aiotestking uk

200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1.  - (Topic 8)

Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.)

A. duplex mismatches on Ethernet segments in the same VLAN

B. multiple errors on switchport interfaces

C. congestion on the switch inband path

D. a failing NIC in an end device

E. an overloaded shared segment

Answer: A,C 

Explanation: Collision Domains

A collision domain is an area of a single LAN where end stations contend for access to the network because all end stations are connected to a shared physical medium. If two connected devices transmit onto the media at the same time, a collision occurs. When a collision occurs, a JAM signal is sent on the network, indicating that a collision has occurred and that devices should ignore any fragmented data associated with the collision. Both sending devices back off sending their data for a random amount and then try again if the medium is free for transmission. Therefore, collisions effectively delay transmission of

data, lowering the effective throughput available to a device. The more devices that are attached to a collision domain, the greater the chances of collisions; this results in lower bandwidth and performance for each device attached to the collision domain. Bridges and switches terminate the physical signal path of a collision domain, allowing you to segment separate collision domains, breaking them up into multiple smaller pieces to provide more bandwidth per user within the new collision domains formed.

Q2.  - (Topic 5)

The network administrator has been asked to give reasons for moving from IPv4 to IPv6. What are two valid reasons for adopting IPv6 over IPv4? (Choose two.)

A. no broadcast

B. change of source address in the IPv6 header

C. change of destination address in the IPv6 header

D. Telnet access does not require a password

E. autoconfiguration

F. NAT

Answer: A,E

Explanation:

IPv6 does not use broadcasts, and autoconfiguration is a feature of IPV6 that allows for hosts to automatically obtain an IPv6 address.

Q3.  - (Topic 3)

Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.)

A. the amount of available ROM

B. the amount of available flash and RAM memory

C. the version of the bootstrap software present on the router

D. show version

E. show processes

F. show running-config

Answer: B,D

Explanation:

When upgrading a new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.

Q4.  - (Topic 3)

What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router?

A. 2

B. 8

C. 16

D. unlimited

Answer: B

Explanation:

maximum-paths (OSPF)

To control the maximum number of parallel routes that Open Shortest Path First (OSPF) can support, use the maximum-paths command.

Syntax Description

maximum

Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16 routes.

Command Default

8 paths

Q5.  - (Topic 8)

Which method does a connected trunk port use to tag VLAN traffic?

A. IEEE 802 1w

B. IEEE 802 1D

C. IEEE 802 1Q

D. IEEE 802 1p

Answer: C

Explanation:

http://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html

Q6.  - (Topic 8)

Which statement about QoS default behavior is true?

A. Ports are untrusted by default.

B. VoIP traffic is passed without being tagged.

C. Video traffic is passed with a well-known DSCP value of 46.

D. Packets are classified internally with an environment.

E. Packets that arrive with a tag are untagged at the edge of an administrative domain.

Answer: E

Explanation: Frames received from users in the administratively-defined VLANs are

classified or tagged for transmission to other devices. Based on rules that you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is sent to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames. For IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used.

Each port on the switch has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or CMS. A tagged frame continues to use its assigned CoS value when it passes through the ingress port.

Q7.  - (Topic 3)

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?

A. enable cdp

B. cdp enable

C. cdp run

D. run cdp

Answer: C

Explanation:

CDP is enabled on Cisco routers by default. If you prefer not to use the CDP capability, disable it with the no cdp run command. In order to reenable CDP, use the cdp run command in global configuration mode. The “cdp enable” command is an interface command, not global.

Q8.  - (Topic 8)

Which command can you use to set the hostname on a switch?

A. switch-mdf-c1(config)#hostname switch-mdf1

B. switch-mdf-c1>hostname switch-mdf1

C. switch-mdf-c1#hostname switch-mdf1

D. switch-mdf-c1(config-if)#hostname switch-mdf1

Answer: A

Q9.  - (Topic 5)

Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)

A. Emergencies

B. Alerts

C. Critical

D. Errors

E. Warnings

Answer: A,B,C,D

Explanation:

The Message Logging is divided into 8 levels as listed below: Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be

displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.

Q10.  - (Topic 8)

Which option is a valid hostname for a switch?

A. Switch-Cisco

B. Switch-Cisco!

C. SwitchCisco

D. SwitchCisc0

Answer: C