aiotestking uk

200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Approved 200-125 testing bible are available on Google Drive, GET MORE: https://drive.google.com/open?id=1h4WwjNBP_fjjnxXJLxNgPsEiO-cPwGBa


New Cisco 200-125 Exam Dumps Collection (Question 12 - Question 21)

Q1. Refer to the exhibit.

In this VLSM addressing scheme, what summary address would be sent from router A?

A. 172.16.0.0 /16

B. 172.16.0.0 /20

C. 172.16.0.0 /24

D. 172.32.0.0 /16

E. 172.32.0.0 /17

F. 172.64.0.0 /16

Answer: A

Explanation:

Router A receives 3 subnets: 172.16.64.0/18, 172.16.32.0/24 and 172.16.128.0/18.

All these 3 subnets have the same form of 172.16.x.x so our summarized subnet must be also in that form -> Only A, B or .

The smallest subnet mask of these 3 subnets is /18 so our summarized subnet must also have its subnet mask equal or smaller than /18.

-> Only answer A has these 2 conditions ->.


Q2. At which layer of the OSI model is RSTP used to prevent loops?

A. physical

B. data link

C. network

D. transport

Answer: B

Explanation:

RSTP and STP operate on switches and are based on the exchange of Bridge Protocol Data Units (BPDUs) between switches. One of the most important fields in BPDUs is the Bridge Priority in which the MAC address is used to elect the Root Bridge -> RSTP operates at Layer 2 u2013 Data Link layer ->.


Q3. What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C

Explanation:

Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.

After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA is copied and forwarded to every neighbor except the one that sent the LSA.


Q4. Refer to the exhibit.

Which two statements are true of the interfaces on Switch1? (Choose two.)

A. Multiple devices are connected directly to FastEthernet0/1.

B. A hub is connected directly to FastEthernet0/5.

C. FastEthernet0/1 is connected to a host with multiple network interface cards.

D. FastEthernet0/5 has statically assigned MAC addresses.

E. FastEthernet0/1 is configured as a trunk link.

F. Interface FastEthernet0/2 has been disabled.

Answer: B,E

Explanation:

Carefully observe the information given after command show. Fa0/1 is connected to Switch2, seven MAC addresses correspond to Fa0/1, and these MAC are in different VLAN. From this we know that Fa0/1 is the trunk interface.

From the information given by show cdp neighbors we find that there is no Fa0/5 in CDP neighbor. However, F0/5 corresponds to two MAC addresses in the same VLAN. Thus we know that Fa0/5 is connected to a Hub.

Based on the output shown, there are multiple MAC addresses from different VLANs attached to the FastEthernet 0/1 interface. Only trunks are able to pass information from devices in multiple VLANs.


Q5. Two routers named Atlanta and Brevard are connected via their serial interfaces as illustrated, but they are unable to communicate. The Atlanta router is known to have the correct configuration.

Given the partial configurations, identify the fault on the Brevard router that is causing the lack of connectivity.

A. incompatible IP address

B. insufficient bandwidth

C. incorrect subnet mask

D. incompatible encapsulation

E. link reliability too low

F. IPCP closed

Answer: D

Explanation:

Because Interface Serial 0 of Atlanta Router has 192.168.10.1 And Interface Serial 1 of Router Brevard has 192.168.11.2. These are from different network.


Q6. Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)

A. 802.1Q native VLAN frames are untagged by default.

B. 802.1Q trunking ports can also be secure ports.

C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.

D. 802.1Q trunks require full-duplex, point-to-point connectivity.

E. 802.1Q trunks should have native VLANs that are the same at both ends.

Answer: A,C,E

Explanation:

By default, 802.1Q trunk defined Native VLAN in order to forward unmarked frame. Switches can forward Layer 2 frame from Native VLAN on unmarked trunks port. Receiver

switches will transmit all unmarked packets to Native VLAN. Native VLAN is the default VLAN configuration of port. Note for the 802.1Q trunk ports between two devices, the same Native VLAN configuration is required on both sides of the link. If the Native VLAN in 802.1Q trunk ports on same trunk link is properly configured, it could lead to layer 2 loops. The 802.1Q trunk link transmits VLAN information through Ethernet.


Q7. What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?

A. path cost

B. lowest port MAC address

C. VTP revision number

D. highest port priority number

E. port priority number and MAC address

Answer: A

Explanation:

The path cost to the root bridge is the most important value to determine which port will become the root port on each non-root switch. In particular, the port with lowest cost to the root bridge will become root port (on non-root switch).


Q8. Which characteristics are representatives of a link-state routing protocol? (Choose three.)

A. provides common view of entire topology

B. exchanges routing tables with neighbors

C. calculates shortest path

D. utilizes event-triggered updates

E. utilizes frequent periodic updates

Answer: A,C,D

Explanation:

Each of routers running link-state routing protocol learns paths to all the destinations in its u201careau201d so we can say although it is a bit unclear.

Link-state routing protocols generate routing updates only (not the whole routing table) when a change occurs in the network topology so

Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -

>.

Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state routing protocol utilizes event-triggered updates (only sends update when a change occurs)

->.


Q9. Refer to the exhibit.

What is the most appropriate summarization for these routes?

A. 10.0.0.0 /21

B. 10.0.0.0 /22

C. 10.0.0.0 /23

D. 10.0.0.0 /24

Answer: B

Explanation:

The 10.0.0.0/22 subnet mask will include the 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 networks, and only those four networks.


Q10. Refer to the exhibit.

Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?

A. 255.255.255.0

B. 255.255.254.0

C. 255.255.252.0

D. 255.255.248.0

Answer: B

Explanation:

310 hosts < 512 = 29-> We need a subnet mask of 9 bits 0 -> 1111 1111.1111 1111.1111

1110.0000 0000 -> 255.255.254.0


Recommend!! Get the Approved 200-125 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/200-125-vce-download.html (New 890 Q&As Version)