When the 200-125 individuals are usually undertaken straight from your Cisco University training curriculum, that doctor needs to realize the one thing, they should in the experts/senior masters teaching. Cisco University is usually a multinational enterprise institutions, when controling Cisco 200-125 along with Cisco computer software teaching heart is perhaps all over the world, so that all necessary locations in the products several years of working experience, individuals can readily obtain their particular teaching heart around Cisco.

2017 Mar 200-125 exam price

Q141.  - (Topic 8)

Which configuration command can you apply to a router so that its local interface becomes active if all other routers in the group fail?

A. Router(config)#standby 1 preempt

B. No additional configuration is required

C. Router(config)#standby 1 Priority 250

D. Router(config)#standby 1 track Ethernet

Answer: A

Q142.  - (Topic 7)

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

A. source IP address

B. source MAC address

C. egress interface

D. ingress interface

E. destination IP address

F. IP next-hop

Answer: A,D,E


Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes. IP Packet attributes used by NetFlow:

• IP source address

• IP destination address

• Source port

• Destination port

• Layer 3 protocol type

• Class of Service

• Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html

Q143.  - (Topic 3)

Which command would you use on a Cisco router to verify the Layer 3 path to a host?

A. tracert address

B. traceroute address

C. telnet address

D. ssh address

Answer: B


In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. Traceroute proceeds unless all (three) sent packets are lost more than twice, then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.

Q144. DRAG DROP - (Topic 3)

Drag the Cisco default administrative distance to the appropriate routing protocol or route. (Not all options are used.)


Q145.  - (Topic 3)

What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router?

A. 2

B. 8

C. 16

D. unlimited

Answer: B


maximum-paths (OSPF)

To control the maximum number of parallel routes that Open Shortest Path First (OSPF) can support, use the maximum-paths command.

Syntax Description


Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16 routes.

Command Default

8 paths

Most up-to-date 200-125 exam topics:

Q146.  - (Topic 3)

Which command encrypts all plaintext passwords?

A. Router# service password-encryption

B. Router(config)# password-encryption

C. Router(config)# service password-encryption

D. Router# password-encryption

Answer: C



The “service password-encryption” command allows you to encrypt all passwords on your router so they cannot be easily guessed from your running-config. This command uses a very weak encryption because the router has to be very quickly decode the passwords for its operation.

It is meant to prevent someone from looking over your shoulder and seeing the password, that is all. This is configured in global configuration mode.

Q147.  - (Topic 8)

While troubleshooting a connection problem on a computer, you determined that the computer can ping a specific web server but it cannot connect to TCP port 80 on that server. Which reason for the problem is most likely true?

A. A VLAN number is incorrect.

B. A Route is missing

C. An ARP table entry is missing.

D. An ACL is blocking the TCP port.

Answer: D

Q148.  - (Topic 5)

What are the Popular destinations for syslog messages to be saved? (Choose three)

A. Flash

B. The logging buffer .RAM

C. The console terminal

D. Other terminals

E. Syslog server

Answer: B,C,E


By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.

Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename.

Q149.  - (Topic 3)

Refer to the exhibit.

What can be determined about the router from the console output?

A. No configuration file was found in NVRAM.

B. No configuration file was found in flash.

C. No configuration file was found in the PCMCIA card.

D. Configuration file is normal and will load in 15 seconds.

Answer: A


When no startup configuration file is found in NVRAM, the System Configuration Dialog will appear to ask if we want to enter the initial configuration dialog or not.

Q150.  - (Topic 3)

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C


Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.

After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA

is copied and forwarded to every neighbor except the one that sent the LSA.