aiotestking uk

200-125 Exam Questions - Online Test


200-125 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1.  - (Topic 7)

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

A. source IP address

B. source MAC address

C. egress interface

D. ingress interface

E. destination IP address

F. IP next-hop

Answer: A,D,E

Explanation:

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:

• IP source address

• IP destination address

• Source port

• Destination port

• Layer 3 protocol type

• Class of Service

• Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html

Q2.  - (Topic 6)

Which item represents the standard IP ACL?

A. access-list 110 permit ip any any

B. access-list 50 deny 192.168.1.1 0.0.0.255

C. access list 101 deny tcp any host 192.168.1.1

D. access-list 2500 deny tcp any host 192.168.1.1 eq 22

Answer: B

Explanation:

The standard access lists are ranged from 1 to 99 and from 1300 to 1999 so only access list 50 is a standard access list.

Q3.  - (Topic 4)

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

A. RSA

B. L2TP

C. IPsec

D. PPTP

Answer: C

Explanation:

IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPSec can be used to protect one or more data flows between IPSec peers.

Q4.  - (Topic 5)

Refer to the diagram.

All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three.)

A. The subnet mask in use is 255.255.255.192.

B. The subnet mask in use is 255.255.255.128.

C. The IP address 172.16.1.25 can be assigned to hosts in VLAN1

D. The IP address 172.16.1.205 can be assigned to hosts in VLAN1

E. The LAN interface of the router is configured with one IP address.

F. The LAN interface of the router is configured with multiple IP addresses.

Answer: B,C,F

Explanation:

The subnet mask in use is 255.255.255.128: This is subnet mask will support up to 126 hosts, which is needed.

The IP address 172.16.1.25 can be assigned to hosts in VLAN1: The usable host range in this subnet is 172.16.1.1-172.16.1.126

The LAN interface of the router is configured with multiple IP addresses: The router will need 2 subinterfaces for the single physical interface, one with an IP address that belongs in each VLAN.

Q5.  - (Topic 5)

Refer to the exhibit.

A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)

A. host A IP address: 192.168.1.79

B. host A IP address: 192.168.1.64

C. host A default gateway: 192.168.1.78

D. host B IP address: 192.168.1.128

E. host B default gateway: 192.168.1.129

F. host B IP address: 192.168.1.190

Answer: A,C,F

Explanation:

It’s a “router-on-a-stick” configuration. Which means each host in the VLAN must corresponds with the VLAN configured on the sub-interfaces.

VLAN 10 is configured on fa0/0.10 and VLAN 20 on fa0/0.20. So each hosts in VLAN 10 must use fa0/0.10 IP address as their default gateway, each hosts must also be in the same subnet as fa0/0.10 IP – same with hosts in VLAN 20.

So find out the usable IP addresses on each sub-interfaces – for 192.168.1.78 /27: 192.168.1.65 – .94 and for 192.168.1.130 /26: 192.168.1.128 – .190.

Host A (using port 6 – VLAN 10) must use IP 192.168.1.79, default gateway 192.168.1.78. Host B (using port 9 – VLAN 20) must use IP 192.168.1.190, default gateway

192.168.1.130.

Q6.  - (Topic 3)

What are two benefits of using a single OSPF area network design? (Choose two.)

A. It is less CPU intensive for routers in the single area.

B. It reduces the types of LSAs that are generated.

C. It removes the need for virtual links.

D. It increases LSA response times.

E. It reduces the number of required OSPF neighbor adjacencies.

Answer: B,C

Explanation:

OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement). The link types are as follows:

•LSA Type 1: Router LSA

•LSA Type 2: Network LSA

•LSA Type 3: Summary LSA

•LSA Type 4: Summary ASBR LSA

•LSA Type 5: Autonomous system external LSA

•LSA Type 6: Multicast OSPF LSA

•LSA Type 7: Not-so-stubby area LSA

•LSA Type 8: External attribute LSA for BGP

If all routers are in the same area, then many of these LSA types (Summary ASBR LSA, external LSA, etc) will not be used and will not be generated by any router.

All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non- backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. Virtual links are not ideal and should really only be used for temporary network solutions or migrations. However, if all locations are in a single OSPF area this is not needed.

Q7.  - (Topic 8)

Which two statements about the tunnel mode ipv6ip command are true? (Choose two.)

A. It enables the transmission of IPv6 packets within the configured tunnel.

B. It specifies IPv4 as the encapsulation protocol.

C. It specifies IPv6 as the encapsulation protocol.

D. It specifies IPv6 as the transport protocol.

E. It specifies that the tunnel is a Teredo tunnel.

Answer: A,B

Q8.  - (Topic 8)

Which VTP mode prevents you from making changes to VLANs?

A. server

B. off

C. client

D. transparent

Answer: C

Q9.  - (Topic 3)

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C

Explanation:

Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.

After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA

is copied and forwarded to every neighbor except the one that sent the LSA.

Q10.  - (Topic 5)

How many bits are contained in each field of an IPv6 address?

A. 24

B. 4

C. 8

D. 16

Answer: D

Explanation:

An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.