200-125 | What Accurate 200-125 braindumps Is?


P.S. Realistic 200-125 training materials are available on Google Drive, GET MORE: https://drive.google.com/open?id=1N7mstYjhTswrvFd1eA3ZZFuxiKuT_fqh


New Cisco 200-125 Exam Dumps Collection (Question 5 - Question 14)

Q1. CORRECT TEXTThe following have already been configured on the router:

u2711 The basic router configuration

u2711 The appropriate interfaces have been configured for NAT inside and NAT outside.

u2711 The appropriate static routes have also been configured (since the company will be a stub network, no routing protocol will be required)

u2711 All passwords have been temporarily set to u201cciscou201d.

The task is to complete the NAT configuration using all IP addresses assigned by the ISP to provide Internet access for the hosts in the Weaver LAN. Functionality can be tested by clicking on the host provided for testing.

Configuration information: router name u2013 Weaver

inside global addresses u2013 198.18.184.105 - 198.18.184.110/29 inside local addresses - 192.168.100.17 u2013 192.168.100.30/28

number of inside hosts u2013 14

A network associate is configuring a router for the weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 u2013 192.168.100.30.

Answer:

The company has 14 hosts that need to access the internet simultaneously but we just have 6 public IP addresses from 198.18.184.105 to 198.18.184.110/29. Therefore we have to use NAT overload (or PAT)

Double click on the Weaver router to open it

Router>enable Router#configure terminal

First you should change the router's name to Weaver

Router(config)#hostname Weaver

Create a NAT pool of global addresses to be allocated with their netmask. Weaver(config)#ip nat pool mypool 198.18.184.105 198.18.184.110 netmask 255.255.255.248

Create a standard access control list that permits the addresses that are to betranslated.

Weaver(config)#access-list 1 permit 192.168.100.16 0.0.0.15

Establish dynamic source translation, specifying the access list that was definedin the prior step.

Weaver(config)#ip nat inside source list 1 pool mypool overload

This command translates all source addresses that pass access list 1, which means a source address from 192.168.100.17 to 192.168.100.30, into an address from the pool

named mypool (the pool contains addresses from198.18.184.105 to 198.18.184.110). Overloadkeyword allows to map multiple IP addresses to a single registered IPaddress (many-to-one) by using different ports.

The question said that appropriate interfaces have been configured for NAT inside and NAT outside statements.

This is how to configure the NAT inside and NAT outside, just for yourunderstanding:

Weaver(config)#interface fa0/0 Weaver(config-if)#ip nat inside Weaver(config-if)#exit Weaver(config)#interface s0/0 Weaver(config-if)#ip nat outside Weaver(config-if)#end

Finally, we should save all your work with the following command:

Weaver#copy running-config startup-config

Check your configuration by going to "Host for testing" and type:

C :>ping 192.0.2.114

The ping should work well and you will be replied from 192.0.2.114

Q2. What are the three things that the Netflow uses to consider the traffic to be in a same flow? (Choose three)

A. IP address

B. Interface name

C. Port numbers

D. L3 protocol type

E. MAC address

Answer: A,C,D

Explanation:

What is an IP Flow?

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:

+ IP source address

+ IP destination address

+ Source port

+ Destination port

+ Layer 3 protocol type

+ Class of Service

+ Router or switch interface

Q3. How many bits are contained in each field of an IPv6 address?

A. 24

B. 4

C. 8

D. 16

Answer: D

Explanation:

An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

Q4. Refer to the exhibit.

A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)

A. host A IP address: 192.168.1.79

B. host A IP address: 192.168.1.64

C. host A default gateway: 192.168.1.78

D. host B IP address: 192.168.1.128

E. host B default gateway: 192.168.1.129

F. host B IP address: 192.168.1.190

Answer: A,C,F

Explanation:

Itu2021s a u201crouter-on-a-sticku201d configuration. Which means each host in the VLAN must corresponds with the VLAN configured on the sub-interfaces.

VLAN 10 is configured on fa0/0.10 and VLAN 20 on fa0/0.20. So each hosts in VLAN 10 must use fa0/0.10 IP address as their default gateway, each hosts must also be in the same subnet as fa0/0.10 IP u2013 same with hosts in VLAN 20.

So find out the usable IP addresses on each sub-interfaces u2013 for 192.168.1.78 /27: 192.168.1.65 u2013 .94 and for 192.168.1.130 /26: 192.168.1.128 u2013 .190.

Host A (using port 6 u2013 VLAN 10) must use IP 192.168.1.79, default gateway 192.168.1.78. Host B (using port 9 u2013 VLAN 20) must use IP 192.168.1.190, default gateway 192.168.1.130.

Q5. In a GLBP network, who is responsible for the ARP request?

A. AVF

B. AVG

C. Active Router

D. Standby Router

Answer: B

Explanation:

Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address.

The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.

Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

Q6. A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?

A. standard

B. extended

C. dynamic

D. reflexive

Answer: C

Explanation:

We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS+ or RADIUS server. The configuration of dynamic ACL can be read here:http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094 524.shtml

Q7. What authentication type is used by SNMPv2?

A. HMAC-MD5

B. HMAC-SHA

C. CBC-DES

D. community strings

Answer: D

Explanation:

SNMP Versions

Cisco IOS software supports the following versions of SNMP:

u2022SNMPv1 u2014 The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

u2022SNMPv2c u2014 The community-string based Administrative Framework for SNMPv2. SNMPv2c (the "c" stands for "community") is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

u2022SNMPv3 u2014 Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network.

SNMP Security Models and Levels

Model Level

Authentication Encryption What Happens v1 noAuthNoPriv

Community String No

Uses a community string match for authentication. v2c

noAuthNoPriv Community String No

Uses a community string match for authentication. v3

noAuthNoPriv Username

No

Uses a username match for authentication. v3

authNoPriv MD5 or SHA

No

Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. v3

authPriv MD5 or SHA DES

Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.h tml

Q8. Refer to the exhibit.

The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.)

A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.

B. Ensure that cables A and B are straight-through cables.

C. Ensure cable A is plugged into a trunk port.

D. Ensure the switch has power.

E. Reboot all of the devices.

F. Reseat all cables.

Answer: B,D,F

Explanation:

The ports on the switch are not up indicating it is a layer 1 (physical) problem so we should check cable type, power and how they are plugged in.

Q9. Refer to the exhibit.

The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)

A. Configure the gateway on Host A as 10.1.1.1.

B. Configure the gateway on Host B as 10.1.2.254.

C. Configure the IP address of Host A as 10.1.2.2.

D. Configure the IP address of Host B as 10.1.2.2.

E. Configure the masks on both hosts to be 255.255.255.224.

F. Configure the masks on both hosts to be 255.255.255.240.

Answer: B,D

Explanation:

The switch 1 is configured with two VLANs: VLAN1 and VLAN2. The IP information of member Host A in VLAN1 is as follows: Address : 10.1.1.126

Mask : 255.255.255.0

Gateway : 10.1.1.254

The IP information of member Host B in VLAN2 is as follows: Address : 10.1.1.12

Mask : 255.255.255.0

Gateway : 10.1.1.254

The configuration of sub-interface on router 2 is as follows: Fa0/0.1 -- 10.1.1.254/24 VLAN1

Fa0/0.2 -- 10.1.2.254/24 VLAN2

It is obvious that the configurations of the gateways of members in VLAN2 and the associated network segments are wrong. The layer3 addressing information of Host B should be modified as follows:

Address : 10.1.2.X Mask : 255.255.255.0

Q10. What are three reasons to collect Netflow data on a company network? (Choose three.)

A. To identify applications causing congestion.

B. To authorize user network access.

C. To report and alert link up / down instances.

D. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.

E. To detect suboptimal routing in the network.

F. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

Answer: A,D,F

Explanation:

NetFlow facilitates solutions to many common problems encountered by IT professionals.

+ Analyze new applications and their network impact

Identify new application network loads such as VoIP or remote site additions.

+ Reduction in peak WAN traffic

Use NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network top talkers.

+ Troubleshooting and understanding network pain points

Diagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command line interface or reporting tools. -> D is correct.

+ Detection of unauthorized WAN traffic

Avoid costly upgrades by identifying the applications causing congestion. -> A is correct.

+ Security and anomaly detection

NetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars.

+ Validation of QoS parameters

Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.-> F is correct.

P.S. Easily pass 200-125 Exam with Dumpscollection Realistic Dumps & pdf vce, Try Free: http://www.dumpscollection.net/dumps/200-125/ (890 New Questions)