It is impossible to pass Cisco 200 125 ccna v3 0 exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed Cisco 200 125 ccna v3 0 practice questions. You will get a surprising result by our Up to the minute CCNA Cisco Certified Network Associate CCNA (v3.0) practice guides.

P.S. Pinpoint 200-125 bible are available on Google Drive, GET MORE: https://drive.google.com/open?id=1N7mstYjhTswrvFd1eA3ZZFuxiKuT_fqh


New Cisco 200-125 Exam Dumps Collection (Question 14 - Question 23)

Question No: 14

What are the alert messages generated by SNMP agents called?

A. TRAP

B. INFORM

C. GET

D. SET

Answer: A,B

Explanation:

A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that theyu2019re unacknowledged so you donu2019t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.


Question No: 15

Why will a switch never learn a broadcast address?

A. Broadcasts only use network layer addressing.

B. A broadcast frame is never forwarded by a switch.

C. A broadcast address will never be the source address of a frame.

D. Broadcast addresses use an incorrect format for the switching table.

E. Broadcast frames are never sent to switches.

Answer: C

Explanation:

Switches dynamically learn MAC addresses based on the source MAC addresses that it sees, and since a broadcast is never the source, it will never learn the broadcast address.


Question No: 16

How is an EUI-64 format interface ID created from a 48-bit MAC address?

A. by appending 0xFF to the MAC address

B. by prefixing the MAC address with 0xFFEE

C. by prefixing the MAC address with 0xFF and appending 0xFF to it

D. by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address

E. by prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes

Answer: D

Explanation:

The modified EUI-64 format interface identifier is derived from the 48-bit link-layer (MAC) address by inserting the hexadecimal number FFFE between the upper three bytes (OUI field) and the lower three bytes (serial number) of the link layer address.


Question No: 17

Which three statements about RSTP are true? (Choose three.)

A. RSTP significantly reduces topology reconverging time after a link failure.

B. RSTP expands the STP port roles by adding the alternate and backup roles.

C. RSTP port states are blocking, discarding, learning, or forwarding.

D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

E. RSTP also uses the STP proposal-agreement sequence.

F. RSTP uses the same timer-based process as STP on point-to-point links.

Answer: A,B,D

Explanation:

One big disadvantage of STP is the low convergence which is very important in switched network. To overcome this problem, in 2001, the IEEE with document 802.1w introduced an evolution of the Spanning Tree Protocol: Rapid Spanning Tree Protocol (RSTP), which significantly reduces the convergence time after a topology change occurs in the network. While STP can take 30 to 50 seconds to transit from a blocking state to a forwarding state, RSTP is typically able to respond less than 10 seconds of a physical link failure.

RSTP works by adding an alternative port and a backup port compared to STP. These ports are allowed to immediately enter the forwarding state rather than passively wait for the network to converge.

RSTP bridge port roles:

* Root portu2013 A forwarding port that is the closest to the root bridge in terms of path cost

* Designated portu2013 A forwarding port for every LAN segment

* Alternate portu2013 A best alternate path to the root bridge. This path is different than using the root port. The alternative port moves to the forwarding state if there is a failure on the designated port for the segment.

* Backup portu2013 A backup/redundant path to a segment where another bridge port already connects. The backup port applies only when a single switch has two links to the same segment (collision domain). To have two links to the same collision domain, the switch must be attached to a hub.

* Disabled portu2013 Not strictly part of STP, a network administrator can manually disable a port.


Question No: 18

Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.)

A. show interface trunk

B. show interface interface

C. show ip interface brief

D. show interface vlan

E. show interface switchport

Answer: A,E

Explanation:

Example output from these two commands: SW3#show interface trunk

Port Mode Encapsulation Status Native vlan Fa0/19 auto n-802.1q trunking 1

Fa0/20 auto n-802.1q trunking 1 Fa0/21 auto n-802.1q trunking 1 Fa0/22 auto n-802.1q trunking 1 Port Vlans allowed on trunk Fa0/19 1-4094

Fa0/20 1-4094

Fa0/21 1-4094

Fa0/22 1-4094

SW1#show interface fast 0/2 switchport Name: Fa0/2

Switchport: Enabled

Administrative Mode: dynamic desirable Operational Mode: down

Administrative Trunking Encapsulation: dot1q Negotiation of TrunkinG. On

Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Voice VLAN: none


Question No: 19

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

A. CHAP uses a two-way handshake.

B. CHAP uses a three-way handshake.

C. CHAP authentication periodically occurs after link establishment.

D. CHAP authentication passwords are sent in plaintext.

E. CHAP authentication is performed only upon link establishment.

F. CHAP has no protection from playback attacks.

Answer: B,C

Explanation:

CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).

Topic 9, Infrastructure Services

765.Which IPv6 address is the equivalent of the IPv4 interface loopback address 127.0.0.1?

A. ::1

B. ::

C. 2000::/3

D. 0::/10


Question No: 20

Refer to the exhibit.

At the end of an RSTP election process, which access layer switch port will assume the discarding role?

A. Switch3, port fa0/1

B. Switch3, port fa0/12

C. Switch4, port fa0/11

D. Switch4, port fa0/2

E. Switch3, port Gi0/1

F. Switch3, port Gi0/2

Answer: C

Explanation:

In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4.

Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior to another if it has:

1. A lower Root Bridge ID

2. A lower path cost to the Root

3. A lower Sending Bridge ID

4. A lower Sending Port ID

These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role).


Question No: 21

Which command is used to enable CHAP authentication, with PAP as the fallback method, on a serial interface?

A. Router(config-if)# ppp authentication chap fallback ppp

B. Router(config-if)# ppp authentication chap pap

C. Router(config-if)# authentication ppp chap fallback ppp

D. Router(config-if)# authentication ppp chap pap

Answer: B

Explanation:

This command tells the router first to use CHAP and then go to PAP if CHAP isn't available.


Question No: 22

A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

A. It checks the configuration register.

B. It attempts to boot from a TFTP server.

C. It loads the first image file in flash memory.

D. It inspects the configuration file in NVRAM for boot instructions.

Answer: A

Explanation:

Default (normal) Boot Sequence

Power on Router - Router does POST - Bootstrap starts IOS load - Check configuration register to see what mode the router should boot up in (usually 0x2102 to read startup- config in NVRAM / or 0x2142 to start in "setup-mode") - check the startup-config file in NVRAM for boot-system commands - load IOS from Flash.


Question No: 23

What does a Layer 2 switch use to decide where to forward a received frame?

A. source MAC address

B. source IP address

C. source switch port

D. destination IP address

E. destination port address

F. destination MAC address

Answer: F

Explanation:

When a frame is received, the switch looks at the destination hardware address and finds the interface if it is in its MAC address table. If the address is unknown, the frame is broadcast on all interfaces except the one it was received on.


P.S. Easily pass 200-125 Exam with Examcollection Pinpoint Dumps & pdf vce, Try Free: http://www.examcollectionuk.com/200-125-vce-download.html (889 New Questions)