200-125 Exam - CCNA Cisco Certified Network Associate CCNA (v3.0)

certleader.com

Q1.  - (Topic 5)

In GLBP, which router will respond to client ARP requests?

A. The active virtual gateway will reply with one of four possible virtual MAC addresses.

B. All GLBP member routers will reply in round-robin fashion.

C. The active virtual gateway will reply with its own hardware MAC address.

D. The GLBP member routers will reply with one of four possible burned in hardware addresses.

Answer: A

Explanation:

One disadvantage of HSRP and VRRP is that only one router is in use, other routers must wait for the primary to fail because they can be used. However, Gateway Load Balancing Protocol (GLBP) can use of up to four routers simultaneously. In GLBP, there is still only one virtual IP address but each router has a different virtual MAC address. First a GLBP group must elect an Active Virtual Gateway (AVG). The AVG is responsible for replying ARP requests from hosts/clients. It replies with different virtual MAC addresses that correspond to different routers (known as Active Virtual Forwarders – AVFs) so that clients can send traffic to different routers in that GLBP group (load sharing).

Q2.  - (Topic 3)

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?

A. enable cdp

B. cdp enable

C. cdp run

D. run cdp

Answer: C

Explanation:

CDP is enabled on Cisco routers by default. If you prefer not to use the CDP capability, disable it with the no cdp run command. In order to reenable CDP, use the cdp run command in global configuration mode. The “cdp enable” command is an interface command, not global.

Q3. DRAG DROP - (Topic 7)

Drag each category on the left to its corresponding router output line on the right. Each router output line is the result of a show ip interface command. Not all categories are used.

Answer:

Explanation:

A simple way to find out which layer is having problem is to remember this rule: “the first statement is for Layer 1, the last statement is for Layer 2 and if Layer 1 is down then surely Layer 2 will be down too”, so you have to check Layer 1 before checking Layer 2. For example, from the output “Serial0/1 is up, line protocol is down” we know that it is a layer 2 problem because the first statement (Serial0/1 is up) is good while the last statement (line protocol is down) is bad. For the statement “Serial0/1 is down, line protocol is down”, both layers are down so the problem belongs to Layer 1.

There is only one special case with the statement “…. is administrator down, line protocol is down”. In this case, we know that the port is currently disabled and shut down by the administrators.

Q4.  - (Topic 8)

In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three.)

A. Unlike IPv4 headers, IPv6 headers have a fixed length.

B. IPv6 uses an extension header instead of the IPv4 Fragmentation field.

C. IPv6 headers eliminate the IPv4 Checksum field.

D. IPv6 headers use the Fragment Offset field in place of the IPv4 Fragmentation field.

E. IPv6 headers use a smaller Option field size than IPv4 headers.

F. IPv6 headers use a 4-bit TTL field, and IPv4 headers use an 8-bit TTL field.

Answer: A,B,C

Q5. CORRECT TEXT - (Topic 7)

Central Florida Widgets recently installed a new router in their office. Complete the network installation by performing the initial router configurations and configuring R1PV2 routing using the router command line interface (CLI) on the RC.

Configure the router per the following requirements: Name of the router is R2

Enable. secret password is cisco

The password to access user EXEC mode using the console is cisco2 The password to allow telnet access to the router is cisco3

IPV4 addresses must be configured as follows:

Ethernet network 209.165.201.0/27 - router has fourth assignable host address in subnet Serial network is 192.0.2.176/28 - router has last assignable host address in the subnet. Interfaces should be enabled.

Router protocol is RIPV2

Attention:

In practical examinations, please note the following, the actual information will prevail.

1. Name or the router is xxx

2. Enable. secret password is xxx

3. Password In access user EXEC mode using the console is xxx

4. The password to allow telnet access to the router is xxx

5. IP information

Answer:  

Router>enable Router#config terminal Router(config)#hostname R2 R2(config)#enable secret Cisco 1 R2(config)#line console 0

R2(config-line)#password Cisco 2 R2(config-line)#exit R2(config)#line vty 0 4

R2(config-line)#password Cisco 3 R2(config-line)#login

R2(config-line)#exit R2(config)#interface faO/0

R2(config-if)#ip address 209.165.201.4 255.255.255.224 R2(config)#interface s0/0/0

R2(config-if)#ip address 192.0.2.190 255.255.255.240 R2(config-if)#no shutdown

R2(config-if)#exit R2(config)#router rip R2(config-router)#version 2

R2(config-router)#network 209.165.201.0

R2(config-router)#network 192.0.2.176

R2(config-router)#end R2#copy run start

Q6.  - (Topic 5)

Which of these represents an IPv6 link-local address?

A. FE80::380e:611a:e14f:3d69 

B. FE81::280f:512b:e14f:3d69 

C. FEFE:0345:5f1b::e14d:3d69

D. FE08::280e:611:a:f14f:3d69

Answer: A

Explanation:

In the Internet Protocol Version 6 (IPv6), the address block fe80::/10 has been reserved for link-local unicast addressing. The actual link local addresses are assigned with the prefix fe80::/64. They may be assigned by automatic (stateless) or stateful (e.g. manual) mechanisms.

Q7.  - (Topic 8)

Which option is the default switch port port-security violation mode?

A. shutdown

B. protect

C. shutdown vlan

D. restrict

Answer: A

Explanation:

Shutdown—This mode is the default violation mode; when in this mode, the switch will automatically force the switchport into an error disabled (err-disable) state when a violation occurs. While in this state, the switchport forwards no traffic. The switchport can be brought out of this error disabled state by issuing the errdisable recovery cause CLI command or by disabling and reenabling the switchport.

Shutdown VLAN—This mode mimics the behavior of the shutdown mode but limits the error disabled state the specific violating VLAN.

Q8.  - (Topic 6)

A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)

A. The network administrator can apply port security to dynamic access ports.

B. The network administrator can apply port security to EtherChannels.

C. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.

D. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

E. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.

Answer: C,D

Explanation:

Follow these guidelines when configuring port security:

+ Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports.

+ A secure port cannot be a dynamic access port.

+ A secure port cannot be a destination port for Switched Port Analyzer (SPAN).

+ A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group.

+ You cannot configure static secure or sticky secure MAC addresses on a voice VLAN.

+ When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two.

+ If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN.

+ When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.

+ The switch does not support port security aging of sticky secure MAC addresses.

+ The protect and restrict options cannot be simultaneously enabled on an interface.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1

/configuration/guide/swtrafc.html)

Q9.  - (Topic 8)

A router has learned three possible routes that could be used to reach a destination network One route is from EIGRP and has a composite metric of 07104371. Another route is from OSPF with a metric of 782 The last is from RIPv2 and has a metric of 4 Which route or routes will the router install in the routing table?

A. the EIGRP route

B. the OSPF route

C. the RIPv2 route

D. all three routes

E. the OSPF and RIPv2 routes

Answer: A

Q10.  - (Topic 8)

Refer to the exhibit.

What is the effect of the given configuration?

A. It configures an inactive switch virtual interface.

B. It configures an active management interface.

C. It configures the native VLAN.

D. It configures the default VLAN.

Answer: A