[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 231-240

Get Full Version of the Exam

Question No.231

What levels will be trapped if the administrator executes thecommand router(config)# logging trap 4 (Choose four)

  1. Emergency

  2. Notice

  3. Alert

  4. Error

  5. Warning

Correct Answer: ACDE


The Message Logging is divided into 8 levels as listed below:

Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

  1. errors Error conditions exist

  2. warnings Warning conditions exist

  3. notification Normal, but significant, conditions exist 6 informational Informational messages 7 debugging Debugging messages

    If you specify a level with the quot;logging trap levelquot; command, that level and all the higher levels will be logged. For example, by using the quot;logging trap 4 command, all the logging of emergencies, alerts, critical, errors, warnings will be logged.

    Question No.232

    A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?

    1. standard

    2. extended

    3. dynamic

    4. reflexive

    Correct Answer: C


    We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS or RADIUS server. The configuration of dynamic ACL can be read here: http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524.shtml

    Question No.233

    What are three features of the IPv6 protocol? (Choose three.)

    1. optional IPsec

    2. autoconfiguration

    3. no broadcasts

    4. complicated header

    5. plug-and-play

    6. checksums

    Correct Answer: BCE


    An important feature of IPv6 is that it allows plug and play option to the network devices by allowing them to configure themselves independently. It is possible to plug a node into an IPv6 network without requiring any human intervention. This feature was critical to allow network connectivity to an increasing number of mobile devices. This is accomplished by autoconfiguration.

    IPv6 does not implement traditional IP broadcast, i.e. the transmission of a packet to all hosts on the attached link using a special broadcast address, and therefore does not define broadcast addresses. In IPv6, the same result can be achieved by sending a packet to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4 multicast to address

    Question No.234

    Which IPv6 address is valid?

    A. 2001:0db8:0000:130F:0000:0000:08GC:140B B. 2001:0db8:0:130H::87C:140B

    C. 2031::130F::9C0:876A:130B D. 2031:0:130F::9C0:876A:130B

    Correct Answer: D


    An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The leading 0#39;s in a group can be collapsed using ::, but this can only be done once in an IP address.

    Question No.235

    A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme? (Choose two.)







    Correct Answer: BE


    Subnetting is used to break the network into smaller more efficient subnets to prevent excessive rates of Ethernet packet collision in a large network. Such subnets can be arranged hierarchically, with the organization#39;s network address space (see also Autonomous System) partitioned into a tree-like structure. Routers are used to manage traffic and constitute borders between subnets.

    A routing prefix is the sequence of leading bits of an IP address that precede the portion of the address used as host identifier. In IPv4 networks, the routing prefix is often expressed as a quot;subnet maskquot;, which is a bit mask covering the number of bits used in the prefix. An IPv4 subnet mask is frequently expressed in quad-dotted decimal representation, e.g., is the subnet mask for the network with a 24-bit routing prefix (

    Question No.236

    Refer to the exhibit. What is the most efficient summarization that R1 can use to advertise its networks to R2?







    Correct Answer: C


    The subnet encompasses all routes from the IP range –

    Question No.237

    What authentication type is used by SNMPv2?

    1. HMAC-MD5

    2. HMAC-SHA

    3. CBC-DES

    4. community strings

    Correct Answer: D Explanation: SNMP Versions

    Cisco IOS software supports the following versions of SNMP:


    SNMPv1 The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.


    SNMPv2c The community-string based Administrative Framework for SNMPv2. SNMPv2c (the quot;cquot; stands for quot;communityquot;) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.


    SNMPv3 Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network.

    SNMP Security Models and Levels Model

    Level Authentication Encryption What Happens v1 noAuthNoPriv

    Community String No

    Uses a community string match for authentication. v2c

    noAuthNoPriv Community String No

    Uses a community string match for authentication. v3

    noAuthNoPriv Username No

    Uses a username match for authentication. v3

    authNoPriv MD5 or SHA


    Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. v3

    authPriv MD5 or SHA DES

    Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56- bit encryption in addition to authentication based on the CBC-DES (DES-56) standard.

    Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html

    Question No.238

    Which two statements about static NAT translations are true? (Choose two.)

    1. They allow connections to be initiated from the outside.

    2. They require no inside or outside interface markings because addresses are statically defined.

    3. They are always present in the NAT table.

    4. They can be configured with access lists, to allow two or more connections to be initiated from the outside.

    Correct Answer: AC


    Static NAT is to map a single outside IP address to a single inside IP address. This is typically done to allow incoming connections from the outside (Internet) to the inside. Since these are static, they are always present in the NAT table even if they are not actively in use.

    Question No.239

    Refer to the exhibit. Which address range efficiently summarizes the routing table of the addresses for router Main?






    Correct Answer: B


    The network is the best option as it includes all networks from – and does it more efficiently than the /16 and /18 subnets. The /21 subnet will not include all the other subnets in this one single summarized address.

    Question No.240

    Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two.)

    1. reduces routing table entries

    2. auto-negotiation of media rates

    3. efficient utilization of MAC addresses

    4. dedicated communications between devices

    5. ease of management and troubleshooting

    Correct Answer: AE


    Here are some of the benefits of hierarchicaladdressing:


    Reduced number of routing table entries whether it is with your Internet routers or your internal routers, you should try to keep your routing tables as small as possible by using route summarization. Route summarization is a way of having a single IP address represent a collection of IP addresses; this is most easily accomplished when you employ a hierarchical addressing plan. By summarizing routes, you can keep your routing table entries (on the routers that receive the summarized routes) manageable, which offers the following benefits:


    Efficient allocation of addressesHierarchical addressing lets you take advantage of all possible addresses because you group them contiguously.

    Reference: http://www.ciscopress.com/articles/article.asp?p=174107

    Get Full Version of the Exam
    200-125 Dumps
    200-125 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress