Ucertify ccna routing and switching 200 125 pdf Questions are updated and all 125 200 answers are verified by experts. Once you have completely prepared with our ccna 200 125 book exam prep kits you will be ready for the real 200 125 ccna pdf exam without a problem. We have Leading Cisco ccna 200 120 vs 200 125 dumps study guide. PASSED cisco ccna 200 125 First attempt! Here What I Did.
P.S. Validated 200-125 secret are available on Google Drive, GET MORE: https://www.slideshare.net/reinigerodp/certleader-200-125examquestionsmaterials
New Cisco 200-125 Exam Dumps Collection (Question 6 - Question 15)
New Questions 6
What are three benefits of implementing VLANs? (Choose three.)
A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure.
C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
D. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.
E. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size.
F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain.
G. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.
Benefits of VLANs
VLAN is a network structure which allows users to communicate while in different locations by sharing one multicast domain and a single broadcast. They provide numerousnetworkingbenefits and have become popular in the market. For instance, it helps reduce administrative costs when users are geographically dispersed.
The popularity of VLANs is due to the fact that changes, adds, and moves can be attained simply by making necessary configurations on the VLAN port. Time-consuming, re- addressing, and host reconfigurations is now a thing of the past, because network configuration can be made at ease when need arises.
2. Better management
A VLAN typically solve the scalability issues that exist in a large network by breaking the main domain into several VLAN groups or smaller broadcast configurations, thereby encourage better control of multicast traffic as well as broadcast domains.
3. Improves network security
High-security can be positioned in different VLAN groups to ensure that non-members
cannot receive their broadcasts. On the other hand, a router is added and workgroups relocated into centralized locations.
4. Enhances performance
A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
5. Segment multiple networks
VLANs are typically used to achieve multiple purposes. They are popularly used to reduce broadcast traffic. Each VLAN creates a separate, smaller broadcast domain.
6. Better administration
VLANs facilitate grouping of multiple geographical stations. When VLAN users move to another physical location, the network does not have to be configured.
New Questions 7
Refer to the exhibit.
Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.)
A. Host E and host F use the same IP gateway address.
B. Router1 and Switch2 should be connected via a crossover cable.
C. Router1 will not play a role in communications between host A and host D.
D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.
E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.
F. The FastEthernet 0/0 interface on Router1 and the FastEthernet 0/1 interface on Switch2 trunk ports must be configured using the same encapsulation type.
In order for multiple VLANs to connect to a single physical interface on a Cisco router, subinterfaces must be used, one for each VLAN. This is known as the router on a stick configuration. Also, for any trunk to be formed, both ends of the trunk must agree on the encapsulation type, so each one must be configured for 802.1q or ISL.
New Questions 8
Which two statements about the OSPF Router ID are true? (Choose two.)
A. It identifies the source of a Type 1 LSA.
B. It should be the same on all routers in an OSPF routing instance.
C. By default, the lowest IP address on the router becomes the OSPF Router ID.
D. The router automatically chooses the IP address of a loopback as the OSPF Router ID.
E. It is created using the MAC Address of the loopback interface.
r120#show ip ospf data
OSPF Router with ID (10.0.0.120) (Process ID 1) Next, who are the other routers in our area? Router Link States (Area 1)
Link IDADV RouterAgeSeq#ChecksumLink count 10.0.0.11110.0.0.1116000x8000023A0x0092B31
We can see OSPF Router ID will be used as source of Type 1 LSA. Also the router will chose the highest loopback interface as its OSPF router ID (if available).
New Questions 9
Refer to the exhibit.
Why has this switch not been elected the root bridge for VLAN1?
A. It has more than one interface that is connected to the root network segment.
B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.
C. It has a higher MAC address than the elected root bridge.
D. It has a higher bridge ID than the elected root bridge.
The root bridge is determined by the lowest bridge ID, and this switch has a bridge ID priority of 32768, which is higher than the roots priority of 20481.
New Questions 10
Refer to the exhibit.
The speed of all serial links is E1 and the speed of all Ethernet links is 100 Mb/s. A static route will be established on the Manchester router to direct traffic toward the Internet over the most direct path available. What configuration on the Manchester router will establish a route toward the Internet for traffic that originates from workstations on the Manchester LAN?
A. ip route 0.0.0.0 255.255.255.0 172.16.100.2
B. ip route 0.0.0.0 0.0.0.0 126.96.36.199
C. ip route 0.0.0.0 255.255.255.252 188.8.131.52
D. ip route 0.0.0.0 0.0.0.0 172.16.100.1
E. ip route 0.0.0.0 0.0.0.0 172.16.100.2
F. ip route 0.0.0.0 255.255.255.255 172.16.100.2
We use default routing to send packets with a remote destination network not in the routing table to the next-hop router. You should generally only use default routing on stub networksu2014those with only one exit path out of the network.
According to exhibit, all traffic towards Internet that originates from workstations should forward to Router R1.
Syntax for default route is:
ip route <Remote_Network> <Netmask> <Next_Hop_Address>.
New Questions 11
Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)
A. Set the IP gateway to be used by the network.
B. Perform host discovery used DHCPDISCOVER message.
C. Configure IP address parameters from DHCP server to a host.
D. Provide an easy management of layer 3 devices.
E. Monitor IP performance using the DHCP server.
F. Assign and renew IP address from the default pool.
The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure devices that are connected to a network (known as hosts) so they can communicate on that network using the Internet Protocol (IP). It involves clients and a server operating in a client-server model. DHCP servers assigns IP addresses from a pool of addresses and also assigns other parameters such as DNS and default gateways to hosts.
New Questions 12
Refer to the exhibit.
A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?
A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62
6 bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet. 8bits+ 8bits+ 8bits + 2bits = /26
/26 bits subnet is 24bits + 11000000 = 24bits + 192 256 u2013 192 = 64
64 u2013 127
New Questions 13
Which type of EIGRP route entry describes a feasible successor?
A. a backup route, stored in the routing table
B. a primary route, stored in the routing table
C. a backup route, stored in the topology table
D. a primary route, stored in the topology table
EIGRP uses the Neighbor Table to list adjacent routers. The Topology Table list all the learned routers to destination whilst the Routing Table contains the best route to a destination, which is known as the Successor. The Feasible Successor is a backup route to a destination which is kept in the Topology Table.
New Questions 14
Which three statements about RSTP are true? (Choose three.)
A. RSTP significantly reduces topology reconverging time after a link failure.
B. RSTP expands the STP port roles by adding the alternate and backup roles.
C. RSTP port states are blocking, discarding, learning, or forwarding.
D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.
E. RSTP also uses the STP proposal-agreement sequence.
F. RSTP uses the same timer-based process as STP on point-to-point links.
One big disadvantage of STP is the low convergence which is very important in switched network. To overcome this problem, in 2001, the IEEE with document 802.1w introduced an evolution of the Spanning Tree Protocol: Rapid Spanning Tree Protocol (RSTP), which significantly reduces the convergence time after a topology change occurs in the network. While STP can take 30 to 50 seconds to transit from a blocking state to a forwarding state, RSTP is typically able to respond less than 10 seconds of a physical link failure.
RSTP works by adding an alternative port and a backup port compared to STP. These ports are allowed to immediately enter the forwarding state rather than passively wait for the network to converge.
RSTP bridge port roles:
* Root portu2013 A forwarding port that is the closest to the root bridge in terms of path cost
* Designated portu2013 A forwarding port for every LAN segment
* Alternate portu2013 A best alternate path to the root bridge. This path is different than using the root port. The alternative port moves to the forwarding state if there is a failure on the designated port for the segment.
* Backup portu2013 A backup/redundant path to a segment where another bridge port already connects. The backup port applies only when a single switch has two links to the same segment (collision domain). To have two links to the same collision domain, the switch must be attached to a hub.
* Disabled portu2013 Not strictly part of STP, a network administrator can manually disable a port.
New Questions 15
Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)
A. CHAP uses a two-way handshake.
B. CHAP uses a three-way handshake.
C. CHAP authentication periodically occurs after link establishment.
D. CHAP authentication passwords are sent in plaintext.
E. CHAP authentication is performed only upon link establishment.
F. CHAP has no protection from playback attacks.
CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).
Topic 9, Infrastructure Services
765.Which IPv6 address is the equivalent of the IPv4 interface loopback address 127.0.0.1?