Exambible offers free demo for ccna routing and switching 200 125 exam. "CCNA Cisco Certified Network Associate CCNA (v3.0)", also known as 200 125 ccna exam, is a Cisco Certification. This set of posts, Passing the Cisco 200 125 ccna pdf exam, will help you answer those questions. The ccna 200 125 ebook Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco 200 125 ccna book exams and revised by experts!
Q91. - (Topic 8)
Which two options are primary responsibilities of the APIC-EM controller? (Choose two.)
A. It automates network actions between different device types.
B. It provides robust asset management.
C. It tracks license usage and Cisco IOS versions.
D. It automates network actions between legacy equipment.
E. It makes network functions programmable.
Q92. - (Topic 8)
Which two statements about IPv6 and routing protocols are true? (Choose two.)
A. Link-local addresses are used to form routing adjacencies.
B. OSPFv3 was developed to support IPv6 routing.
C. EIGRP, OSPF, and BGP are the only routing protocols that support IPv6.
D. Loopback addresses are used to form routing adjacencies.
E. EIGRPv3 was developed to support IPv6 routing.
Q93. - (Topic 3)
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.)
A. the amount of available ROM
B. the amount of available flash and RAM memory
C. the version of the bootstrap software present on the router
D. show version
E. show processes
F. show running-config
When upgrading a new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.
Q94. - (Topic 7)
What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)
A. source IP address
B. source MAC address
C. egress interface
D. ingress interface
E. destination IP address
F. IP next-hop
Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.
Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:
• IP source address
• IP destination address
• Source port
• Destination port
• Layer 3 protocol type
• Class of Service
• Router or switch interface
All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.
Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html
Q95. - (Topic 8)
Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)
A. The tunnel interface IP address is misconfigured.
B. The tunnel interface is down.
C. A valid route to the destination address is missing from the routing table.
D. The tunnel address is routed through the tunnel itself.
E. The ISP is blocking the traffic.
F. An ACL is blocking the outbound traffic.
Q96. - (Topic 8)
A router has learned three possible routes that could be used to reach a destination network One route is from EIGRP and has a composite metric of 07104371. Another route is from OSPF with a metric of 782 The last is from RIPv2 and has a metric of 4 Which route or routes will the router install in the routing table?
A. the EIGRP route
B. the OSPF route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes
Q97. - (Topic 5)
What is the first 24 bits in a MAC address called?
An Organizationally Unique Identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization globally or worldwide.
They are used as the first 24 nits of the MAC address to uniquely identify a particular piece of equipment.
Q98. - (Topic 8)
Why has the Branch3 router lost connectivity with R1?
Use only show commands to troubleshoot because usage of the debug command is restricted on the Branch3 and R1 routers.
A. A PPP chap hostname mismatch is noticed between Branch3 and R1.
B. A PPP chap password mismatch is noticed between Branch3 and R1.
C. PPP encapsulation is not configured on Branch3.
D. The PPP chap hostname and PPP chap password commands are missing on the Branch3 router.
Q99. - (Topic 8)
Which RFC was created to alleviate the depletion of IPv4 public addresses?
A. RFC 4193
B. RFC 1519
C. RFC 1518
D. RFC 1918
Q100. - (Topic 6)
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)
A. The network administrator can apply port security to dynamic access ports.
B. The network administrator can apply port security to EtherChannels.
C. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.
D. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
E. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.
Follow these guidelines when configuring port security:
+ Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports.
+ A secure port cannot be a dynamic access port.
+ A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
+ A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group.
+ You cannot configure static secure or sticky secure MAC addresses on a voice VLAN.
+ When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two.
+ If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN.
+ When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.
+ The switch does not support port security aging of sticky secure MAC addresses.
+ The protect and restrict options cannot be simultaneously enabled on an interface.
To know more about the 200-125, click here.