Documente Academic
Documente Profesional
Documente Cultură
2. Which value must you configure on a device before EIGRP for IPv6 can start running?
A. process ID
B. loopback interface
C. public IP address
D. router ID
3. Which are valid modes for a switch port used as a VLAN trunk? (Choose three.)
A. transparent
B. blocking
C. forwarding
D. desirable
E. on
F. auto
5. Which feature is configured by setting a variance that is at least two times the metric?
A. path selection
B. equal cost load balancing
C. path count
D. unequal cost load balancing
6. When you troubleshoot an IPv4 connectivity issue on a router, which three router
configuration checks you must perform? (Choose three.)
A. Verify that the router firmware is up-to-date.
B. Verify that a default route is configured
C. Verify that the router interface IP address is correct
D. Verify that the router and the host use the same subnet mask
E. Verify that the route appears in the routing table.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
7. Which three statements about link-state routing are true? (Choose three.)
A. Updates are sent to a broadcast address
B. OSPF is a link-state protocol.
C. Routes are updated when a change in topology occurs.
D. It uses split horizon.
E. Updates are sent to a multicast address by default.
F. RIP is a link-state protocol.
8. What are the possible trunking modes for a switch port? (Choose three.)
A. on
B. desirable
C. client
D. auto
E. forwarding
F. transparent
9. Refer to the exhibit. Which of these statements correctly describes the state of the
switch once the boot process has been completed?<br>
10. Which state does the port-channel interface enter when LACP is misconfigured on the
interface?
A. disabled
B. errdisable
C. enabled
D. forwarding
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
11. When an interface is configured with PortFast BPDU guard, how does the interface
respond when it receives a BPDU?
A. It goes into an errdisable state
B. It continues operating normally.
C. It goes into a down/down state
D. It becomes the root bridge for the configured VLAN
12. Which two statements about MPLS are true? (Choose two.)
A. It uses labels to separate and forward customer traffic.
B. It encapsulates all traffic m an IPv4 header
C. It provides automatic authentication.
D. It can carry mutiple protocols, including IPv4 and IPv6
E. It tags customer traffic using 802.1q
D. forwarding
16. Which three options are switchport configurations that can always avoid duplex
mismatch errors between two switches? (Choose three.)
A. Set both sides of the connection to full duplex
B. Set one side of the connection to auto negotiate and the other side to half duplex
C. Set one side of the connection to auto-negotiate and the other side of full duplex
D. Set both sides of the connection to auto negotiate
E. Set both sides of the connection to half duplex
F. Set one side of the connection to full duplex and the other side to half duplex
17. For which two reasons might you choose chassis aggregation instead of stacking
switches? (Choose two.)
A. to increase the maximum port count
B. to avoid the use of a centralized configuration manager
C. to increase the number of device in use
D. to avoid relying society on Ethernet interfaces
E. to allow host-swapping modules
18. Which task must you perform to enable an IOS device to use DNS services?
A. Configure the relay agent information option
B. Configure a name server.
C. Configure a relay agent information reforwarding policy
D. Configure manual bindings
19. Which two statements about configuring an EtherChannel on a Cisco switch are true?
(Choose two.)
A. The interfaces configured in the EtherChannel must operate at the speed and duplex mode.
B. The interfaces configured in the EtherChannel must be on the same physical switch.
C. The interfaces configured in the EtherChannel must be part of the same VLAN or trunk.
D. The interfaces configured in the EtherChannel must have same STP port path cost
E. An EtherChannel can operate in Layer 2 mode only.
20. Which two statements about Cisco Discovery Protocol are true? (Choose two.)
A. It runs on the data link layer only
B. It uses SNMP to share device information to an external server.
C. It is used to initiate a VTP server and client relationship.
D. It uses TLVs to share device information
E. It runs on the network layer and the data link layer.
21. Which two criteria must be met to support the ICMP echo IP SLA? (Choose two.)
A. The destination device must support the echo protocol
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. The source device must be a Cisco device but the destination device can be from any vendor.
C. A default gateway must be configured for the Source and destination devices
D. The Source and destination devices must be Cisco devices.
E. The source device must be running Layer 2 services.
22. Which two statements about EUl-64 addressing are true? (Choose two.)
A. The addresses includes the hex digits FFFE after the first 24 bits of the interface MAC address
B. A 96-bit interface identifier is derived from the interface MAC address
C. A 64-bit interface identifier is derived from the interface MAC address.
D. The address includes the hex digits FFFE after the last 24 bits of the interface MAC address
E. A locally administered addresses has the universal/local bit set to 0.
23. If you change the weight and distance parameters on a device with an established
BGP neighbour, which additional task must you perform to allow the two devices to
continue exchange routers?
A. Reset the BGP connections on the device.
B. Reset the gateway interface.
C. Clear the IP routes on the device
D. Change the weight and distance settings on the other device to match
24. Which two statements about IPV6 anycast addresses are true? (Choose two.)
A. They are allocated from the IPv6 broadcast address space
B. They use the prefix FC00::/8
C. They receive packets on the closest interface that is discovered by the routing protocol.
D. They are allocated from the IPv6 unicast address space.
E. They are used in conjuction with the source-specific multicast for IPv6
25. Which two QoS tools can provide congestion management? (Choose two.)
A. PQ
B. CAR
C. FRTS
D. CBWFQ
E. PBR
26. Which two features can you enable on a switch to capture and analyze frames that
transit an interface? (Choose two.)
A. SNMP
B. IP SLA
C. SPAN
D. NetFlow
E. RSPAN
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
27. Which two characteristics of an ICMP echo-based IP SLA are true? (Choose two.)
A. It can use RSPAN to report network statistics to a designated remote port.
B. It aggregates traffic statistic for reporting on a configuration basis.
C. It requires a remote device to log and rnaintain collected data.
D. It generates continuous traffic to monitor network performance
E. It measures traffic to determine the reliability of a connection from a Cisco router to a designated
end device.
28. Which two benefits of implementing a full-mesh WAN topology are true? (Choose
two.)
A. reliability
B. improved scalability
C. reduce jitter
D. redundancy
E. increased latency
29. Which two addresses are defined as private IP addresses? (Choose two.)
A. 10.172.76.200
B. 172.15.2.250
C. 192.169.32.10
D. 172.31.255.100
E. 12.17.1.20
30. Which two statements about stacking Cisco switches are true? (Choose two.)
A. Each switch manages its own MAC address table
B. When a new master switch is elected It queries the previous master for its running configuration
C. The administrator can create only one stack of switch of switches in a network which is under the
same administrative domain
D. The administrator can add additional switches to the stack as demand increases
E. It enables the administrator to manage multiple switches from a single management interface.
32. Which two statements about stateful firewalls in an enterprise network are true?
(Choose two.)
A. They are most effective when placed in front of the router connected to the Internet.
B. They can track the number of active TCP connections
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
33. Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?
A. NHRP
B. NDP
C. ARP
D. CLNS
E. TCPv6
34. In which STP state does MAC address learning take place on a PortFast-enabled port?
A. forwarding
B. learning
C. discarding
D. listening
35. What is the most efficient subnet mask for a point to point ipv6 connection?
A. /32
B. /48
C. /64
D. /127
E. /128
36. Which two pieces of information can be shared with LLDP TLVs? (Choose two)
A. spanning-tree topology
B. access-list configuration
C. routing configuration
D. device type
E. device management address.
37. After you configure the ip dns spoofing command globally on a device, under which
two conditions is DNS spoofing enabled on the device? (Choose two.)
A. All configured IP name server addresses are removed
B. The no ip domain lookup command is configured
C. The ip dns spoofing command is disabled on the local interface
D. The DNS server queue limit is disabled.
E. The ip host command is disabled.
B. outside global
C. inside global
D. inside local
E. outside local
F. outside public
39. Which two statements about LLDP are true? (Choose two.)
A. It is a Cisco-proprietary technology
B. It uses mandatory TLVs to discover the neighboring devices.
C. It functions at Layer 2 and Layer 3.
D. It enables systems to learn about one another over the data-link layer.
E. It is implemented in accordance with the 802.11 a specification
40. Which commands can you can enter to verify that a router is synced with a configured
time source?
A. ntp authenticate
B. show ntp authenticate
C. show ntp associations
D. ntp associations
E. ntp server timer
41. A network administrator enters the following command on a router: logging trap 3.
What are three message types that will be sent to the Syslog server? (Choose three.)
A. debug
B. informational
C. warning
D. error
E. emergency
F. critical
42. What is the danger of the permit any entry in a NAT access list?
A. It can disable the overload command.
B. It can lead to overloaded resources on the router
C. It prevents the correct translation of IP addresses on the inside network.
D. it can cause too many addresses to be assigned to the same interface.
43. Which two benefits can you get by stacking Cisco switches? (Choose two.)
A. You can license the entire stack with a single master license
B. Each switch in the stack handles the MAC table independently from the others.
C. You can add or remove switches without talking the stack down.
D. The stack enables any active member to talk over as the master switch if the existing master fails.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
44. Which configuration register value can you set on a Cisco device so that it ignores the
NVRAM when it boots?
A. 0x2124
B. 0x2102
C. 0x2142
D. 0x2120
45. What SNMP message alerts the manager to a condition on the network?
A. capture
B. get
C. response
D. trap
47. Which NAT function can map multiple inside addresses to a single outside address?
A. PAT
B. ARP
C. TFTP
D. SFTP
48. Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true?
(Choose three)
A. The global ID is 14920bf83d
B. The global ID is 4079
C. The address is a unique local address
D. The subnet ID is 4079
E. The address is a link-local address
F. The subnet ID is 14920bf83d
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
A network technician
is asked to design a small network with redundancy. The exhibit represents this
design, with all hosts configured in the same VLAN. What conclusions can be made
about this design?
A. The router interfaces must be encapsulated with the 802.1Q protocol.
B. This design will function as intended
C. The router will not accept the addressing scheme.
D. The connection between switches should be a trunk.
E. Spanning-tree will need to be used
Which three
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
ports will be STP designated ports if all the links are operating at the same
bandwidth? (Choose three.)
A. Switch C - Fa0/1
B. Switch A - Fa0/0
C. Switch B - Fa0/0
D. Switch A - Fa0/1
E. Switch B - Fa0/1
F. Switch C - Fa0/0
53. Which command can you enter to display duplicate IP addresses that the DHCP server
assigns?
A. show ip dhcp binding 10.0.2.12
B. show ip dhcp conflict 10.0.2.12
C. show ip dhcp server statistics
D. show ip dhcp database 10.0.2.12
A new subnet
with 60 hosts has been added to the network. Which subnet address should this
network use to provide enough usable addresses while wasting the fewest
addresses?
A. 192.168.1.64/27
B. 192.168.1.56/27
C. 192.168.1.64/26
D. 192.168.1.56/26
55. Refer to the exhibit<br> Each of these four switches has been configured with a
hostname, as well as being configured to run RSTP. No other configuration changes
have been made. Which three of these show the correct RSTP port roles for the
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
If the devices produced the given output, what is the cause of the EtherChannel
problem?
A. There is an MTU mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.
B. SW1's Fa0/1 interface is administratively shut down.
C. There is an encapsulation mismatch between SW1 's Fa0/1 and SW2's Fa0/1 interfaces
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
D. There is a speed mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.
57. Which two features can dynamically assign IPv6 addresses? (Choose two.)
A. NHRP
B. IPv6 stateless autoconfiguratlon
C. DHCP
D. IPv6 stateful autocorfiqurauon
E. ISATAP tunneling
58. Which two types of NAT addresses are used in a Cisco NAT device? (Choose two.)
A. inside private
B. outside private
C. inside local
D. external global
E. inside global
F. external local
59. Which three commands are required to enable NTP authentication on a Cisco router?
(Choose three).
A. ntp authentication-key
B. ntp authenticate
C. ntp max-associations
D. ntp peer
E. ntp trusted-key
F. ntp refclock
60. Which two IP SLA operations can you use to measure the end-to-end response time
for all IP traffic between a Cisco router and an end device?
A. UDP echo
B. UDP Jitter
C. TCP connect
D. ICMP path echo
E. ICMP path Jitter
F. ICMP echo
61. Which three statements about Syslog utilization are true? (Choose three.)
A. Enabling Syslog on a router automatically enables NTP for accurate time stamping.
B. Utilizing Syslog improves network performance.
C. There are more Syslog messages available within Cisco IOS than there are comparable SNMP
trap messages.
D. A Syslog server provides the storage space necessary to store log fies without using router disk
space.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
62. Which three statements about IPv6 prefixes are true? (Choose three.)
A. FE80::/8 is used for link-local unicast
B. FE80::/10 is used for link-local unicast
C. 2001::1/127 is used for loopback addresses.
D. FECO::/10 is used for IPv6 broadcast
E. FF00:/8 is used for IPv6 multicast
F. FC00::/7 is used in private networks.
63. Which logging command can enable administrators to correlate syslog messages with
millisecond precision?
A. logging host 10.2.0.21
B. logging buffered 4
C. no logging console
D. no logging monitor
B. SwitchA is not the root bridge, because not all of the interface roles are designated.
C. The Fa0/11 role confirms that SwitchA rs the root bridge for VLAN 20
D. VLAN 20 is running the Per VLAN Spanning Tree Protocol.
All hosts have connectivity with one another. Which statements describe the
addressing scheme that is in use in the network? (Choose three.)
A. The LAN interface of the router is configured with multiple IP addresses
B. The IP address 172.16.1.25 can be assigned to hosts in VLAN1
C. The subnet mask in use is 255.255.255.128
D. The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E. The LAN interface of the router is configured with one IP address.
F. The subnet mask in use is 255.255.255.192
67. Which Layer 2 protocol encapsulation type supports synchronous and asynchronous
circuits and has built-in security mechanisms?
A. PPP
B. X.25
C. Frame Relay
D. HDLC
69. Which command can you enter to determine whether serial interface Serial 0/2/0 has
been configured using HDLC encapsulation?
A. router#show platform
B. router#show interfaces Serial 0/2/0
C. router#show ip interface Serial 0/2/0
D. router#show ip interface brief
70. Which of the following correctly describe steps in the OSI data encapsulation
process? (Choose two.)
A. The data link layer adds physical source and destination addresses and an FCS to the segment
B. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment
C. The presentation layer translates bits into voltages for transmission across the physical link.
D. Packets are created when the network layer encapsulates a frame with source and destination
host addresses and protocol-related control information
E. The transport layer divides a data stream into segments and may add reliability and flow control
information.
71. What are three characteristics of the TCP protocol? (Choose three.)
A. It requires applications to determine when data packets must be retransmitted
B. It uses separate SYN and ACK messages to establish a connection.
C. It supports significantly higher transmission speeds than UDP
D. The connection is established before data is transmitted.
E. It uses a single SYN-ACK message to establish a connection
F. It ensures that all data is transmitted and received by the remote device
72. Which command would you configure globally on a Cisco router that would allow you
to view directly connected Cisco devices?
A. cdp run
B. cdp enable
C. enable run
D. run cdp
74. Which three circumstances can cause a GRE tunnel to be in an up/down state?
(Choose three.)
A. The tunnel interface IP address is misconfigured
B. The tunnel address is routed through the tunnel itself
C. A valid route to the destination address is missing from the routing table.
D. The ISP is blocking the traffic
E. An ACL is blocking the outbound traffic
F. The tunnel interface is down.
75. Which two statements about IPv4 multicast traffic are true? (Choose two.)
A. It uses a minimum amount of network bandwidth
B. It burdens the source host without affecting remote hosts
C. It is the most efficient way to deliver data to multiple receivers.
D. It is bandwidth-intensive.
E. It simultaneously delivers multiple streams of data
76. Which step in the router boot process searches for an IOS image to load into the
router?
A. bootstrap
B. ROMMON mode
C. POST
D. mini-lOS
78. Which two statements about IPv6 and routing protocols are true? (Choose two.)
A. Link-local addresses are used to form routing adjacencies
B. EIGRPv3 was developed to support IPv6 routing.
C. Loopback addresses are used to form routing adjacencies.
D. EIGRP, OSPF and BGP are the only routing protocols that support IPv6.
E. OSPFv3 was developed to support IPv6 routing
79. Which type of device can be replaced by the use of subinterfaces for VLAN routing?
A. router
B. Layer 3 switch
C. Layer 2 switch
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
D. Layer 2 bridge
80. Which interface counter can you use to diagnose a duplex mismatch problem?
A. runts
B. deferred
C. late collisions
D. CRC errors
E. giants
F. no earner
82. When a router is unable to find a known route in the routing table, how does it handle
the packet?
A. It sends the packet to the gateway of the last resort
B. It discards the packet
C. It sends the packet over the route with the best metric.
D. It sends the packet to the next hop address
Which command can you enter to verify link speed and duplex setting on the
interface?
A. router#show ip protocols
B. router#show startup-config
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
84. Which type of routing protocol operates by exchanging the entire routing information?
A. exterior gateway protocols
B. distance-vector protocols
C. path-vector protocols
D. link-state protocols
85. When troubleshooting client DNS issues, which two tasks must you perform? (Choose
two)
A. Determine whether the hardware address is correct.
B. Determine whether the name servers have been configured.
C. Determine whether a DHCP address has been assigned.
D. Ping a public website IP address.
E. Ping the DNS server.
86. Which two steps must you perform on each device that is configured for IPv4 routing
before you implement OSPFv3? (Choose two.)
A. Configure a loopback interface.
B. Configure an autonomous system number.
C. Enable IPv6 on an interface.
D. Configure a router ID.
E. Enable IPv6 unicast routing.
89. Which two statements about late collisions are true? (Choose two.)
A. By definition, they occur after the 512th bit of the frame has been transmitted
B. They may indicate a duplex mismatch
C. They are frames that exceed 1518 bytes
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
D. They occur when CRC errors and interference occur on the cable.
E. They indicate received frames that did not pass the FCS match
90. Which three statements accurately describe Layer 2 Ethernet switches? (Choose
three.)
A. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address
B. Switches that are configured with VLANs make forwardinq decisions based on both Layer 2 and
Layer 3 address information
C. Spanning Tree Protocol allows switches to automatically share VLAN information.
D. Microsegmentation decreases the number of collisions on the network
E. In a properly functioning network with redundant switched paths, each switched segment will
contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast
domain will have only one root port.
F. Establishing VLANs increases the number of broadcast domains
92. Which two options are fields is an Ethernet frame? (Choose two)
A. frame check sequence
B. destination IP address
C. source IP address
D. header
E. type
93. Which two statements about Ethernet standards are true? (Choose two.)
A. Ethernet is defined by IEEE standard 802.2
B. Ethernet is defined by IEEE standard 802.3
C. Ethernet 10BASE-T does not support full-duplex
D. When an Ethernet network uses CSMA/CA, it terminates transmission as soon as a collision
occurs
E. When an Ethernet network uses CSMA/CD, it terminates transmission as soon as a collision
occurs
94. Which symptom most commonly indicates that two connecting interfaces are
configured with a duplex mismatch?
A. an interface with a down/down status
B. collisions on the interface
C. the spanning-tree process shutting down
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
97. Which two statements about firewalls are true? (Choose two.)
A. They can be used with an intrusion prevention system
B. They can limit unauthorized user access to protected data
C. They can prevent attacks from the Internet only
D. They must be placed only at locations where the private network connects to the Internet
E. Each wireless access point requires its own firewall
98. Which port security mode can assist with troubleshooting by keeping count of
violations?
A. protect
B. shutdown
C. restrict
D. access
100. Which three options are types of IPv6 static routes? (Choose three.)
A. recursive static routes
B. redistributed static routes
C. fully specified static routes
D. directly connected static routes
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
101. Which two options are requirements for configuring RIPv2 on an IPv4 network
router? (Choose two.)
A. connecting RIP to a WAN interface
B. enabling RIP on the router
C. enabling automatic route summarization
D. enabling RIP authentication
E. allowing unicast updates for RIP
You have discovered that computers on the 19.168.10.0/24 network can ping their
default gateway, but they cannot connect to an resources on a remote network. Which
reason tor the problem is most likely true?
A. The OSPF area number is incorrect
B. The 192.168.12.0/24 network is missing from OSPF
C. The OSPF process ID is incorrect
D. An ARP table entry is missing for 192.168.10.0.
E. A VLAN number is incorrect for 192.168.10.0.
103. Which two options are primary responsibilties of the APIC-EM controller?
A. it automates network actions between legacy equipment
B. it tracks license usage and Cisco IOS versions
C. it automates network actions between different device types.
D. it provides robust asset management
E. it makes network functions programmable
104. Which two statements about TACACS+ are true? (Choose two.)
A. It authenticates against the user database on the local device.
B. It is enabled on Cisco routers by default
C. It can run on a UNIX server.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
105. Which type of cable must you use to connect two devices with MDI interfaces?
A. rolled
B. straight-through
C. crossover
D. crossed
106. Which two options describe benefits of aggregated chassis technology? (Choose
two)
A. It requires only one IP address per VLAN
B. It reduce management overhead
C. It requires only three IP addresses per VLAN
D. It supports redundant configuration files
E. It supports HSRP VRRP and GLBP
F. Switches can be located anywhere regardless of their physical distance from one another.
110. Which two options are features of the extended ping command? (Choose two.)
A. It can send packets from a specified interface or IP address
B. It can count the number of hops to the remote host
C. It can send a specified number of packets
D. It can ping multiple hosts as the same time
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
111. When you deploy Multiplelink PPP on your network, where you must configure the
group IP address on each device?
A. under the multi link interface
B. under the serial interface
C. under the routing protocol
D. in the global configuration
112. Which technology can provide security when connecting multiple sites across the
internet?
A. MPLS
B. site-to-site VPN
C. DMVPN
D. EBGP
113. Which port security violation mode allows traffic from valid MAC addresses to pass
but blocks traffic from invalid MAC address?
A. shutdown
B. shutdown VLAN
C. restrict
D. protect
116. Which two statements about data VLANs on access ports are true? (Choose two.)
A. Exactly one VLAN can be configured on the interface
B. They can be configured as host ports
C. Two or more VLANs can be configured on the interface
D. They can be configured as trunk ports
E. 802.1 Q encapsulation must be configured on the interface.
117. Which type of routing protocol operates by using first-hand information from each
device's peers?
A. exterior gateway protocols
B. link-state protocols
C. distance vector protocols
D. path vector protocols
118. A BPDU guard is configured on an interface that has PortFast enabled. Which state
does the interface enter when it receives a BPDU?
A. blocking
B. listening
C. errdisable
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
D. shutdown
119. Which three options are the major components of a network virtualization
architecture? (Choose three.)
A. path isolation
B. authentication services
C. network access control
D. network resilience
E. virtual network services
F. policy enforcement
Which command do you enter so that R1 advertises the Loopback0 interface to the
BGP peers?
A. network 172.16.1.32 0.0 0 31
B. network 172.16.1.0.0.0.255
C. network 172.16.1 32 255.255 255 224
D. network 172.16.1.33 mask 255.255.255.224
E. network 172.16.1.32 mask 255.255.255.224
F. network 172.16.1.32 mask 0.0.0.31
121. Which two statements about the extended traceroute command are true? (Choose
two.)
A. it can use a specified TTL value
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
122. For what two purposes does the Ethernet protocol use physical addresses?
(Choose two.)
A. to differentiate a Layer 2 frame from a Layer 3 packet
B. to allow communication with devices on a different network
C. to allow communication between different devices on the same network
D. to uniquely identify devices at Layer 2
E. to allow detection of a remote device when its physical address is unknown
F. to establish a priority system to determine which device gets to transmit first
125. Assuming the default switch configuration, which VLAN range can be added,
modified, and removed on a Cisco switch?
A. 2 through 1005
B. 1 through 1002
C. 2 through 1001
D. 1 through 1001
126. Which two states are the port states when RSTP has converged? (Choose two.)
A. disabled
B. listening
C. discarding
D. learning
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
E. forwarding
127. <br>How
should the FastEthemeto/1 ports on the 2950 model switches that are shown in the
exhibit be configured to allow connectivity between all devices?
A. SwitchX(config)# interface fastethernet 0/1<br>SwitchX(config-if)# switchport mode trunk
B. the ports only need to be connected by a crossover cable.
C. SwitchX(config)# intertace fastethemet 0/1<br>SwitchX(config-if)# swllchport node
trunk<br>SwitchX(config-if)# switchport trunk vlan 1<br>SwitchX(config-if)# switchport trunk vlan
10<br>SwitchX(config-if)# switchport trun ... vlan 20
D. SwilchX(config)# interface fastethemet 0/1<br>SwitchX(config-if)# switchport mode
access<br>SwitchX(config-if)# switchport access vlan 1
128. Where does routing occur within the DoD TCP/IP reference model?
A. internet
B. network
C. transport
D. application
129. Why do large OSPF networks use a hierarchical design? (Choose three.)
A. to reduce the complexity of router configuration
B. to reduce routing overhead
C. to confine network instability to single areas of the network
D. to lower costs by replacing routers with distribution layer switches
E. to speed up convergence
F. to decrease latency by increasing bandwidth
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
130. Which keyword enables an HSRP router to take the active role immediately when it
comes online?
A. Preempt
B. Version
C. Priority
D. IP address
Which two statements are true of the interfaces on Switch1? (Choose two.)
A. FastEthernet0/1 is connected to a host with multiple network interface cards.
B. FastEthernet0/5 has statically assigned MAC addresses.
C. Multiple devices are connected directly to FastEthernet0/1
D. FastEthernet0/1 is configured as a trunk link
E. Interface FastEthernet0/2 has been disabled
F. A hub is connected directly to FastEthernet0/5
134. Which three of these statements regarding 802.1Q trunking are correct? (Choose
three.)
A. 802.1 Q trunking ports can also be secure ports.
B. 802 1 Q trunks require full-duplex, point-to-point connectivity
C. 802.1 Q trunks should have native VLANs that are the same at both ends
D. 802 1 Q trunks can use 10 Mb/s Ethernet interfaces
E. 802.1 Q native VLAN frames are untagged by default.
136. Which of the following statements describe the network shown in the graphic?
(Choose two.)<br>
137. Which three statements about the features of SNMPv2 and SNMPv3 are true?
(Choose three.)
A. SNMPv3 enhanced SNMPv2 security features.
B. SNMPv2 added the Inform protocol message to SNMP.
C. SNMPv3 added the GetBulk protocol messages to SNMP
D. SNMPv2 added the GetBulk protocol message to SNMP
E. SNMPv2 added the GetNext protocol message to SNMP
F. SNMPv3 added the Inform protocol message to SNMP.
140. Which command can you enter on a switch to determine the current SNMP security
model?
A. show snmp group
B. show snmp pending
C. show snmp enginelD
D. snmp-server contract
141. What value is primarily used to determine which port becomes the root port on
each nonroot switch in a spanning-tree topology?
A. VTP revision number
B. highest port priority number
C. lowest port MAC address
D. path cost
E. port priority number and MAC address
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
143. Which three statements about HSRP operation are true? (Choose three.)
A. The HSRP default timers are a 3 second hello interval and a 10 second dead interval
B. HSRP supports up to 255 groups per interface, enabling an adrnirustranve form of load balancing.
C. The HSRP virtual IP address must be the same as one of the router's interface addresses on the
LAN.
D. The virtual IP address and virtual MAC+K44C address are active on the HSRP Master router.
E. HSRP supports only clear-text authentication
F. The HSRP virtual IP address must be on a different subnet than the routers' interfaces on the
same LAN.
145. Which two are advantages of static routing when compared to dynamic routing?
(Choose two)
A. Routing tables adapt automatically to topology changes
B. An efficient algorithm is used to build routing tables, using automatic updates
C. Routing updates are automatically sent to neighbors
D. Configuration complexity decreases as network size increases
E. Route summarization is computed automatically by the router
F. Security increases because only the network administrator may change the routing table.
G. Routing traffic load is reduced when used in stub network links
146. Which command can you enter to display the operational status of the network
ports on a router?
A. show interface status
B. show running-config interface fastethernet 0/1
C. show interface switchport
D. show ip interface brief
147. In an Ethernet network, under what two scenarios can devices transmit? (Choose
two.)
A. when there is a carrier
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
148. Which option is the benefit of implementing an intelligent DNS for a cloud
computing solution?
A. It eliminates the need for a GSS
B. It can redirect user requests to locations that are using fewer network resources.
C. It reduces the need for a backup data center
D. It enables the ISP to maintain DNS records automatically.
149. What are three features of the IPv6 protocol? (Choose three.)
A. no broadcasts
B. complicated header
C. autoconfiguration
D. checksums
E. optional IPsec
F. plug-and-play
151. Router R1 has a static route that is configured to a destination network. A directty
connected interface is configured with an IP address in the same destination network.
Which statement about R1 is true?
A. R1 prefers the directly connected interface
B. R1 refuses to advertise the dynamic route to the other neighbors
C. R1 sends a withdrawal notification to the neighboring router
D. R1 prefers the static route
152. How does a router handle an incoming packet whose destination network is
missing from the routing table?
A. it routes the packet to the default route
B. it discards the packet
C. it broadcasts the packet to each network on the router
D. it broadcasts the packet to each interface on the router
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
153. Which IEEE standard protocol is initated as a result of successful DTP completion
in a switch over Fast
A. 802.1W
B. 802.1Q
C. 802.1AD
D. 802.1D
157. A switch is configured with all ports assigned to VLAN 2 with full duplex
FastEthernet to segment existing departmental traffic. What is the effect of adding
switch ports to a new VLAN on the switch?
A. More bandwidth will be required than was needed previously
B. More collision domains will be created
C. IP address utilization will be more efficient
D. An addmonal broadcast domain will be created.
159. Which RPVST+ port state is excluded from all STP operations?
A. forwardinq
B. learning
C. blocking
D. disabled
160. To enable router on a stick on a router subinterface, which two steps must you
perform? (Choose two.)
A. Configure an IP route to the VLAN destmatiion network.
B. Configure encapsulation dot1q
C. Configure the subinterface with an IP address.
D. Configure full duplex and speed
E. Configure a default to the route traffic between suomtertaces.
161. While troubleshooting a GRE tunnel interface issue, show interface command
output displays tunnel status up, but line protocol is down. Which reason for this
problem is the most likely?
A. The route to the tunnel destination address is through the tunnel itself
B. The next hop server is misconfigured
C. The tunnel was just reset
D. The interface has been administratively shut down.
162. Which command can you use to test whether a switch supports secure
connections and strong authentication?
A. Router>ssh-v2-I admin 10.1.1.1
B. Router#ssh-v1-I admin 10.1.1.1
C. Switch>ssh-v1-I admin 10.1.1.1
D. Switch#ssh-l admin 10.1.1.1
163. Which type of access list compares source and destination IP addresses?
A. Extended
B. Standard
C. IP named
D. Reflexive
164. Which command is needed to send RIPv2 updates as broadcast when configured
for RIPv2?
A. IP RIP V2-BROADCAST
B. version 2
C. ip rip recevie version 1
D. ip rip receive version 2
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
165. Which two statements about GRE tunnels are true?(choose two)
A. They can operate in tunnel mode and transport mod
B. They provide privacy, integrity, and authenticity
C. They encapsulate the payload
D. They allow multicast traffic to traverse WAN circuits
167. Which two features can you enable on a switch to capture network traffic and
measure performance?(choose two)
A. SNMP
B. IP SLA
C. STP
D. ACL
E. SPAN
168. Which two features can mitigate spanning tree issues that are caused by broken
fiber cables on interswitch links?( choose two)
A. DTP
B. root guard
C. udld
D. tool guard
E. BPDU guard
169. In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three)
A. IPv6 headers eliminate the IPv4 checksum field.
B. IPv6 headers use a smaller Option field size than IPv4 headers
C. Unlike IPv4 headers, IPv6 headers have a fixed length.
D. IPv6 headers use the Fragment Offset field in place of the IPv4 Fragmentation field.
E. IPv6 uses an extension header instead of the IPV4 Fragmentation field
F. IPv6 header use a 4-bit TTL field, and IPv4 headers use an 8-bit TTL field
170. which utility can you use to identify redundant or shadow or shadow rules?
A. the ACL analysis tool in Cisco APIC-EM
B. the ACL trace tool in Cisco APIC-EM
C. the Cisco APIC-EM automation scheduler
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
171. which two statement about link-state routing protocols are true?(choose two)
A. each router determines its own path to a destination
B. each router shares a database of known routes
C. each router maintains its own unique routing database
D. each router is aware only of its neighbor routers
E. link-state routing protocols use split horizon to avoid routing loops
172. which command can you enter on a switch to display the IP addresses associated
with connected devices?
A. show cdp traffic
B. show cdp neighbors detail
C. Show cdp neighbors
D. show cdp interface
The network administrator normally established a Telnet session with the switch from
host A. However, host A is unavailable The administrator's attempt to telnet to the
switch from host B fails but pings to the other two hosts are successful. What is the
issue?
A. The switch interfceconneded to the router is down
B. The switch needs an appropriate default gateway assigned
C. Host B and the switch need to be in the same subnet
D. The switch interfaces need to appropriate IP address assigned
E. Host 8 needs to be assigned an IP address in VLAN1
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
175. After you configure a DHCP server on VLAN 10 to service clients on VLAN 20,
clients on vlan 10 are given IP address assignments, but clients on VLAN 20 fail to
recevie IP addresses , Which action must you take to correct the problem?
A. configure the DNS name option in the DHCP server configuration
B. configure a separate DHCP sever on server on VLAN20
C. configure a separate DHCP sever configuration
D. configure the default gateway in the DHCP server configuration
177. Which IEEE mechanism is responsible for the authentication of devices when they
attempt to connect to a local network?
A. 802.1x
B. 802.2x
C. 802.3x
D. 802.11
178. which extended ping option do you use to specify the path that the packet
traverses?
A. strict
B. verbose
C. record
D. timestamp
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
179. Which two statements about single and dual homed links are true? (choose two)
A. Single-homed connections to a service provider can use either static routing or BGP
B. Dual-homed connections to a service provider most frequently use static routing
C. Dual-homed connections to multiple service providers can use OSPF or EIGRP for load balancing
D. Single-homed connections to a service provider require OSPF or EIGRP
E. Dual-homed connection to multiple service providers typically use BGP
180. Which two circumstance can prevent two routers from establishing an OSPF
neighbour adjacency? (Choose two.)
A. Mismatched hello timers and dead timers
B. Use of the same router ID on both devices
C. Mismatched autonomous system numbers
D. An ACL blocking traffic from multicast address 224.0.0.10
E. Mismatched process IDs
Which two pieces of information can you determine from the EIGRP topology table?
(Choose two.)
A. Each route has only one best path
B. Route 10.42.91.0/24 has a tag of 28160
C. Route 10.42.88.0/21 has an administrative distance of 28160
D. The RIGRP neighbour IP address is 10.111.253.216
E. The EIGRP neighbour IP address is 10.111.253.216
F. The reported distance of 10.0.0.0/8 is 0
182. Which layer of the TCP/IP model manages the transmission of binary digits across
an Ethernet Cable?
A. Physical
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. Transport
C. Network
D. Data link
184. A network engineer wants to allow a temporary entry for a remote user with a
specific username and password so that the user can access the entire network over
the internet. Which ACL can be used?
A. Extended
B. Standard
C. Reflexive
D. Dynamic
185. Which two approaches are common when troubleshooting network issues?
(Choose two.)
A. Policing
B. Layer-by-layer
C. Divide and conquer
D. Top-down
E. Round-robin
186. Which two values are needed to run the APIC-EM ACL Analysis tool? (Choose two.)
A. Periodic refresh interval
B. Destination port
C. Protocol
D. Source port
E. Destination address
F. Source address
187. What two actions can be taken to secure the virtual terminal interfaces on a router?
( Choose two.)
A. Configure a virtual terminal password and login process
B. Create an access list and apply it to the virtual terminal interface with the access-group command
C. Administratively shut down the interface
D. Enter an access list and apply it to the virtual terminal interfaces using the access-classcommand
E. Physically secure the interface
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
188. in a CDP environment, What happens when the CDP interface on an adjacent
device is configured without an IP address?
A. CDP uses the IP address of another interface for that neighbor
B. COP operates normally, but is cannot provide any information for that neighbor
C. CDP operates normally, but it cannot provide IP address information for that neighbor
D. CDP becomes inoperable on that neighbor
When PC 1 send a packet to PC2. The packet has witch source and destination IP
address when it arrives at interface Gi0/0 on router R2?
A. Source 192.168.20.10 and destination 192.168.20 1
B. Source 192.168/10/10 and destination 10.10.2.2
C. Source 10.10.1.1 and destination 10.10.2 2
D. Source 192.168.10.10 and destination 192.168.20.10
D. The path through R2, because the EIGRP administrative distance is lower than the OSPF and
BGP adminisfrawe distance
191. Which feature or method can you use to isolate physical layer problems on a serial
link?
A. Autonegotiation
B. Protocol analyzer
C. Loopback test
D. UDLD
192. Which two statements about DNS lookup operations are true? (Choose two.)
A. When the primary IP address of the destination is down, the DNS server can forward the client to
an alternate IP address
B. They use destination port 53
C. The client sends a request for IP address to domain name resolution to the DNS server
D. The client sends a request for a domain name to IP address resolution to the DNS server
E. The DNS server pings the destination to verify that it is available
193. Bases on the output below from Switch B, which statement is true?<br>Switch
B#show spanning-tree Vlan 40
A. VLAN 40 is running the Per VLAN spanning Tree Protocol
B. The MAC address of the root bridge is aaaa.bbbb.cccc
C. The Fa0/11 role confirms that Switch Bis the root brodge for VLAN 40
D. Switch B is not the root bridge, because not all of the interface rotes are designated
195. Which two statements about the routing table are true? (Choose two.)
A. It displays the distance and metric of the routes that it learns
B. It displays information about the successor and the feasible successor
C. It uses the> symbol to indicate the best route
D. It displays the metric and the reported distance of the routes that is learns
E. It uses letters such as 0, I, and D to identify how a route is learned
196. Which two statements about DMVPN are true? (Choose two.)
A. It creates point-to-point tunnels
B. It can operate in tunnel mode and transport mode
C. It uses a spoke-toOspoke model to create a broadcast network
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
199. What happens to new traffic that is sent to a destination MAC address after the
MAC aging time expires
A. It is queued
B. It is dropped
C. It is process switched
D. It is flooded
200. The Ethernet frame that is shown arrives on interface fa0/1 What two function will
occur when this frame IS received by 2950Switch? (Choose two.)<br>
A. The mac address table will now have and additional entry of fa0/1 FFFF.FFFF.FFFF
B. All frame arriving on 2950 Switch with a destination of 0000.00aa.aaaa will be forwarded out 0/1
C. This frame will be discarded when it is received by 2950Switch
D. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be
forward out fa0/1
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
E. Only frames from source 0000.00bb.bbbb the first learned MAC address of 2950Switch will be
forwarded our fa0/1
F. Only host A will be allowed to transmit frames on fa0/1
201. Which technology supports multiple dynamic secure connection over an unsecure
transport network?
A. Site-to-site VPN
B. DMVPN
C. Client VPN
D. VPN
203. Which statement about loopback testing on a route serial interface is true?
A. Traffic is dropped with a hardware loopback, but traffic passes through the interface with a
software loopback
B. Traffic is dropped with a software loopback but traffic passes through the interface with a hardware
loopback
C. Traffic is dropped with both software loopbacks and hardware loopbacks
D. Traffic passes through the interface with both software loopback and hardware loopbacks
205. which network appliance check the state of a packet to determine whether the
packet is legitimate?
A. The LAN controller
B. The firewall
C. The layer 2 switch
D. The load balance
206. Which adverse circumstance can occur when you connect full duplex devices to a
shared Ethernet hub?
A. A duplex mismatch
B. Excessive collisions
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
C. Alignment errors
D. Native VLAN mismatches
207. You are configuring a 100-Mb fast Ethernet connection between a PC and Switch.
Which action must you take to configure the speed one each of the two interfaces?
A. Set both interfaces to 100 Mb
B. Set the switch port to 100 Mb and the PC interface to auto-negotiate
C. Set both interfaces to auto-negotiate
D. Set the switch port to auto-negotiate and the PC interface to 100 Mb
208. When you are troubleshooting an ACL issue on a router, which command would
you use to verify which interface are affected by the ACL?
A. List ip interface
B. Show interface
C. Show ip interface
D. Show ip access-list
E. Show access-lists
209. Which two command sequences must you configure on a establish a layer 3 ether
channel with an open- standard protocol? (choose two)
A. interface port.channel 10<br>switchport<br>switchport mode trunk
B. interface Gigabit ethemet 0/0/1<br>channel -group 10 mode active
C. interface gigabit ethernet 0/0/1<br>channel -group 10 mode auto
D. interface port- channel 10<br>no switchort<br>ip address 172.16.0.1 255.255.255.0
E. interface gigabit ethernet 0/0/1<br>channel -group 10 mode on
210. Which command should you enter to verify the priority of a router in an HSRP
group?
A. show hsrp
B. show interface
C. show standby
D. show sessions
212. Which effect does the aaa new model configuration command have?
A. it configures the device to connect to a RADIUS server for AAA
B. it configures a local user on the device
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
213. Which command should you enter to configure a device as an NTP server?
A. ntp server
B. ntp authenticate
C. ntp master
D. ntp peer
214. Which command should you enter to configure a single port to prevent alternate
ports fromcbecoming designated ports?
A. spanning-treeguard root
B. spanning-tree etherchannel misconflg
C. spanning-tree loopguard default
D. spanning-tree guard loop
215. Which two values can identify a switch stack on the network?( choose two)
A. the switch priority
B. the spanning tree priority
C. the management IP address of the device
D. the switch BIA
E. the bridge ID
216. Which chassis-aggregation technology combines two physical switches into one
virtualvswitch?
A. VRRP
B. stackwise
C. vss
D. LACP
217. After you deploy a new WLAN controller on your network, which two additional
tasks you consider? (choose two)
A. configure additional VLANs
B. configure additional security policies
C. deplay POE switches
D. deploy load balancers
E. configure multiple VRRP groups
218. Which two statements about the ip default network command are true ?(choose
two)
A. it specifies the network that is used when the device cannot finds an exact match in the routing
table
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
219. Which two pieces of information about a cisco device can cisco discovery protocol
communication (choose two)
A. the native VLAN
B. the trunking protocol
C. the spanning tree priorty
D. the spanning tree protocol
E. the VTP domain
the server
on this network is configured with an MTU of 9216, and the two interface on router R 1
are configured for MTUs of 2000 and 3000, as shown, what is the largest packet size
that can pass between the workstation and the server?
A. 3000 bytes
B. 1500 bytes
C. 2000 bytes
D. 9216 bytes
222. Which prompt does a Cisco switch display when it is running in privileged exec
mode?
A. switch#
B. switch>
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
C. switch(config}#
D. switch(config-lf)#
226. Under which two circumstances is a switch port that is configured with PortFast
BPDU guard error-disabled? (Choose two.)
A. when a single IP address is configured on the switch
B. when the switch receives a request for an IP address from an individual PC
C. when the switch receives a BPDU from a connected switch
D. when a connected server has more than one VLAN configured on its NIC
E. when a wireless access point running in bridge mode is connected to a switch
227. Which two commands can you use to verify an IP SLA? (Choose two.)
A. show ip sla statistics
B. show ip sla application
C. show ip sla reaction- configuration
D. show ip sla history
E. show ip sla configuration
228. For which routes does the distance bgp 10 50 70 command set the administrative
distance?
A. between BGP routes and IGP routes
B. for all BGP routes
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
230. Which two differences between distance-vector and link-state routing protocols are
true? (Choose two)
A. Distance-vector routing protocols are less susceptible to loops than link-state protocols
B. Only distance-vector routing protocols maintain identical topology tables on all connected
neighbours
C. Only distance-vector routing protocols send full routing table updates
D. Only link-state routing protocols use the Bellman-Ford algorithm
E. Link-state routing protocols offer faster convergence than distance-vector protocols during network
changes
231. Which command can you enter on a Cisco IOS device to enable a scheduled
algorithm that directs lookup calls to multiple DNS hosts?
A. ip domain lookup
B. ip domain list
C. ip name-server 192.168.10.14 192.168.10.15
D. ip domain round-robin
232. Which API uses HTTP messages to transfer data to applications residing on
different hosts?
A. OpenFlow
B. OpenStack
C. REST
D. OpFlex
233. Which two statements about IPv6 multicast addresses are true? (Choose two.)
A. They use the prefix FC80::/8
B. If the lifetime parameter is set to 1, the route is permanent
C. If the scope parameter is set to 5, the route is local to the node
D. They use the prefix FF00::/8
E. They identify a group of interfaces on different devices
234. Which tunneling mechanism embeds an IPv4 address within an IPv6 address?
A. Teredo
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. 6to4
C. ISATAP
D. GRE
E. 4to6
235. Which two services can be provided by a wireless controller? (Choose two.)
A. Layer 3 routing between wired and wireless devices
B. issuing IP addresses to wired devices
C. providing authentication services to users
D. managing interference in a dense network
E. mitigating threats from the Internet
236. You are configuring an IP SLA ICMP Echo operation to troubleshoot a network
connectivity issue. When do you enter an IP address to test the IP SLA?
A. when you define the ICMP Echo operation
B. when you verify the IP SLA operation
C. when you specify the test frequency
D. when you enable the ICMP Echo operation
Which
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
two destination addresses will be used by Host A to send data to Host C? (Choose
two.)
A. the MAC address of Host C
B. the IP address of Switch 1
C. the IP address of the router's E0 interface
D. the MAC address of Switch 1
E. the MAC address of the router's E0 interface
F. the IP address of Host C
239. If all switches are configured with default values, which switch will take over when
the primary root bridge experiences a power loss?
A. switch 00E0.F908.6BE3
B. switch 0004.9A1A.C182
C. switch 0040.0BC0.90C5
D. switch 00E0.F726.3DC6
240. Which two server types are used to support DNS lookup? (Choose two.)
A. web server
B. ESX host
C. name resolver
D. authoritative name server
E. file transfer server
Host A
cannot ping Host B. Assuming routing is property configured, what is the cause of
this problem?
A. The serial interfaces of the routers are not on the same subnet
B. The address of SwitchA is a subnet address
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
242. Which two advantages do dynamic routing protocols provide over static routing?
(Choose two.)
A. Dynamic routing protocols automatically adapt to reroute traffic if possible
B. Dynamic routing protocols are easier to manage on very large networks
C. Only dynamic routing is supported on all topologies that require multiple routers
D. Dynamic routing is more secure than static routing
E. Dynamic routing requires fewer resources than static routing
243. Which two statements about 1000BASE-T UTP cable are true? (Choose two.)
A. It uses four wires
B. Both ends of the cable can transmit and receive simultaneously
C. It is most appropriate for installations up to 1000 meters in length
D. It is most appropriate for installations up to 1000 feet in length
E. It uses four wire pairs
244. Which two neighbour types are supported in a BGP environment? (Choose two)
A. remote
B. external
C. autonomous
D. internal
E. directly attached
245. You have configured a router with an OSPF router ID, but its IP address still
reflects the physical interface. Which action can you take to correct the problem in the
least disruptive way?
A. Reboot the router
B. Reload the OSPF process
C. Specify a loopback address
D. Save the router configuration
246. Which two values must you specify to perform an ACL-based Path Trace using
APIC-EM? (Choose two.)
A. source port
B. source interface
C. source IP address
D. destination port
E. destination IP address
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
The
network shown in the diagram is experiencing connectivity problems Which two
configuration changes will correct the problems? (Choose two.)
A. Configure the IP address of Host A as 10.1.2.2
B. Configure the masks on both hosts to be 255.255.255.224
C. Configure the gateway Host A as 10.1.1.1
D. Configure the gateway on Host B as 10.1.2.254
E. Configure the IP address of Host B as 10.1.2.2
F. Configure the masks on both hosts to be 255.255.255.240
On R1,
which routing protocol is in use on the route to 192.168.10.1?
A. EIGRP
B. OSPF
C. RIP
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
D. IGRP
How many
broadcast domains are shown in the graphic assuming only the default VLAN is
configured on the switches?
A. twelve
B. six
C. one
D. two
251. Which three elements are fields in a basic Ethernet data frame? (Choose three.)
A. Preamble
B. Frame Check Sequence
C. Version
D. Time to Live
E. Length/Type
F. Header Checksum
All of the routers in the network are configured with the ip subnet-zero command.
Which two network addresses should be used for Link A and Network A? (Choose )
A. Network A- 172 16.3.48/26
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. Link A - 172.16.3.0/30
C. Link A- 172.16.3.40/30
D. Network A- 172.16.3.192/26
E. Link A - 172.16.3.112/30
F. Network A - 172.16.3.128/25
253. Which two benefits can you get by stacking Cisco switches? (Choose two.)
A. The stack enables any active member to take over as the master switch if the existing master fails
B. Each switch in the stack handles the MAC table independently from the others
C. You can add or remove switches without taking the stack down.
D. Each switch in the stack can use a different IOS image.
E. You can license the entire stack with a single master license
An attempt to deny web access to a subnet blocks all traffic from the subnet. Which
interface command immediately removers the effect of ACL 102?
A. no ip access-list 102 in
B. no ip access-group 102 in
C. no ip access-group 102 out
D. no ip access-class 102 out
E. no ip access-class 102 in
255. A network administrator needs to configure port security on a switch. Which two
statements are true? (Choose two.)
A. The network administrator can apply port security to dynamic access ports.
B. The network administrator can configure static secure or sticky secure MAC addresses in the
voice VLAN.
C. When dynamic MAC address learning is enabled on an interface the switch learns new addresses,
up to the maximum
D. The network administrator can apply port security to EtherChannels.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
E. The sticky learning feature allows the addition of dynamically learned addresses to the running
configuration.
256. Which three encapsulation layers in the OSI model are combined into the TCP/IP
application layer? (Choose three.)
A. Presentation
B. Session
C. data link
D. application
E. transport
F. network
257. Which command can you enter to set the default route for all traffic to an IP
enabled router interface?
A. router(config-router)#default-information originate
B. router(config)#Ip route 0.0.0 0 255.255 255 255 GigabitEthernet0/1
C. router(config)#Ip route 0.0.0.0 0.0 0.0 GigabitEthemet0/1
D. router(config)#lp default-gateway GigabitEthernet0/1
258. Which two EtherChannel PAgP modes can you configure? (Choose two.)
A. Desirable
B. on
C. auto
D. active
E. Passive
259. Which command can you execute to set the user inactivity timer to 10 seconds?
A. SW1 (config-line)#exec-timeout 1 0
B. SW1 (config-line)#exec-timeout 0 10
C. SW1 (config-line)#absolute-timeout 10
D. SW1 (config-line)#absolute-timeout 0 10
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
The
network administrator must establish a route by which the London workstations can
forward traffic to the Manchester workstations. What is the simplest way to
accomplish this?
A. Configure a static default route on London with a next hop of 10 .1. .1.1
B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester
C. Configure a dynamic routing protocol on London to advertise all routes to Manchester
D. Configure a dynamic routing protocol on Manchester to advertise a default route to the London
router
E. Configure a static route on London to direct all traffic destined for 172 .16.0.0/22 to 10.1.1.2.
262. Which three features are represented by the letter A in AAA authentication?
(Choose three.)
A. Accessibility
B. Authority
C. Accountability
D. Authorization
E. Authentication
F. Accounting
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0
network The network administrator connected to router Coffee via the console port
issued the show ip route command, and was able to ping the server. Based on the
output of the show ip route command and the topology shown in the graphic, what is
the cause of the failure?
A. The neighbor relationship table is not correctly updated.
B. The routing table on Coffee has not updated
C. The network has not fully converged
D. A static route is configured incorrectly.
E. The FastEthemet interface on Coffee is disabled
F. IP routing is not enabled.
264. Which three options are types of layer 2 network attacks? (Choose three.)
A. ARP attacks
B. Spoofing attacks
C. botnet attacks
D. DDOS attacks
E. VLAN hopping
F. brute force attacks
265. Which address prefix does OSPFv3 use when multiple IPv6 addresses are
configured on a single interface?
A. the prefix that administrator configures for OSPFv3 use
B. all prefixes on the interface
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
A technician
ha installed Switch B and needs to configure it for remote access from the
management workstation connected Switch A. Which set of commands is required to
accomplish this task?
A.
B.
C.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
D.
E.
267. Which option is the master redundancy scheme for stacked switches?
A. 1:N
B. 1+N
C. N:1
D. 1:1
268. What are two benefits of private IPv4 IP addresses? (Choose two.)
A. They are routed to the Internet the same as public IP addresses
B. They are less costly than public IP addresses
C. They eliminate duplicate IP conflicts
D. They can be assigned to devices not requiring Internet connections
E. They eliminate the necessity for NAT policies
270. Which two functions can be performed by a local DNS server? (Choose two.)
A. assigning IP addresses to local clients
B. copying updated IOS images to Cisco switches
C. forwarding name resolution requests to an external DNS server
D. resolving names locally
E. transferring split horizon traffic between zones
271. Which two statements about wireless LAN controllers are true? (Choose two.)
A. They can manage mobility policies at a system wide level
B. They must be configured through a GUI over HTTP or HTTPS
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
273. Which command can you enter to configure a local username with an encrypted
password and EXEC mode user privileges?
A. Router(config)#username jdone privilege 15 password O 083140501A48
B. Router(config)#username jdone privilege 1 password 7 83140501A48
C. Router(config)#username jdone privilege 1 password 7 PASSWORD1
D. Router(config)#username jdone privilege 15 password O PASSWORD1
274. A Cisco router is booting and has just completed the POST process. It is now
ready to find and load an IOS image. What function does the router perform next?
A. It checks the configuration register
B. It inspects the configuration file in NVRAM for boot instructions
C. It attempts to boot from a TFTP server.
D. It loads the first image file in flash memory.
275. Refer
A. Check the duplex mode for SwitchA's fa0/2 port.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
277.
<br>At the end of an RSTP election process, which access layer switch port will
assume the discarding role?
A. Switch3, port Gi0/2
B. Switch3, port Gi0/1
C. Switch3, port fa0/12
D. Switch3, port fa0/1
E. Switch4, port fa0/11
F. Switch4, port fa0/2
278. Which WAN topology is most appropriate for a centrally located server farm with
several satellite branches?
A. Full mesh
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. point- to-point
C. star
D. hub and spoke
279. Which two statements about the tunnel mode ipv6ip command are true? (Choose
two.)
A. It specifies IPv4 as the encapsulation protocol.
B. It specifies that the tunnel is a Teredo tunnel
C. It specifies IPv6 as the encapsulation protocol.
D. It specifies IPv6 as the transport protocol
E. It enables the transmission of IPv6 packets within the configured tunnel.
280. Which two tasks does a router perform when it receives a packet that is being
forwarded from one network to another? (Choose two.)
A. It examines the MAC address table for the forwarding interface
B. It removes the Layer 2 frame header and trailer
C. It examines the routing table for the best path to the destination IP address of the packet
D. It encapsulates the Layer 2 packet
E. It removes the Layer 3 frame header and trailer.
281. Which two statements about northbound and southbound APls are true? (Choose
two.)
A. Both northbound and southbound APls allow program control of the network
B. Only northbound API interfaces use a Service Abstraction Layer
C. Both northbound and southbound API interfaces use a Service Abstraction Layer.
D. Only northbound APls allow program control of the network.
E. Only southbound APls allow program control of the network
F. Only southbound API interfaces use a Service Abstraction Layer
283. Which two statements about floating static routes are true? (Choose two.)
A. They are dynamic routes that are learned from a server.
B. They are used as backup routes when the primary route goes down
C. They are used when a route to the destination network is missing
D. They have a higher administrative distance than default static route administrative distance
E. They are routes to the exact /32 destination address.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
284. Which three commands can you use to set a router boot image? (Choose three)
A. Router>boot flash:c 180x-adventerprisek9-mz-124--6T.bin
B. Router(config)#boot system flash c4500-p-mz.121-20.bin
C. Router(config)#boot system tftp c7300-Js-mz.122-33.SB8a.bin
D. Router(config)#boot flash:c180x-adventerprisek9-mz-124-6T.bin
E. Router(config)#bool bootldr bootflash:c4500-Jk9s-mz .122.23f.bin
F. Router(config)#boot system rom c7301-advtpservicesk9-mz .124-24.T4.bin
285. What are two requirements for an HSRP group? (Choose two.)
A. one or more backup virtual routers
B. exactly one active router
C. exactly one standby active router
D. one or more standby routers
E. exactly one backup virtual router
286. Which two facts about configuring EIGRPv6 are true? (Choose two.)
A. If you change the interface bandwidth the EIGRPv4 metric is affected
B. The variance command for EIGRPv6 is independent of EIGRPv4
C. The router ID must be an IPv6 address.
D. If you change the interface delay, the EIGRPv4 delay remains unchanged.
E. You must configure neighboring devices with the same IPv6 hello-interval eigrp value
288. You are implementing WAN access for an enterprise network while running
applications that require a fully meshed network, which two design standards are
appropriate for such an environment? (Choose two.)
A. multiple MPLS VPN connections with dynamic routing
B. a centralized DMVPN solution to simplify connectivity for the enterprise
C. a collapsed core and distribution layer to minimize costs
D. a dedicated WAN distribution layer to consolidate connectivity to remote sites
E. multiple MPLS VPN connections with static routing
289. Which two statements about IGP and EGP routing protocols are true? (Choose
two.)
A. OSPF, EIGRP, and BGP are categorized as IGP routing protocols.
B. IGP routing protocols are used within internal networks.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
290. Which extended ping feature do you use to specify the path that the packet
traverses?
A. Record
B. verbose
C. timestamp
D. strict
292. Which two functions describe benefits of aggregated chassis technology? (Choose
two.)
A. It supports HSRP, VRRP and GLBP
B. It reduces management overhead
C. It requires only one IP address per VLAN
D. It supports redundant configuration files
E. It requires only three IP addresses per VLAN
293. Which two statements about the ip subnet-zero command are true? (Choose two.)
A. It enables the network to make full use of the available IP address space
B. It specifies the broadcast IP addresses in the subnet
C. It is enabled by default on Cisco routers.
D. It must be configured each time you reboot a router.
E. It must be configured before you active NAT on a router.
294. Which file-system management command is used frequently when IOS backups,
upgrades, and restores are performed?
A. show file
B. show dir
C. copy
D. delete
295. Which command must you enter to switch from privileged EXEC mode to user
EXEC mode on a Cisco device?
A. configure terminal
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. disable
C. logout
D. enable
297. Which two conditions can be used to elect the spanning-tree root bridge? (Choose
two.)
A. the lowest system ID
B. the lowest switch priority
C. the highest port priority
D. the highest MAC address
E. the lowest MAC address
298. Which two statements about PAP authentication in a PPP environment are true?
(Choose two.)
A. It is performed at the beginning of the session and Is repeated periodically for as long as the
session is maintained
B. It hashes the password before sending it
C. It sends the password in clear text
D. It uses a username with an MD5 password to authenticate
E. It is performed at the beginning of the session only
300. Which two values must you specify to define a static route? (Choose two.)
A. next-hop address or exit interface
B. destination network and mask
C. incoming interface
D. administrative distance of the route
E. source network and mask
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
301. Which two commands can you user to configure an LACP EtherChannel? (Choose
two.)
A. channel-group 10 mode auto
B. channel-group 10 mode passive
C. channel-group 10 mode on
D. channel-group 10 mode desirable
E. channel-group 10 mode active
302. Which algorithm is used for the frame check sequence in an Ethernet frame?
A. CRC
B. MD5
C. AES-256
D. SHA-1
303. Which feature can cause a port to shut down immediately after a switch reboot?
A. PortFast
B. DTP
C. COPP
D. Port security
304. Which three statements describe the reasons large OSPF networks use a
hierarchical design? (Choose three.)
A. to confine network instability to single areas of the network
B. to decrease latency by increasing bandwidth
C. to speed up convergence
D. to reduce the complexity of router configuration
E. to lower costs by replacing routers with distribution layer switches
F. to reduce routing overhead
305. Which two best practices protect your network from VLAN hopping attacks?
(Choose two.)
A. Configure dynamic ARP inspection
B. Change the native VLAN to an unused VLAN ID
C. Assign all access ports to VLANs other than the native VLAN
D. Configure port security
E. Configure an ACL to prevent traffic from changing VLANs
308. You apply a new inbound access list to routers, blocking UDP packets to the HSRP
group. Which two effect does this action have on the HSRP group process? (Choose
two)
A. HSRP redundancy fails
B. HSRP redundancy works as expected
C. The active router immediately becomes the standby router
D. The routers in the group generate duplicate IP address warnings
E. Both the active and standby routers become active
309. Which two statements about RFC 1918 address are true? (Choose two.)
A. They provide security to end users when the users access the Internet
B. They require Network Address Translation or Port Address Translation to access the Internet
C. They must be registered
D. They have reserved address space for Class A and Class B networks only
E. They increase network performance
Which two statements about the interface that generated the output are true? (Choose
two.)
A. Two secure MAC address are manually configured on the interface
B. The interface dynamically learned two secure MAC addresses.
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
C. An SNMP trap is generated when the maximum number of secure MAC addresses is reached on
the interface
D. The interface is error-disabled
E. A syslog message is generated when the maximum number of secure MAC addresses is reached
on the interface
Which two facts can you determine from the EIGRP topology table? (Choose two)
A. All successors are injecting into the routing table
B. The variance command must have issued to allow route 10.85.184.0 to have two successors
C. The reported distance value is greater than the feasible distance
D. If a route has more than one successor, only one route is injected into the routing table
E. The FD 28416 for route 10.242.0.148 is also the metric for the routing table
313. Which two tasks should you perform to begin troubleshooting a network problem?
(Choose two.)
A. Define the problem as a set of symptoms and causes
B. Implement an action plan
C. Analyze the results
D. Gather all the facts
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
314. Which two facts must you take into account when you deploy PPPoE? (Choose
two.)
A. An individual PVC can support one PPPoE client
B. DDR idle timers must be configured to support VPDN logging
C. You must manually configure IP addresses on the PPPoE interface
D. DDR is not supported
E. PPPoE supports a maximum of 10 clients per customer premises equipment
315. Which two circumstances can prevent two routers from establishing an EIGRP
neighbor adjacency (Choose two)
A. An ACL is blocking traffic from multicast address 224.0.0.5
B. Both routers have the same router ID
C. The routers are on different subnets
D. The two routers have the same autonomous system number
E. The routers have mismatched K values
316. Which Rapid PVST+ port role provides a different path to the root bridge?
A. alternate
B. forwarding
C. designated
D. backup
317. Which two commands should you enter to prevent a Cisco device from sharing
information with upstream devices? (Choose two)
A. R1(config-if)#no cdp enable
B. R1(config-if)#no cdp run
C. R1(config)#no cdp enable
D. R1(config)#no cdp run
E. R1(config)#no cdp advertise-v2
318. Which two statements about PDU encapsulation are true? (Choose two.)
A. During encapsulation, each layer adds a header and trailer to the PDU from the layer below
B. PDU encapsulation takes place only at the transport layer
C. In the TCP/IP reference model, PDU encapsulation occurs on the network layer
D. During encapsulation. each layer adds a header and sometimes adds a trailer to the PDU from the
layer above
E. In the TCP/IP reference model, PDU encapsulation starts on the Internet layer with the date from
the application layer
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
319. Which two goals are reasons to implement private IPv4 addressing on your
network? (Choose two)
A. Reduce the risk of a network security breach.
B. Comply with local law
C. Reduce the size of the forwarding table on network routers
D. Comply with PCI regulation
E. Conserve IPv4 addresses
320. Which QoS feature can drop traffic that exceeds the committed access rate?
A. weighted fair queuing
B. policing
C. shaping
D. FIFO
321. What are two benefits that the UDP protocol provide for application traffic?
(Choose two.)
A. UDP maintains the connection state to provide more stable connections than TCP
B. UDP traffic has lower overhead than TCP traffic
C. The application can use checksums to verify the integrity of application data
D. The CTL field in the UDP packet header enables a three-way handshake to establish the
connection
E. UDP provides a built-in recovery mechanism to retransmit lost packets
322. Which two statements about the successor and feasible successor are true?
(Choose two.)
A. The successor is the secondary route
B. The feasible successor has a lower metric than the successor
C. The successor is stored in the routing table
D. The successor is the primary route
E. The feasible successor is stored in both the topology table and the routing table
323. What is the easiest way to verify the Layer 3 path from a router to host 192.168.2.1?
A. Execute a ping from the router to host 192.168.2.1
B. Add a static route for host 192.168.2.1 to the routing table of the router.
C. Execute a traceroute from the router to host 192.168.2.1
D. Use Telnet to connect the router to host 192.168.2.1
324. Which two statements about TACACS+ are true? (Choose two.)
A. it supports full command logging
B. it combines authentication and authorization to simplify configuration
C. It encrypts the password only
D. It uses TCP port 49
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
325. What are two reasons to use multicast to deliver video traffic, instead of unicast or
broadcast? (Choose two.)
A. It enables multiple clients to receive the video stream simultaneously
B. It provides reliable TCP transport.
C. It enables multiple clients to send video streams simultaneously
D. It enables multiple servers to send video streams simultaneously
E. It supports distributed applications
326. Which two commands should you enter to view the PID and serial number of a
router? (Choose two)
A. show license feature
B. show license
C. show license status
D. show version
E. show license udl
Which two statements about the interface that generated the output are true? (Choose
two)
A. It has dynamically learned two secure MAC addresses
B. Learned MAC addresses are deleted after five minutes of inactivity
C. It has dynamically learned three secure MAC addresses
D. The interface is error-disabled if packets arrive from a new unknown source address
E. The security violation counter increments if packets arrive from a new unknown source address
328. Which two actions must you take to correctly configure PPPoE on a client?
(Choose two.)
A. Create a BBA group and link it to the dialer interface
B. Define a dialer interface
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
330. After an FTP session to ftp.cisco.com fails, you attempt to ping the server. A ping
to ftp.cisco.com also fails, but a ping to the IP address of the server is successful.
What is reason for the failed FTP session?
A. An ACL is blocking the FTP request
B. A firewall is blocking traffic from the FTP site
C. The Internet connection is down
D. The assigned DNS server is down
331. Which two address spaces are valid Class B IPv4 ranges that are non-routable to
the Internet? (Choose two)
A. 172.16.0.0 through 172.32.255.255
B. 192.168.0.0 through 192.168.255.255
C. 10.0.0.0 through 10.0.255.255
D. 172.16.0.0 through 172.31.255.255
E. 169.254.0.0 through 169.254.255.255
332. Which access layer threat mitigation technique provides security by acting as a
filter between trusted and untrusted traffic sources?
A. 802.1X
B. a nondefault native VLAN
C. dynamic packet inspection
D. DHCP snooping
333. Which task do you need to perform first when you configure IP SLA to troubleshoot
a network connectivity issue?
A. Verify the ICMP echo operation
B. Specify the test frequency
C. Schedule the ICMP echo operation
D. Enable the ICMP echo operation
334. Which two statements correctly describe the ping utility? (Choose two.)
A. It can identify the path that a packet takes to a remote device
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
B. It uses UDP
C. It uses ICMP
D. It can identify the source of an ICMP "time exceeded" message
E. It can verify connectivity to a remote device without identifying the path
335. Which two statements about an Ethernet frame source address are true? (Choose
two.)
A. The address is 4 bits long
B. The address is 6 bytes long
C. The leftmost bit is always 0
D. The leftmost bit is always 1
E. The address is 4 bytes long
336. Which two pieces of information can you determine from the output of the show
ntp status command (Choose two)
A. The NTP version number of the peer
B. Whether the NTP peer is statically configured
C. The IP address of the peer to which the clock is synchronized
D. The configured NTP servers
E. Whether the clock is synchronized
337. Which command allows you to set the administrative distance for EIGRP for IPv6?
A. ipv6 summary-address eigrp
B. ipv6 bandwidth-percent eigrp
C. metric weights
D. ipv6 next-hop-self eigrp
338. Which IP address can send traffic to all hosts on network 10.101.0.0/16?
A. 224.0.0.1
B. 10.101.0.1
C. 10.101.255.255
D. 10.101.254.254
339. Which two technologies can combine multiple physical switches into one logical
switch? (Choose two)
A. HSRP
B. VSS
C. GLBP
D. VRRP
E. StackWise
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
340. Which two benefits are provided by cloud resources to an enterprise network?
(Choose two.)
A. flexibility
B. on-demand scalability
C. full control of infrastructure
D. easy access with low security
E. complexity at higher cost
342. Which frame type allows STP to compute the spanning-tree topology?
A. LSA
B. RSTP
C. LSP
D. BPDU
344. Which two features are compatible with port security? (Choose two.)
A. SPAN source port
B. SPAN destination port
C. DTP
D. EtherChannel
E. voice VLAN
345. Which two commands can you use to configure a PAgP EtherChannel? (Choose
two.)
A. channel-group 10 mode auto
B. channel-group 10 mode on
C. channel-group 10 mode passive
D. channel-group 10 mode desirable
E. channel-group 10 mode active
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
If all routers on this network run RIPv2, which two configurations can you apply to
router R3 to produce this routing table? (Choose two)
A. router rip<br>version 2<br>network 192.168.3.0<br>network 192.168.4.0<br>network
192.168.23.0<br>passive-interface default
B. router rip<br>version 2<br>network 192.168.4.0<br>network 192.168.23.0
C. router rip<br>version 2<br>network 192.168.3.0<br>network 192.168.4.0<br>network
192.168.23.0
D. router rip<br>version 2<br>network 192.168.3.0<br>network 192.168.23.0<br>passive-interface
default
E. router rip<br>version 2<br>network 192.168.3.0<br>network 192.168.4.0
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
Which two events occur on the interface, if packets from an unknown source address
arrive after the interface learns the maximum member of secure MAC address?
(Choose two)
A. The security violation counter does not increment
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
350. What is the maximum number of switches that StackWise can support in on
stack??
A. 8
B. 9
C. 10
D. 6
351. Which two cable specifications can support 1-Gbps Ethernet? (Choose two)
A. RG-11
B. Category 6
C. RG-6
D. Category 3
E. Category 5e
353. Which two statements about RIPv2 are true? (Choose two.)
A. It supports CIDR and VLSM
B. It sends periodic updates via broadcast
C. It uses the Bellman-Ford routing algorithm
D. It does not support clear text authentication, similar to RIPv1
E. It stores RIP neighbour adjacency information in a neighbour table
354. Which two statements about UTP cables are true? (Choose two)
A. Category 6 Ethernet cables are appropriate for installations of up to 200m
B. Category 6a Ethernet cable can transmit up to 10 Gbps
C. Category 5e Ethernet cables support speeds up to 1000 Mbps
D. All Ethernet cable types from Category 1 through Category 6 are suitable for transmitting data in
the appropriate environments
E. Category 5 Ethernet cables support speeds up to 1000 Mbps beyond 100m
CCNA/CCNA_200-125_Exam_Dumps_ version_4_2019
355. Which keyboard shortcut can you use to exit the System Configuration Dialog on a
Cisco network device and return to privileged EXEC mode without making changes?
A. Ctrl-C
B. Ctrl-Alt-Delete
C. Ctrl-V
D. Shift-Esc
356. Which two statements about static routing are true? (Choose two)
A. It allows the administrator to determine the entire path of a packet
B. Its default administrative distance is lower than EIGRP
C. It provides only limited security unless the administrator performs additional configuration
D. Its initial implementation is more complex then OSPF
E. It allows packets to transit a different path if the topology changes
357. Which two pieces of information can you learn by viewing the routing table?
(Choose two)
A. which neighbour adjacencies are established
B. the length of time that a route has been known
C. whether the administrative distance was manually or dynamically configured
D. whether an ACL was applied inbound or outbound to an interface
E. the EIGRP or BGP autonomous system