1 / 5

Download Latest Cisco 200-125 Exam Dumps - Dumps4download

Dumps4Download.com is the leading organization which provide updated PDF file of Cisco 200-125 dumps. They provide you updated and latest 200-125 CCNA Cisco Certified Network Associate CCNA (v3.0) Exam dumps questions with valid answers. If you buy your exam dumps from our site then you can easily pass your exam in just one day. <br><br>100% exam passing Guarantee on your purchased exams.<br>100% money back guarantee if you will not clear your exam. <br><br>For more info:<br>Website: https://www.dumps4download.com/200-125-dumps.html <br>Email: Ads@dumps4download.com

albert63650
Download Presentation

Download Latest Cisco 200-125 Exam Dumps - Dumps4download

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO 1

  2. NO.1 How does a router handle an incoming packet whose destination network is missing from the routing table? A. it discards the packet. B. it broadcasts the packet to each network on the router. C. it routes the packet to the default route. D. it broadcasts the packet to each interface on the router. Answer: A NO.2 Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem? A. data link layer B. application layer C. access layer D. session layer E. network layer Answer: E Explanation: The command ping uses ICMP protocol, which is a network layer protocol used to propagate control message between host and router. The command ping is often used to verify the network connectivity, so it works at the network layer. NO.3 Which of the following are benefits of VLANs? (Choose three.) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They can enhance network security. D. They increase the size of broadcast domains while decreasing the number of collision domains. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration. Answer: B,C,E Explanation: When using VLAN the number and size of collision domains remain the same ->. VLANs allow to group users by function, not by location or geography ->. VLANs help minimize the incorrect configuration of VLANs so it enhances the security of the network ->. VLAN increases the size of broadcast domains but does not decrease the number of collision domains 2

  3. ->. VLANs increase the number of broadcast domains while decreasing the size of the broadcast domains which increase the utilization of the links. It is also a big advantage of VLAN ->. VLANs are useful but they are more complex and need more administration ->. NO.4 Two routers named Atlanta and Brevard are connected via their serial interfaces as illustrated, but they are unable to communicate. The Atlanta router is known to have the correct configuration. Given the partial configurations, identify the fault on the Brevard router that is causing the lack of connectivity. A. incompatible IP address B. insufficient bandwidth C. incorrect subnet mask D. incompatible encapsulation E. link reliability too low F. IPCP closed Answer: D Explanation: Because Interface Serial 0 of Atlanta Router has 192.168.10.1 And Interface Serial 1 of Router Brevard has 192.168.11.2. These are from different network. NO.5 Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.) A. RAM B. NVRAM C. flash memory D. HTTP server E. TFTP server F. Telnet server Answer: C,E Explanation: The following locations can be configured as a source for the IOS image: 1 . + Flash (the default location) 3

  4. 2 . + TFTP server 3 . + ROM (used if no other source is found) 4 . (Please read the explanation of Question 4 for more information) NO.6 What are three factors a network administrator must consider before implementing Netflow in the network? (Choose three.) A. CPU utilization B. where Netflow data will be sent C. number of devices exporting Netflow data D. port availability E. SNMP version F. WAN encapsulation Answer: A,B,C Explanation: NetFlow has a reputation for increasing CPU utilization on your network devices. Cisco's performance testing seems to indicate that newer hardware can accommodate this load pretty well, but you will still want to check it out before you turn on the feature. Some symptoms of high CPU utilization are very large jitter and increased delay. Services running on the device may also be affected. Another thing to keep in mind is the amount of data you're going to be sending across the network. Depending on how much traffic you have and how you configure it, the traffic can be substantial. For example, you may not want to send NetFlow data from a datacenter switch to a NetFlow collector on the other side of a small WAN circuit. Also bear in mind that the flows from aggregating large numbers of devices can add up. Reference: http://searchenterprisewan.techtarget.com/tip/How-the-NetFlow-protocol-monitors- your-WAN NO.7 Which statement about QoS default behavior is true? A. Ports are untrusted by default. B. VoIP traffic is passed without being tagged. C. Video traffic is passed with a well-known DSCP value of 46. D. Packets are classified internally with an environment. E. Packets that arrive with a tag are untagged at the edge of an administrative domain. Answer: E Explanation: Frames received from users in the administratively-defined VLANs are classified or tagged for transmission to other devices. Based on rules that you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is sent to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames. For IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used. Each port on the switch has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or CMS. A tagged frame continues to use its assigned CoS value 4

  5. IT Certification Guaranteed, The Easy Way! when it passes through the ingress port. NO.8 In which byte of an IP packet can traffic be marked? A. the ToS byte B. the QoS byte C. the DSCP byte D. the CoS byte Answer: A NO.9 Refer to the exhibit. After you apply the given configuration to arouter, the DHCP clients behind the device connot communicate with hosts outside of their subnet. Which action is most likely to correct the problem? A. Configure the dns server on the same subnet as the clients B. Activate the dhcp pool C. Correct the subnet mask D. configure the default gateway Answer: D NO.10 Which option is the default switch port port-security violation mode? A. shutdown B. protect C. shutdown vlan D. restrict Answer: A Explanation: Shutdown-This mode is the default violation mode; when in this mode, the switch will automatically force the switchport into an error disabled (err-disable) state when a violation occurs. While in this state, the switchport forwards no traffic. The switchport can be brought out of this error disabled state by issuing the errdisable recovery cause CLI command or by disabling and reenabling the switchport. Shutdown VLAN-This mode mimics the behavior of the shutdown mode but limits the error disabled state the specific violating VLAN. https://www.dumps4download.com/200-125-dumps.html

More Related