Proper study guides for Improve Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) certified begins with Cisco 200 125 ccna pdf preparation products which designed to deliver the High value ccna 200 125 book questions by making you pass the ccna 200 125 dumps test at your first time. Try the free ccna 200 125 syllabus demo right now.
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 200-125 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q71. – (Topic 5)
Refer to the exhibit.
All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)
A. Network A – 172.16.3.48/26
B. Network A – 172.16.3.128/25
C. Network A – 172.16.3.192/26
D. Link A – 172.16.3.0/30
E. Link A – 172.16.3.40/30
F. Link A – 172.16.3.112/30
Only a /30 is needed for the point to point link and sine the use of the ip subnet-zero was used, 172.16.3.0/30 is valid. Also, a /25 is required for 120 hosts and again 172.16.3.128/25 is the best, valid option.
Q72. – (Topic 8)
Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.)
A. duplex mismatches on Ethernet segments in the same VLAN
B. multiple errors on switchport interfaces
C. congestion on the switch inband path
D. a failing NIC in an end device
E. an overloaded shared segment
Explanation: Collision Domains
A collision domain is an area of a single LAN where end stations contend for access to the network because all end stations are connected to a shared physical medium. If two connected devices transmit onto the media at the same time, a collision occurs. When a collision occurs, a JAM signal is sent on the network, indicating that a collision has occurred and that devices should ignore any fragmented data associated with the collision. Both sending devices back off sending their data for a random amount and then try again if the medium is free for transmission. Therefore, collisions effectively delay transmission of
data, lowering the effective throughput available to a device. The more devices that are attached to a collision domain, the greater the chances of collisions; this results in lower bandwidth and performance for each device attached to the collision domain. Bridges and switches terminate the physical signal path of a collision domain, allowing you to segment separate collision domains, breaking them up into multiple smaller pieces to provide more bandwidth per user within the new collision domains formed.
Q73. – (Topic 7)
Refer to the exhibit.
A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 on Switch1 is disconnected. What would be an effect of this cable being disconnected?
A. Host B would not be able to access the server in VLAN9 until the cable is reconnected.
B. Communication between VLAN3 and the other VLANs would be disabled.
C. The transfer of files from Host B to the server in VLAN9 would be significantly slower.
D. For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.
Spanning-Tree Protocol (STP) is a Layer 2 protocol that utilizes a special-purpose algorithm to discover physical loops in a network and effect a logical loop-free topology. STP creates a loop-free tree structure consisting of leaves and branches that span the entire Layer 2 network. The actual mechanics of how bridges communicate and how the STP algorithm works will be discussed at length in the following topics. Note that the terms bridge and switch are used interchangeably when discussing STP. In addition, unless otherwise indicated, connections between switches are assumed to be trunks.
Q74. – (Topic 5)
Refer to the exhibit.
A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?
A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62
6 bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet. 8bits+ 8bits+ 8bits + 2bits = /26
/26 bits subnet is 24bits + 11000000 = 24bits + 192 256 â 192 = 64
64 â 127
Q75. CORRECT TEXT – (Topic 7)
Central Florida Widgets recently installed a new router in their office. Complete the network installation by performing the initial router configurations and configuring R1PV2 routing using the router command line interface (CLI) on the RC.
Configure the router per the following requirements: Name of the router is R2
Enable. secret password is cisco
The password to access user EXEC mode using the console is cisco2 The password to allow telnet access to the router is cisco3
IPV4 addresses must be configured as follows:
Ethernet network 126.96.36.199/27 – router has fourth assignable host address in subnet Serial network is 192.0.2.176/28 – router has last assignable host address in the subnet. Interfaces should be enabled.
Router protocol is RIPV2
In practical examinations, please note the following, the actual information will prevail.
1. Name or the router is xxx
2. Enable. secret password is xxx
3. Password In access user EXEC mode using the console is xxx
4. The password to allow telnet access to the router is xxx
5. IP information
Router>enable Router#config terminal Router(config)#hostname R2 R2(config)#enable secret Cisco 1 R2(config)#line console 0
R2(config-line)#password Cisco 2 R2(config-line)#exit R2(config)#line vty 0 4
R2(config-line)#password Cisco 3 R2(config-line)#login
R2(config-line)#exit R2(config)#interface faO/0
R2(config-if)#ip address 188.8.131.52 255.255.255.224 R2(config)#interface s0/0/0
R2(config-if)#ip address 192.0.2.190 255.255.255.240 R2(config-if)#no shutdown
R2(config-if)#exit R2(config)#router rip R2(config-router)#version 2
R2(config-router)#end R2#copy run start
Q76. . – (Topic 3)
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?
A. It checks the configuration register.
B. It attempts to boot from a TFTP server.
C. It loads the first image file in flash memory.
D. It inspects the configuration file in NVRAM for boot instructions.
Default (normal) Boot Sequence
Power on Router – Router does POST – Bootstrap starts IOS load – Check configuration register to see what mode the router should boot up in (usually 0x2102 to read startup- config in NVRAM / or 0x2142 to start in "setup-mode") – check the startup-config file in NVRAM for boot-system commands – load IOS from Flash.
Q77. – (Topic 5)
What command instructs the device to timestamp Syslog debug messages in milliseconds?
A. service timestamps log datetime localtime<input type
B. service timestamps debug datetime msec<input type
C. service timestamps debug datetime localtime<input type
D. service timestamps log datetime msec
Enable millisecond (msec) timestamps using the service timestamps command: router(config)#service timestamps debug datetime msec.
router(config)#service timestamps log datetime msec The âservice timestamps debugâ. command configures the system to apply a time stamp to debugging messages. The time- stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD is the date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additional keyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm, where .mmm is milliseconds.
Q78. – (Topic 8)
A router has learned three possible routes that could be used to reach a destination network One route is from EIGRP and has a composite metric of 07104371. Another route is from OSPF with a metric of 782 The last is from RIPv2 and has a metric of 4 Which route or routes will the router install in the routing table?
A. the EIGRP route
B. the OSPF route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes
Q79. – (Topic 3)
Which command is used to display the collection of OSPF link states?
A. show ip ospf link-state
B. show ip ospf lsa database
C. show ip ospf neighbors
D. show ip ospf database
The âshow ip ospf databaseâ command displays the link states. Here is an example: Here is the lsa database on R2.
R2#show ip ospf database
OSPF Router with ID (184.108.40.206) (Process ID 1) Router Link States (Area 0)
Link ID ADV Router Age Seq# Checksum Link count 220.127.116.11 18.104.22.168 793 0x80000003 0x004F85 2
10.4.4.4 10.4.4.4 776 0x80000004 0x005643 1
22.214.171.124 126.96.36.199 755 0x80000005 0x0059CA 2
188.8.131.52 184.108.40.206 775 0x80000005 0x00B5B1 2
Net Link States (Area 0)
Link ID ADV Router Age Seq# Checksum
10.1.1.1 220.127.116.11 794 0x80000001 0x001E8B
10.2.2.3 18.104.22.168 812 0x80000001 0x004BA9
10.4.4.1 22.214.171.124 755 0x80000001 0x007F16
10.4.4.3 126.96.36.199 775 0x80000001 0x00C31F
Q80. – (Topic 8)
Which command can you enter to determine whether a switch is operating in trunking mode?
A. show ip interface brief
B. show vlan
C. show interfaces
D. show interface switchport