2017 Cisco Official New Released 200-125 ♥♥
100% Free Download! 100% Pass Guaranteed!

Downloadable of 200-125 vce materials and torrent for Cisco certification for customers, Real Success Guaranteed with Updated 200-125 pdf dumps vce Materials. 100% PASS CCNA Cisco Certified Network Associate CCNA (v3.0) exam Today!

2017 Apr 200-125 training

Q111.  - (Topic 8)

Which dynamic routing protocol uses only the hop count to determine the best path to a destination?





Answer: C

Q112.  - (Topic 3)

Which command reveals the last method used to powercycle a router?

A. show reload

B. show boot

C. show running-config

D. show version

Answer: D


The “show version” command can be used to show the last method to powercycle (reset) a router.

Q113.  - (Topic 6)

Refer to the exhibit.

A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.

Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.)

A. Port security needs to be globally enabled.

B. Port security needs to be enabled on the interface.

C. Port security needs to be configured to shut down the interface in the event of a violation.

D. Port security needs to be configured to allow only one learned MAC address.

E. Port security interface counters need to be cleared before using the show command.

F. The port security configuration needs to be saved to NVRAM before it can become active.

Answer: B,D


From the output we can see that port security is disabled so this needs to be enabled. Also, the maximum number of devices is set to 2 so this needs to be just one if we want the single host to have access and nothing else.

Q114.  - (Topic 5)

Refer to the exhibit.

A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?





Answer: C


A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62

6 bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet. 8bits+ 8bits+ 8bits + 2bits = /26

/26 bits subnet is 24bits + 11000000 = 24bits + 192 256 – 192 = 64

0 -63

64 – 127

Q115. DRAG DROP - (Topic 7)

A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning with the lowest layer, drag each procedure on the left to its proper category on the right.



The question asks us to “begin with the lowest layer” so we have to begin with Layer 1: verify physical connection; in this case an Ethernet cable connection. For your information, “verify Ethernet cable connection” means that we check if the type of connection (crossover, straight-through, rollover…) is correct, the RJ45 headers are plugged in, the signal on the cable is acceptable…

Next we “verify NIC operation”. We do this by simply making a ping to the loopback interface If it works then the NIC card (layer 1, 2) and TCP/IP stack (layer 3) are working properly.

Verify IP configuration belongs to layer 3. For example, checking if the IP can be assignable for host, the PC’s IP is in the same network with the gateway…

Verifying the URL by typing in your browser some popular websites like google.com, microsoft.com to assure that the far end server is not down (it sometimes make we think we can’t access to the Internet). We are using a URL so this step belongs to layer 7 of the OSI model.

Renovate 200-125 download:

Q116.  - (Topic 6)

Refer to exhibit.

A network administrator cannot establish a Telnet session with the indicated router. What is the cause of this failure?

A. A Level 5 password is not set.

B. An ACL is blocking Telnet access.

C. The vty password is missing.

D. The console password is missing.

Answer: C


The login keyword has been set, but not password. This will result in the “password

required, but none set” message to users trying to telnet to this router.

Q117.  - (Topic 8)

Which HSRP feature was new in HSRPv2?

A. VLAN group numbers that are greater than 255

B. virtual MAC addresses

C. tracking

D. preemption

Answer: A

Q118.  - (Topic 3)

On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?

A. a router with subinterfaces configured on the physical interface that is connected to the switch

B. a router with an IP address on the physical interface connected to the switch

C. a switch with an access link that is configured between the switches

D. a switch with a trunk link that is configured between the switches

Answer: A


Different VLANs can't communicate with each other, they can communicate with the help of Layer3 router. Hence, it is needed to connect a router to a switch, then make the sub- interface on the router to connect to the switch, establishing Trunking links to achieve communications of devices which belong to different VLANs.

When using VLANs in networks that have multiple interconnected switches, you need to use VLAN trunking between the switches. With VLAN trunking, the switches tag each frame sent between switches so that the receiving switch knows to what VLAN the frame belongs. End user devices connect to switch ports that provide simple connectivity to a single VLAN each. The attached devices are unaware of any VLAN structure.

By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch.

Here is the example of configuring the router for inter-vlan communication

RouterA(config)#int f0/0.1 RouterA(config-subif)#encapsulation ? dot1Q IEEE 802.1Q Virtual LAN

RouterA(config-subif)#encapsulation dot1Q or isl VLAN ID RouterA(config-subif)# ip address x.x.x.x y.y.y.y

Q119.  - (Topic 5)

Which statement describes VRRP object tracking?

A. It monitors traffic flow and link utilization.

B. It ensures the best VRRP router is the virtual router master for the group.

C. It causes traffic to dynamically move to higher bandwidth links.

D. It thwarts man-in-the-middle attacks.

Answer: B


Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group.

Q120.  - (Topic 6)

What will be the result if the following configuration commands are implemented on a Cisco switch?

Switch(config-if)# switchport port-security

Switch(config-if)# switchport port-security mac-address sticky

A. A dynamically learned MAC address is saved in the startup-configuration file.

B. A dynamically learned MAC address is saved in the running-configuration file.

C. A dynamically learned MAC address is saved in the VLAN database.

D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.

E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

Answer: B


In the interface configuration mode, the command switchport port-security mac-address sticky enables sticky learning. When entering this command, the interface converts all the dynamic secure MAC addresses to sticky secure MAC addresses.