P.S. Tested 200-125 prep are available on Google Drive, GET MORE: https://drive.google.com/open?id=1GYoIP8av070YUllGeTpz9IFUfla_iPR7
Question No: 3
Which component of a routing table entry represents the subnet mask?
A. routing protocol code
B. prefix
C. metric
D. network mask
Answer: D
Explanation:
IP Routing Table Entry Types
An entry in the IP routing table contains the following information in the order presented: Network ID.The network ID or destination corresponding to the route. The network ID can be class-based, subnet, or supernet network ID, or an IP address for a host route. Network Mask.The mask that is used to match a destination IP address to the network ID. Next Hop.The IP address of the next hop.
Interface.An indication of which network interface is used to forward the IP packet. Metric.A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID.
Routing table entries can be used to store the following types of routes:
Directly Attached Network IDs.Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network.
Remote Network IDs.Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network.
Host Routes.A route to a specific IP address. Host routes allow routing to occur on a per-
IP address basis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255.
Default Route.The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 0.0.0.0.
Question No: 4
Which three statements about VTP features are true? (Choose three.)
A. VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured.
B. When properly configured, VTP minimizes VLAN misconfigurations and configuration inconsistencies.
C. When properly configured, VTP maintains VLAN configuration consistency and accelerates trunk link negotiation.
D. Each broadcast domain on a switch can have its own unique VTP domain.
E. VTP pruning is used to increase available bandwidth in trunk links.
F. To configure a switch to be part of two VTP domains, each domain must have its own passwords.
G. Client, server, and transparent are valid VTP modes.
Answer: B,E,G
Question No: 5
CORRECT TEXTA corporation wants to add security to its network. The requirements are:
u2711 Host C should be able to use a web browser (HTTP) to access the Finance Web Server.
u2711 Other types of access from host C to the Finance Web Server should be blocked.
u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
u2711 All hosts in the Core and on local LAN should be able to access the Public Web Server.
You have been tasked to create and apply anumbered access listto a single outbound interface. This access list can contain no more thanthreestatements that meet these requirements.
Access to the router CLI can be gained by clicking on the appropriate host.
u2711 All passwords have been temporarily set to u201cciscou201d.
u2711 The Core connection uses an IP address of 198.18.209.65.
u2711 The computers in the Hosts LAN have been assigned addresses of 192.168.78.1 u2013 192.168.78.254.
u2711 host A 192.168.78.1
u2711 host B 192.168.78.2
u2711 host C 192.168.78.3
u2711 host D 192.168.78.4
u2711 The Finance Web Server has been assigned an address of 172.22.146.17.
u2711 The Public Web Server in the Server LAN has been assigned an address of 172.22.146.18.
Answer:
Please see below explanation part for details answer steps:
Explanation:
We should create an access-list and apply it to the interface that is connected to the Server LAN because it can filter out traffic from both S2 and Core networks. To see which interface this is, use the u201cshow ip int briefu201d command:
From this, we know that the servers are located on the fa0/1 interface, so we will place our numbered access list here in the outbound direction.
Corp1#configure terminal
Our access-list needs to allow host C u2013 192.168125.3 to the Finance Web Server 172.22.109.17 via HTTP (port 80), so our first line is this:
Corp1(config)#access-list 100 permit tcp host 192.168.125.3 host 172.22.109.17 eq 80
Then, our next two instructions are these:
u2711 Other types of access from host C to the Finance Web Server should be blocked.
u2711 All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
This can be accomplished with one command (which we need to do as our ACL needs to
be no more than 3 lines long), blocking all other access to the finance web server:
Corp1(config)#access-list 100 deny ip any host 172.22.109.17
Our last instruction is to allow all hosts in the Core and on the local LAN access to the Public Web Server (172.22.109.18)
Corp1(config)#access-list 100 permit ip host 172.22.109.18 any Finally, apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface fa0/1
Corp1(config-if)#ip access-group 100 out
Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core networks.
To verify, just click on host C to open its web browser. In the address box type http://172.22.109.17 to check if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it.
Click on other hosts (A, B and D) and check to make sure you canu2021t access Finance Web Server from these hosts. Then, repeat to make sure they can reach the public server at 172.22.109.18. Finally, save the configuration
Corp1(config-if)#end
Corp1#copy running-config startup-config
Question No: 6
If all OSPF routers in a single area are configured with the same priority value, what value does a router use for the OSPF router ID in the absence of a loopback interface?
A. the IP address of the first Fast Ethernet interface
B. the IP address of the console management interface
C. the highest IP address among its active interfaces
D. the lowest IP address among its active interfaces
E. the priority value until a loopback interface is configured
Answer: C
Explanation: Ordinarily the loopback interface would be selected as the router ID. In the event that no loopback interface is configured, the router ID will be the first active interface that comes up on the router. If that particular interface has more then one IP address, then the highest address will be selected as the Router ID.
Question No: 7
What is the effect of the overload keyword in a static NAT translation configuration?
A. It enables port address translation.
B. It enables the use of a secondary pool of IP addresses when the first pool is depleted.
C. It enables the inside interface to receive traffic.
D. It enables the outside interface to forward traffic.
Answer: A
Question No: 8
Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)
A. the type of cable that is connected to the interface.
B. The uptime of the interface
C. the status of the physical layer of the interface
D. the full configuration of the interface
E. the interface's duplex settings
Answer: A,C
Explanation:
Theshow controllercommand provides hardware-related information useful to troubleshoot and diagnose issues with Cisco router interfaces. The Cisco 12000 Series uses a distributed architecture with a central command-line interface (CLI) at the Gigabit Route Processor (GRP) and a local CLI at each line card.
Question No: 9
Which feature allows a device to use a switch port that is configured for half-duplex to access the network?
A. CSMA/CD
B. IGMP
C. port security
D. split horizon
Answer: A
Explanation:
Ethernet began as a local area network technology that provided a half-duplex shared
channel for stations connected to coaxial cable segments linked with signal repeaters. In this appendix, we take a detailed look at the half-duplex shared-channel mode of operation, and at the CSMA/CD mechanism that makes it work.
In the original half-duplex mode, the CSMA/CD protocol allows a set of stations to compete for access to a shared Ethernet channel in a fair and equitable manner. The protocolu2021s rules determine the behavior of Ethernet stations, including when they are allowed to transmit a frame onto a shared Ethernet channel, and what to do when a collision occurs. Today, virtually all devices are connected to Ethernet switch ports over full-duplex media, such as twisted-pair cables. On this type of connection, assuming that both devices can support the full-duplex mode of operation and that Auto-Negotiation (AN) is enabled, the AN protocol will automatically select the highest-performance mode of operation supported by the devices at each end of the link. That will result in full-duplex mode for the vast majority of Ethernet connections with modern interfaces that support full duplex and AN.
Question No: 10
In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)
A. fd15:0db8:0000:0000:700:3:400F:527B
B. fd15::db8::700:3:400F:527B
C. fd15:db8:0::700:3:4F:527B
D. fd15:0db8::7:3:4F:527B
E. fd15:db8::700:3:400F:572B
Answer: A,E
Question No: 11
Which command sequence can you enter to create VLAN 20 and assign it to an interface on a switch?
A. Switch(config)#vlan 20 Switch(config)#Interface gig x/y Switch(config-if)#switchport access vlan 20
B. Switch(config)#Interface gig x/y Switch(config-if)#vlan 20
Switch(config-vlan)#switchport access vlan 20
C. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk native vlan 20
D. Switch(config)#vlan 20
Switch(config)#Interface vlan 20 Switch(config-if)#switchport access vlan 20
E. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk allowed vlan 20
Answer: A
Question No: 12
Under normal operations, Cisco recommends that you configure switchports on which VLAN?
A. on any VLAN except the default VLAN
B. on the management VLAN
C. on the native VLAN
D. on the default VLAN
Answer: D
Recommend!! Get the Tested 200-125 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-200-125/ (New 573 Q&As Version)