Certshared
2017 Cisco Official New Released 200-125 ♥♥
100% Free Download! 100% Pass Guaranteed!
http://www.certshared.com/exam/200-125/


Cause all that matters here is passing the Cisco 200-125 exam. Cause all that you need is a high score of 200-125 CCNA Cisco Certified Network Associate CCNA (v3.0) exam. The only one thing you need to do is downloading Exambible 200-125 exam study guides now. We will not let you down with our money-back guarantee.

2017 Mar 200-125 practice test

Q11.  - (Topic 3)

What OSPF command, when configured, will include all interfaces into area 0?

A. network 0.0.0.0 255.255.255.255 area 0

B. network 0.0.0.0 0.0.0.0 area 0

C. network 255.255.255.255 0.0.0.0 area 0

D. network all-interfaces area 0

Answer: A

Explanation:

Example 3-1 displays OSPF with a process ID of 1 and places all interfaces configured with an IP address in area 0. The network command network 0.0.0.0 255.255.255.255 area 0 dictates that you do not care (255.255.255.255) what the IP address is, but if an IP address is enabled on any interface, place it in area 0.

Example 3-1 Configuring OSPF in a Single Area

router ospf 1

network 0.0.0.0 255.255.255.255 area 0

Reference: http://www.ciscopress.com/articles/article.asp?p=26919&seqNum=3


Q12.  - (Topic 5)

What are three components that comprise the SNMP framework? (Choose three.)

A. MIB

B. agent

C. set

D. AES

E. supervisor

F. manager

Answer: A,B,F

Explanation:

The SNMP framework consists of three parts:

•An SNMP manager — The system used to control and monitor the activities of network devices using SNMP.

•An SNMP agent — The software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. Cisco Nexus 1000V supports the agent and MIB. To enable the SNMP agent, you must define the relationship between the manager and the agent.

•A managed information base (MIB) — The collection of managed objects on the SNMP agent.

SNMP is defined in RFCs 3411 to 3418.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3/s ystem_management/configuration/guide/n1000v_system/n1000v_system_10snmp.html


Q13.  - (Topic 7)

What Netflow component can be applied to an interface to track IPv4 traffic?

A. flow monitor

B. flow record

C. flow sampler

D. flow exporter

Answer: A

Explanation:

Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the first interface. Flow data

is collected from the network traffic during the monitoring process based on the key and nonkey fields in the record, which is configured for the flow monitor and stored in the flow monitor cache.

For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters Flexible NetFlow flow monitor configuration mode:

Router(config)# flow monitor FLOW-MONITOR-1 Router(config-flow-monitor)#


Q14.  - (Topic 8)

Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)

A. The tunnel interface IP address is misconfigured.

B. The tunnel interface is down.

C. A valid route to the destination address is missing from the routing table.

D. The tunnel address is routed through the tunnel itself.

E. The ISP is blocking the traffic.

F. An ACL is blocking the outbound traffic.

Answer: B,C,D


Q15.  - (Topic 8)

Which statement about switch access ports is true?

A. They drop packets with 802.1Q tags.

B. A VLAN must be assigned to an access port before it is created.

C. They can receive traffic from more than one VLAN with no voice support

D. By default, they carry traffic for VLAN 10.

Answer: A

Explanation:

"If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that port drops the packet without learning its MAC source address."


Up to the minute 200-125 free question:

Q16.  - (Topic 7)

What are three factors a network administrator must consider before implementing Netflow

in the network? (Choose three.)

A. CPU utilization

B. where Netflow data will be sent

C. number of devices exporting Netflow data

D. port availability

E. SNMP version

F. WAN encapsulation

Answer: A,B,C

Explanation:

NetFlow has a reputation for increasing CPU utilization on your network devices. Cisco's performance testing seems to indicate that newer hardware can accommodate this load pretty well, but you will still want to check it out before you turn on the feature. Some symptoms of high CPU utilization are very large jitter and increased delay. Services running on the device may also be affected.

Another thing to keep in mind is the amount of data you're going to be sending across the network. Depending on how much traffic you have and how you configure it, the traffic can be substantial. For example, you may not want to send NetFlow data from a datacenter switch to a NetFlow collector on the other side of a small WAN circuit. Also bear in mind that the flows from aggregating large numbers of devices can add up.

Reference: http://searchenterprisewan.techtarget.com/tip/How-the-NetFlow-protocol- monitors-your-WAN


Q17.  - (Topic 8)

Which two statements about late collisions are true? (Choose two.)

A. They may indicate a duplex mismatch.

B. By definition, they occur after the 512th bit of the frame has been transmitted.

C. They indicate received frames that did not pass the FCS match.

D. They are frames that exceed 1518 bytes.

E. They occur when CRC errors and interference occur on the cable.

Answer: A,B


Q18.  - (Topic 4)

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

A. RSA

B. L2TP

C. IPsec

D. PPTP

Answer: C

Explanation:

IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPSec can be used to protect one or more data flows between IPSec peers.


Q19.  - (Topic 8)

Which MTU size can cause a baby giant error?

A. 1500

B. 9216

C. 1600

D. 1518

Answer: C

Explanation: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/29805-175.html


Q20.  - (Topic 5)

Which three features are added in SNMPv3 over SNMPv2?

A. Message Integrity

B. Compression

C. Authentication

D. Encryption

E. Error Detection

Answer: A,C,D

Explanation:

Cisco IOS software supports the following versions of SNMP:

+ SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

+ SNMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the “c” stands for “community”) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

+ SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are as follows:

– Message integrity: Ensuring that a packet has not been tampered with in transit.

– Authentication: Determining that the message is from a valid source.

– Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source.