Why You Need To ccna 200 125 study guide?

Want to know Exambible ccna 200 125 book Exam practice test features? Want to lear more about Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) certification experience? Study Guaranteed Cisco ccna 200 125 pdf answers to Rebirth ccna 200 125 book questions at Exambible. Gat a success with an absolute guarantee to pass Cisco 200 125 ccna (CCNA Cisco Certified Network Associate CCNA (v3.0)) test on your first attempt.


The article at Testaimer.com going over http://www.testaimer.com/200-125-test is very comprehensive.

Q131.  - (Topic 6)

A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)

A. The network administrator can apply port security to dynamic access ports.

B. The network administrator can apply port security to EtherChannels.

C. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.

D. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

E. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.

Answer: C,D

Explanation:

Follow these guidelines when configuring port security:

+ Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports.

+ A secure port cannot be a dynamic access port.

+ A secure port cannot be a destination port for Switched Port Analyzer (SPAN).

+ A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group.

+ You cannot configure static secure or sticky secure MAC addresses on a voice VLAN.

+ When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two.

+ If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN.

+ When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.

+ The switch does not support port security aging of sticky secure MAC addresses.

+ The protect and restrict options cannot be simultaneously enabled on an interface.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1

/configuration/guide/swtrafc.html)


Q132.  - (Topic 8)

Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two)

A. no logging console

B. logging host ip-address

C. terminal monitor

D. show logging | redirect flashioutput.txt

E. snmp-server enable traps syslog

Answer: B,C


Q133.  - (Topic 8)

Why did Branch1 router lose WAN connectivity with R1 router?

A. The IP address is misconfigured on PPP multilink interface on the Branch1 router.

B. The PPP multilink group is misconfigured on the £ranch1 serial interfaces.

C. The PPP multilink group is misconfigured on the R1 serial interfaces.

D. The Branch1 serial interfaces are placed in a shutdown condition.

Answer: A


Q134.  - (Topic 3)

What are two enhancements that OSPFv3 supports over OSPFv2? (Choose two.)

A. It requires the use of ARP.

B. It can support multiple IPv6 subnets on a single link.

C. It supports up to 2 instances of OSPFv3 over a common link.

D. It routes over links rather than over networks.

Answer: B,D

Explanation:

Here is a list of the differences between OSPFv2 and OSPFv3:

✑ They use different address families (OSPFv2 is for IPv4-only, OSPFv3 can be used for IPv6-only or both protocols

✑ OSPFv3 introduces new LSA types

✑ OSPFv3 has different packet format

✑ OSPFv3 uses different flooding scope bits (U/S2/S1)

✑ OSPFv3 adjacencies are formed over link-local IPv6 communications

✑ OSPFv3 runs per-link rather than per-subnet

✑ OSPFv3 supports multiple instances on a single link, Interfaces can have multiple IPv6 addresses

✑ OSPFv3 uses multicast addresses FF02::5 (all OSPF routers), FF02::6 (all OSPF DRs)

✑ OSPFv3 Neighbor Authentication done with IPsec (AH)

✑ OSPFv2 Router ID (RID) must be manually configured, still a 32-bit number

Reference: http://www.networkworld.com/article/2225270/cisco-subnet/ospfv3-for-ipv4-and- ipv6.html


Q135.  - (Topic 4)

Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?

A. show frame-relay lmi

B. show frame-relay map

C. show frame-relay pvc

D. show interfaces serial

Answer: B

Explanation:

When connecting Cisco devices with non-Cisco devices, you must use IETF4 encapsulation on both devices. Check the encapsulation type on the Cisco device with the show frame-relay map exec command.


Q136.  - (Topic 3)

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?

A. enable cdp

B. cdp enable

C. cdp run

D. run cdp

Answer: C

Explanation:

CDP is enabled on Cisco routers by default. If you prefer not to use the CDP capability, disable it with the no cdp run command. In order to reenable CDP, use the cdp run command in global configuration mode. The “cdp enable” command is an interface command, not global.


Q137.  - (Topic 7)

What are the benefits of using Netflow? (Choose three.)

A. Network, Application & User Monitoring

B. Network Planning

C. Security Analysis

D. Accounting/Billing

Answer: A,C,D

Explanation:

NetFlow traditionally enables several key customer applications including:

+ Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns

associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

+ Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.


Q138.  - (Topic 3)

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.)

A. Router(config)# router ospf 0

B. Router(config)# router ospf 1

C. Router(config)# router ospf area 0

D. Router(config-router)# network 192.168.16.0 0.0.0.255 0

E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0

F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0

Answer: B,E

Explanation:

In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> but To configure OSPF, we need a wildcard in the “network” statement, not a subnet mask. We also need to assgin an area to this process ->.


Q139.  - (Topic 8)

Which statement about the IP SLAs ICMP Echo operation is true?

A. The frequency of the operation .s specified in milliseconds.

B. It is used to identify the best source interface from which to send traffic.

C. It is configured in enable mode.

D. It is used to determine the frequency of ICMP packets.

Answer: D

Explanation:

This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices using IPv4 or IPv6. ICMP Echo is useful for

troubleshooting network connectivity issues. This module also demonstrates how the results of the ICMP Echo operation can be displayed and analyzed to determine how the network IP connections are performing.

ICMP Echo Operation

The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply.

In the figure below ping is used by the ICMP Echo operation to measure the response time between the source IP SLAs device and the destination IP device. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time measurements.

Figure 1. ICMP Echo Operation

http://www.cisco.com/c/dam/en/us/td/i/100001-200000/120001-130000/121001- 122000/121419.ps/_jcr_content/renditions/121419.jpg

The IP SLAs ICMP Echo operation conforms to the same IETF specifications for ICMP ping testing and the two methods result in the same response times.

Configuring a Basic ICMP Echo Operation on the Source Device SUMMARY STEPS


Q140.  - (Topic 7)

Refer to the exhibit.

A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 on Switch1 is disconnected. What would be an effect of this cable being disconnected?

A. Host B would not be able to access the server in VLAN9 until the cable is reconnected.

B. Communication between VLAN3 and the other VLANs would be disabled.

C. The transfer of files from Host B to the server in VLAN9 would be significantly slower.

D. For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.

Answer: D

Explanation:

Spanning-Tree Protocol (STP) is a Layer 2 protocol that utilizes a special-purpose algorithm to discover physical loops in a network and effect a logical loop-free topology. STP creates a loop-free tree structure consisting of leaves and branches that span the entire Layer 2 network. The actual mechanics of how bridges communicate and how the STP algorithm works will be discussed at length in the following topics. Note that the terms bridge and switch are used interchangeably when discussing STP. In addition, unless otherwise indicated, connections between switches are assumed to be trunks.