10 Tips For 200-125 IT professionals
Act now and download your Cisco 200-125 test today! Do not waste time for the worthless Cisco 200-125 tutorials. Download Avant-garde Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) exam with real questions and answers and begin to learn Cisco 200-125 with a classic professional.
The article at Testaimer.com going over http://www.testaimer.com/200-125-test is very comprehensive.
2017 Apr 200-125 test question
Q21. - (Topic 8)
Which VTP mode prevents you from making changes to VLANs?
Q22. - (Topic 8)
If the primary root bridge experiences a power loss, which switch takes over?
A. switch 0004.9A1A.C182
B. switch 00E0.F90B.6BE3
C. switch 00E0.F726.3DC6
D. switch 0040.0BC0.90C5
Q23. - (Topic 7)
An administrator is trying to ping and telnet from SwitchC to RouterC with the results shown below.
Click the console connected to RouterC and issue the appropriate commands to answer the questions.
Which will fix the issue and allow ONLY ping to work while keeping telnet disabled?
A. Correctly assign an IP address to interface fa0/1.
B. Change the ip access-group command on fa0/0 from “in” to “out”.
C. Remove access-group 106 in from interface fa0/0 and add access-group 115 in.
D. Remove access-group 102 out from interface s0/0/0 and add access-group 114 in
E. Remove access-group 106 in from interface fa0/0 and add access-group 104 in.
Let’s have a look at the access list 104:
The question does not ask about ftp traffic so we don’t care about the two first lines. The 3rd line denies all telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is applied on the inbound direction so the 5th line “access-list 104 deny icmp any any echo-reply” will not affect our icmp traffic because the “echo-reply” message will be sent over the outbound direction.
Q24. - (Topic 8)
Which two security appliances will you use in a network? (Choose two.)
Q25. - (Topic 5)
Refer to the exhibit.
Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?
310 hosts < 512 = 29 -> We need a subnet mask of 9 bits 0 -> 1111 1111.1111 1111.1111
1110.0000 0000 -> 255.255.254.0
Regenerate 200-125 free download:
Q26. - (Topic 6)
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which
two ACL statements, when combined, would you use to accomplish this task? (Choose two.)
A. access-list 10 permit ip 192.168.146.0 0.0.1.255
B. access-list 10 permit ip 192.168.147.0 0.0.255.255
C. access-list 10 permit ip 192.168.148.0 0.0.1.255
D. access-list 10 permit ip 192.168.149.0 0.0.255.255
E. access-list 10 permit ip 192.168.146.0 0.0.0.255
F. access-list 10 permit ip 192.168.146.0 255.255.255.0
“access-list 10 permit ip 192.168.146.0 0.0.1.255” would allow only the 192.168.146.0 and
192.168.147.0 networks, and “access-list 10 permit ip 192.168.148.0 0.0.1.255” would allow only the 192.168.148.0 and 192.168.149.0 networks.
Topic 7, Infrastructure Management
Q27. - (Topic 8)
Which standards-based First Hop Redundancy Protocol is a Cisco supported alternative to Hot Standby Router Protocol?
Q28. - (Topic 7)
What are three factors a network administrator must consider before implementing Netflow
in the network? (Choose three.)
A. CPU utilization
B. where Netflow data will be sent
C. number of devices exporting Netflow data
D. port availability
E. SNMP version
F. WAN encapsulation
NetFlow has a reputation for increasing CPU utilization on your network devices. Cisco's performance testing seems to indicate that newer hardware can accommodate this load pretty well, but you will still want to check it out before you turn on the feature. Some symptoms of high CPU utilization are very large jitter and increased delay. Services running on the device may also be affected.
Another thing to keep in mind is the amount of data you're going to be sending across the network. Depending on how much traffic you have and how you configure it, the traffic can be substantial. For example, you may not want to send NetFlow data from a datacenter switch to a NetFlow collector on the other side of a small WAN circuit. Also bear in mind that the flows from aggregating large numbers of devices can add up.
Reference: http://searchenterprisewan.techtarget.com/tip/How-the-NetFlow-protocol- monitors-your-WAN
Q29. - (Topic 7)
What Netflow component can be applied to an interface to track IPv4 traffic?
A. flow monitor
B. flow record
C. flow sampler
D. flow exporter
Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the first interface. Flow data
is collected from the network traffic during the monitoring process based on the key and nonkey fields in the record, which is configured for the flow monitor and stored in the flow monitor cache.
For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters Flexible NetFlow flow monitor configuration mode:
Router(config)# flow monitor FLOW-MONITOR-1 Router(config-flow-monitor)#
Q30. - (Topic 8)
How does NAT overloading provide one-to-many address transalation?
A. it uses a pool of addresses.
B. it converts IPv4 addresses to unused IPv6 addresses.
C. it assigns a unique TCP/UDP port to each session.
D. it uses virtual MAC address and virtual IP addresses.