Ensurepass
2017 July Cisco Official New Released 200-125 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/200-125.html

CCNA Routing and Switching v3.0

QUESTION 221

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?

 

A.

192.168.252.0 255.255.255.252

B.

192.168.252.8 255.255.255.248

C.

192.168.252.8 255.255.255.252

D.

192.168.252.16 255.255.255.240

E.

192.168.252.16 255.255.255.252

 

Correct Answer: B

Explanation:

A subnet mask of 255.255.255.248 will allow for up to 6 hosts to reside in this network. A subnet mask of 255.255.255.252 will allow for only 2 usable IP addresses, since we cannot use the network or broadcast address.

 

 

 

 

QUESTION 222

Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)

 

A.

Emergencies

B.

Alerts

C.

Critical

D.

Errors

E.

Warnings

 

Correct Answer: ABCD

Explanation:

The Message Logging is divided into 8 levels as listed below:

 

Level Keyword Description

0 emergencies System is unusable

1 alerts Immediate action is needed

2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

 

The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.

 

 

QUESTION 223

What are the Popular destinations for syslog messages to be saved? (Choose three)

 

A.

Flash

B.

The logging buffer .RAM

C.

The console terminal

D.

Other terminals

E.

Syslog server

 

Correct Answer: BCE

Explanation:

By default, switches send the output from system messages and debug privileg
ed EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.

Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename.

 

 

QUESTION 224

In a GLBP network, who is responsible for the ARP request?

 

A.

AVF

B.

AVG

C.

Active Router

D.

Standby Router

 

Correct Answer: B

Explanation:

Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address. The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.

Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

 

 

QUESTION 225

Which statement is correct regarding the operation of DHCP?

 

A.

A DHCP client uses a ping to detect address conflicts.

B.

A DHCP server uses a gratuitous ARP to detect DHCP clients.

C.

A DHCP client uses a gratuitous ARP to detect a DHCP server.

D.

If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

E.

If an address conflict is detected, the address is removed from the pool for an amount of time configurable by the administrator.

F.

If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted.

 

Correct Answer: D

Explanation:

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html

 

 

QUESTION 226

What are three approaches that are used when migrating from an IPv4 addressing scheme to an IPv6 scheme. (Choose three.)

 

A.

enable dual-stack routing

B.

configure IPv6 directly

C.

configure IPv4 tunnels between IPv6 islands

D.

use proxying and translation to translate IPv6 packets into IPv4 packets

E.

statically map IPv4 addresses to IPv6 addresses

F.

use DHCPv6 to map IPv4 addresses to IPv6 addresses

 

Correct Answer: ACD

Explanation:

Several methods are used terms of migration including tunneling, translators, and dual stack. Tunnels are used to carry one protocol inside another, while translators simply translate IPv6 packets into IPv4 packets. Dual stack uses a combination of both native IPv4 and IPv6. With dual stack, devices are able to run IPv4 and IPv6 together and if IPv6 communication is possible that is the preferred protocol. Hosts can simultaneously reach IPv4 and IPv6 content.

 

 

QUESTION 227

Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)

 

clip_image001

 

A.

host A IP address: 192.168.1.79

B.

host A IP address: 192.168.1.64

C.

host A default gateway: 192.168.1.78

D.

host B IP address: 192.168.1.128

E.

host B default gateway: 192.168.1.129

F.

host B IP address: 192.168.1.190

 

Correct Answer: ACF

Explanation:

It’s a “router-on-a-stick” configuration. Which means each host in the VLAN must corresponds with the VLAN configured on the sub-interfaces.

VLAN 10 is configured on fa0/0.10 and VLAN 20 on fa0/0.20. So each hosts in VLAN 10 must use fa0/0.10 IP address as their default gateway, each hosts must also be in the same subnet as fa0/0.10 IP – same with hosts in VLAN 20.

So find out the usable IP addresses on each sub-interfaces – for 192.168.1.78 /27: 192.168.1.65 – .94 and for 192.168.1.130 /26: 192.168.1.128 – .190.

Host A (using port 6 – VLAN 10) must use IP 192.168.1.79, default gateway 192.168.1.78.

Host B (using port 9 – VLAN 20) must use IP 192.168.1.190, default gateway 192.168.1.130.

 

 

 

 

 

 

 

 

 

 < /font>

QUESTION 228

Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)

 

clip_image002

 

A.

Network A – 172.16.3.48/26

B.

Network A – 172.16.3.128/25

C.

Network A – 172.16.3.192/26

D.

Link A – 172.16.3.0/30

E.

Link A – 172.16.3.40/30

F.

Link A – 172.16.3.112/30

 

Correct Answer: BD

Explanation:

Only a /30 is needed for the point to point link and sine the use of the ip subnet-zero was used, 172.16.3.0/30 is valid. Also, a /25 is required for 120 hosts and again 172.16.3.128/25 is the best, valid option.

 

 

QUESTION 229

What are the alert messages generated by SNMP agents called?

 

A.

TRAP

B.

INFORM

C.

GET

D.

SET

 

Correct Answer: AB

Explanation:

A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they’re unacknowledged so you don’t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.

 

QUESTION 230

Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three.)

 

clip_image003

 

A.

The subnet mask in use is 255.255.255.192.

B.

The subnet mask
in use is 255.255.255.128.

C.

The IP address 172.16.1.25 can be assigned to hosts in VLAN1

D.

The IP address 172.16.1.205 can be assigned to hosts in VLAN1

E.

The LAN interface of the router is configured with one IP address.

F.

The LAN interface of the router is configured with multiple IP addresses.

 

Correct Answer: BCF

Explanation:

The subnet mask in use is 255.255.255.128: This is subnet mask will support up to 126 hosts, which is needed.

The IP address 172.16.1.25 can be assigned to hosts in VLAN1: The usable host range in this subnet is 172.16.1.1-172.16.1.126

The LAN interface of the router is configured with multiple IP addresses: The router will need 2 subinterfaces for the single physical interface, one with an IP address that belongs in each VLAN.

100% Free Download!
—Download Free Demo:200-125 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 200-125 Full Exam PDF and VCE Q&As:635
—Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE