200-125 Premium Bundle

200-125 Premium Bundle

CCNA Cisco Certified Network Associate CCNA (v3.0) Certification Exam

4.5 
(10005 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-125 Free Practice Questions

Q1.  - (Topic 5)

When a DHCP server is configured, which two IP addresses should never be assignable to

hosts? (Choose two.)

A. network or subnetwork IP address

B. broadcast address on the network

C. IP address leased to the LAN

D. IP address used by the interfaces

E. manually assigned address to the clients

F. designated IP address to the DHCP server

Answer: A,B

Explanation:

Network or subnetwork IP address (for example 11.0.0.0/8 or 13.1.0.0/16) and broadcast address (for example 23.2.1.255/24) should never be assignable to hosts. When try to assign these addresses to hosts, you will receive an error message saying that they can’t be assignable.

Q2.  - (Topic 6)

Refer to the exhibit.

An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?

A. no ip access-class 102 in

B. no ip access-class 102 out

C. no ip access-group 102 in

D. no ip access-group 102 out

E. no ip access-list 102 in

Answer: D

Explanation:

The “ip access-group” is used to apply and ACL to an interface. From the output shown, we know that the ACL is applied to outbound traffic, so “no ip access-group 102 out” will

remove the effect of this ACL.

Q3.  - (Topic 3)

Which command reveals the last method used to powercycle a router?

A. show reload

B. show boot

C. show running-config

D. show version

Answer: D

Explanation:

The “show version” command can be used to show the last method to powercycle (reset) a router.

Q4.  - (Topic 8)

On which type of port can switches interconnect for multi-VLAN communication?

A. interface port

B. access port

C. switch port

D. trunk port

Answer: D

Q5.  - (Topic 5)

Refer to the exhibit.

What is the most efficient summarization that R1 can use to advertise its networks to R2?

A. 172.1.0.0/22

B. 172.1.0.0/21 

C. 172.1.4.0/22 

D. 172.1.4.0/24 

172.1.5.0/24

172.1.6.0/24

172.1.7.0/24

E. 172.1.4.0/25 

172.1.4.128/25

172.1.5.0/24

172.1.6.0/24

172.1.7.0/24

Answer: C

Explanation:

The 172.1.4.0/22 subnet encompasses all routes from the IP range 172.1.4.0 – 172.1.7.255.

Q6.  - (Topic 5)

What are three components that comprise the SNMP framework? (Choose three.)

A. MIB

B. agent

C. set

D. AES

E. supervisor

F. manager

Answer: A,B,F

Explanation:

The SNMP framework consists of three parts:

•An SNMP manager — The system used to control and monitor the activities of network devices using SNMP.

•An SNMP agent — The software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. Cisco Nexus 1000V supports the agent and MIB. To enable the SNMP agent, you must define the relationship between the manager and the agent.

•A managed information base (MIB) — The collection of managed objects on the SNMP agent.

SNMP is defined in RFCs 3411 to 3418.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3/s ystem_management/configuration/guide/n1000v_system/n1000v_system_10snmp.html

Q7.  - (Topic 7)

Refer to the exhibit.

Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output from RouterA, what are two possible reasons for the failure? (Choose two.)

A. The cable that is connected to S0/0 on RouterA is faulty.

B. Interface S0/0 on RouterB is administratively down.

C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.

D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet.

E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.

F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA.

Answer: E,F

Explanation:

From the output we can see that there is a problem with the Serial 0/0 interface. It is enabled, but the line protocol is down. There could be a result of mismatched encapsulation or the interface not receiving a clock signal from the CSU/DSU.

Q8.  - (Topic 5)

Refer to the exhibit.

Which address range efficiently summarizes the routing table of the addresses for router Main?

A. 172.16.0.0./21

B. 172.16.0.0./20

C. 172.16.0.0./16

D. 172.16.0.0/18

Answer: B

Explanation:

The 172.16.0.0./20 network is the best option as it includes all networks from 172.16.0.0 –

172.16.16.0 and does it more efficiently than the /16 and /18 subnets. The /21 subnet will not include all the other subnets in this one single summarized address.

Q9.  - (Topic 3)

If IP routing is enabled, which two commands set the gateway of last resort to the default gateway? (Choose two.)

A. ip default-gateway 0.0.0.0

B. ip route 172.16.2.1 0.0.0.0 0.0.0.0

C. ip default-network 0.0.0.0

D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1

E. ip route 0.0.0.0 0.0.0.0 172.16.2.1

Answer: C,E

Explanation:

Both the “ip default-network” and “ip route 0.0.0.0 0.0.0.0 (next hop)” commands can be used to set the default gateway in a Cisco router.

Q10.  - (Topic 5)

What are the Popular destinations for syslog messages to be saved? (Choose three)

A. Flash

B. The logging buffer .RAM

C. The console terminal

D. Other terminals

E. Syslog server

Answer: B,C,E

Explanation:

By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.

Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename.

Q11.  - (Topic 5)

Which statement describes VRRP object tracking?

A. It monitors traffic flow and link utilization.

B. It ensures the best VRRP router is the virtual router master for the group.

C. It causes traffic to dynamically move to higher bandwidth links.

D. It thwarts man-in-the-middle attacks.

Answer: B

Explanation:

Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group.

Q12.  - (Topic 8)

Which two statements about unique local IPv6 addresses are true?

A. They are identical to IPv4 private addresses.

B. They are defined by RFC 1884.

C. They use the prefix FEC0::/10

D. They use the prefix FC00::/7

E. They can be routed on the IPv6 global internet.

Answer: A,D

Q13. CORRECT TEXT - (Topic 8)

Which protocol authenticates connected devices before allowing them to access the LAN?

A. 802.1d

B. 802.11

C. 802.1w

D. 802.1x

Answer: D

Explanation:

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The

authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant’s identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.

Q14. DRAG DROP - (Topic 3)

Drag the Cisco default administrative distance to the appropriate routing protocol or route. (Not all options are used.)

Answer:

Q15.  - (Topic 8)

Which option is a valid hostname for a switch?

A. Switch-Cisco

B. Switch-Cisco!

C. SwitchCisco

D. SwitchCisc0

Answer: C

START 200-125 EXAM