200-125 Exam - CCNA Cisco Certified Network Associate CCNA (v3.0)

certleader.com

P.S. Vivid 200-125 torrent are available on Google Drive, GET MORE: https://www.slideshare.net/reinigerodp/certleader-200-125examquestionsmaterials


New Cisco 200-125 Exam Dumps Collection (Question 3 - Question 12)

Question No: 3

Which command displays CPU utilization?

A. show protocols

B. show process

C. show system

D. show version

Answer: B

Explanation:

The u201cshow processu201d (in fact, the full command is u201cshow processesu201d) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted).

A more friendly way to check the CPU utilization is the command u201cshow processes cpu historyu201d, in which the total CPU usage on the router over a period of time: one minute, one hour, and 72 hours are clearly shown:

+ The Y-axis of the graph is the CPU utilization.

+ The X-axis of the graph is the increment within the period displayed in the graph.

For example, from the last graph (last 72 hours) we learn that the highest CPU utilization within 72 hours is 37% about six hours ago.


Question No: 4

VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?

A. The command is rejected.

B. The port turns amber.

C. The command is accepted and the respective VLAN is added to vlan.dat.

D. The command is accepted and you must configure the VLAN manually.

Answer: C

Explanation:

The u201cswitchport access vlan 3u201d will put that interface as belonging to VLAN 3 while also updated the VLAN database automatically to include VLAN 3.


Question No: 5

Which command encrypts all plaintext passwords?

A. Router# service password-encryption

B. Router(config)# password-encryption

C. Router(config)# service password-encryption

D. Router# password-encryption

Answer: C

Explanation:

Command

The u201cservice password-encryptionu201d command allows you to encrypt all passwords on your router so they cannot be easily guessed from your running-config. This command uses a very weak encryption because the router has to be very quickly decode the passwords for its operation.

It is meant to prevent someone from looking over your shoulder and seeing the password, that is all. This is configured in global configuration mode.


Question No: 6

What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?

A. B514 : 82C3 : 0029 : EC7A : EC72

B. B514 : 82C3 :: 0029 : EC7A : EC72

C. B514 : 82C3 : 0029 :: EC7A : 0000 : EC72

D. B514 : 82C3 :: 0029 : EC7A : 0 : EC72

Answer: D

Explanation:

There are two ways that an IPv6 address can be additionally compressed: compressing leading zeros and substituting a group of consecutive zeros with a single double colon (::). Both of these can be used in any number of combinations to notate the same address. It is important to note that the double colon (::) can only be used once within a single IPv6 address notation. So, the extra 0u2021s can only be compressed once.


Question No: 7

Refer to the exhibit.

The network administrator must establish a route by which London workstations can forward traffic to the Manchester workstations. What is the simplest way to accomplish this?

A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.

B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester.

C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router.

D. Configure a static default route on London with a next hop of 10.1.1.1.

E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2.

F. Configure Manchester to advertise a static default route to London.

Answer: E

Explanation:

This static route will allow for communication to the Manchester workstations and it is better to use this more specific route than a default route as traffic destined to the Internet will then not go out the London Internet connection.


Question No: 8

Which three are the components of SNMP? (Choose three)

A. MIB

B. SNMP Manager

C. SysLog Server

D. SNMP Agent

E. Set

Answer: A,B,D

Explanation:

SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network. The SNMP framework has three parts:

+ An SNMP manager

+ An SNMP agent

+ A Management Information Base (MIB)

The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP. The most common managing system is called a Network Management System (NMS). The term NMS can be applied to either a dedicated device used for network management, or the applications used on such a device. A variety of network management applications are available for use with SNMP. These features range from simple command-line applications to feature-rich graphical user interfaces (such as the CiscoWorks2000 line of products).

The SNMP agent is the software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. The agent and MIB reside on the routing device (router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you must define the relationship between the

manager and the agent.

The Management Information Base (MIB) is a virtual information storage area for network management information, which consists of collections of managed objects.


Question No: 9

Which command shows your active Telnet connections?

A. show cdp neigbors

B. show session

C. show users

D. show vty logins

Answer: B

Explanation:

The u201cshow usersu201d shows telnet/ssh connections to your router while u201cshow sessionsu201d shows telnet/ssh connections from your router (to other devices). The question asks about u201cyour active Telnet connectionsu201d, meaning connections from your router so the answer should be A.


Question No: 10

When a router undergoes the exchange protocol within OSPF, in what order does it pass through each state?

A. exstart state > loading state > exchange state > full state

B. exstart state > exchange state > loading state > full state

C. exstart state > full state > loading state > exchange state

D. loading state > exchange state > full state > exstart state

Answer: B

Explanation:

When OSPF adjacency is formed, a router goes through several state changes before it becomes fully adjacent with its neighbor. Those states are defined in the OSPF RFC 2328, section 10.1. The states are (in order) Down, Attempt, Init, 2-Way, Exstart, Exchange, Loading, and Full.

Reference:http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first- ospf/13685-13.html


Question No: 11

What does a Layer 2 switch use to decide where to forward a received frame?

A. source MAC address

B. source IP address

C. source switch port

D. destination IP address

E. destination port address

F. destination MAC address

Answer: F

Explanation:

When a frame is received, the switch looks at the destination hardware address and finds the interface if it is in its MAC address table. If the address is unknown, the frame is broadcast on all interfaces except the one it was received on.


Question No: 12

A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem?

Router(config)# router ospf 1

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0

A. The process id is configured improperly.

B. The OSPF area is configured improperly.

C. The network wildcard mask is configured improperly.

D. The network number is configured improperly.

E. The AS is configured improperly.

F. The network subnet mask is configured improperly.

Answer: C

Explanation:

When configuring OSPF, the mask used for the network statement is a wildcard mask similar to an access list. In this specific example, the correct syntax would have been u201cnetwork 10.0.0.0 0.0.0.255 area 0.u201d