Where to find ccna 200 125 pdf

we provide Approved Cisco ccna 200 125 torrent study guide which are the best for clearing ccna 200 125 study guide test, and to get certified by Cisco CCNA Cisco Certified Network Associate CCNA (v3.0). The ccna 200 120 vs 200 125 Questions & Answers covers all the knowledge points of the real cisco 200 125 exam. Crack your Cisco 200 125 ccna Exam with latest dumps, guaranteed!


The article at Testaimer.com going over http://www.testaimer.com/200-125-test is very comprehensive.

Q51.  - (Topic 3)

Refer to the exhibit.

For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)

A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.

B. Router1 is acting as a TFTP server for other routers.

C. Router1 cannot locate a valid IOS image in flash memory.

D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.

E. Cisco routers will first attempt to load an image from TFTP for management purposes.

Answer: A,C

Explanation:

The loading sequence of CISCO IOS is as follows: Booting up the router and locating the Cisco IOS

1. POST (power on self-test)

2. Bootstrap code executed

3. Check Configuration Register value (NVRAM) which can be modified using the config- register command

0 = ROM Monitor mode 1 = ROM IOS

2 - 15 = startup-config in NVRAM

4. Startup-config filE. Check for boot system commands (NVRAM)

If boot system commands in startup-config

a. Run boot system commands in order they appear in startup-config to locate the IOS

b. [If boot system commands fail, use default fallback sequence to locate the IOS (Flash, TFTP, ROM)?]

If no boot system commands in startup-config use the default fallback sequence in locating the IOS:

a. Flash (sequential)

b. TFTP server (netboot)

c. ROM (partial IOS) or keep retrying TFTP depending upon router model

5. If IOS is loaded, but there is no startup-config file, the router will use the default fallback sequence for locating the IOS and then it will enter setup mode or the setup dialogue.


Q52. CORRECT TEXT - (Topic 4)

A corporation wants to add security to its network. The requirements are:

✑ Host B should be able to use a web browser (HTTP) to access the Finance Web Server.

✑ Other types of access from host B to the Finance Web Server should be blocked.

✑ All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.

✑ All hosts in the Core and on local LAN should be able to access the Public Web Server.

You have been tasked to create and apply a numbered access list to a single outbound interface. This access list can contain no more than three statements that meet these requirements.

Access to the router CLI can be gained by clicking on the appropriate host.

✑ All passwords have been temporarily set to “cisco”.

✑ The Core connection uses an IP address of 198.18.132.65.

✑ The computers in the Hosts LAN have been assigned addresses of 192.168.201.1

– 192.168.201.254.

✑ host A 192.168.201.1

✑ host B 192.168.201.2

✑ host C 192.168.201.3

✑ host D 192.168.201.4

✑ The Finance Web Server has been assigned an address of 172.22.237.17.

✑ The Public Web Server in the Server LAN has been assigned an address of 172.22.237.18.

Answer: 

Please check the below explanation for all details.

Explanation:

We should create an access-list and apply it to the interface that is connected to the Server LAN because it can filter out traffic from both S2 and Core networks. To see which interface this is, use the “show ip interface brief” command:

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-11-17 at 3.24.34 PM.png From this, we know that the servers are located on the fa0/1 interface, so we will place our numbered access list here in the outbound direction.

Corp1#configure terminal

Our access-list needs to allow host B – 192.168125.2 to the Finance Web Server 172.22.109.17 via HTTP (port 80), so our first line is this:

Corp1(config)#access-list 100 permit tcp host 192.168.125.2 host 172.22.109.17 eq 80

Then, our next two instructions are these:

✑ Other types of access from host B to the Finance Web Server should be blocked.

✑ All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.

This can be accomplished with one command (which we need to do as our ACL needs to be no more than 3 lines long), blocking all other access to the finance web server: Corp1(config)#access-list 100 deny ip any host 172.22.109.17

Our last instruction is to allow all hosts in the Core and on the local LAN access to the Public Web Server (172.22.109.18)

Corp1(config)#access-list 100 permit ip host 172.22.109.18 any Finally, apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface fa0/1

Corp1(config-if)#ip access-group 100 out

Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core networks.

To verify, just click on host B to open its web browser. In the address box type

http://172.22.109.17 to check if you are allowed to access Finance Web Server or not. If

your configuration is correct then you can access it.

Click on other hosts (A, C and D) and check to make sure you can’t access Finance Web Server from these hosts. Then, repeat to make sure they can reach the public server at 172.22.109.18. Finally, save the configuration

Corp1(config-if)#end

Corp1#copy running-config startup-config


Q53.  - (Topic 5)

In a GLBP network, who is responsible for the ARP request?

A. AVF

B. AVG

C. Active Router

D. Standby Router

Answer: B

Explanation:

Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address.

The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.

Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html


Q54.  - (Topic 6)

When you are troubleshooting an ACL issue on a router, which command would you use to verify which interfaces are affected by the ACL?

A. show ip access-lists

B. show access-lists

C. show interface

D. show ip interface

E. list ip interface

Answer: D

Explanation:

Incorrect Answer

show ip access-lists does not show interfaces affected by an ACL.


Q55.  - (Topic 5)

Refer to the exhibit.

What is the most efficient summarization that R1 can use to advertise its networks to R2?

A. 172.1.0.0/22

B. 172.1.0.0/21 

C. 172.1.4.0/22 

D. 172.1.4.0/24 

172.1.5.0/24

172.1.6.0/24

172.1.7.0/24

E. 172.1.4.0/25 

172.1.4.128/25

172.1.5.0/24

172.1.6.0/24

172.1.7.0/24

Answer: C

Explanation:

The 172.1.4.0/22 subnet encompasses all routes from the IP range 172.1.4.0 – 172.1.7.255.


Q56.  - (Topic 5)

When a DHCP server is configured, which two IP addresses should never be assignable to

hosts? (Choose two.)

A. network or subnetwork IP address

B. broadcast address on the network

C. IP address leased to the LAN

D. IP address used by the interfaces

E. manually assigned address to the clients

F. designated IP address to the DHCP server

Answer: A,B

Explanation:

Network or subnetwork IP address (for example 11.0.0.0/8 or 13.1.0.0/16) and broadcast address (for example 23.2.1.255/24) should never be assignable to hosts. When try to assign these addresses to hosts, you will receive an error message saying that they can’t be assignable.


Q57.  - (Topic 5)

Which statement is correct regarding the operation of DHCP?

A. A DHCP client uses a ping to detect address conflicts.

B. A DHCP server uses a gratuitous ARP to detect DHCP clients.

C. A DHCP client uses a gratuitous ARP to detect a DHCP server.

D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

E. If an address conflict is detected, the address is removed from the pool for an amount of time configurable by the administrator.

F. If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted.

Answer: D

Explanation:

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

(Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html)


Q58.  - (Topic 5)

What are the alert messages generated by SNMP agents called?

A. TRAP

B. INFORM

C. GET

D. SET

Answer: A,B

Explanation:

A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they’re

unacknowledged so you don’t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.


Q59.  - (Topic 3)

Refer to the exhibit.

The network administrator must establish a route by which London workstations can forward traffic to the Manchester workstations. What is the simplest way to accomplish this?

A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.

B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester.

C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router.

D. Configure a static default route on London with a next hop of 10.1.1.1.

E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2.

F. Configure Manchester to advertise a static default route to London.

Answer: E

Explanation:

This static route will allow for communication to the Manchester workstations and it is better to use this more specific route than a default route as traffic destined to the Internet will then not go out the London Internet connection.


Q60.  - (Topic 8)

Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?

A. router#show platform

B. router#show interfaces Serial 0/2/0

C. router#show ip interface s0/2/0

D. router#\show ip interface brief

Answer: C