Foolproof ccna 200 125 syllabus tips

It is more faster and easier to pass the Cisco ccna routing and switching 200 125 official cert guide library exam by using Free Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) questuins and answers. Immediate access to the Renewal ccna routing and switching 200 125 official cert guide library Exam and find the same core area ccna 200 125 syllabus questions with professionally verified answers, then PASS your exam with a high score now.

The article at going over is very comprehensive.

Q1.  - (Topic 8)

Which configuration can you apply to enable encapsulation on a subinterface?

A. interface FastEthernet 0/0 encapsulation dot1Q 30

ip address

B. interface FastEthernet 0/0.30

ip address

C. interface FastEthernet 0/0.30 description subinterface vlan 30

D. interface FastEthernet 0/0.30 encapsulation dot1Q 30

ip address

Answer: D

Q2.  - (Topic 8)

Which command can you use to set the hostname on a switch?

A. switch-mdf-c1(config)#hostname switch-mdf1

B. switch-mdf-c1>hostname switch-mdf1

C. switch-mdf-c1#hostname switch-mdf1

D. switch-mdf-c1(config-if)#hostname switch-mdf1

Answer: A

Q3.  - (Topic 4)

The command frame-relay map ip 102 broadcast was entered on the router. Which of the following statements is true concerning this command?

A. This command should be executed from the global configuration mode.

B. The IP address is the local router port used to forward data.

C. 102 is the remote DLCI that will receive the information.

D. This command is required for all Frame Relay configurations.

E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.

Answer: E


Broadcast is added to the configurations of the frame relay, so the PVC supports broadcast, allowing the routing protocol updates that use the broadcast update mechanism to be forwarded across itself.

Q4.  - (Topic 5)

Which option is a valid IPv6 address?

A. 2001:0000:130F::099a::12a

B. 2002:7654:A1AD:61:81AF:CCC1

C. FEC0:ABCD:WXYZ:0067::2A4

D. 2004:1:25A4:886F::1

Answer: D


An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The leading 0’s in a group can be collapsed using ::, but this can only be done once in an IP address.

Q5.  - (Topic 5)

Which IPv6 address is the all-router multicast group?

A. FF02::1

B. FF02::2

C. FF02::3

D. FF02::4

Answer: B


Well-known IPv6 multicast addresses:

Address Description ff02::1

All nodes on the local network segment


All routers on the local network segment

Q6.  - (Topic 7)

Refer to the exhibit.

If the devices produced the given output, what is the cause of the EtherChannel problem?

A. SW1's Fa0/1 interface is administratively shut down.

B. There is an encapsulation mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

C. There is an MTU mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

D. There is a speed mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

Answer: D


You must configure all interfaces in an EtherChannel to operate at the same speeds and duplex modes. Based on the output shown, SW1 is configured to run at 10Mb while SW2 is operating at 100 Mb.

Q7.  - (Topic 7)

What command visualizes the general NetFlow data on the command line?

A. show ip flow export

B. show ip flow top-talkers

C. show ip cache flow

D. show mls sampling

E. show mls netflow ip

Answer: C


The following is an example of how to visualize the NetFlow data using the CLI. There are three methods to visualize the data depending on the version of Cisco IOS Software. The traditional show command for NetFlow is "show ip cache flow" also available are two forms of top talker commands. One of the top talkers commands uses a static configuration to view top talkers in the network and another command called dynamic top talkers allows real-time sorting and aggregation of NetFlow data. Also shown is a show MLS command to view the hardware cache on the Cisco Catalyst 6500 Series Switch.

The following is the original NetFlow show command used for many years in Cisco IOS Software. Information provided includes packet size distribution; basic statistics about number of flows and export timer setting, a view of the protocol distribution statistics and the NetFlow cache.

The “show ip cache flow” command displays a summary of the NetFlow accounting statistics.


Q8.  - (Topic 8)

Which option describes how a switch in rapid PVST+ mode responds to a topology change?

A. It immediately deletes dynamic MAC addresses that were learned by all ports on the switch.

B. It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP instance.

C. It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch.

D. It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP instance.

Answer: D


Rapid PVST+This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence based on the IEEE 802.1w standard. To provide rapid convergence, the rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a short aging time for dynamically learned MAC address entries.

The rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only minimal extra configuration. The benefit of rapid PVST+ is that you can migrate a large PVST+ install base to rapid PVST+ without having to learn the complexities of the MSTP configuration and without having to reprovision your network. In rapid-PVST+ mode, each VLAN runs its own spanning-tree instance up to the maximum supported.

Q9.  - (Topic 8)

Which protocol is the Cisco proprietary implementation of FHRP?





Answer: A

Q10.  - (Topic 6)

How does using the service password-encryption command on a router provide additional security?

A. by encrypting all passwords passing through the router

B. by encrypting passwords in the plain text configuration file

C. by requiring entry of encrypted passwords for access to the device

D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

E. by automatically suggesting encrypted passwords for use in configuring the router

Answer: B


By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file