Act now and download your Cisco ccna 200 125 dumps test today! Do not waste time for the worthless Cisco ccna 200 125 ebook tutorials. Download Renew Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) exam with real questions and answers and begin to learn Cisco 200 125 ccna pdf with a classic professional.

Q131.  - (Topic 8)

Which statement about switch access ports is true?

A. They drop packets with 802.1Q tags.

B. A VLAN must be assigned to an access port before it is created.

C. They can receive traffic from more than one VLAN with no voice support

D. By default, they carry traffic for VLAN 10.

Answer: A

Explanation:

"If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that port drops the packet without learning its MAC source address."


Q132.  - (Topic 4)

It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit. Which of the following procedures are required to accomplish this task? (Choose three.)

A. Remove the IP address from the physical interface.

B. Encapsulate the physical interface with multipoint PPP.

C. Create the virtual interfaces with the interface command.

D. Configure each subinterface with its own IP address.

E. Disable split horizon to prevent routing loops between the subinterface networks.

F. Configure static Frame Relay map entries for each subinterface network.

Answer: A,C,D

Explanation:

For multiple PVC’s on a single interface, you must use subinterfaces, with each subinterface configured for each PVC. Each subinterface will then have its own IP address, and no IP address will be assigned to the main interface.


Q133.  - (Topic 8)

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Answer: A

Explanation:

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.


Q134. DRAG DROP - (Topic 7)

A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning with the lowest layer, drag each procedure on the left to its proper category on the right.

Answer:

Explanation:

The question asks us to “begin with the lowest layer” so we have to begin with Layer 1: verify physical connection; in this case an Ethernet cable connection. For your information, “verify Ethernet cable connection” means that we check if the type of connection (crossover, straight-through, rollover…) is correct, the RJ45 headers are plugged in, the signal on the cable is acceptable…

Next we “verify NIC operation”. We do this by simply making a ping to the loopback interface 127.0.0.1. If it works then the NIC card (layer 1, 2) and TCP/IP stack (layer 3) are working properly.

Verify IP configuration belongs to layer 3. For example, checking if the IP can be assignable for host, the PC’s IP is in the same network with the gateway…

Verifying the URL by typing in your browser some popular websites like google.com, microsoft.com to assure that the far end server is not down (it sometimes make we think we can’t access to the Internet). We are using a URL so this step belongs to layer 7 of the OSI model.


Q135.  - (Topic 8)

What is the danger of the permit any entry in a NAT access list?

A. It can lead to overloaded resources on the router.

B. It can cause too many addresses to be assigned to the same interface.

C. It can disable the overload command.

D. It prevents the correct translation of IP addresses on the inside network.

Answer: A


Q136.  - (Topic 8)

How can you disable DTP on a switch port?

A. Configure the switch port as a trunk.

B. Add an interface on the switch to a channel group.

C. Change the operational mode to static access.

D. Change the administrative mode to access.

Answer: A


Q137.  - (Topic 8)

Which HSRP feature was new in HSRPv2?

A. VLAN group numbers that are greater than 255

B. virtual MAC addresses

C. tracking

D. preemption

Answer: A


Q138.  - (Topic 8)

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

A. NAT

B. NTP

C. RFC 1631

D. RFC 1918

Answer: A


Q139.  - (Topic 8)

What are three broadband wireless technologies? (Choose three.)

A. WiMax

B. satellite Internet

C. municipal Wi-Fi

D. site-to-site VPN

E. DSLAM

F. CMTS

Answer: A,B,C


Q140.  - (Topic 5)

Refer to the exhibit.

Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?

A. 255.255.255.0

B. 255.255.254.0

C. 255.255.252.0

D. 255.255.248.0

Answer: B

Explanation:

310 hosts < 512 = 29 -> We need a subnet mask of 9 bits 0 -> 1111 1111.1111 1111.1111

1110.0000 0000 -> 255.255.254.0