P.S. Download 200-125 interactive bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=1h4WwjNBP_fjjnxXJLxNgPsEiO-cPwGBa
New Questions 14
Which three options are the major components of a network virtualization architecture? (Choose three.)
A. virtual network services
B. authentication services
C. network access control
D. network resilience
E. path isolation
F. policy enforcement
Answer: A,C,E
New Questions 15
Which IPV6 function serves the same purpose as ARP entry verification on an IPv4 network?
A. interface ip address verification.
B. MAC address table verification
C. neighbor discovery verification
D. routing table entry verification
Answer: C
New Questions 16
Refer to the exhibit.
After you apply the given configuration to R1, you notice that it failed to enable OSPF Which action can you take to correct the problem?
A. Configure a loopback interface on R1
B. Enable IPv6 unicast routing on R1.
C. Configure an IPv4 address on interface FO/0.
D. Configure an autonomous system number on OSPF.
Answer: C
New Questions 17
Which statement about DHCP snooping is true?
A. it blocks traffic from DHCP servers on untrusted interfaces.
B. it can be configured on switches and routers.
C. it allows packets from untrusted ports if their source MAC address is found in the binding table.
D. it uses DHCPDiscover packets to identify DHCP servers.
Answer: A
New Questions 18
Refer to the exhibit.
If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet ?
A. 192.168.14.4
B. 192.168.12.2
C. 192.168.13.3
D. 192.168.15.5
Answer: A
New Questions 19
Which command can you enter to block HTTPS traffic from the whole class A private network range to a host?
A. R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 443
B. R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 53
C. R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2 0.0.0.0 eq 53
D. R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2 0.0.0.0 eq 443
Answer: D
New Questions 20
Which utility can you use to identify redundant or shadow rules ?
A. The ACL trace tool in Cisco APIC-EM.
B. The ACL analysis tool in Cisco APIC-EM.
C. The Cisco APIC-EM automation scheduler.
D. The Cisco IWAN application.
Answer: B
New Questions 21
CORRECT TEXTScenario:
You work as Junior Network Engineer for RADO Network Ltd company. Your colleague has set up a Layer 2 network for testing purpose in one of your client locations. You must verify the configuration and fix if any issues identified as per customer requirements.
Topology Details
- Three switches (SVV1. SW2, and SW3) are connected using Ethernet link as shown in the topology diagram.
- Server1 and PC1 are connected to SW1 and are assigned to VLAN 500 and VLAN 600 respectively.
- Server2 and PC2 are connected to SW2 and are assigned to VLAN 500 and VLAN 600 respectively.
- PC3 is connected to SW3 and assigned to VLAN 600.
Customer requirements
- Verify if switch ports are assigned in correct VLANs as per topology diagram Identify and fix any misconfigurations found in three switches.
- Verify if trunk links are operational between switches and the IEEE 802.1 q trunk encapsulation method is used Identrfy and fix if any misconfigurations are found in the trunk configuration
- You must make sure the ports connected between switches are set as trunk ports.
Special Note: To gain the maximum number you must make sure that VLANs are assigned to switch ports as per customer requirements and make sure the trunk links are operational between switches Do not change VLAN names and VLAN number that are already configured in the switches
Answer:
See the explanation below:
Explanation:
Switch 1 port E0/1 WAS CONNECTED TO A COMPUTER WITH A STRAIGHT THROUGH CABLE AND AS WELL AS ROLLOVER CABLE (FOR CONFIGURATION OF SWITCH PORTS ON THIS SWITCH) WHICH WAS SHOWN IN VLAN 600 IN THE DIAGRAM BUT ACTUALLY THAT PC WAS NOT IN VLAN 600 AFTER CHECKING THE VLAN CONFIGURATION USING SHOW VLAN COMMAND. INSTEAD THIS PORT WAS CONFIGURED IN VLAN 1. SO WE NEEDED TO PUT THAT PC IN VAN 600 USING FOLLOWING COMMANDS-SW1(CONFIG)# INTERFACE E0/0SW1(CONFIG- IF)#SWITCHPORT MODE ACCESSSW1(CONFIG-IF)#SWITCHPORT ACCESS VLAN 600
NOW THE E0/0-PORT OF THIS SWITCH-SW1 WAS RECEIVING NATIVE VLAN MISMATCH FROM SW3 SWITCH-PORT E0/1. ALSO E0/0 OF SW1 AND E0/1 OF SW3 WERE NOT IN TRUNKING MODE. AND THE QUESTION WAS ASKED TO MAKE SURE THAT CONNECTION BETWEEN BOTH SWITCHES SHOULD BE IN TRUNKING MODE WITH 802.1Q ENCAPSULATION ENABLEDSO USED THE BELOW COMMANDS- SW1(CONFIG)#INT E0/0SW1(CONFIG-IF)#SWITCHPORT TRUNK ENCAPSULATION DOT1QSW1(CONFIG-IF)# SWITCHPORT MODE TRUNK.
ON OTHER SWITCH WHICH IS SWITCH3
SW3(CONFIG)#INT E0/0SW3(CONFIG-IF)#SWITCHPORT TRUNK ENCAPSULATION DOT1QSW3(CONFIG-IF)# SWITCHPORT MODE TRUNK.SW3(CONFIG-IF)# SWITCHPORT TRUNK NATIVE VLAN 1
ALSO PORT E0/2 OF SW3 WAS CONNECTED TO SERVER AND IN VLAN 600 AND PORT E0/3 WAS ASSIGNED TO VLAN 500 AND TO A COMPUTER AGAIN IN VLAN 500 ITSELF. SO THAT COMPUTER HAD A CONSOLE CABLE CONNECTED TO SW3 AS WELL IN ORDER TO CONFIGURE SW3 PORTS AS TRUNK PORTS AND SWITCHPORTS USING THE ABOVE STEPS FOR SW1 WHICH WAS MENTIONED ABOVE.
SIMILARLY SW2 PORT E0/1 PORT WAS CONNECTED TO E0/4 PORT OF SW3 SO AGAIN TRUNK LINK CONFIGURATIONS BETWEEN E0/1 AND E0/4 PORTS BETWEEN TWO SWITCHES NEED TO EB DONE HERE. BUT YOU NEDD NOT TO AGAIN RUN THAT NATIVE VLAN COMMAND CHANGE ON SW3 OR SW2 SINCE ON SW3 WE AKREADY CHANGED IN ABOVE STEP AND IN SW2 ITS FINE IN VLAN 1 ONLY.
A COMPUTER WAS CONNECTED TO PORT E0/2 OF SW2 AND WAS IN VLAN 600 AND E0/3 WAS CONNECTED TIO SERVER WHCH WAS IN VLAN 600 AGAIN. ALSO AGAIN THIS TIME THE COMPUTER WAS CONNECTED TO THE SWITCH USING A CONSOLE CABLE ASWELL TO GIVE YOU CONSOLE ACCESS TO CONFIGURE AND VERIFY THE CONFIGURATIONS ON SW2. SO JUST VERIFY THE ACCESS PORTS ARE CORRECTLY ASSIGNED AND TRUNK PORTS AS WELL USING BELOW
COMMANDS.
New Questions 22
which command can you enter to troubleshoot the failure of address assignment ?
A. sh ip dhcp database
B. sh ip dhcp pool
C. sh ip dhcp import
D. sh ip dhcp server statistics
Answer: B
New Questions 23
How does a Layer 2 switch differ from a hub?
A. A switch tracks MAC addresses of directly-connected devices.
B. A switch always induces latency into the frame transfer time.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switchdecreases the number of collision domains.
Answer: A
P.S. Easily pass 200-125 Exam with Certleader Download Dumps & pdf vce, Try Free: https://www.certleader.com/200-125-dumps.html (889 New Questions)