What tells you about ccna routing and switching 200 125

we provide Certified Cisco cisco ccna 200 125 free question which are the best for clearing 200 125 ccna test, and to get certified by Cisco CCNA Cisco Certified Network Associate CCNA (v3.0). The 125 200 Questions & Answers covers all the knowledge points of the real cisco ccna 200 125 exam. Crack your Cisco 200 125 ccna book Exam with latest dumps, guaranteed!


The article at Testaimer.com going over http://www.testaimer.com/200-125-test is very comprehensive.

Q11.  - (Topic 5)

Refer to the exhibit.

The Bigtime router is unable to authenticate to the Littletime router. What is the cause of the problem?

A. The usernames are incorrectly configured on the two routers.

B. The passwords do not match on the two routers.

C. CHAP authentication cannot be used on a serial interface.

D. The routers cannot be connected from interface S0/0 to interface S0/0.

E. With CHAP authentication, one router must authenticate to another router. The routers cannot be configured to authenticate to each other.

Answer: B

Explanation:

With CHAP authentication, the configured passwords must be identical on each router. Here, it is configured as little123 on one side and big123 on the other.


Q12.  - (Topic 3)

Which command encrypts all plaintext passwords?

A. Router# service password-encryption

B. Router(config)# password-encryption

C. Router(config)# service password-encryption

D. Router# password-encryption

Answer: C

Explanation:

Command

The “service password-encryption” command allows you to encrypt all passwords on your router so they cannot be easily guessed from your running-config. This command uses a very weak encryption because the router has to be very quickly decode the passwords for its operation.

It is meant to prevent someone from looking over your shoulder and seeing the password, that is all. This is configured in global configuration mode.


Q13. - (Topic 5)

What is a valid HSRP virtual MAC address?

A. 0000.5E00.01A3 

B. 0007.B400.AE01 

C. 0000.0C07.AC15 

D. 0007.5E00.B301

Answer: C

Explanation:

With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IP address. There are two version of HSRP.

+ With HSRP version 1, the virtual router’s MAC address is 0000.0c07.ACxx , in which xx is the HSRP group.

+ With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group.

Note: Another case is HSRP for IPv6, in which the MAC address range from 0005.73A0.0000 through 0005.73A0.0FFF.


Q14.  - (Topic 7)

An administrator is trying to ping and telnet from SwitchC to RouterC with the results shown below.

Click the console connected to RouterC and issue the appropriate commands to answer the questions.

What would be the effect of issuing the command ip access-group 115 in on the s0/0/1 interface?

A. No host could connect to RouterC through s0/0/1.

B. Telnet and ping would work but routing updates would fail.

C. FTP, FTP-DATA, echo, and www would work but telnet would fail.

D. Only traffic from the 10.4.4.0 network would pass through the interface.

Answer: A

Explanation:

First let’s see what was configured on interface S0/0/1:


Q15.  - (Topic 5)

In GLBP, which router will respond to client ARP requests?

A. The active virtual gateway will reply with one of four possible virtual MAC addresses.

B. All GLBP member routers will reply in round-robin fashion.

C. The active virtual gateway will reply with its own hardware MAC address.

D. The GLBP member routers will reply with one of four possible burned in hardware addresses.

Answer: A

Explanation:

One disadvantage of HSRP and VRRP is that only one router is in use, other routers must wait for the primary to fail because they can be used. However, Gateway Load Balancing Protocol (GLBP) can use of up to four routers simultaneously. In GLBP, there is still only one virtual IP address but each router has a different virtual MAC address. First a GLBP group must elect an Active Virtual Gateway (AVG). The AVG is responsible for replying ARP requests from hosts/clients. It replies with different virtual MAC addresses that correspond to different routers (known as Active Virtual Forwarders – AVFs) so that clients can send traffic to different routers in that GLBP group (load sharing).


Q16.  - (Topic 7)

Scenario

Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

Study the following output taken on R1: R1# Ping 10.5.5.55 source 10.1.1.1 Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 10.5.5.55, timeout is 2 seconds:

Packet sent with a source address of 10.1.1.1

…….

Success rate is 0 percent (0/5) Why are the pings failing?

A. The network statement is missing on R5.

B. The loopback interface is shut down on R5.

C. The network statement is missing on R1.

D. The IP address that is configured on the Lo1 interface on R5 is incorrect.

Answer: C

Explanation:

R5 does not have a route to the 10.1.1.1 network, which is the loopback0 IP address of R1. When looking at the EIGRP configuration on R1, we see that the 10.1.1.1 network statement is missing on R1.


Q17.  - (Topic 6)

Which item represents the standard IP ACL?

A. access-list 110 permit ip any any

B. access-list 50 deny 192.168.1.1 0.0.0.255

C. access list 101 deny tcp any host 192.168.1.1

D. access-list 2500 deny tcp any host 192.168.1.1 eq 22

Answer: B

Explanation:

The standard access lists are ranged from 1 to 99 and from 1300 to 1999 so only access list 50 is a standard access list.


Q18.  - (Topic 3)

Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.)

A. the amount of available ROM

B. the amount of available flash and RAM memory

C. the version of the bootstrap software present on the router

D. show version

E. show processes

F. show running-config

Answer: B,D

Explanation:

When upgrading a new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.


Q19.  - (Topic 7)

Scenario

Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

Which path does traffic take from R1 to R5?

A. The traffic goes through R2.

B. The traffic goes through R3.

C. The traffic is equally load-balanced over R2 and R3.

D. The traffic is unequally load-balanced over R2 and R3.

Answer: A

Explanation:

Using the “show ip int brief command” on R5 we can see the IP addresses assigned to this router. Then, using the “show ip route” command on R1 we can see that to reach 10.5.5.5 and 10.5.5.55 the preferred path is via Serial 1/3, which we see from the diagram is the link to R2.


Q20.  - (Topic 3)

Which type of EIGRP route entry describes a feasible successor?

A. a backup route, stored in the routing table

B. a primary route, stored in the routing table

C. a backup route, stored in the topology table

D. a primary route, stored in the topology table

Answer: C

Explanation:

EIGRP uses the Neighbor Table to list adjacent routers. The Topology Table list all the learned routers to destination whilst the Routing Table contains the best route to a destination, which is known as the Successor. The Feasible Successor is a backup route to a destination which is kept in the Topology Table.