Ensurepass
2017 July Cisco Official New Released 200-125 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/200-125.html

CCNA Routing and Switching v3.0

QUESTION 341

What is the first step in the NAT configuration process?

 

A.

Define inside and outside interfaces.

B.

Define public and private IP addresses.

C.

Define IP address pools.

D.

Define global and local interfaces.

 

Correct Answer: A

 

 

QUESTION 342

Which two commands can you enter to verify that a configured NetFlow data export is operational? (Choose two.)

 

A.

show ip flow export

B.

show ip cache flow

C.

ip flow ingress

D.

ip flow egress

E.

interface ethernet 0/0

F.

ip flow-export destination

 

Correct Answer: AB

 

 

 

 

 

QUESTION 343

Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)

 

clip_image001

 

< tr style="mso-yfti-irow: 3">

A.

It ensures that data will be forwarded by RouterB.

B.

It provides stability for the OSPF process on RouterB.

C.

It specifies that the router ID for RouterB should be 10.0.0.1.

D.

It decreases the metric for routes that are advertised from RouterB.

E.

It indicates that RouterB should be elected the DR for the LAN.

 

Correct Answer: BC

Explanation:

A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) – The router-ID is chosen in the order below:

 

clip_image003The highest IP address assigned to a loopback (logical) interface.

clip_image003[1]If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

 > The loopback interface will be chosen as the router ID of RouterB

 

 

QUESTION 344

Which two features can dynamically assign IPv6 addresses? (Choose two.)

 

A.

IPv6 stateless autoconfiguration

B.

DHCP

C.

NHRP

D.

IPv6 stateful autoconfiguration

E.

ISATAP tunneling

 

Correct Answer: AB

 

 

QUESTION 345

Which NAT function can map multiple inside addresses to a single outside address?

 

A.

PAT

B.

SFTP

C.

RARP

D.

ARP

E.

TFTP

 

Correct Answer: A

 

 

QUESTION 346

Which command can you enter to view the ports that are assigned to VLAN 20?

 

A.

Switch#show vlan id 20

B.

Switch#show ip interface brief

C.

Switch#show interface vlan 20

D.

Switch#show ip interface vlan 20

 

Correct Answer: A

 

 

QUESTION 347

Which technology can en
able multiple VLANs to communicate with one another?

 

A.

inter-VLAN routing using a Layer 3 switch

B.

inter-VLAN routing using a Layer 2 switch

C.

intra-VLAN routing using router on a stick

D.

intra-VLAN routing using a Layer 3 switch

 

Correct Answer: A

 

 

QUESTION 348

What are two requirements for an HSRP group? (Choose two.)

 

< td style="border-top-style: none; border-left-style: none; background: white; border-bottom-style: none; padding-bottom: 0cm; padding-top: 0cm; border-right-style: none; padding-left: 0cm; padding-right: 0cm" valign="top" width="26">

A.

exactly one active router

B.

one or more standby routers

C.

one or more backup virtual routers

D.

exactly one standby active router

E.

exactly one backup virtual router

 

Correct Answer: AB

 

 

QUESTION 349

What should be part of a comprehensive network security plan?

 

A.

Allow users to develop their own approach to network security.

B.

Physically secure network equipment from potential access by unauthorized individuals.

C.

Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.

D.

Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

E.

Minimize network overhead by deactivating automatic antivirus client updates.

 

Correct Answer: B

Explanation:

Computer systems and networks are vulnerable to physical attack; therefore, procedures should be implemented to ensure that systems and networks are physically secure. Physical access to a system or network provides the opportunity for
an intruder to damage, steal, or corrupt computer equipment, software, and information. When computer systems are networked with other departments or agencies for the purpose of sharing information, it is critical that each party to the network take appropriate measures to ensure that its system will not be physically breached, thereby compromising the entire network. Physical security procedures may be the least expensive to implement but can also be the most costly if not implemented. The most expensive and sophisticated computer protection software can be overcome once an intruder obtains physical access to the network.

 

 

QUESTION 350

Which command can you use to set the hostname on a switch?

 

A.

switch-mdf-c1(config)#hostname switch-mdf1

B.

switch-mdf-c1>hostname switch-mdf1

C.

switch-mdf-c1#hostname switch-mdf1

D.

switch-mdf-c1(config-if)#hostname switch-mdf1

 

Correct Answer: A

100
% Free Download!

—Download Free Demo:200-125 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 200-125 Full Exam PDF and VCE Q&As:635
—Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE