Dumpleader: Ensure Success With Money Back Guarantee
Dumpleader: Ensure Success With Money Back Guarantee
Dumpleader: Ensure Success With Money Back Guarantee
http://www.dumpleader.com
Advance your career with IT Cert!
IT Certification Guaranteed, The Easy Way!
Exam : 200-125
Vendor : Cisco
Version : DEMO
1
IT Certification Guaranteed, The Easy Way!
Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output
from RouterA, what are two possible reasons for the failure? (Choose two.)
A. The cable that is connected to S0/0 on RouterA is faulty.
B. Interface S0/0 on RouterB is administratively down.
C. Interface S0/0 on RouterA is configured with an incorrect subnet mask.
D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet.
E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.
F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is
configured on S0/0 of RouterA.
Answer: E,F
Explanation:
From the output we can see that there is a problem with the Serial 0/0 interface. It is enabled, but
the line protocol is down. There could be a result of mismatched encapsulation or the interface not
receiving a clock signal from the CSU/DSU.
NO.2 What are three approaches that are used when migrating from an IPv4 addressing scheme to
an IPv6 scheme. (Choose three.)
A. enable dual-stack routing
B. configure IPv6 directly
C. configure IPv4 tunnels between IPv6 islands
D. use proxying and translation to translate IPv6 packets into IPv4 packets
E. statically map IPv4 addresses to IPv6 addresses
F. use DHCPv6 to map IPv4 addresses to IPv6 addresses
Answer: A,C,D
Explanation:
Several methods are used terms of migration including tunneling, translators, and dual stack. Tunnels
are used to carry one protocol inside another, while translators simply translate IPv6 packets into
IPv4 packets. Dual stack uses a combination of both native IPv4 and IPv6. With dual stack, devices are
able to run IPv4 and IPv6 together and if IPv6 communication is possible that is the preferred
protocol. Hosts can simultaneously reach IPv4 and IPv6 content.
2
IT Certification Guaranteed, The Easy Way!
NO.3 Which two statements about using leased lines for your WAN infrastructure are true? (Choose
two.)
A. Leased lines provide inexpensive WAN access.
B. Leased lines with sufficient bandwidth can avoid latency between endpoints.
C. Leased lines require little installation and maintenance expertise.
D. Leased lines provide highly flexible bandwidth scaling.
E. Multiple leased lines can share a router interface.
F. Leased lines support up to T1 link speeds.
Answer: C,D
NO.4 After you configure the Loopback0 interface, which command can you enter to verify the status
of the interface and determine whether fast switching is enabled?
A. Router#show ip interface loopback 0
B. Router#show run
C. Router#show interface loopback 0
D. Router#show ip interface brief
Answer: A
NO.5 Users have been complaining that their Frame Relay connection to the corporate site is very
slow. The network administrator suspects that the link is overloaded.
Based on the partial output of the Router# show frame relay pvc command shown in the graphic,
which output value indicates to the local router that traffic sent to the corporate site is experiencing
congestion?
A. DLCI = 100
B. last time PVC status changed 00:25:40
C. in BECN packets 192
3
IT Certification Guaranteed, The Easy Way!
NO.6 An administrator is trying to ping and telnet from SwitchC to RouterC with the results shown
below.
Click the console connected to RouterC and issue the appropriate commands to answer the
questions.
4
IT Certification Guaranteed, The Easy Way!
5
IT Certification Guaranteed, The Easy Way!
6
IT Certification Guaranteed, The Easy Way!
7
IT Certification Guaranteed, The Easy Way!
What would be the effect of issuing the command ip access-group 115 in on the s0/0/1 interface?
A. No host could connect to RouterC through s0/0/1.
B. Telnet and ping would work but routing updates would fail.
8
IT Certification Guaranteed, The Easy Way!
C. FTP, FTP-DATA, echo, and www would work but telnet would fail.
D. Only traffic from the 10.4.4.0 network would pass through the interface.
Answer: A
Explanation:
First let's see what was configured on interface S0/0/1:
NO.7 Which step in the router boot process searches for an IOS image to load into the router?
A. bootstrap
B. POST
C. mini-IOS
D. ROMMON mode
Answer: A
NO.9 What is the default maximum number of equal-cost paths that can be placed into the routing
table of a Cisco OSPF router?
A. 2
B. 8
C. 16
D. unlimited
Answer: B
Explanation:
maximum-paths (OSPF)
To control the maximum number of parallel routes that Open Shortest Path First (OSPF) can support,
use the maximum-paths command.
Syntax Description
9
IT Certification Guaranteed, The Easy Way!
maximum
Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16
routes.
Command Default
8 paths
NO.10 If the primary root bridge experiences a power loss, which switch takes over?
A. switch 0004.9A1A.C182
B. switch 00E0.F90B.6BE3
C. switch 00E0.F726.3DC6
D. switch 0040.0BC0.90C5
Answer: A
NO.11 Which two features can dynamically assign IPv6 addresses? (Choose two.)
A. IPv6 stateless autoconfiguration
B. DHCP
C. NHRP
D. IPv6 stateful autoconfiguration
E. ISATAP tunneling
Answer: A,B
NO.13 What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?
A. defines the destination IP address that is used in all broadcast packets on DCLI 202
B. defines the source IP address that is used in all broadcast packets on DCLI 202
10
IT Certification Guaranteed, The Easy Way!
C. defines the DLCI on which packets from the 192.168.1.2 IP address are received
D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address
Answer: D
Explanation:
This command identifies the DLCI that should be used for all packets destined to the
192.168.1.2 address. In this case, DLCI 202 should be used.
NO.14 Which characteristics are representatives of a link-state routing protocol? (Choose three.)
A. provides common view of entire topology
B. exchanges routing tables with neighbors
C. calculates shortest path
D. utilizes event-triggered updates
E. utilizes frequent periodic updates
Answer: A,C,D
Explanation:
Each of routers running link-state routing protocol learns paths to all the destinations in its
"area" so we can say although it is a bit unclear.
Link-state routing protocols generate routing updates only (not the whole routing table)
when a change occurs in the network topology so
Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -
>.
Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state
routing protocol utilizes event-triggered updates (only sends update when a change occurs)
->.
NO.15 What command sequence will configure a router to run OSPF and add network 10.1.1.0 /24 to
area 0?
A. router ospf area 0 network 10.1.1.0 255.255.255.0 area 0
B. router ospf network 10.1.1.0 0.0.0.255
C. router ospf 1 network 10.1.1.0 0.0.0.255 area 0
D. router ospf area 0 network 10.1.1.0 0.0.0.255 area 0
E. router ospf network 10.1.1.0 255.255.255.0 area 0
F. router ospf 1 network 10.1.1.0 0.0.0.255
Answer: C
Explanation:
- Enabling OSPF
SUMMARY STEPS
1.enable
2.configure terminal
3.router ospf process-id
4.network ip-address wildcard-mask area area-id
5.end
11
IT Certification Guaranteed, The Easy Way!
DETAILED STEPS
Command or Action Purpose Step 1 Enable
Example:
Device> enable Enables privileged EXEC mode. - Enter your password if prompted.
Step 2 Configure terminal
Example:
Device# configure terminal Enters global configuration mode.
Step 3 router ospf process-id
Example:
Device(config)# router ospf 109
Enables OSPF routing and enters router configuration mode.
Step 4 Network ip-address wildcard-mask area area-id
Example:
Device(config-router)# network 192.168.129.16 0.0.0.3 area 0
Defines an interface on which OSPF runs and defines the area ID for that interface.
Step 5 End
Example:
Device(config-router)# end
Exits router configuration mode and returns to privileged EXEC mode.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/12-
4t/iro-12-4t-book/iro-cfg.html#GUID-588D1301-F63C-4DAC-BF1C-C3735EB13673
The network administrator must establish a route by which London workstations can forward traffic
to the Manchester workstations. What is the simplest way to accomplish this?
A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.
B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester.
C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London
12
IT Certification Guaranteed, The Easy Way!
router.
D. Configure a static default route on London with a next hop of 10.1.1.1.
E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to
10.1.1.2.
F. Configure Manchester to advertise a static default route to London.
Answer: E
Explanation:
This static route will allow for communication to the Manchester workstations and it is better to use
this more specific route than a default route as traffic destined to the Internet will then not go out
the London Internet connection.
NO.17 What can be done to secure the virtual terminal interfaces on a router? (Choose two.)
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
Answer: D,E
Explanation:
It is a waste to administratively shut down the interface. Moreover, someone can still
access the virtual terminal interfaces via other interfaces ->
We cannot physically secure a virtual interface because it is "virtual" ->.
To apply an access list to a virtual terminal interface we must use the "access-class"
command. The "access-group" command is only used to apply an access list to a physical
interface -> C is not correct.
The most simple way to secure the virtual terminal interface is to configure a username &
password to prevent unauthorized login.
NO.18 Scenario
Refer to the topology. Your company has decided to connect the main office with three other remote
branch offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main
office and the routers located in the remote branch offices.
13
IT Certification Guaranteed, The Easy Way!
14
IT Certification Guaranteed, The Easy Way!
15
IT Certification Guaranteed, The Easy Way!
16
IT Certification Guaranteed, The Easy Way!
17
IT Certification Guaranteed, The Easy Way!
An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2
office. What is causing the problem?
A. There is an area ID mismatch.
B. There is a PPP authentication issue; a password mismatch.
C. There is an OSPF hello and dead interval mismatch.
D. There is a missing network command in the OSPF process on R5.
Answer: C
Explanation:
The "show ip ospf interface command on R3 and R5 shows that the hello and dead intervals do not
match. They are 50 and 200 on R3 and 10 and 40 on R5.
18