Want to know Testking 200 125 ccna pdf Exam practice test features? Want to lear more about Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) certification experience? Study Highest Quality Cisco ccna 200 125 ebook answers to Improve 200 125 ccna v3 0 questions at Testking. Gat a success with an absolute guarantee to pass Cisco ccna 200 125 ebook (CCNA Cisco Certified Network Associate CCNA (v3.0)) test on your first attempt.
Q71. - (Topic 8)
when you troubleshoot an IPv4 connectivity issue on a router, which three router configuration checks you must perform?
A. Verify that the router interface IP address IP address is correct.
B. Verify that the DNS is configured correctly.
C. Verify that the router and the host use the same subnet mask.
D. Verify that the router firmware is up-to-date.
E. Verify that a default route is configured.
F. Verify that the route appears in the routing table
Q72. - (Topic 6)
Refer to exhibit.
A network administrator cannot establish a Telnet session with the indicated router. What is the cause of this failure?
A. A Level 5 password is not set.
B. An ACL is blocking Telnet access.
C. The vty password is missing.
D. The console password is missing.
The login keyword has been set, but not password. This will result in the “password
required, but none set” message to users trying to telnet to this router.
Q73. - (Topic 8)
Which MAC protocol sets a random timer to reattempt communication?
A. IEEE 802.1x
Q74. - (Topic 5)
What are two benefits of using NAT? (Choose two.)
A. NAT facilitates end-to-end communication when IPsec is enabled.
B. NAT eliminates the need to re-address all hosts that require external access.
C. NAT conserves addresses through host MAC-level multiplexing.
D. Dynamic NAT facilitates connections from the outside of the network.
E. NAT accelerates the routing process because no modifications are made on the packets.
F. NAT protects network security because private networks are not advertised.
By not revealing the internal IP addresses, NAT adds some security to the inside network -
> F is correct.
NAT has to modify the source IP addresses in the packets -> E is not correct.
Connection from the outside of the network through a “NAT” network is more difficult than a more network because IP addresses of inside hosts are hidden -> C is not correct.
In order for IPsec to work with NAT we need to allow additional protocols, including Internet Key Exchange (IKE), Encapsulating Security Payload (ESP) and Authentication Header (AH) -> more complex -> A is not correct.
By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re- address the inside hosts -> B is correct.
NAT does conserve addresses but not through host MAC-level multiplexing. It conserves addresses by allowing many private IP addresses to use the same public IP address to go to the Internet -> C is not correct.
Q75. - (Topic 8)
Which component of the routing table ranks routing protocols according to their preferences?
A. administrative distance
B. next hop
D. routing protocol code
Administrative distance - This is the measure of trustworthiness of the source of the route. If a router learns about a destination from more than one routing protocol, administrative distance is compared and the preference is given to the routes with lower administrative distance. In other words, it is the believability of the source of the route.
Q76. - (Topic 5)
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address?
For this example, the network range is 172.16.16.1 - 172.16.31.254, the network address is 172.16.16.0 and the broadcast IP address is 172.16.31.255.
Q77. - (Topic 5)
What SNMP message alerts the manager to a condition on the network?
An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP
connection, loss of connection to a neighbor, or other significant events.
Q78. - (Topic 5)
Refer to the exhibit.
Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?
310 hosts < 512 = 29 -> We need a subnet mask of 9 bits 0 -> 1111 1111.1111 1111.1111
1110.0000 0000 -> 255.255.254.0
Q79. - (Topic 5)
What is the first 24 bits in a MAC address called?
An Organizationally Unique Identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization globally or worldwide.
They are used as the first 24 nits of the MAC address to uniquely identify a particular piece of equipment.
Q80. - (Topic 8)
Which action can change the order of entries in a named access list?
A. opening the access list in Notepad.
C. removing an entry
D. adding an entry