200-125 | Renovate Cisco 200-125 pdf


P.S. Virtual 200-125 courses are available on Google Drive, GET MORE: https://drive.google.com/open?id=1qSmqe9lmg23sR5XECqlhobCqcIIdpdHn


New Cisco 200-125 Exam Dumps Collection (Question 14 - Question 23)

Question No: 14

Which command can you enter to view the ports that are assigned to VLAN 20?

A. Switch#show vlan id 20

B. Switch#show ip interface brief

C. Switch#show interface vlan 20

D. Switch#show ip interface vlan 20

Answer: A

Question No: 15

In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)

A. fd15:0db8:0000:0000:700:3:400F:527B

B. fd15::db8::700:3:400F:527B

C. fd15:db8:0::700:3:4F:527B

D. fd15:0db8::7:3:4F:527B

E. fd15:db8::700:3:400F:572B

Answer: A,E

Question No: 16

Refer to the exhibit.

Which statement describes the effect of this configuration?

A. The VLAN 10 VTP configuration is displayed.

B. VLAN 10 spanning-tree output is displayed.

C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode.

D. VLAN 10 is added to the VLAN database.

Answer: D

Question No: 17

Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?

A. PortFast on the interface

B. the interface as an access port to allow the voice VLAN ID

C. a voice VLAN ID in interface and global configuration mode

D. Cisco Discovery Protocol in global configuration mode

Answer: B

Explanation:

Configure the Switch Port to Carry Both Voice and Data Traffic

When you connect an IP phone to a switch using a trunk link, it can cause high CPU utilization in the switches. As all the VLANs for a particular interface are trunked to the phone, it increases the number of STP instances the switch has to manage. This increases the CPU utilization. Trunking also causes unnecessary broadcast / multicast / unknown unicast traffic to hit the phone link.

In order to avoid this, remove the trunk configuration and keep the voice and access VLAN configured along with Quality of Service (QoS). Technically, it is still a trunk, but it is called a Multi-VLAN Access Port (MVAP). Because voice and data traffic can travel through the same port, you should specify a different VLAN for each type of traffic. You can configure a switch port to forward voice and data traffic on different VLANs. Configure IP phone ports with a voice VLAN configuration. This configuration creates a pseudo trunk, but does not require you to manually prune the unnecessary VLANs.

The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. The voice VLAN feature is disabled by default. The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice VLAN, the Port Fast feature is not automatically disabled.

Question No: 18

Which statement about unicast frame forwarding on a switch is true?

A. The TCAM table stores destination MAC addresses

B. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on.

C. The CAM table is used to determine whether traffic is permitted or denied on a switch

D. The source address is used to determine the switch port to which a frame is forwarded

Answer: B

Question No: 19

Which type of device can be replaced by the use of subinterfaces for VLAN routing?

A. Layer 2 bridge

B. Layer 2 switch

C. Layer 3 switch

D. router

Answer: C

Question No: 20

Which two statements about wireless LAN controllers are true? (Choose two.)

A. They can simplify the management and deployment of wireless LANs.

B. They rely on external firewalls for WLAN security.

C. They are best suited to smaller wireless networks.

D. They must be configured through a GUI over HTTP or HTTPS.

E. They can manage mobility policies at a systemwide level.

Answer: A,E

Question No: 21

Which version of SNMP first allowed user-based access?

A. SNMPv3 with RBAC

B. SNMPv3

C. SNMPv1

D. SNMPv2

Answer: B

Question No: 22

Which type of topology is required by DMVPN?

A. ring

B. full mesh

C. hub-and-spoke

D. partial mesh

Answer: C

Question No: 23

Which two components are used to identify a neighbor in a BGP configuration? (Choose two.)

A. autonomous system number

B. version number

C. router ID

D. subnet mask

E. IP address

Answer: A,E

Explanation:

Use theshow ip bgp neighbors(registeredcustomers only)command to display information about the TCP and Border Gateway Protocol (BGP) connections and verify if the BGP peer is established. The output of theshow ip bgp neighborscommand below shows the BGP state as 'Established', which indicates that the BGP peer relationship has been established successfully.

R1-AGS#show ip bgp neighbors | include BGP

BGP neighbor is10.10.10.2, remote AS 400,internal link

BGP version 4, remote router ID 2.2.2.2 BGP state = Established, up for 00:04:20 BGP table version 1, neighbor version 1 R1-AGS#

Theshow ip bgp neighborscommand has been used above with the modifier| include BGP. This makes the output more readable by filtering the the command output and displaying the relevant parts only.

In addition, theshow ip bgp summary(registeredcustomers only)command can also be used to display the status of all BGP connections, as shown below.

R1-AGS(9)#show ip bgp summary

BGP router identifier 10.1.1.2, local AS number 400 BGP table version is 1, main routing table version 1

Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 10.10.10.2 4 400 3 3 1 0 0 00:00:26 0