2017 Cisco Official New Released 200-125 ♥♥
100% Free Download! 100% Pass Guaranteed!

Q151.  - (Topic 8)

Which RFC was created to alleviate the depletion of IPv4 public addresses?

A. RFC 4193

B. RFC 1519

C. RFC 1518

D. RFC 1918

Answer: C

Q152.  - (Topic 7)


Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

Which path does traffic take from R1 to R5?

A. The traffic goes through R2.

B. The traffic goes through R3.

C. The traffic is equally load-balanced over R2 and R3.

D. The traffic is unequally load-balanced over R2 and R3.

Answer: A


Using the “show ip int brief command” on R5 we can see the IP addresses assigned to this router. Then, using the “show ip route” command on R1 we can see that to reach and the preferred path is via Serial 1/3, which we see from the diagram is the link to R2.

Q153.  - (Topic 8)

Which switching method duplicates the first six bytes of a frame before making a switching decision?

A. fragment-free switching

B. store and-forward switching

C. cut through switching

D. ASIC switching

Answer: C

Explanation: Cut and Through method has lowest latency. In this method Switch only read first six bytes from frame after the preamble. These six bytes are the destination address of frame. This is the fastest method of switching. This method also processes invalid frames. Only advantage of this method is speed.

Q154.  - (Topic 5)

Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)

A. Emergencies

B. Alerts

C. Critical

D. Errors

E. Warnings

Answer: A,B,C,D


The Message Logging is divided into 8 levels as listed below: Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be

displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.

Q155.  - (Topic 8)

Which two statements about the tunnel mode ipv6ip command are true? (Choose two.)

A. It enables the transmission of IPv6 packets within the configured tunnel.

B. It specifies IPv4 as the encapsulation protocol.

C. It specifies IPv6 as the encapsulation protocol.

D. It specifies IPv6 as the transport protocol.

E. It specifies that the tunnel is a Teredo tunnel.

Answer: A,B

Q156.  - (Topic 7)

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

A. source IP address

B. source MAC address

C. egress interface

D. ingress interface

E. destination IP address

F. IP next-hop

Answer: A,D,E


Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:

• IP source address

• IP destination address

• Source port

• Destination port

• Layer 3 protocol type

• Class of Service

• Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html

Q157.  - (Topic 4)

What occurs on a Frame Relay network when the CIR is exceeded?

A. All TCP traffic is marked discard eligible.

B. All UDP traffic is marked discard eligible and a BECN is sent.

C. All TCP traffic is marked discard eligible and a BECN is sent.

D. All traffic exceeding the CIR is marked discard eligible.

Answer: D


Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network.

Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

Q158. CORRECT TEXT - (Topic 7)

Central Florida Widgets recently installed a new router in their office. Complete the network installation by performing the initial router configurations and configuring R1PV2 routing using the router command line interface (CLI) on the RC.

Configure the router per the following requirements: Name of the router is R2

Enable. secret password is cisco

The password to access user EXEC mode using the console is cisco2 The password to allow telnet access to the router is cisco3

IPV4 addresses must be configured as follows:

Ethernet network - router has fourth assignable host address in subnet Serial network is - router has last assignable host address in the subnet. Interfaces should be enabled.

Router protocol is RIPV2


In practical examinations, please note the following, the actual information will prevail.

1. Name or the router is xxx

2. Enable. secret password is xxx

3. Password In access user EXEC mode using the console is xxx

4. The password to allow telnet access to the router is xxx

5. IP information


Router>enable Router#config terminal Router(config)#hostname R2 R2(config)#enable secret Cisco 1 R2(config)#line console 0

R2(config-line)#password Cisco 2 R2(config-line)#exit R2(config)#line vty 0 4

R2(config-line)#password Cisco 3 R2(config-line)#login

R2(config-line)#exit R2(config)#interface faO/0

R2(config-if)#ip address R2(config)#interface s0/0/0

R2(config-if)#ip address R2(config-if)#no shutdown

R2(config-if)#exit R2(config)#router rip R2(config-router)#version 2



R2(config-router)#end R2#copy run start

Q159.  - (Topic 3)

Refer to the exhibit.

What commands must be configured on the 2950 switch and the router to allow communication between host 1 and host 2? (Choose two.)

A. Router(config)# interface fastethernet 0/0 Router(config-if)# ip address Router(config-if)# no shut down

B. Router(config)# interface fastethernet 0/0 Router(config-if)# no shut down Router(config)# interface fastethernet 0/0.1 Router(config-subif)# encapsulation dot1q 10

Router(config-subif)# ip address Router(config)# interface fastethernet 0/0.2

Router(config-subif)# encapsulation dot1q 20

Router(config-subif)# ip address

C. Router(config)# router eigrp 100 Router(config-router)# network

Router(config-router)# network

D. Switch1(config)# vlan database Switch1(config-vlan)# vtp domain XYZ

Switch1(config-vlan)# vtp server

E. Switch1(config)# interface fastethernet 0/1 Switch1(config-if)# switchport mode trunk

F. Switch1(config)# interface vlan 1 Switch1(config-if)# ip default-gateway

Answer: B,E


The router will need to use subinterfaces, where each subinterface is assigned a VLAN and IP address for each VLAN. On the switch, the connection to the router need to be configured as a trunk using the switchport mode trunk command and it will need a default gateway for VLAN 1.

Q160.  - (Topic 5)

How is an EUI-64 format interface ID created from a 48-bit MAC address?

A. by appending 0xFF to the MAC address

B. by prefixing the MAC address with 0xFFEE

C. by prefixing the MAC address with 0xFF and appending 0xFF to it

D. by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address

E. by prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes

Answer: D


The modified EUI-64 format interface identifier is derived from the 48-bit link-layer (MAC) address by inserting the hexadecimal number FFFE between the upper three bytes (OUI field) and the lower three bytes (serial number) of the link layer address.