.


Q17.  - (Topic 5)

Which command enables IPv6 forwarding on a Cisco router?

A. ipv6 local

B. ipv6 host

C. ipv6 unicast-routing

D. ipv6 neighbor

Answer: C

Explanation:

To enable IPv6 routing on the Cisco router use the following command: ipv6 unicast-routing

If this command is not recognized, your version of IOS does not support IPv6.


Q18.  - (Topic 3)

Refer to the exhibit.

The speed of all serial links is E1 and the speed of all Ethernet links is 100 Mb/s. A static route will be established on the Manchester router to direct traffic toward the Internet over the most direct path available. What configuration on the Manchester router will establish a route toward the Internet for traffic that originates from workstations on the Manchester LAN?

A. ip route 0.0.0.0 255.255.255.0 172.16.100.2

B. ip route 0.0.0.0 0.0.0.0 128.107.1.1

C. ip route 0.0.0.0 255.255.255.252 128.107.1.1

D. ip route 0.0.0.0 0.0.0.0 172.16.100.1

E. ip route 0.0.0.0 0.0.0.0 172.16.100.2

F. ip route 0.0.0.0 255.255.255.255 172.16.100.2

Answer: E

Explanation:

We use default routing to send packets with a remote destination network not in the routing table to the next-hop router. You should generally only use default routing on stub networks—those with only one exit path out of the network.

According to exhibit, all traffic towards Internet that originates from workstations should forward to Router R1.

Syntax for default route is:

ip route <Remote_Network> <Netmask> <Next_Hop_Address>.


Q19.  - (Topic 8)

Which component of the Cisco SDN solution serves as the centralized management system?

A. Cisco OpenDaylight

B. Cisco ACI

C. Cisco APIC

D. Cisco IWAN

Answer: B

Explanation:

Cisco ACI is a comprehensive SDN architecture. This policy-based automation solution supports a business-relevant application policy language, greater scalability through a distributed enforcement system, and greater network visibility. These benefits are achieved through the integration of physical and virtual environments under one policy model for networks, servers, storage, services, and security.


Q20.  - (Topic 8)

Which command can you enter to route all traffic that is destined for 192.168.0.0/20 to a specific interface?

A. router(config)#ip route 192.168.0.0 255.255.240.0 GigabitEthernet0/1

B. router(config)#ip route 0.0.0.0 255.255.255.0 GigabitEthernet0/1

C. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1

D. router(config)#ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1

Answer: A


Q21.  - (Topic 8)

Refer to the exhibit.

What is the result of setting the no login command?

A. Telnet access is denied.

B. Telnet access requires a new password at the first login.

C. Telnet access requires a new password.

D. no password is required for telnet access.

Answer: D


Q22.  - (Topic 7)

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link.

The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?

A. The OSPF area is not configured properly.

B. The priority on R1 should be set higher.

C. The cost on R1 should be set higher.

D. The hello and dead timers are not configured properly.

E. A backup designated router needs to be added to the network.

F. The OSPF process ID numbers must match.

Answer: D

Explanation:

In OSPF, the hello and dead intervals must match and here we can see the hello interval is set to 5 on R1 and 10 on R2. The dead interval is also set to 20 on R1 but it is 40 on R2.


Q23.  - (Topic 8)

Why did Branch1 router lose WAN connectivity with R1 router?

A. The IP address is misconfigured on PPP multilink interface on the Branch1 router.

B. The PPP multilink group is misconfigured on the £ranch1 serial interfaces.

C. The PPP multilink group is misconfigured on the R1 serial interfaces.

D. The Branch1 serial interfaces are placed in a shutdown condition.

Answer: A


Q24. CORRECT TEXT - (Topic 7)

A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.

The task is to create and apply an access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted.

Access to the router CLI can be gained by clicking on the appropriate host.

All passwords have been temporarily set to "cisco".

The Core connection uses an IP address of 198.18.247.65

The computers in the Hosts LAN have been assigned addresses of 192.168.240.1 - 192.168.240.254

✑ host A 192.168.240.1

✑ host B 192.168.240.2

✑ host C 192.168.240.3

Answer: 

Corp1#conf t

Corp1(config)# access-list 128 permit tcp host 192.168.240.1 host 172.22.141.26 eq www Corp1(config)# access-list 128 deny tcp any host 172.22.141.26 eq www

Corp1(config)# access-list 128 permit ip any any Corp1(config)#int fa0/1

Corp1(config-if)#ip access-group 128 out Corp1(config-if)#end

Corp1#copy run startup-config


Q25.  - (Topic 8)

Which command can you enter to set the default route for all traffic to an interface?

A. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1

B. router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1

C. router(config-router)#default-information originate

D. router(config-router)#default-information originate always

Answer: A


Q26.  - (Topic 5)

What will happen if a private IP address is assigned to a public interface connected to an ISP?

A. Addresses in a private range will not be routed on the Internet backbone.

B. Only the ISP router will have the capability to access the public network.

C. The NAT process will be used to translate this address to a valid IP address.

D. A conflict of IP addresses happens, because other public routers can use the same range.

Answer: A

Explanation:

Private RFC 1918 IP addresses are meant to be used by organizations locally within their own network only, and cannot be used globally for Internet use.


Q27.  - (Topic 5)

Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)

A. Emergencies

B. Alerts

C. Critical

D. Errors

E. Warnings

Answer: A,B,C,D

Explanation:

The Message Logging is divided into 8 levels as listed below: Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be

displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.


Q28.  - (Topic 7)

Scenario

Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

Which path does traffic take from R1 to R5?

A. The traffic goes through R2.

B. The traffic goes through R3.

C. The traffic is equally load-balanced over R2 and R3.

D. The traffic is unequally load-balanced over R2 and R3.

Answer: A

Explanation:

Using the “show ip int brief command” on R5 we can see the IP addresses assigned to this router. Then, using the “show ip route” command on R1 we can see that to reach 10.5.5.5 and 10.5.5.55 the preferred path is via Serial 1/3, which we see from the diagram is the link to R2.


Q29.  - (Topic 5)

Refer to the exhibit.

A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?

A. 192.168.1.56/26 

B. 192.168.1.56/27 

C. 192.168.1.64/26 

D. 192.168.1.64/27

Answer: C

Explanation:

A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62

6 bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet. 8bits+ 8bits+ 8bits + 2bits = /26

/26 bits subnet is 24bits + 11000000 = 24bits + 192 256 – 192 = 64

0 -63

64 – 127


Q30.  - (Topic 3)

Refer to the exhibit.

For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)

A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.

B. Router1 is acting as a TFTP server for other routers.

C. Router1 cannot locate a valid IOS image in flash memory.

D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.

E. Cisco routers will first attempt to load an image from TFTP for management purposes.

Answer: A,C

Explanation:

The loading sequence of CISCO IOS is as follows: Booting up the router and locating the Cisco IOS

1. POST (power on self-test)

2. Bootstrap code executed

3. Check Configuration Register value (NVRAM) which can be modified using the config- register command

0 = ROM Monitor mode 1 = ROM IOS

2 - 15 = startup-config in NVRAM

4. Startup-config filE. Check for boot system commands (NVRAM)

If boot system commands in startup-config

a. Run boot system commands in order they appear in startup-config to locate the IOS

b. [If boot system commands fail, use default fallback sequence to locate the IOS (Flash, TFTP, ROM)?]

If no boot system commands in startup-config use the default fallback sequence in locating the IOS:

a. Flash (sequential)

b. TFTP server (netboot)

c. ROM (partial IOS) or keep retrying TFTP depending upon router model

5. If IOS is loaded, but there is no startup-config file, the router will use the default fallback sequence for locating the IOS and then it will enter setup mode or the setup dialogue.