Examcollection ccna 200 125 dumps Questions are updated and all 200 125 ccna answers are verified by experts. Once you have completely prepared with our ccna 200 125 ebook exam prep kits you will be ready for the real 200 125 ccna v3 0 exam without a problem. We have Up to date Cisco ccna 200 125 pdf dumps study guide. PASSED ccna 200 125 dumps First attempt! Here What I Did.

Q9.  - (Topic 7)

Scenario

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.

An OSPF neighbor adjacency is not formed between R3 in the main office and R6 in the Branch3 office. What is causing the problem?

A. There is an area ID mismatch.

B. There is a PPP authentication issue; the username is not configured on R3 and R6.

C. There is an OSPF hello and dead interval mismatch.

D. The R3 router ID is configured on R6.

Answer: D

Explanation:

Using the show running-config command we see that R6 has been incorrectly configured with the same router ID as R3 under the router OSPF process.


Q10.  - (Topic 4)

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

A. CHAP uses a two-way handshake.

B. CHAP uses a three-way handshake.

C. CHAP authentication periodically occurs after link establishment.

D. CHAP authentication passwords are sent in plaintext.

E. CHAP authentication is performed only upon link establishment.

F. CHAP has no protection from playback attacks.

Answer: B,C

Explanation:

CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).


Q11.  - (Topic 4)

At which layer of the OSI model does PPP perform?

A. Layer 2

B. Layer 3

C. Layer 4

D. Layer 5

Answer: A

Explanation:

The Point-to-Point Protocol (PPP) provides a standard method for transporting multi- protocol datagrams over point-to-point links. PPP was originally emerged as an encapsulation protocol for transporting IP traffic between two peers. It is a data link layer protocol (layer 2 in the OSI model)


Q12.  - (Topic 3)

Which command reveals the last method used to powercycle a router?

A. show reload

B. show boot

C. show running-config

D. show version

Answer: D

Explanation:

The “show version” command can be used to show the last method to powercycle (reset) a router.


Q13.  - (Topic 5)

In a GLBP network, who is responsible for the ARP request?

A. AVF

B. AVG

C. Active Router

D. Standby Router

Answer: B

Explanation:

Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address.

The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.

Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html


Q14.  - (Topic 8)

Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable auto mode?

A. trunk

B. access

C. dynamic desirable

D. dynamic auto

Answer: C


Q15.  - (Topic 8)

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

A. NAT

B. NTP

C. RFC 1631

D. RFC 1918

Answer: A


Q16.  - (Topic 6)

How does using the service password-encryption command on a router provide additional security?

A. by encrypting all passwords passing through the router

B. by encrypting passwords in the plain text configuration file

C. by requiring entry of encrypted passwords for access to the device

D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

E. by automatically suggesting encrypted passwords for use in configuring the router

Answer: B

Explanation:

By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file