aiotestking uk

200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1.  - (Topic 7)

What are the three things that the Netflow uses to consider the traffic to be in a same flow? (Choose three)

A. IP address

B. Interface name

C. Port numbers

D. L3 protocol type

E. MAC address

Answer: A,C,D

Explanation:

What is an IP Flow?

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:

+ IP source address

+ IP destination address

+ Source port

+ Destination port

+ Layer 3 protocol type

+ Class of Service

+ Router or switch interface

Q2.  - (Topic 8)

Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?

A. router#show platform

B. router#show interfaces Serial 0/2/0

C. router#show ip interface s0/2/0

D. router#\show ip interface brief

Answer: C

Q3.  - (Topic 8)

Which logging command can enable administrators to correlate syslog messages with millisecond precision?

A. no logging console

B. logging buffered 4

C. no logging monitor

D. service timestamps log datetime msec

E. logging host 10.2.0.21

Answer: D

Q4.  - (Topic 5)

What levels will be trapped if the administrator executes the command router(config)# logging trap 4 (Choose four)

A. Emergency

B. Notice

C. Alert

D. Error

E. Warning

Answer: A,C,D,E

Explanation:

The Message Logging is divided into 8 levels as listed below: Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged. For example, by using the “logging trap 4 command, all the logging of emergencies, alerts, critical, errors, warnings will be logged.

Q5.  - (Topic 8)

Which RFC was created to alleviate the depletion of IPv4 public addresses?

A. RFC 4193

B. RFC 1519

C. RFC 1518

D. RFC 1918

Answer: C

Q6.  - (Topic 8)

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?

A. 1

B. 2

C. 4

D. 8

Answer: C

Q7.  - (Topic 3)

What is the effect of using the service password-encryption command?

A. Only the enable password will be encrypted.

B. Only the enable secret password will be encrypted.

C. Only passwords configured after the command has been entered will be encrypted.

D. It will encrypt the secret password and remove the enable secret password from the configuration.

E. It will encrypt all current and future passwords.

Answer: E

Explanation:

Enable vty, console, AUX passwords are configured on the Cisco device. Use the show run command to show most passwords in clear text. If the service password-encryption is used, all the passwords are encrypted. As a result, the security of device access is improved.

Q8.  - (Topic 8)

Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?

A. copy run start

B. traceroute

C. the ICMP Echo IP SLA

D. SPAN

Answer: D

Explanation: A source port, also called a monitored port, is a switched or routed port that you monitor for network traffic analysis. In a single local SPAN session or RSPAN source session, you can monitor source port traffic, such as received (Rx), transmitted (Tx), or bidirectional (both). The switch supports any number of source ports (up to the maximum

number of available ports on the switch) and any number of source VLANs. A source port has these characteristics:

✑ It can be any port type, such as EtherChannel, Fast Ethernet, Gigabit Ethernet,

and so forth.

✑ It can be monitored in multiple SPAN sessions.

✑ It cannot be a destination port.

✑ Each source port can be configured with a direction (ingress, egress, or both) to monitor. For EtherChannel sources, the monitored direction applies to all physical ports in the group.

✑ Source ports can be in the same or different VLANs.

✑ For VLAN SPAN sources, all active ports in the source VLAN are included as source ports.

Q9.  - (Topic 7)

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

A. during high traffic periods

B. after broken links are re-established

C. when upper-layer protocols require high reliability

D. in an improperly implemented redundant topology

E. when a dual ring topology is in use

Answer: D

Explanation:

If we connect two switches via 2 or more links and do not enable STP on these switches then a loop (which creates multiple copies of the same unicast frame) will occur. It is an example of an improperly implemented redundant topology.

Q10.  - (Topic 5)

When a DHCP server is configured, which two IP addresses should never be assignable to

hosts? (Choose two.)

A. network or subnetwork IP address

B. broadcast address on the network

C. IP address leased to the LAN

D. IP address used by the interfaces

E. manually assigned address to the clients

F. designated IP address to the DHCP server

Answer: A,B

Explanation:

Network or subnetwork IP address (for example 11.0.0.0/8 or 13.1.0.0/16) and broadcast address (for example 23.2.1.255/24) should never be assignable to hosts. When try to assign these addresses to hosts, you will receive an error message saying that they can’t be assignable.