Them qualification checks are extremely famous among the many learners and also doing the job school that go forward in their profession. fact simply being the most significant and most powerful software package giants, that it is 200-125 qualification is tremendously respected by individuals over the world but it ensures that you a job inside a great organization. Thats the marketplace case right now, you now have a Cisco 200-125 you now have a job.

2021 Mar 200-125 free exam questions

Q91.  - (Topic 8)

On which type of device is every port in the same collision domain?

A. a router

B. a Layer 2 switch

C. a hub

Answer: C

Explanation: Collision domainA collision domain is, as the name implies, a part of a

network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. The packets collide and both devices must send the packets again, which reduces network efficiency. Collisions are often in a hub environment, because each port on a hub is in the same collision domain. By contrast, each port on a bridge, a switch or a router is in a separate collision domain.


Q92. DRAG DROP - (Topic 4)

Drag the Frame Relay acronym on the left to match its definition on the right. (Not all acronyms are used.)

Answer:


Q93.  - (Topic 5)

What SNMP message alerts the manager to a condition on the network?

A. response

B. get

C. trap

D. capture

Answer: C

Explanation:

An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP

connection, loss of connection to a neighbor, or other significant events.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-1_9_ea1/configuration/guide/scg/swsnmp.html


Q94.  - (Topic 7)

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

A. source IP address

B. source MAC address

C. egress interface

D. ingress interface

E. destination IP address

F. IP next-hop

Answer: A,D,E

Explanation:

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:

• IP source address

• IP destination address

• Source port

• Destination port

• Layer 3 protocol type

• Class of Service

• Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html


Q95.  - (Topic 3)

What OSPF command, when configured, will include all interfaces into area 0?

A. network 0.0.0.0 255.255.255.255 area 0

B. network 0.0.0.0 0.0.0.0 area 0

C. network 255.255.255.255 0.0.0.0 area 0

D. network all-interfaces area 0

Answer: A

Explanation:

Example 3-1 displays OSPF with a process ID of 1 and places all interfaces configured with an IP address in area 0. The network command network 0.0.0.0 255.255.255.255 area 0 dictates that you do not care (255.255.255.255) what the IP address is, but if an IP address is enabled on any interface, place it in area 0.

Example 3-1 Configuring OSPF in a Single Area

router ospf 1

network 0.0.0.0 255.255.255.255 area 0

Reference: http://www.ciscopress.com/articles/article.asp?p=26919&seqNum=3


Avant-garde 200-125 study guide:

Q96.  - (Topic 7)

Refer to the exhibit.

If the devices produced the given output, what is the cause of the EtherChannel problem?

A. SW1's Fa0/1 interface is administratively shut down.

B. There is an encapsulation mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

C. There is an MTU mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

D. There is a speed mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.

Answer: D

Explanation:

You must configure all interfaces in an EtherChannel to operate at the same speeds and duplex modes. Based on the output shown, SW1 is configured to run at 10Mb while SW2 is operating at 100 Mb.


Q97.  - (Topic 4)

Which two statistics appear in show frame-relay map output? (Choose two.)

A. the number of BECN packets that are received by the router

B. the value of the local DLCI

C. the number of FECN packets that are received by the router

D. the status of the PVC that is configured on the router

E. the IP address of the local router

Answer: B,D

Explanation:

Sample “show frame-relay map” output: R1#sh frame map

Serial0/0 (up): ip 10.4.4.1 dlci 401(0x191,0x6410), dynamic, broadcast,, status defined, active

Serial0/0 (up): ip 10.4.4.3 dlci 403(0x193,0x6430), dynamic, broadcast,, status defined, active

Serial0/0 (up): ip 10.4.4.4 dlci 401(0x191,0x6410), static, CISCO, status defined, active


Q98.  - (Topic 8)

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?

A. 1

B. 2

C. 4

D. 8

Answer: C


Q99.  - (Topic 6)

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Answer: D,E

Explanation:

It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces ->

We cannot physically secure a virtual interface because it is “virtual” ->.

To apply an access list to a virtual terminal interface we must use the “access-class” command. The “access-group” command is only used to apply an access list to a physical interface -> C is not correct.

The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login.


Q100.  - (Topic 5)

Refer to the exhibit.

The Bigtime router is unable to authenticate to the Littletime router. What is the cause of the problem?

A. The usernames are incorrectly configured on the two routers.

B. The passwords do not match on the two routers.

C. CHAP authentication cannot be used on a serial interface.

D. The routers cannot be connected from interface S0/0 to interface S0/0.

E. With CHAP authentication, one router must authenticate to another router. The routers cannot be configured to authenticate to each other.

Answer: B

Explanation:

With CHAP authentication, the configured passwords must be identical on each router. Here, it is configured as little123 on one side and big123 on the other.