200-125 practice exam(161 to 168) for IT professionals: Apr 2021 Edition


The article at Testaimer.com going over http://www.testaimer.com/200-125-test is very comprehensive.

Q161.  - (Topic 8)

Which component of the routing table ranks routing protocols according to their preferences?

A. administrative distance

B. next hop

C. metric

D. routing protocol code

Answer: A

Explanation:

Administrative distance - This is the measure of trustworthiness of the source of the route. If a router learns about a destination from more than one routing protocol, administrative distance is compared and the preference is given to the routes with lower administrative distance. In other words, it is the believability of the source of the route.


Q162.  - (Topic 4)

Refer to the exhibit.

In the Frame Relay network, which IP addresses would be assigned to the interfaces with point-to-point PVCs?

A. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.10.1 /24

DLCI 99: 192.168.10.2 /24

DLCI 28: 192.168.10.3 /24

B. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.11.1 /24

DLCI 99: 192.168.12.1 /24

DLCI 28: 192.168.13.1 /24

C. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.11.1 /24

DLCI 99: 192.168.10.2 /24

DLCI 28: 192.168.11.2 /24

D. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.10.2 /24

DLCI 99: 192.168.10.3 /24

DLCI 28: 192.168.10.4 /24

Answer: C

Explanation:

With point to point PVC’s, each connection needs to be in a separate subnet. The R2-R1 connection (DLCI 16 to 99) would have each router within the same subnet. Similarly, the R3-R1 connection would also be in the same subnet, but it must be in a different one than the R2-R1 connection.


Q163.  - (Topic 5)

Which IPv6 address is the equivalent of the IPv4 interface loopback address 127.0.0.1?

A. ::1

B. ::

C. 2000::/3

D. 0::/10

Answer: A

Explanation:

In IPv6 the loopback address is written as, ::1

This is a 128bit number, with the first 127 bits being '0' and the 128th bit being '1'. It's just a single address, so could also be written as ::1/128.


Q164.  - (Topic 8)

Which logging command can enable administrators to correlate syslog messages with millisecond precision?

A. no logging console

B. logging buffered 4

C. no logging monitor

D. service timestamps log datetime msec

E. logging host 10.2.0.21

Answer: D


Q165.  - (Topic 8)

Which configuration command can you apply to a router so that its local interface becomes active if all other routers in the group fail?

A. Router(config)#standby 1 preempt

B. No additional configuration is required

C. Router(config)#standby 1 Priority 250

D. Router(config)#standby 1 track Ethernet

Answer: A


Q166.  - (Topic 8)

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Answer: A

Explanation:

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.


Q167.  - (Topic 5)

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

A. SNMPv3 enhanced SNMPv2 security features.

B. SNMPv3 added the Inform protocol message to SNMP.

C. SNMPv2 added the Inform protocol message to SNMP.

D. SNMPv3 added the GetBulk protocol messages to SNMP.

E. SNMPv2 added the GetBulk protocol message to SNMP.

F. SNMPv2 added the GetNext protocol message to SNMP.

Answer: A,C,E

Explanation:

SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct.

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.

Note: These two messages are carried over SNMPv3.


Q168.  - (Topic 5)

Which two are features of IPv6? (Choose two.)

A. anycast

B. broadcast

C. multicast

D. podcast

E. allcast

Answer: A,C

Explanation:

IPv6 addresses are classified by the primary addressing and routing methodologies common in networking: unicast addressing, anycast addressing, and multicast addressing.

✑ A unicast address identifies a single network interface. The Internet Protocol

delivers packets sent to a unicast address to that specific interface.

✑ An anycast address is assigned to a group of interfaces, usually belonging to different nodes. A packet sent to an anycast address is delivered to just one of the member interfaces, typically the nearest host, according to the routing protocol’s definition of distance. Anycast addresses cannot be identified easily, they have the same format as unicast addresses, and differ only by their presence in the network at multiple points. Almost any unicast address can be employed as an anycast address.

✑ A multicast address is also used by multiple hosts, which acquire the multicast address destination by participating in the multicast distribution protocol among the network routers. A packet that is sent to a multicast address is delivered to all interfaces that have joined the corresponding multicast group.