Certshared
2017 Cisco Official New Released 200-125 ♥♥
100% Free Download! 100% Pass Guaranteed!
http://www.certshared.com/exam/200-125/


Exam Code: ccna routing and switching 200 125 pdf (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCNA Cisco Certified Network Associate CCNA (v3.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 200 125 ccna book Exam.

Q106.  - (Topic 3)

If IP routing is enabled, which two commands set the gateway of last resort to the default gateway? (Choose two.)

A. ip default-gateway 0.0.0.0

B. ip route 172.16.2.1 0.0.0.0 0.0.0.0

C. ip default-network 0.0.0.0

D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1

E. ip route 0.0.0.0 0.0.0.0 172.16.2.1

Answer: C,E

Explanation:

Both the “ip default-network” and “ip route 0.0.0.0 0.0.0.0 (next hop)” commands can be used to set the default gateway in a Cisco router.


Q107.  - (Topic 8)

Which dynamic routing protocol uses only the hop count to determine the best path to a destination?

A. IGRP

B. RIP

C. EIGRP

D. OSPF

Answer: C


Q108.  - (Topic 8)

Scenario:

You are a junior network engineer for a financial company, and the main office network is experiencing network issues. Troubleshoot the network issues.

Router R1 connects the main office to the internet, and routers R2 and R3 are internal routers.

NAT is enabled on router R1.

The routing protocol that is enabled between routers R1, R2 and R3 is RIPv2.

R1 sends the default route into RIPv2 for the internal routers to forward internet traffic to R1.

You have console access on R1, R2 and R3 devices. Use only show commands to troubleshoot the issues.

Examine the DHCP configuration between R2 and R3; R2 is configured as the DHCP server and R3 as the client. What is the reason R3 is not receiving the IP address via DHCP?

A. On R2. The network statement In the DHCP pool configuration is incorrectly configured.

B. On R3. DHCP is not enabled on the interface that is connected to R2.

C. On R2, the interface that is connected to R3 is in shutdown condition.

D. On R3, the interface that is connected to R2 is in shutdown condition.

Answer: B

Explanation:

Please check the below:


Q109.  - (Topic 4)

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?

A. IETF

B. ANSI Annex D

C. Q9333-A Annex A

D. HDLC

Answer: A

Explanation:

Cisco supports two Frame Relay encapsulation types: the Cisco encapsulation and the IETF Frame Relay encapsulation, which is in conformance with RFC 1490 and RFC 2427. The former is often used to connect two Cisco routers while the latter is used to connect a Cisco router to a non-Cisco router. You can test with your Cisco router when typing the command Router(config-if)#encapsulation frame-relay ? on a WAN link. Below is the output of this command (notice Cisco is the default encapsulation so it is not listed here, just press Enter to use it).

Note: Three LMI options are supported by Cisco routers are ansi, Cisco, and Q933a. They

represent the ANSI Annex D, Cisco, and ITU Q933-A (Annex A) LMI types, respectively. HDLC is a WAN protocol same as Frame-Relay and PPP so it is not a Frame Relay encapsulation type.


Q110.  - (Topic 3)

What are two benefits of using a single OSPF area network design? (Choose two.)

A. It is less CPU intensive for routers in the single area.

B. It reduces the types of LSAs that are generated.

C. It removes the need for virtual links.

D. It increases LSA response times.

E. It reduces the number of required OSPF neighbor adjacencies.

Answer: B,C

Explanation:

OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement). The link types are as follows:

•LSA Type 1: Router LSA

•LSA Type 2: Network LSA

•LSA Type 3: Summary LSA

•LSA Type 4: Summary ASBR LSA

•LSA Type 5: Autonomous system external LSA

•LSA Type 6: Multicast OSPF LSA

•LSA Type 7: Not-so-stubby area LSA

•LSA Type 8: External attribute LSA for BGP

If all routers are in the same area, then many of these LSA types (Summary ASBR LSA, external LSA, etc) will not be used and will not be generated by any router.

All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non- backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. Virtual links are not ideal and should really only be used for temporary network solutions or migrations. However, if all locations are in a single OSPF area this is not needed.


Q111.  - (Topic 3)

What are two enhancements that OSPFv3 supports over OSPFv2? (Choose two.)

A. It requires the use of ARP.

B. It can support multiple IPv6 subnets on a single link.

C. It supports up to 2 instances of OSPFv3 over a common link.

D. It routes over links rather than over networks.

Answer: B,D


Q112.  - (Topic 8)

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

A. NAT

B. NTP

C. RFC 1631

D. RFC 1918

Answer: A


Q113.  - (Topic 7)

What are the benefits of using Netflow? (Choose three.)

A. Network, Application & User Monitoring

B. Network Planning

C. Security Analysis

D. Accounting/Billing

Answer: A,C,D

Explanation:

NetFlow traditionally enables several key customer applications including:

+ Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns

associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

+ Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.


Q114. DRAG DROP - (Topic 4)

Drag the Frame Relay acronym on the left to match its definition on the right. (Not all acronyms are used.)

Answer:


Q115.  - (Topic 8)

Why has the Branch3 router lost connectivity with R1?

Use only show commands to troubleshoot because usage of the debug command is restricted on the Branch3 and R1 routers.

A. A PPP chap hostname mismatch is noticed between Branch3 and R1.

B. A PPP chap password mismatch is noticed between Branch3 and R1.

C. PPP encapsulation is not configured on Branch3.

D. The PPP chap hostname and PPP chap password commands are missing on the Branch3 router.

Answer: A


Q116.  - (Topic 8)

Which network topology allows all traffic to flow through a central hub?

A. bus

B. star

C. mesh

D. ring

Answer: B


Q117.  - (Topic 8)

Why did Branch1 router lose WAN connectivity with R1 router?

A. The IP address is misconfigured on PPP multilink interface on the Branch1 router.

B. The PPP multilink group is misconfigured on the £ranch1 serial interfaces.

C. The PPP multilink group is misconfigured on the R1 serial interfaces.

D. The Branch1 serial interfaces are placed in a shutdown condition.

Answer: A


Q118.  - (Topic 8)

Which MTU size can cause a baby giant error?

A. 1500

B. 9216

C. 1600

D. 1518

Answer: C

Explanation: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/29805-175.html


Q119.  - (Topic 3)

On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?

A. a router with subinterfaces configured on the physical interface that is connected to the switch

B. a router with an IP address on the physical interface connected to the switch

C. a switch with an access link that is configured between the switches

D. a switch with a trunk link that is configured between the switches

Answer: A

Explanation:

Different VLANs can't communicate with each other, they can communicate with the help of Layer3 router. Hence, it is needed to connect a router to a switch, then make the sub- interface on the router to connect to the switch, establishing Trunking links to achieve communications of devices which belong to different VLANs.

When using VLANs in networks that have multiple interconnected switches, you need to use VLAN trunking between the switches. With VLAN trunking, the switches tag each frame sent between switches so that the receiving switch knows to what VLAN the frame belongs. End user devices connect to switch ports that provide simple connectivity to a single VLAN each. The attached devices are unaware of any VLAN structure.

By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch.

Here is the example of configuring the router for inter-vlan communication

RouterA(config)#int f0/0.1 RouterA(config-subif)#encapsulation ? dot1Q IEEE 802.1Q Virtual LAN

RouterA(config-subif)#encapsulation dot1Q or isl VLAN ID RouterA(config-subif)# ip address x.x.x.x y.y.y.y


Q120.  - (Topic 8)

Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.)

A. duplex mismatches on Ethernet segments in the same VLAN

B. multiple errors on switchport interfaces

C. congestion on the switch inband path

D. a failing NIC in an end device

E. an overloaded shared segment

Answer: A,C 

Explanation: Collision Domains

A collision domain is an area of a single LAN where end stations contend for access to the network because all end stations are connected to a shared physical medium. If two connected devices transmit onto the media at the same time, a collision occurs. When a collision occurs, a JAM signal is sent on the network, indicating that a collision has occurred and that devices should ignore any fragmented data associated with the collision. Both sending devices back off sending their data for a random amount and then try again if the medium is free for transmission. Therefore, collisions effectively delay transmission of

data, lowering the effective throughput available to a device. The more devices that are attached to a collision domain, the greater the chances of collisions; this results in lower bandwidth and performance for each device attached to the collision domain. Bridges and switches terminate the physical signal path of a collision domain, allowing you to segment separate collision domains, breaking them up into multiple smaller pieces to provide more bandwidth per user within the new collision domains formed.