Act now and download your Cisco ccna 200 120 vs 200 125 test today! Do not waste time for the worthless Cisco ccna routing and switching 200 125 official cert guide library tutorials. Download Far out Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) exam with real questions and answers and begin to learn Cisco cisco 200 125 with a classic professional.

♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 200-125 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 200-125 Exam Dumps (PDF & VCE):
Available on:

Q81.  - (Topic 3)

Which command is used to display the collection of OSPF link states?

A. show ip ospf link-state

B. show ip ospf lsa database

C. show ip ospf neighbors

D. show ip ospf database

Answer: D


The “show ip ospf database” command displays the link states. Here is an example: Here is the lsa database on R2.

R2#show ip ospf database

OSPF Router with ID ( (Process ID 1) Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count 793 0x80000003 0x004F85 2 776 0x80000004 0x005643 1 755 0x80000005 0x0059CA 2 775 0x80000005 0x00B5B1 2

Net Link States (Area 0)

Link ID ADV Router Age Seq# Checksum 794 0x80000001 0x001E8B 812 0x80000001 0x004BA9 755 0x80000001 0x007F16 775 0x80000001 0x00C31F

Q82.  - (Topic 6)

When you are troubleshooting an ACL issue on a router, which command would you use to verify which interfaces are affected by the ACL?

A. show ip access-lists

B. show access-lists

C. show interface

D. show ip interface

E. list ip interface

Answer: D


Incorrect Answer

show ip access-lists does not show interfaces affected by an ACL.

Q83.  - (Topic 6)

Refer to the exhibit.

Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?





Answer: D


Routers go line by line through an access list until a match is found and then will not look any further, even if a more specific of better match is found later on in the access list. So, it it best to begin with the most specific entries first, in this cast the two hosts in line C and D. Then, include the subnet (B) and then finally the rest of the traffic (A).

Q84.  - (Topic 5)

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

A. SNMPv3 enhanced SNMPv2 security features.

B. SNMPv3 added the Inform protocol message to SNMP.

C. SNMPv2 added the Inform protocol message to SNMP.

D. SNMPv3 added the GetBulk protocol messages to SNMP.

E. SNMPv2 added the GetBulk protocol message to SNMP.

F. SNMPv2 added the GetNext protocol message to SNMP.

Answer: A,C,E


SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct.

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.

Note: These two messages are carried over SNMPv3.

Q85.  - (Topic 5)

How is an EUI-64 format interface ID created from a 48-bit MAC address?

A. by appending 0xFF to the MAC address

B. by prefixing the MAC address with 0xFFEE

C. by prefixing the MAC address with 0xFF and appending 0xFF to it

D. by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address

E. by prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes

Answer: D


The modified EUI-64 format interface identifier is derived from the 48-bit link-layer (MAC) address by inserting the hexadecimal number FFFE between the upper three bytes (OUI field) and the lower three bytes (serial number) of the link layer address.

Q86.  - (Topic 7)

An administrator is trying to ping and telnet from SwitchC to RouterC with the results shown below.

Click the console connected to RouterC and issue the appropriate commands to answer the questions.

Which will fix the issue and allow ONLY ping to work while keeping telnet disabled?

A. Correctly assign an IP address to interface fa0/1.

B. Change the ip access-group command on fa0/0 from “in” to “out”.

C. Remove access-group 106 in from interface fa0/0 and add access-group 115 in.

D. Remove access-group 102 out from interface s0/0/0 and add access-group 114 in

E. Remove access-group 106 in from interface fa0/0 and add access-group 104 in.

Answer: E


Let’s have a look at the access list 104:

The question does not ask about ftp traffic so we don’t care about the two first lines. The 3rd line denies all telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is applied on the inbound direction so the 5th line “access-list 104 deny icmp any any echo-reply” will not affect our icmp traffic because the “echo-reply” message will be sent over the outbound direction.

Q87. CORRECT TEXT - (Topic 7)

Central Florida Widgets recently installed a new router in their office. Complete the network installation by performing the initial router configurations and configuring R1PV2 routing using the router command line interface (CLI) on the RC.

Configure the router per the following requirements: Name of the router is R2

Enable. secret password is cisco

The password to access user EXEC mode using the console is cisco2 The password to allow telnet access to the router is cisco3

IPV4 addresses must be configured as follows:

Ethernet network - router has fourth assignable host address in subnet Serial network is - router has last assignable host address in the subnet. Interfaces should be enabled.

Router protocol is RIPV2


In practical examinations, please note the following, the actual information will prevail.

1. Name or the router is xxx

2. Enable. secret password is xxx

3. Password In access user EXEC mode using the console is xxx

4. The password to allow telnet access to the router is xxx

5. IP information


Router>enable Router#config terminal Router(config)#hostname R2 R2(config)#enable secret Cisco 1 R2(config)#line console 0

R2(config-line)#password Cisco 2 R2(config-line)#exit R2(config)#line vty 0 4

R2(config-line)#password Cisco 3 R2(config-line)#login

R2(config-line)#exit R2(config)#interface faO/0

R2(config-if)#ip address R2(config)#interface s0/0/0

R2(config-if)#ip address R2(config-if)#no shutdown

R2(config-if)#exit R2(config)#router rip R2(config-router)#version 2



R2(config-router)#end R2#copy run start

Q88.  - (Topic 8)

Which component of the routing table ranks routing protocols according to their preferences?

A. administrative distance

B. next hop

C. metric

D. routing protocol code

Answer: A


Administrative distance - This is the measure of trustworthiness of the source of the route. If a router learns about a destination from more than one routing protocol, administrative distance is compared and the preference is given to the routes with lower administrative distance. In other words, it is the believability of the source of the route.

Q89.  - (Topic 3)

What are two enhancements that OSPFv3 supports over OSPFv2? (Choose two.)

A. It requires the use of ARP.

B. It can support multiple IPv6 subnets on a single link.

C. It supports up to 2 instances of OSPFv3 over a common link.

D. It routes over links rather than over networks.

Answer: B,D


Here is a list of the differences between OSPFv2 and OSPFv3:

✑ They use different address families (OSPFv2 is for IPv4-only, OSPFv3 can be used for IPv6-only or both protocols

✑ OSPFv3 introduces new LSA types

✑ OSPFv3 has different packet format

✑ OSPFv3 uses different flooding scope bits (U/S2/S1)

✑ OSPFv3 adjacencies are formed over link-local IPv6 communications

✑ OSPFv3 runs per-link rather than per-subnet

✑ OSPFv3 supports multiple instances on a single link, Interfaces can have multiple IPv6 addresses

✑ OSPFv3 uses multicast addresses FF02::5 (all OSPF routers), FF02::6 (all OSPF DRs)

✑ OSPFv3 Neighbor Authentication done with IPsec (AH)

✑ OSPFv2 Router ID (RID) must be manually configured, still a 32-bit number

Reference: ipv6.html

Q90.  - (Topic 4)

The output of the show frame-relay pvc command shows "PVC STATUS = INACTIVE". What does this mean?

A. The PVC is configured correctly and is operating normally, but no data packets have been detected for more than five minutes.

B. The PVC is configured correctly, is operating normally, and is no longer actively seeking the address of the remote router.

C. The PVC is configured correctly, is operating normally, and is waiting for interesting traffic to trigger a call to the remote router.

D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.

E. The PVC is not configured on the local switch.

Answer: D


The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses:

+ ACTIVE: the PVC is operational and can transmit data

+ INACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not available

+ DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch

+ STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen so it is ignored in some books.