how to use ccna 200 125 dumps
Exam Code: 200 125 ccna book (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCNA Cisco Certified Network Associate CCNA (v3.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 200 125 ccna pdf Exam.
P.S. Validated 200-125 pdf are available on Google Drive, GET MORE: https://www.slideshare.net/reinigerodp/certleader-200-125examquestionsmaterials
New Cisco 200-125 Exam Dumps Collection (Question 4 - Question 13)
New Questions 4
Refer to the exhibit.
What is the effect of the configuration that is shown?
A. It configures SSH globally for all logins.
B. It tells the router or switch to try to establish an SSh connection first and if that fails to use Telnet.
C. It configures the virtual terminal lines with the password 030752180500.
D. It configures a Cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.
E. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
Answer: D
Explanation:
Secure Shell (SSH) is a protocol which provides a secure remote access connection to network devices. Communication between the client and server is encrypted in both SSH version 1 and SSH version 2. If you want to prevent non-SSH connections, add the
u201ctransport input sshu201d command under the lines to limit the router to SSH connections only. Straight (non-SSH) Telnets are refused.
Reference:www.cisco.com/warp/public/707/ssh.shtml
New Questions 5
Refer to the exhibit.
The two exhibited devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? (Choose three.)
A. The Manchester serial address is 10.1.1.1.
B. The Manchester serial address is 10.1.1.2.
C. The London router is a Cisco 2610.
D. The Manchester router is a Cisco 2610.
E. The CDP information was received on port Serial0/0 of the Manchester router.
F. The CDP information was sent by port Serial0/0 of the London router.
Answer: A,C,E
Explanation:
From the output, we learn that the IP address of the neighbor router is 10.1.1.2 and the question stated that the subnet mask of the network between two routers is 255.255.255.252. Therefore there are only 2 available hosts in this network (22 u2013 2 = 2). So we can deduce the ip address (of the serial interface) of Manchester router is 10.1.1.1 ->. The platform of the neighbor router is cisco 2610, as shown in the output ->.
Maybe the most difficult choice of this question is the answer E or F. Please notice that u201cInterfaceu201d refers to the local port on the local router, in this case it is the port of Manchester router, and u201cPort ID (outgoing port)u201d refers to the port on the neighbor router.
New Questions 6
What are three benefits of GLBP? (Choose three.)
A. GLBP supports up to eight virtual forwarders per GLBP group.
B. GLBP supports clear text and MD5 password authentication between GLBP group members.
C. GLBP is an open source standardized protocol that can be used with multiple vendors.
D. GLBP supports up to 1024 virtual routers.
E. GLBP can load share traffic across a maximum of four routers.
F. GLBP elects two AVGs and two standby AVGs for redundancy.
Answer: B,D,E
New Questions 7
Refer to the exhibit.
The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
A. 3 MB
B. 4 MB
C. 5 MB
D. 7 MB
E. 8 MB
Answer: B
Explanation:
In this example, there are a total of 8 MB, but 3.8 are being used already, so another file as large as 4MB can be loaded in addition to the original file.
New Questions 8
Which statement describes VRRP object tracking?
A. It monitors traffic flow and link utilization.
B. It ensures the best VRRP router is the virtual router master for the group.
C. It causes traffic to dynamically move to higher bandwidth links.
D. It thwarts man-in-the-middle attacks.
Answer: B
Explanation:
Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group.
New Questions 9
Refer to the exhibit.
Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?
A. The router will forward packets from R3 to R2 to R1.
B. The router will forward packets from R3 to R1 to R2.
C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1.
D. The router will forward packets from R3 to R1.
Answer: C
Explanation:
From the routing table we learn that network 192.168.10.0/30 is learned via 2 equal-cost paths (192.168.10.9 &192.168.10.5) -> traffic to this network will be load-balancing.
New Questions 10
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?
A. RSA
B. L2TP
C. IPsec
D. PPTP
Answer: C
Explanation:
IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPSec can be used to protect one or more data flows between IPSec peers.
New Questions 11
Which two benefits are provided by creating VLANs? (Choose two.)
A. added security
B. dedicated bandwidth
C. provides segmentation
D. allows switches to route traffic between subinterfaces
E. contains collisions
Answer: A,C
Explanation:
AVLAN is a switched network that is logically segmented on an organizational basis, by
functions, project teams, or applications rather than on a physical or geographical basis. Security:
VLANs also improve security by isolating groups. High-security users can be grouped into a VLAN, possible on the same physical segment, and no users outside that VLAN can communicate with them.
LAN Segmentation
VLANs allow logical network topologies to overlay the physical switched infrastructure such that any arbitrary collection of LAN ports can be combined into an autonomous user group or community of interest. The technology logically segments the network into separate Layer 2 broadcast domains whereby packets are switched between ports designated to be within the same VLAN. By containing traffic originating on a particular LAN only to other LANs in the same VLAN, switched virtual networks avoid wasting bandwidth.
New Questions 12
Refer to the exhibit.
Which of these statements correctly describes the state of the switch once the boot process has been completed?
A. As FastEthernet0/12 will be the last to come up, it will be blocked by STP.
B. Remote access management of this switch will not be possible without configuration change.
C. More VLANs will need to be created for this switch.
D. The switch will need a different IOS code in order to support VLANs and STP.
Answer: B
Explanation:
Notice the line, which says u201cInterface VLAN1, changed state to administratively downu201d. This shows that VLAN1 is shut down. Hence remote management of this switch is not possible unless VLAN1 is brought back up. Since VLAN1 is the only interface shown in the output, you have to assume that no other VLAN interface has been configured with an IP Address.
New Questions 13
Two routers named Atlanta and Brevard are connected via their serial interfaces as illustrated, but they are unable to communicate. The Atlanta router is known to have the correct configuration.
Given the partial configurations, identify the fault on the Brevard router that is causing the lack of connectivity.
A. incompatible IP address
B. insufficient bandwidth
C. incorrect subnet mask
D. incompatible encapsulation
E. link reliability too low
F. IPCP closed
Answer: D
Explanation:
Because Interface Serial 0 of Atlanta Router has 192.168.10.1 And Interface Serial 1 of Router Brevard has 192.168.11.2. These are from different network.
Recommend!! Get the Validated 200-125 dumps in VCE and PDF From Thedumpscentre, Welcome to download: http://www.thedumpscentre.com/200-125-dumps/ (New 889 Q&As Version)