aiotestking uk

200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Vivid 200-125 cram are available on Google Drive, GET MORE: https://drive.google.com/open?id=1IiiyEYVh7VGuzQjIt9B135ONv4m9W195


New Cisco 200-125 Exam Dumps Collection (Question 7 - Question 14)

Q7. An administrator is trying to ping and telnet from SwitchC to RouterC with the results shown below.

Click the console connected to RouterC and issue the appropriate commands to answer the questions.

Which will fix the issue and allow ONLY ping to work while keeping telnet disabled?

A. Correctly assign an IP address to interface fa0/1.

B. Change the ip access-group command on fa0/0 from u201cinu201d to u201coutu201d.

C. Removeaccess-group 106 infrom interface fa0/0 and addaccess-group 115 in.

D. Removeaccess-group 102 outfrom interface s0/0/0 and addaccess-group 114 in

E. Removeaccess-group 106 infrom interface fa0/0 and addaccess-group 104 in.

Answer: E

Explanation:

Letu2021s have a look at the access list 104:

The question does not ask about ftp traffic so we donu2021t care about the two first lines. The 3rd line denies all telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is applied on the inbound direction so the 5th line u201caccess-list 104 deny icmp any any echo-replyu201d will not affect our icmp traffic because the u201cecho-replyu201d message will be sent over the outbound direction.


Q8. A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?

A. standard

B. extended

C. dynamic

D. reflexive

Answer: C

Explanation:

We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS+ or RADIUS server. The configuration of dynamic ACL can be read here:http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094 524.shtml


Q9. Refer to the exhibit.

A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)

A. host A IP address: 192.168.1.79

B. host A IP address: 192.168.1.64

C. host A default gateway: 192.168.1.78

D. host B IP address: 192.168.1.128

E. host B default gateway: 192.168.1.129

F. host B IP address: 192.168.1.190

Answer: A,C,F

Explanation:

Itu2021s a u201crouter-on-a-sticku201d configuration. Which means each host in the VLAN must corresponds with the VLAN configured on the sub-interfaces.

VLAN 10 is configured on fa0/0.10 and VLAN 20 on fa0/0.20. So each hosts in VLAN 10 must use fa0/0.10 IP address as their default gateway, each hosts must also be in the same subnet as fa0/0.10 IP u2013 same with hosts in VLAN 20.

So find out the usable IP addresses on each sub-interfaces u2013 for 192.168.1.78 /27: 192.168.1.65 u2013 .94 and for 192.168.1.130 /26: 192.168.1.128 u2013 .190.

Host A (using port 6 u2013 VLAN 10) must use IP 192.168.1.79, default gateway 192.168.1.78. Host B (using port 9 u2013 VLAN 20) must use IP 192.168.1.190, default gateway 192.168.1.130.


Q10. What is the first 24 bits in a MAC address called?

A. NIC

B. BIA

C. OUI

D. VAI

Answer: C

Explanation:

An Organizationally Unique Identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization globally or worldwide.

They are used as the first 24 nits of the MAC address to uniquely identify a particular piece of equipment.


Q11. Which option is a valid IPv6 address?

A. 2001:0000:130F::099a::12a

B. 2002:7654:A1AD:61:81AF:CCC1

C. FEC0:ABCD:WXYZ:0067::2A4

D. 2004:1:25A4:886F::1

Answer: D

Explanation:

An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The leading 0u2021s in a group can be collapsed using ::, but this can only be done once in an IP address.


Q12. Refer to the exhibit.

What is the cause of the Syslog output messages?

A. The EIGRP neighbor on Fa0/1 went down due to a failed link.

B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.

C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go

down.

D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

Answer: C

Explanation:

The first lines of the message show that a configuration change was made, and that the fa0/1 interface changed to a state of administratively down. This can only be done by issuing the shutdown command. The last line indicates that this caused an EIGRP neighbor adjacency to go down.


Q13. Which protocol can cause overload on a CPU of a managed device?

A. Netflow

B. WCCP

C. IP SLA

D. SNMP

Answer: D

Explanation:

Sometimes, messages like this might appear in the router console:

%SNMP-3-CPUHOG: Processing [chars] of [chars]

They mean that the SNMP agent on the device has taken too much time to process a request.

You can determine the cause of high CPU use in a router by using the output of the show process cpu command.

Note: A managed device is a part of the network that requires some form of monitoring and management (routers, switches, servers, workstations, printersu2026).


Q14. How does using the service password-encryption command on a router provide additional security?

A. by encrypting all passwords passing through the router

B. by encrypting passwords in the plain text configuration file

C. by requiring entry of encrypted passwords for access to the device

D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

E. by automatically suggesting encrypted passwords for use in configuring the router

Answer: B

Explanation:

By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file


100% Latest Cisco 200-125 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/200-125-dumps.html (New 890 Q&As)