Ucertify give all the vital Cisco 200-125 test components can be located. Getting data on this deal consisting of 200-125 investigation tutorial, 200-125 practice qualifications, 200-125 internet tests motor and also Ucertify Cisco documentation electronic book. Additionally your 200-125 test tutorial is actually resolved by simply I actually.T. pros who allow you to practice evaluation issues in order to achieve your purpose. Some of our Test 200-125 Getting ready Stuff provides you all you could need to take an individuals 200-125 Test. Any 200-125 details are tested and also created by Specialized Documentation Pros who are continuously applying sector expertise to produce specific, and also plausible.

2017 Mar 200-125 free practice exam

Q161.  - (Topic 7)

Refer to the exhibit.

The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.)

A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.

B. Ensure that cables A and B are straight-through cables.

C. Ensure cable A is plugged into a trunk port.

D. Ensure the switch has power.

E. Reboot all of the devices.

F. Reseat all cables.

Answer: B,D,F

Explanation:

The ports on the switch are not up indicating it is a layer 1 (physical) problem so we should check cable type, power and how they are plugged in.


Q162.  - (Topic 8)

What is the best way to verify that a host has a path to other hosts in different networks?

A. Ping the loopback address.

B. Ping the default gateway.

C. Ping the local interface address.

D. Ping the remote network.

Answer: D

Explanation:

Ping is a tool that helps to verify IP-level connectivity; PathPing is a tool that detects packet loss over multiple-hop trips. When troubleshooting, the ping command is used to send an ICMP Echo Request to a target host name or IP address. Use Ping whenever you want to verify that a host computer can send IP packets to a destination host. You can also use the Ping tool to isolate network hardware problems and incompatible configurations.

If you call ipconfig /all and receive a response, there is no need to ping the loopback address and your own IP address — Ipconfig has already done so in order to generate the report.

It is best to verify that a route exists between the local computer and a network host by first using ping and the IP address of the network host to which you want to connect. The command syntax is:

ping < IP address >

Perform the following steps when using Ping:

✑ Ping the loopback address to verify that TCP/IP is installed and configured correctly on the local computer.

ping 127.0.0.1

If the loopback step fails, the IP stack is not responding. This might be because the TCP drivers are corrupted, the network adapter might not be working, or another service is interfering with IP.

✑ Ping the IP address of the local computer to verify that it was added to the network

correctly. Note that if the routing table is correct, this simply forwards the packet to the loopback address of 127.0.0.1.

ping < IP address of local host >

✑ Ping the IP address of the default gateway to verify that the default gateway is functioning and that you can communicate with a local host on the local network.

ping < IP address of default gateway >

✑ Ping the IP address of a remote host to verify that you can communicate through a router.

ping < IP address of remote host >

✑ Ping the host name of a remote host to verify that you can resolve a remote host name.

ping < Host name of remote host >

✑ Run a PathPing analysis to a remote host to verify that the routers on the way to the destination are operating correctly.

pathping < IP address of remote host >


Q163.  - (Topic 8)

Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)

A. It ensures that data will be forwarded by RouterB.

B. It provides stability for the OSPF process on RouterB.

C. It specifies that the router ID for RouterB should be 10.0.0.1.

D. It decreases the metric for routes that are advertised from RouterB.

E. It indicates that RouterB should be elected the DR for the LAN.

Answer: B,C

Explanation: 

A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) -

The router-ID is chosen in the order below:

+ The highest IP address assigned to a loopback (logical) interface.+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.

-> The loopback interface will be chosen as the router ID of RouterB –


Q164.  - (Topic 8)

Which two security appliances will you use in a network? (Choose two.)

A. ATM

B. IDS

C. IOS

D. IOX

E. IPS

F. SDM

Answer: B,E


Refresh 200-125 exams:

Q165.  - (Topic 3)

Refer to the exhibit.

Assuming that the entire network topology is shown, what is the operational status of the interfaces of R2 as indicated by the command output shown?

A. One interface has a problem.

B. Two interfaces have problems.

C. The interfaces are functioning correctly.

D. The operational status of the interfaces cannot be determined from the output shown.

Answer: C

Explanation:

The output shown shows normal operational status of the router’s interfaces. Serial0/0 is down because it has been disabled using the “shutdown” command.


Q166. DRAG DROP - (Topic 6)

Drag the security features on the left to the specific security risks they help protect against on the right. (Not all options are used.)

Answer:


Q167.  - (Topic 3)

What is the effect of using the service password-encryption command?

A. Only the enable password will be encrypted.

B. Only the enable secret password will be encrypted.

C. Only passwords configured after the command has been entered will be encrypted.

D. It will encrypt the secret password and remove the enable secret password from the configuration.

E. It will encrypt all current and future passwords.

Answer: E

Explanation:

Enable vty, console, AUX passwords are configured on the Cisco device. Use the show run command to show most passwords in clear text. If the service password-encryption is used, all the passwords are encrypted. As a result, the security of device access is improved.


Q168.  - (Topic 8)

What are three broadband wireless technologies? (Choose three.)

A. WiMax

B. satellite Internet

C. municipal Wi-Fi

D. site-to-site VPN

E. DSLAM

F. CMTS

Answer: A,B,C