aiotestking uk

200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1.  - (Topic 8)

Which command can you enter to route all traffic that is destined for 192.168.0.0/20 to a specific interface?

A. router(config)#ip route 192.168.0.0 255.255.240.0 GigabitEthernet0/1

B. router(config)#ip route 0.0.0.0 255.255.255.0 GigabitEthernet0/1

C. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1

D. router(config)#ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1

Answer: A

Q2.  - (Topic 7)

Scenario:

Refer to the topology. Your company has decided to connect the main office with three

other remote branch offices using point-to-point serial links.

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.

An OSPF neighbor adjacency is not formed between R3 in the main office and R4 in the Branch1 office. What is causing the problem?

A. There is an area ID mismatch.

B. There is a Layer 2 issue; an encapsulation mismatch on serial links.

C. There is an OSPF hello and dead interval mismatch.

D. The R3 router ID is configured on R4.

Answer: A

Explanation:

A show running-config command on R3 and R4 shows that R4 is incorrectly configured for area 2:

Q3.  - (Topic 4)

Refer to the exhibit.

In the Frame Relay network, which IP addresses would be assigned to the interfaces with point-to-point PVCs?

A. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.10.1 /24

DLCI 99: 192.168.10.2 /24

DLCI 28: 192.168.10.3 /24

B. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.11.1 /24

DLCI 99: 192.168.12.1 /24

DLCI 28: 192.168.13.1 /24

C. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.11.1 /24

DLCI 99: 192.168.10.2 /24

DLCI 28: 192.168.11.2 /24

D. DLCI 16: 192.168.10.1 /24

DLCI 17: 192.168.10.2 /24

DLCI 99: 192.168.10.3 /24

DLCI 28: 192.168.10.4 /24

Answer: C

Explanation:

With point to point PVC’s, each connection needs to be in a separate subnet. The R2-R1 connection (DLCI 16 to 99) would have each router within the same subnet. Similarly, the R3-R1 connection would also be in the same subnet, but it must be in a different one than the R2-R1 connection.

Q4.  - (Topic 8)

Which configuration can you apply to enable encapsulation on a subinterface?

A. interface FastEthernet 0/0 encapsulation dot1Q 30

ip address 10.1.1.30 255.255.255.0

B. interface FastEthernet 0/0.30

ip address 10.1.1.30 255.255.255.0

C. interface FastEthernet 0/0.30 description subinterface vlan 30

D. interface FastEthernet 0/0.30 encapsulation dot1Q 30

ip address 10.1.1.30 255.255.255.0

Answer: D

Q5.  - (Topic 5)

Which two are features of IPv6? (Choose two.)

A. anycast

B. broadcast

C. multicast

D. podcast

E. allcast

Answer: A,C

Explanation:

IPv6 addresses are classified by the primary addressing and routing methodologies common in networking: unicast addressing, anycast addressing, and multicast addressing.

✑ A unicast address identifies a single network interface. The Internet Protocol

delivers packets sent to a unicast address to that specific interface.

✑ An anycast address is assigned to a group of interfaces, usually belonging to different nodes. A packet sent to an anycast address is delivered to just one of the member interfaces, typically the nearest host, according to the routing protocol’s definition of distance. Anycast addresses cannot be identified easily, they have the same format as unicast addresses, and differ only by their presence in the network at multiple points. Almost any unicast address can be employed as an anycast address.

✑ A multicast address is also used by multiple hosts, which acquire the multicast address destination by participating in the multicast distribution protocol among the network routers. A packet that is sent to a multicast address is delivered to all interfaces that have joined the corresponding multicast group.

Q6.  - (Topic 8)

While troubleshooting a connection problem on a computer, you determined that the computer can ping a specific web server but it cannot connect to TCP port 80 on that server. Which reason for the problem is most likely true?

A. A VLAN number is incorrect.

B. A Route is missing

C. An ARP table entry is missing.

D. An ACL is blocking the TCP port.

Answer: D

Q7.  - (Topic 8)

Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.)

A. duplex mismatches on Ethernet segments in the same VLAN

B. multiple errors on switchport interfaces

C. congestion on the switch inband path

D. a failing NIC in an end device

E. an overloaded shared segment

Answer: A,C 

Explanation: Collision Domains

A collision domain is an area of a single LAN where end stations contend for access to the network because all end stations are connected to a shared physical medium. If two connected devices transmit onto the media at the same time, a collision occurs. When a collision occurs, a JAM signal is sent on the network, indicating that a collision has occurred and that devices should ignore any fragmented data associated with the collision. Both sending devices back off sending their data for a random amount and then try again if the medium is free for transmission. Therefore, collisions effectively delay transmission of

data, lowering the effective throughput available to a device. The more devices that are attached to a collision domain, the greater the chances of collisions; this results in lower bandwidth and performance for each device attached to the collision domain. Bridges and switches terminate the physical signal path of a collision domain, allowing you to segment separate collision domains, breaking them up into multiple smaller pieces to provide more bandwidth per user within the new collision domains formed.

Q8.  - (Topic 5)

What authentication type is used by SNMPv2?

A. HMAC-MD5

B. HMAC-SHA

C. CBC-DES

D. community strings

Answer: D

Explanation:

SNMP Versions

Cisco IOS software supports the following versions of SNMP:

•SNMPv1 — The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

•SNMPv2c — The community-string based Administrative Framework for SNMPv2. SNMPv2c (the "c" stands for "community") is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

•SNMPv3 — Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network.

SNMP Security Models and Levels

Model Level

Authentication Encryption What Happens v1 noAuthNoPriv

Community String No

Uses a community string match for authentication. v2c

noAuthNoPriv Community String No

Uses a community string match for authentication. v3

noAuthNoPriv Username

No

Uses a username match for authentication. v3

authNoPriv MD5 or SHA

No

Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. v3

authPriv MD5 or SHA DES

Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.h tml

Q9.  - (Topic 4)

What occurs on a Frame Relay network when the CIR is exceeded?

A. All TCP traffic is marked discard eligible.

B. All UDP traffic is marked discard eligible and a BECN is sent.

C. All TCP traffic is marked discard eligible and a BECN is sent.

D. All traffic exceeding the CIR is marked discard eligible.

Answer: D

Explanation:

Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network.

Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

Q10.  - (Topic 3)

Which command would you use on a Cisco router to verify the Layer 3 path to a host?

A. tracert address

B. traceroute address

C. telnet address

D. ssh address

Answer: B

Explanation:

In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. Traceroute proceeds unless all (three) sent packets are lost more than twice, then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.