200-125 Premium Bundle

200-125 Premium Bundle

CCNA Cisco Certified Network Associate CCNA (v3.0) Certification Exam

4.5 
(23850 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-125 Free Practice Questions

Q1.  - (Topic 8)

Which method does a connected trunk port use to tag VLAN traffic?

A. IEEE 802 1w

B. IEEE 802 1D

C. IEEE 802 1Q

D. IEEE 802 1p

Answer: C

Explanation:

http://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html

Q2.  - (Topic 3)

Refer to the exhibit.

The network administrator requires easy configuration options and minimal routing protocol traffic. What two options provide adequate routing table information for traffic that passes between the two routers and satisfy the requests of the network administrator? (Choose two.)

A. a dynamic routing protocol on InternetRouter to advertise all routes to CentralRouter.

B. a dynamic routing protocol on InternetRouter to advertise summarized routes to CentralRouter.

C. a static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to CentralRouter.

D. a dynamic routing protocol on CentralRouter to advertise all routes to InternetRouter.

E. a dynamic routing protocol on CentralRouter to advertise summarized routes to InternetRouter.

F. a static, default route on CentralRouter that directs traffic to InternetRouter.

Answer: C,F

Explanation:

The use of static routes will provide the necessary information for connectivity while producing no routing traffic overhead.

Q3. CORRECT TEXT - (Topic 7)

The following have already been configured on the router:

✑ The basic router configuration

✑ The appropriate interfaces have been configured for NAT inside and NAT outside.

✑ The appropriate static routes have also been configured (since the company will be a stub network, no routing protocol will be required)

✑ All passwords have been temporarily set to “cisco”.

The task is to complete the NAT configuration using all IP addresses assigned by the ISP to provide Internet access for the hosts in the Weaver LAN. Functionality can be tested by clicking on the host provided for testing.

Configuration information:

router name – Weaver

inside global addresses – 198.18.184.105 - 198.18.184.110/29 inside local addresses - 192.168.100.17 – 192.168.100.30/28 number of inside hosts – 14

A network associate is configuring a router for the weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 – 192.168.100.30.

Answer:  

The company has 14 hosts that need to access the internet simultaneously but we just have 6 public IP addresses from 198.18.184.105 to 198.18.184.110/29. Therefore we have to use NAT overload (or PAT)

Double click on the Weaver router to open it

Router>enable Router#configure terminal

First you should change the router's name to Weaver

Router(config)#hostname Weaver

Create a NAT pool of global addresses to be allocated with their netmask. Weaver(config)#ip nat pool mypool 198.18.184.105 198.18.184.110 netmask 255.255.255.248

Create a standard access control list that permits the addresses that are to be translated.

Weaver(config)#access-list 1 permit 192.168.100.16 0.0.0.15

Establish dynamic source translation, specifying the access list that was defined in the prior step.

Weaver(config)#ip nat inside source list 1 pool mypool overload

This command translates all source addresses that pass access list 1, which means a source address from 192.168.100.17 to 192.168.100.30, into an address from the pool named mypool (the pool contains addresses from 198.18.184.105 to 198.18.184.110). Overload keyword allows to map multiple IP addresses to a single registered IP address (many-to-one) by using different ports.

The question said that appropriate interfaces have been configured for NAT inside and NAT outside statements.

This is how to configure the NAT inside and NAT outside, just for your understanding:

Weaver(config)#interface fa0/0 Weaver(config-if)#ip nat inside Weaver(config-if)#exit Weaver(config)#interface s0/0 Weaver(config-if)#ip nat outside Weaver(config-if)#end

Finally, we should save all your work with the following command:

Weaver#copy running-config startup-config

Check your configuration by going to "Host for testing" and type:

C :\>ping 192.0.2.114

The ping should work well and you will be replied from 192.0.2.114

Q4.  - (Topic 8)

Which two statements about the tunnel mode ipv6ip command are true? (Choose two.)

A. It enables the transmission of IPv6 packets within the configured tunnel.

B. It specifies IPv4 as the encapsulation protocol.

C. It specifies IPv6 as the encapsulation protocol.

D. It specifies IPv6 as the transport protocol.

E. It specifies that the tunnel is a Teredo tunnel.

Answer: A,B

Q5.  - (Topic 5)

A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)

A. informational

B. emergency

C. warning

D. critical

E. debug

F. error

Answer: B,D,F

Explanation:

The Message Logging is divided into 8 levels as listed below:

Level Keyword Description 0

emergencies System is unusable 1

alerts

Immediate action is needed 2

critical

Critical conditions exist 3

errors

Error conditions exist 4

warnings

Warning conditions exist 5

notification

Normal, but significant, conditions exist 6

informational Informational messages 7

debugging Debugging messages

If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged. For example, by using the “logging trap 3 command, all the logging of emergencies, alerts, critical, and errors, will be logged.

Q6.  - (Topic 5)

Refer to the exhibit.

What is the most appropriate summarization for these routes?

A. 10.0.0.0 /21

B. 10.0.0.0 /22

C. 10.0.0.0 /23

D. 10.0.0.0 /24

Answer: B

Explanation:

The 10.0.0.0/22 subnet mask will include the 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 networks, and only those four networks.

Q7.  - (Topic 6)

How does using the service password-encryption command on a router provide additional security?

A. by encrypting all passwords passing through the router

B. by encrypting passwords in the plain text configuration file

C. by requiring entry of encrypted passwords for access to the device

D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

E. by automatically suggesting encrypted passwords for use in configuring the router

Answer: B

Explanation:

By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file

Q8.  - (Topic 8)

Which MAC protocol sets a random timer to reattempt communication?

A. IEEE 802.1x

B. RARP

C. CSMA/CA

D. CSMA/CD

Answer: D

Q9.  - (Topic 8)

Which HSRP feature was new in HSRPv2?

A. VLAN group numbers that are greater than 255

B. virtual MAC addresses

C. tracking

D. preemption

Answer: A

Q10.  - (Topic 8)

Which condition does the err-disabled status indicate on an Ethernet interface?

A. There is a duplex mismatch.

B. The device at the other end of the connection is powered off.

C. The serial interface is disabled.

D. The interface is configured with the shutdown command.

E. Port security has disabled the interface.

F. The interface is fully functioning.

Answer: E

Q11.  - (Topic 8)

Which destination IP address can a host use to send one message to multiple devices across different subnets?

A. 172.20.1.0

B. 127.0.0.1

C. 192.168.0.119

D. 239.255.0.1

Answer: D

Explanation: Multicast is a networking protocol where one host can send a message to a special multicast IP address and one or more network devices can listen for and receive those messages.

Multicast works by taking advantage of the existing IPv4 networking infrastructure, and it does so in something of a weird fashion. As you read, keep in mind that things are a little

confusing because multicast was "shoe-horned" in to an existing technology.

For the rest of this article, let's use the multicast IP address of 239.255.0.1. We'll not worry about port numbers yet, but make a mental note that they are used in multicast. We'll discuss that later.

Q12.  - (Topic 4)

The output of the show frame-relay pvc command shows "PVC STATUS = INACTIVE". What does this mean?

A. The PVC is configured correctly and is operating normally, but no data packets have been detected for more than five minutes.

B. The PVC is configured correctly, is operating normally, and is no longer actively seeking the address of the remote router.

C. The PVC is configured correctly, is operating normally, and is waiting for interesting traffic to trigger a call to the remote router.

D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.

E. The PVC is not configured on the local switch.

Answer: D

Explanation:

The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses:

+ ACTIVE: the PVC is operational and can transmit data

+ INACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not available

+ DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch

+ STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen so it is ignored in some books.

Q13.  - (Topic 7)

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

A. during high traffic periods

B. after broken links are re-established

C. when upper-layer protocols require high reliability

D. in an improperly implemented redundant topology

E. when a dual ring topology is in use

Answer: D

Explanation:

If we connect two switches via 2 or more links and do not enable STP on these switches then a loop (which creates multiple copies of the same unicast frame) will occur. It is an example of an improperly implemented redundant topology.

Q14.  - (Topic 8)

Which statement about the IP SLAs ICMP Echo operation is true?

A. The frequency of the operation .s specified in milliseconds.

B. It is used to identify the best source interface from which to send traffic.

C. It is configured in enable mode.

D. It is used to determine the frequency of ICMP packets.

Answer: D

Explanation:

This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices using IPv4 or IPv6. ICMP Echo is useful for

troubleshooting network connectivity issues. This module also demonstrates how the results of the ICMP Echo operation can be displayed and analyzed to determine how the network IP connections are performing.

ICMP Echo Operation

The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply.

In the figure below ping is used by the ICMP Echo operation to measure the response time between the source IP SLAs device and the destination IP device. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time measurements.

Figure 1. ICMP Echo Operation

http://www.cisco.com/c/dam/en/us/td/i/100001-200000/120001-130000/121001- 122000/121419.ps/_jcr_content/renditions/121419.jpg

The IP SLAs ICMP Echo operation conforms to the same IETF specifications for ICMP ping testing and the two methods result in the same response times.

Configuring a Basic ICMP Echo Operation on the Source Device SUMMARY STEPS

Q15. DRAG DROP - (Topic 7)

Drag each category on the left to its corresponding router output line on the right. Each router output line is the result of a show ip interface command. Not all categories are used.

Answer:

Explanation:

A simple way to find out which layer is having problem is to remember this rule: “the first statement is for Layer 1, the last statement is for Layer 2 and if Layer 1 is down then surely Layer 2 will be down too”, so you have to check Layer 1 before checking Layer 2. For example, from the output “Serial0/1 is up, line protocol is down” we know that it is a layer 2 problem because the first statement (Serial0/1 is up) is good while the last statement (line protocol is down) is bad. For the statement “Serial0/1 is down, line protocol is down”, both layers are down so the problem belongs to Layer 1.

There is only one special case with the statement “…. is administrator down, line protocol is down”. In this case, we know that the port is currently disabled and shut down by the administrators.

START 200-125 EXAM