Super ways to ccna 200 120 vs 200 125
Testking offers free demo for ccna 200 125 torrent exam. "CCNA Cisco Certified Network Associate CCNA (v3.0)", also known as ccna 200 125 ebook exam, is a Cisco Certification. This set of posts, Passing the Cisco 200 125 ccna pdf exam, will help you answer those questions. The 200 125 cisco Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco ccna routing and switching 200 125 official cert guide library exams and revised by experts!
Q101. - (Topic 5)
Refer to the exhibit.
In this VLSM addressing scheme, what summary address would be sent from router A?
A. 172.16.0.0 /16
B. 172.16.0.0 /20
C. 172.16.0.0 /24
D. 188.8.131.52 /16
E. 184.108.40.206 /17
F. 220.127.116.11 /16
Router A receives 3 subnets: 172.16.64.0/18, 172.16.32.0/24 and 172.16.128.0/18.
All these 3 subnets have the same form of 172.16.x.x so our summarized subnet must be also in that form -> Only A, B or .
The smallest subnet mask of these 3 subnets is /18 so our summarized subnet must also have its subnet mask equal or smaller than /18.
-> Only answer A has these 2 conditions ->.
Q102. - (Topic 4)
Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)
A. CHAP uses a two-way handshake.
B. CHAP uses a three-way handshake.
C. CHAP authentication periodically occurs after link establishment.
D. CHAP authentication passwords are sent in plaintext.
E. CHAP authentication is performed only upon link establishment.
F. CHAP has no protection from playback attacks.
CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).
Q103. - (Topic 4)
Which PPP subprotocol negotiates authentication options?
The PPP Link Control Protocol (LCP) is documented in RFC 1661. LPC negotiates link and PPP parameters to dynamically configure the data link layer of a PPP connection. Common LCP options include the PPP MRU, the authentication protocol, compression of PPP header fields, callback, and multilink options.
Q104. - (Topic 8)
Which two statements about late collisions are true? (Choose two.)
A. They may indicate a duplex mismatch.
B. By definition, they occur after the 512th bit of the frame has been transmitted.
C. They indicate received frames that did not pass the FCS match.
D. They are frames that exceed 1518 bytes.
E. They occur when CRC errors and interference occur on the cable.
Q105. - (Topic 5)
What SNMP message alerts the manager to a condition on the network?
An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP
connection, loss of connection to a neighbor, or other significant events.
Q106. - (Topic 5)
Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)
A. Global addresses start with 2000::/3.
B. Link-local addresses start with FE00:/12.
C. Link-local addresses start with FF00::/10.
D. There is only one loopback address and it is ::1.
E. If a global address is assigned to an interface, then that is the only allowable address for the interface.
Below is the list of common kinds of IPv6 addresses:
Q107. - (Topic 8)
Which MAC protocol sets a random timer to reattempt communication?
A. IEEE 802.1x
Q108. - (Topic 7)
What are three reasons to collect Netflow data on a company network? (Choose three.)
A. To identify applications causing congestion.
B. To authorize user network access.
C. To report and alert link up / down instances.
D. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.
E. To detect suboptimal routing in the network.
F. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.
NetFlow facilitates solutions to many common problems encountered by IT professionals.
+ Analyze new applications and their network impact
Identify new application network loads such as VoIP or remote site additions.
+ Reduction in peak WAN traffic
Use NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network top talkers.
+ Troubleshooting and understanding network pain points
Diagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command line interface or reporting tools. -> D is correct.
+ Detection of unauthorized WAN traffic
Avoid costly upgrades by identifying the applications causing congestion. -> A is correct.
+ Security and anomaly detection
NetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars.
+ Validation of QoS parameters
Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.-> F is correct.
Q109. - (Topic 7)
An administrator is trying to ping and telnet from SwitchC to RouterC with the results shown below.
Click the console connected to RouterC and issue the appropriate commands to answer the questions.
What would be the effect of issuing the command ip access-group 114 in to the fa0/0 interface?
A. Attempts to telnet to the router would fail.
B. It would allow all traffic from the 10.4.4.0 network.
C. IP traffic would be passed through the interface but TCP and UDP traffic would not.
D. Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface.
From the output of access-list 114: access-list 114 permit ip 10.4.4.0 0.0.0.255 any we can easily understand that this access list allows all traffic (ip) from 10.4.4.0/24 network
Q110. - (Topic 8)
when you troubleshoot an IPv4 connectivity issue on a router, which three router configuration checks you must perform?
A. Verify that the router interface IP address IP address is correct.
B. Verify that the DNS is configured correctly.
C. Verify that the router and the host use the same subnet mask.
D. Verify that the router firmware is up-to-date.
E. Verify that a default route is configured.
F. Verify that the route appears in the routing table