Ensurepass

CCNA Routing and Switching v3.0

 

QUESTION 311

What are three broadband wireless technologies? (Choose three.)

 

A.

WiMax

B.

satellite Internet

C.

municipal Wi-Fi

D.

site-to-site VPN

E.

DSLAM

F.

CMTS

 

Correct Answer: ABC

 

 

QUESTION 312

Which three characteristics are representative of a link-state routing protocol? (Choose three.)

 

A.

provides common view of entire topology

B.

exchanges routing tables with neighbors

C.

calculates shortest path

D.

utilizes event-triggered updates

E.

utilizes frequent periodic updates

 

Correct Answer: ACD

 

 

QUESTION 313

Which protocol advertises a virtual IP address to facilitate transparent failover of a Cisco routing device?

 

A.

FHRP

B.

DHCP

C.

RSMLT

D.

ESRP

 

Correct Answer: A

 

 

QUESTION 314

Which command can you enter to determine whether a switch is operating in trunking mode?

 

A.

show ip interface brief

B.

show vlan

C.

show interfaces

D.

show interface switchport

 

Correct Answer: D

 

 

QUESTION 315

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

 

A.

NAT

B.

NTP

C.

RFC 1631

D.

RFC 1918

 

Correct Answer: A

 

 

QUESTION 316

What are three characteristics of satellite Internet connections? (Choose three.)

 

A.

Their upload speed is about 10 percent of their download speed.

B.

They are frequently used by rural users without access to other high-speed connections.

C.

They are usually at least 10 times faster than analog modem connections.

D.

They are usually faster than cable and DSL connections.

E.

They require a WiMax tower within 30 miles of the user location.

F.

They use radio waves to communicate with cellular phone towers.

 

Correct Answer: ABC

 

 

QUESTION 317

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary switch can take over?

 

A.

a switch with priority 20480

B.

a switch with priority 8192

C.

a switch with priority 4096

D.

a switch with priority 12288

 

Correct Answer: A

QUESTION 318

Which three statements about IPv6 prefixes are true? (Choose three.)

 

A.

FF00:/8 is used for IPv6 multicast.

B.

FE80::/10 is used for link-local unicast.

C.

FC00::/7 is used in private networks.

D.

2001::1/127 is used for loopback addresses.

E.

FE80::/8 is used for link-local unicast.

F.

FEC0::/10 is used for IPv6 broadcast.

 

Correct Answer: ABC

 

 

QUESTION 319

Which command can you enter to display the hits counter for NAT traffic?

 

A.

show ip nat statistics

B.

debug ip nat

C.

show ip debug nat

D.

clear ip nat statistics

 

Correct Answer: A

 

 

QUESTION 320

Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)

 

A.

tty password

B.

enable secret password

C.

vty password

D.

aux password

E.

console password

F.

username password

 

Correct Answer: BC

Explanation:

Telnet presents a potential security risk, so Telnet uses vty for connecting a remote Cisco switch. For access security, the vty password and enable password must be configured.

 

Free VCE & PDF File for Cisco 200-125 Practice Test

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …