P.S. Vivid 200-125 ebook are available on Google Drive, GET MORE: https://drive.google.com/open?id=1TVPbOp7ab9OckkT77rZa87L3hf9XaR7B
New Questions 7
Which two statistics appear in show frame-relay map output? (Choose two.)
A. the number of BECN packets that are received by the router
B. the value of the local DLCI
C. the number of FECN packets that are received by the router
D. the status of the PVC that is configured on the router
E. the IP address of the local router
Answer: B,D
Explanation:
Sample u201cshow frame-relay mapu201d output: R1#sh frame map
Serial0/0 (up): ip 10.4.4.1dlci 401(0x191,0x6410), dynamic, broadcast,,status defined, active
Serial0/0 (up): ip 10.4.4.3dlci 403(0x193,0x6430), dynamic, broadcast,,status defined, active
Serial0/0 (up): ip 10.4.4.4dlci 401(0x191,0x6410), static, CISCO,status defined, active
New Questions 8
What are three features of the IPv6 protocol? (Choose three.)
A. optional IPsec
B. autoconfiguration
C. no broadcasts
D. complicated header
E. plug-and-play
F. checksums
Answer: B,C,E
Explanation:
An important feature of IPv6 is that it allows plug and play option to the network devices by allowing them to configure themselves independently. It is possible to plug a node into an IPv6 network without requiring any human intervention. This feature was critical to allow network connectivity to an increasing number of mobile devices. This is accomplished by autoconfiguration.
IPv6 does not implement traditional IP broadcast, i.e. the transmission of a packet to all hosts on the attached link using a special broadcast address, and therefore does not define broadcast addresses. In IPv6, the same result can be achieved by sending a packet to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4 multicast to address 224.0.0.1.
New Questions 9
Why do large OSPF networks use a hierarchical design? (Choose three.)
A. to decrease latency by increasing bandwidth
B. to reduce routing overhead
C. to speed up convergence
D. to confine network instability to single areas of the network
E. to reduce the complexity of router configuration
F. to lower costs by replacing routers with distribution layer switches
Answer: B,C,D
Explanation:
OSPF implements a two-tier hierarchical routing model that uses a core or backbone tier known as area zero (0). Attached to that backbone via area border routers (ABRs) are a number of secondary tier areas. The hierarchical approach is used to achieve the following:
u2022Rapid convergence because of link and/or switch failures
u2022Deterministic traffic recovery
u2022Scalable and manageable routing hierarchy, reduced routing overhead.
New Questions 10
Refer to the exhibit.
In the Frame Relay network, which IP addresses would be assigned to the interfaces with point-to-point PVCs?
A. DLCI 16: 192.168.10.1 /24
DLCI 17: 192.168.10.1 /24
DLCI 99: 192.168.10.2 /24
DLCI 28: 192.168.10.3 /24
B. DLCI 16: 192.168.10.1 /24
DLCI 17: 192.168.11.1 /24
DLCI 99: 192.168.12.1 /24
DLCI 28: 192.168.13.1 /24
C. DLCI 16: 192.168.10.1 /24
DLCI 17: 192.168.11.1 /24
DLCI 99: 192.168.10.2 /24
DLCI 28: 192.168.11.2 /24
D. DLCI 16: 192.168.10.1 /24
DLCI 17: 192.168.10.2 /24
DLCI 99: 192.168.10.3 /24
DLCI 28: 192.168.10.4 /24
Answer: C
Explanation:
With point to point PVCu2021s, each connection needs to be in a separate subnet. The R2-R1 connection (DLCI 16 to 99) would have each router within the same subnet. Similarly, the R3-R1 connection would also be in the same subnet, but it must be in a different one than the R2-R1 connection.
New Questions 11
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?
A. service password-encryption
access-list 1 permit 192.168.1.0 0.0.0.255
line vty 0 4 login
password cisco access-class 1
B. enable password secret line vty 0
login
password cisco
C. service password-encryption line vty 1
login
password cisco
D. service password-encryption line vty 0 4
login
password cisco
Answer: C
Explanation:
Only one VTY connection is allowed which is exactly what's requested. Incorrect Answer: command.
line vty0 4
would enable all 5 vty connections.
New Questions 12
At which layer of the OSI model is RSTP used to prevent loops?
A. physical
B. data link
C. network
D. transport
Answer: B
Explanation:
RSTP and STP operate on switches and are based on the exchange of Bridge Protocol Data Units (BPDUs) between switches. One of the most important fields in BPDUs is the Bridge Priority in which the MAC address is used to elect the Root Bridge -> RSTP operates at Layer 2 u2013 Data Link layer ->.
New Questions 13
On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?
A. a router with subinterfaces configured on the physical interface that is connected to the switch
B. a router with an IP address on the physical interface connected to the switch
C. a switch with an access link that is configured between the switches
D. a switch with a trunk link that is configured between the switches
Answer: A
Explanation:
Different VLANs can't communicate with each other, they can communicate with the help of Layer3 router. Hence, it is needed to connect a router to a switch, then make the sub- interface on the router to connect to the switch, establishing Trunking links to achieve communications of devices which belong to different VLANs.
When using VLANs in networks that have multiple interconnected switches, you need to use VLAN trunking between the switches. With VLAN trunking, the switches tag each frame sent between switches so that the receiving switch knows to what VLAN the frame belongs. End user devices connect to switch ports that provide simple connectivity to a single VLAN each. The attached devices are unaware of any VLAN structure.
By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch.
Here is the example of configuring the router for inter-vlan communication RouterA(config)#int f0/0.1
RouterA(config-subif)#encapsulation ? dot1Q IEEE 802.1Q Virtual LAN
RouterA(config-subif)#encapsulation dot1Q or isl VLAN ID RouterA(config-subif)# ip address x.x.x.x y.y.y.y
New Questions 14
Refer to the exhibit.
A technician is troubleshooting host connectivity issues on the switches. The hosts in VLANs 10 and 15 on Sw11 are unable to communicate with hosts in the same VLANs on Sw12. Hosts in the Admin VLAN are able to communicate. The port-to-VLAN assignments are identical on the two switches. What could be the problem?
A. The Fa0/1 port is not operational on one of the switches.
B. The link connecting the switches has not been configured as a trunk.
C. At least one port needs to be configured in VLAN 1 for VLANs 10 and 15 to be able to communicate.
D. Port FastEthernet 0/1 needs to be configured as an access link on both switches.
E. A router is required for hosts on SW11 in VLANs 10 and 15 to communicate with hosts in the same VLAN on Sw12.
Answer: B
Explanation:
In order for hosts in the same VLAN to communicate with each other over multiple switches, those switches need to be configured as trunks on their connected interfaces so that they can pass traffic from multiple VLANs.
New Questions 15
Which three are valid modes for a switch port used as a VLAN trunk? (Choose three.)
A. transparent
B. auto
C. on
D. desirable
E. blocking
F. forwarding
Answer: B,C,D
Explanation:
These are the different types of trunk modes:
u2711 ON: This mode puts the port into permanent trunk mode and negotiates to convert the link into a trunk link. The port becomes a trunk port even if the adjacent port does not agree to the change.
u2711 OFF: This mode puts the port into permanent non-trunk mode and negotiates to convert the link into a non-trunk link. The port becomes a non-trunk port even if the adjacent port does not agree to the change.
u2711 Desirable: This mode causes the port to actively attempt to convert the link into a
trunk link. The port becomes a trunk port if the adjacent port is set to on, desirable, or auto mode.
u2711 Auto: This mode enables the port to convert the link into a trunk link. The port
becomes a trunk port if the adjacent port is set to on or desirable mode. This is the default mode for Fast and Gigabit Ethernet ports.
u2711 Nonegotiate: This mode puts the port into permanent trunk mode, but does not
allow the port to generate Dynamic Trunking Protocol (DTP) frames. The adjacent port must be configured manually as a trunk port to establish a trunk link.
New Questions 16
Two routers named Atlanta and Brevard are connected via their serial interfaces as illustrated, but they are unable to communicate. The Atlanta router is known to have the correct configuration.
Given the partial configurations, identify the fault on the Brevard router that is causing the lack of connectivity.
A. incompatible IP address
B. insufficient bandwidth
C. incorrect subnet mask
D. incompatible encapsulation
E. link reliability too low
F. IPCP closed
Answer: D
Explanation:
Because Interface Serial 0 of Atlanta Router has 192.168.10.1 And Interface Serial 1 of Router Brevard has 192.168.11.2. These are from different network.
Recommend!! Get the Vivid 200-125 dumps in VCE and PDF From Surepassexam, Welcome to download: https://www.surepassexam.com/200-125-exam-dumps.html (New 890 Q&As Version)