Cisco CCNA 200-125 Exam Dumps Latest – New Questions & Answers

Section VII: Infrastructure Management

VII.1. Which command is used to show the interface status of a router?

  • show interface status
  • show ip interface brief
  • show ip route
  • show interface
Show (Hide) Explanation/Reference
The “show ip interface brief” command can be used to view a summary of the router interfaces. This command displays the IP address, interface status, and additional information. An example of the “show ip interface brief” command is shown below. We can see the interface status of E0/0 is “up/up”.

VII.2. After you configure the Loopback0 interface, Which command can you enter to verify the status of the interface and determine whether fast switching is enabled?

  • Router#show ip interface loopback 0
  • Router#show run
  • Router#show interface loopback 0
  • Router#show ip interface brief
Show (Hide) Explanation/Reference
Output from real device

Router2901#sh int g0/0
GigabitEthernet0/0 is up, line protocol is up
Hardware is CN Gigabit Ethernet, address is c471.fe99.9999 (bia c471.fe99.9999)
Description: Lan
Internet address is 10.1.1.1/25
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full Duplex, 1Gbps, media type is RJ45
output flow-control is unsupported, input flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:00, output hang never
Last clearing of “show interface” counters never
Input queue: 0/75/61/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 39000 bits/sec, 30 packets/sec
5 minute output rate 73000 bits/sec, 37 packets/sec
41068530 packets input, 3905407112 bytes, 0 no buffer
Received 8678853 broadcasts (0 IP multicasts)
0 runts, 0 giants, 45 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 79853 multicast, 0 pause input
39267208 packets output, 2262399504 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
79926 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
Router2901#
Router2901 ip int g0/0
GigabitEthernet0/0 is up, line protocol is up
Internet address is 10.1.1.1/25
Broadcast address is 255.255.255.255
Address determined by non-volatile memory
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Secondary address 192.168.1.7/24
Multicast reserved groups joined: 224.0.0.10
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Flow switching is disabled
IP CEF switching is enabled
IP CEF switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Policy routing is disabled
Network address translation is enabled, interface in domain inside
BGP Policy Mapping is disabled
Input features: Common Flow Table, Stateful Inspection, Virtual Fragment Reassembly, Virtual Fragment Reassembly After IPSec Decryption, CAR, MCI Check
Output features: NAT Inside, Common Flow Table, Stateful Inspection, NAT ALG proxy, CAR
Post encapsulation features: CAR
IPv4 WCCP Redirect outbound is disabled
IPv4 WCCP Redirect inbound is disabled
IPv4 WCCP Redirect exclude is disabled
Router2901#

VII.3. In Which CLI configuration mode can you configure the hostname of a device?

  • line mode
  • interface mode
  • global mode
  • router mode

VII.4. Which command can you use to set the hostname on a switch?

  • A. switch-mdf-c1(config)#hostname switch-mdf1
  • B. switch-mdf-c1>hostname switch-mdf1
  • C. switch-mdf-c1#hostname switch-mdf1
  • D. switch-mdf-c1(config-if)#hostname switch-mdf1

VII.5. Which logging command can enable administrators to correlate syslog messages with millisecond precision?

  • no logging console
  • logging buffered 4
  • no logging monitor
  • service timestamps log datetime mscec
  • logging host 10.2.0.21
Show (Hide) Explanation/Reference
The “service timestamps log” command configures the system to apply a time stamp to logging messages. The time-stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD is the date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additional keyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm, where .mmm is milliseconds.

VII.6. Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is caused by excessive end-to-end time?

  • packet loss
  • jitter
  • successive packet loss
  • round-trip time latency

VII.7. Which two statements about northbound and southbound APIs are true? (Choose two.)

  • Only southbound APIs allow program control of the network.
  • Only northbound APIs allow program control of the network.
  • Only southbound API interfaces use a Service Abstraction Layer.
  • Only northbound API interfaces use a Service Abstraction Layer.
  • Both northbound and southbound API interfaces use a Service Abstraction Layer.
  • Both northbound and southbound APIs allow program control of the network.
Show (Hide) Explanation/Reference
A northbound interface is an interface that allows a particular component of a network to communicate with a higher-level component. Conversely, a southbound interface allows a particular network component to communicate with a lower-level component.

The northbound APIs on an SDN controller enable applications and orchestration systems to program the network and request services from it.

Southbound interfaces are implemented with a Service Abstraction Layer (SAL) Which speak to network devices using SNMP and CLI (Command Line Interface) of the elements that make up the network. The main functions of SAL are:
+ Expose device services and capabilities to apps
+ Determine how to fulfill requested service irrespective of the underlying protocol

Note:
+ An API is a method for one application (program) to exchange data with another application.
+ Interface here refers to the “software interface”, not the physical interfaces.

VII.8. While viewing the running configuration of a router, you observe the command logging trap warning. Which syslog messages will the router send?

  • levels 1-4
  • levels 0-4
  • levels 0-5
  • warnings only
  • levels 1-5

VII.9. Which statement about SNMPv2 is true?

  • Its privacy algorithms use MD5 encryption by default.
  • it requires passwords to be encrypyed.
  • Its authetication and privacy algorithms are enable without default values.
  • It requires passwords at least eight characters en length.
Show (Hide) Explanation/Reference
Default values do not exist for authentication or privacy algorithms when you configure the SNMP commands. Also, no default passwords exist. The minimum length for a password is one character, although we recommend that you use at least eight characters for security. If you forget a password, you cannot recover it and must reconfigure the user. You can specify either a plain text password or a localized Message Digest 5 (MD5) digest.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv2c.pdf

VII.10. Which two statements about the extended traceroute command are true? (Choose two.)

  • It can validate the reply data.
  • It can be repeated automatically at a specified interval.
  • It can send packets from a specified interface or IP address.
  • It can use a specified ToS.
  • It can use a specified TTL value.

VII.11. Refer to the exhibit. You have determined that computer A cannot ping computer B. Which reason for the problem is most likely true?

  • The computer B default gateway address is incorrect.
  • The computer B subnet mask is incorrect.
  • The computer A subnet mask is incorrect.
  • The computer A default gateway address is incorrect.

VII.12. If you configure syslog messages without specifying the logging trap level, Which log messages will the router send?

  • informational messages only
  • warning and error conditions only
  • normal but significant conditions only
  • error conditions only
  • all levels except debugging
Show (Hide) Explanation/Reference
Syslog levels are listed below

Level Keyword Description
0 emergencies System is unusable
1 alerts Immediate action is needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist
6 informational Informational messages
7 debugging Debugging messages

The highest level is level 0 (emergencies). The lowest level is level 7. By default, the router will send informational messages (level 6). That means it will send all the syslog messages from level 0 to 6.

VII.13. Which two statements about syslog logging are true?

  • Syslog logging is disabled by default
  • Messages are stored in the internal memory of device
  • Messages can be erased when device reboots
  • Messages are stored external to the device
  • The size of the log file is dependent on the resources of the device.
Show (Hide) Explanation/Reference
By default if we type “show logging” command we will see the Syslog logging has been enabled -> A is not correct.

The syslog messages are stored in the internal buffer of the device. The buffer size is limited to few kilobytes. However, when the device reboots, these syslog messages are lost -> B is correct; C is correct; D is not correct.

VII.14. What is the purpose of the POST operation on a router?

  • determine whether additional hardware has been added
  • locate an IOS image for booting
  • enable a TFTP server
  • set the configuration register
Show (Hide) Explanation/Reference
In short, when powered on the router needs to do:

1. Run POST to check hardware
2. Search for a valid IOS (the Operating System of the router)
3. Search for a configuration file (all the configurations applied to this router)

VII.15. Which function does the IP SLA ICMP ECHO operation perform to assist with troubleshooting?

  • packet-loss detection
  • congestion detection
  • hop-by-hop response time
  • one way jitter measurements

VII.16. Which three commands can you use to set a router boot image? (Choose three.)

  • Router(config)# boot system flash c4500-p-mz.121-20.bin
  • Router(config)# boot system tftp c7300-js-mz.122-33.SB8a.bin
  • Router(config)#boot system rom c7301-advipservicesk9-mz.124-24.T4.bin
  • Router> boot flash:c180x-adventerprisek9-mz-124-6T.bin
  • Router(config)#boot flash:c180x-adventerprisek9-mz-124-6T.bin
  • Router(config)#boot bootldr bootflash:c4500-jk9s-mz.122-23f.bin
Show (Hide) Explanation/Reference
The correct syntax of the “boot” command is “boot system” path. In Which the popular for path can be:
+ flash
+ rom
+ tftp
+ ftp
+ IP address (IP address of the server containing the system image file)

Therefore answers A, B, C are correct.

VII.17. A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

  • It checks the configuration register.
  • It attempts to boot from a TFTP server.
  • It loads the first image file in flash memory.
  • It inspects the configuration file in NVRAM for boot instructions.
Show (Hide) Explanation/Reference
When you turn the router on, it runs through the following boot process.

The Power-On Self Test (POST) checks the router’s hardware. When the POST completes successfully, the System OK LED indicator comes on.
The router checks the configuration register to identify where to load the IOS image from. A setting of 0×2102 means that the router will use information in the startup-config file to locate the IOS image. If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image:

1. Flash (the default location)
2. TFTP server
3. ROM (used if no other source is found)

The router loads the configuration file into RAM (Which configures the router). The router can load a configuration file from:

+ NVRAM (startup-configuration file)
+ TFTP server
If a configuration file is not found, the router starts in setup mode.

VII.18. If you are configuring syslog messages specifying `logging trap warning’, Which log messages will the router send?

  • 0-4
  • 0-5
  • 0-2
  • 0-6
  • 0-1
Show (Hide) Explanation/Reference
0 emergencies System is unusable
1 alerts Immediate action is needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist
6 informational Informational messages
7 debugging Debugging messages

VII.20. If you configure syslog messages without specifying the logging trap level, Which log messages will the router send?

  • 0-4
  • 0-5
  • 0-2
  • 0-6
  • 0-1
Show (Hide) Explanation/Reference
Router(config)# logging trap level – Specifies the kind of messages, by severity level, to be sent to the syslog server. The default is informational (6) and lower ( 0 ­ 6). The possible values for level are as follows:
Emergency: 0
Alert: 1
Critical: 2
Error: 3
Warning: 4
Notice: 5
Informational: 6
Debug: 7

VII.21. Which command can you execute to set the user inactivity timer to 10 seconds?

  • SW1(config-line)#exec-timeout 0 10
  • SW1(config-line)#exec-timeout 10
  • SW1(config-line)#absolute-timeout 0 10
  • SW1(config-line)#absolute-timeout 10
Show (Hide) Explanation/Reference
The “exec-timeout” command is used to configure the inactive session timeout on the console port or the virtual terminal. The syntax of this command is:

exec-timeout minutes [seconds]

Therefore we need to use the “exec-timeout 0 10” command to set the user inactivity timer to 10 seconds.

VII.22. How do you configure a hostname?

  • Router(config)#hostname R1
  • Router#hostname R1
  • Router(config)#host name R1
  • Router>hostname R1

VII.23. Which command is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?

  • transport type all
  • transport output all
  • transport preferred all
  • transport input all
Show (Hide) Explanation/Reference
The “transport input” command is used to define Which protocols to use to connect to a specific line (vty, console, aux…) of the router. The “transport input all” command will allow all protocols (including SSH and Telnet) to do this.

VII.24. Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two)

  • no logging console
  • logging host ip-address
  • terminal monitor
  • show logging | redirect flashioutput.txt
  • snmp-server enable traps syslog
Show (Hide) Explanation/Reference
The “no logging console” turns off logging to the console connection (it is turned on by default) and it is often used if the console received large amount of logging output. But this command is not recommended in normal configuration -> A is not correct.

The command “logging host ip-address” instructs the device to send syslog messages to an external syslog server -> B is correct.

The “show logging | redirect flashioutput.txt” command will put the text file in the router flash memory because we did not specify a remote location (like tftp) -> D is not correct.

The command “snmp-server enable traps syslog” instructs the device to send syslog messages to your network management server as SNMP traps instead of syslog packets. This command itself does not enable debug output to a remote location -> E is not correct.

By default, Cisco IOS does not send log messages to a terminal session over IP, that is, telnet or SSH connections don’t get log messages. But notice that console connections on a serial cable do have logging enabled by default. The command “terminal monitor” helps logging messages appear on the your terminal. First we don’t think this is a correct answer but after reading the question again, we believe it is a suitable one as a Telnet/SSH session may be considered a “remote location” -> C is correct.

VII.25. Which two options are features of the extended ping command? (Choose two.)

  • A. It can send a specific number of packets
  • B. It can send packet from specified interface of IP address
  • C. It can resolve the destination host name
  • D. It can ping multiple host at the same time
  • E. It can count the number of hops to the remote host.
Show (Hide) Explanation/Reference
There are many options to choose when using extended ping. Below shows the options that we can choose:

In which:

Repeat count [5]: Number of ping packets that are sent to the destination address. The default is 5 -> A is correct.
Source address or interface: The interface or IP address of the router to use as a source address for the probes -> B is correct.

For more information about extended ping, please read: http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13730-ext-ping-trace.html

VII.26. What is the cause of the Syslog output messages?

  • The EIGRP neighbor on Fa0/1 went down due to a failed link.
  • The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.
  • A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.
  • Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.
Show (Hide) Explanation/Reference
From the second line of the output, we learned that Fa0/1 interface was shut down so we see the “changed state to administratively down”. The third and fourth line is the result of this action, Which cause Fa0/1 interface “changed state to down” and the EIGRP neighbor relationship with 10.10.11.2 was down.

VII.27. Why is flash memory erased prior to upgrading the IOS image from the TFTP server?

  • The router cannot verify that the Cisco IOS image currently in flash is valid.
  • Flash memory on Cisco routers can contain only a single IOS image.
  • Erasing current flash content is requested during the copy dialog.
  • In order for the router to use the new image as the default, it must be the only IOS image in flash.
Show (Hide) Explanation/Reference
During the copy process, the router asked “Erasing flash before copying? [confirm]” and the administrator confirmed (by pressing Enter) so the flash was deleted.

Note: In this case, the flash has enough space to copy a new IOS without deleting the current one. The current IOS is deleted just because the administrator wants to do so. If the flash does not have enough space you will see an error message like this:

%Error copying tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin (Not enough space on device)

VII.28. In Which two situations should you use out-of-band management? 

  • when a network device fails to forward packets
  • when you require ROMMON access
  • when management applications need concurrent access to the device
  • when you require administrator access from multiple locations
  • when the control plane fails to respond

VII.29. Which command can you enter to configure a local username with an encrypted password and EXEC mode user privileges?

  • Router(config)#username jdone privilege 1 password 7 08314D5D1A48
  • Router(config)#username jdone privilege 1 password 7 PASSWORD1
  • Router(config)#username jdone privilege 15 password 0 08314D5D1A48
  • Router(config)#username jdone privilege 15 password 0 PASSWORD1
Show (Hide) Explanation/Reference
Usually we enter a command like this:

username bill password westward

And the system display this command as follows:

username bill password 7 21398211

The encrypted version of the password is 21398211. The password was encrypted by the Cisco-defined encryption algorithm, as indicated by the “7”.
However, if you enter the following command: “username bill password 7 21398211”, the system determines that the password is already encrypted and performs no encryption. Instead, it displays the command exactly as you entered it.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfpass.html#wp1001412

VII.30. Which statement about the IP SLAs ICMP Echo operation is true?

  • The frequency of the operation .s specified in milliseconds.
  • It is used to identify the best source interface from Which to send traffic.
  • It is configured in enable mode.
  • It is used to determine the frequency of ICMP packets.
Show (Hide) Explanation/Reference
The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time measurements.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_icmp_echo.html

VII.31. What are three components that comprise the SNMP framework? (Choose three)

  • MIB
  • manager
  • supervisor
  • agent
  • set
  • AES

VII.32. Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?

  • ping address
  • tracert address
  • traceroute address
  • arp address
Show (Hide) Explanation/Reference
To check the connectivity between a host and a destination (through some networks) we can use both “tracert” and “ping” commands. But the difference between these two commands is the “tracert” command can display a list of near-side router interfaces in the path between the source and the destination. In this question the PC and the host are in the same VLAN so “tracert” command is not useful as there is no router to go through. Therefore the best answer in this case is “ping address”.

Note: “traceroute” command has the same function of the “tracert” command but it is used on Cisco routers only, not on a PC.

VII.33. What command instructs the device to timestamp Syslog debug messages in milliseconds?

  • service timestamps log datetime localtime
  • service timestamps debug datetime msec
  • service timestamps debug datetime localtime
  • service timestamps log datetime msec
Show (Hide) Explanation/Reference
The “service timestamps debug” command configures the system to apply a time stamp to debugging messages. The time-stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD is the date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additional keyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm, where .mmm is milliseconds

(Reference: http://www.cisco.com/c/en/us/td/docs/ios/fundamentals/command/reference/cf_book/cf_r1.html#wp1030116)

VII.34. Which command can you enter on a switch to determine the current SNMP security model?

  • show snmp group
  • show snmp pending
  • snmp-server contact
  • show snmp engineID
Show (Hide) Explanation/Reference
Three security models are available: SNMPv1, SNMPv2c, and SNMPv3. The security model combined with the security level  determine the security mechanism applied when the SNMP message is processed.

The command “show snmp group” displays the names of groups on the router and the security model, the status of the different views, and the storage type of each group. Below is an example of this command.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_9snmp.html

VII.35. Which statement about upgrading a cisco IOS device with TFTP server ?

  • the operation is performed in active mode
  • the operation is performed in unencrypted format
  • the operation is performed in passive mode
  • the cisco IOS device must be on the same LAN as the TFTP server
Show (Hide) Explanation/Reference
Verify that the TFTP or RCP server has IP connectivity to the router. If you cannot successfully ping between the TFTP or RCP server and the router, do one of the following:
– Configure a default gateway on the router.
– Make sure that the server and the router each have an IP address in the same network or subnet.

Reference: https://www.cisco.com/c/en/us/td/docs/routers/access/1900/software/configuration/guide/Software_Configuration/upgrade.html

The first option implies the router can be in a different subnet from the TFTP server -> D is not correct.

TFTP has no encryption process so answer B is correct.

VII.36. Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

  • SNMPv3 enhanced SNMPv2 security features
  • SNMPv3 added the Inform protocol message to SNMP.
  • SNMPv2 added the Inform protocol message to SNMP
  • SNMPv3 added the GetBulk protocol messages to SNMP
  • SNMPv2 added the GetBulk protocol message to SNMP.
  • SNMPv2 added the GetNext protocol message to SNMP.
Show (Hide) Explanation/Reference
SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct.

(Reference: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-3/snmpv3.html)

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.

Note: These two messages are carried over SNMPv3.

VII.37. Which command do use we to see SNMP version

  • show snmp pending
  • show snmp engineID
  • snmp-server something
  • http://bbs.hh010.com
Show (Hide) Explanation/Reference
The “show snmp pending” command displays the current set of pending SNMP requests. It also displays the SNMP version used.

Router# show snmp pending
req id: 47, dest: 171.69.58.33.161, V2C community: public, Expires in 5 secs
req id: 49, dest: 171.69.58.33.161, V2C community: public, Expires in 6 secs
req id: 51, dest: 171.69.58.33.161, V2C community: public, Expires in 6 secs
req id: 53, dest: 171.69.58.33.161, V2C community: public, Expires in 8 secs

Note:

The “show snmp engineID” displays the identification of the local SNMP engine and all remote engines that have been configured on the router. The following example specifies 00000009020000000C025808 as the local engineID and 123456789ABCDEF000000000 as the remote engine ID, 171.69.37.61 as the IP address of the remote engine (copy of SNMP) and 162 as the port from Which the remote device is connected to the local device:

Router# show snmp engineID
Local SNMP engineID: 00000009020000000C025808
Remote Engine ID           IP-addr          Port
123456789ABCDEF000000000   171.69.37.61     162

VII.38. Which feature can you use to restrict SNMP queries to a specific OID tree?

  • server group
  • a community
  • a view record
  • an access group
Show (Hide) Explanation/Reference
You can assign views to community strings to limit Which MIB objects an SNMP manager can access. The syntax to create a view record is shown below:

Router(config)# snmp-server view view-name oid-tree {included | excluded}

Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html

VII.39. What authentication type is used by SNMPv2 ?

  • username and password
  • community strings
  • HMAC-MD5
  • HMAC-SHA

VII.40. Which two IP SLA operations can you use to measure the end-to-end response time for all IP traffic between a Cisco router and an end device ?(choose two)

  • ICMP path echo
  • UDP echo
  • ICMP path jitter
  • UDP jitter
  • TCP connect
  • ICMP echo
Show (Hide) Explanation/Reference
To measure end-to-end reponse time we have to use ICMP echo to continuously ping to a remote device. The difference between ICMP path echo and ICMP echo is the former can measure hop-by-hop response time on its whole path while the latter can only measure to a specific destination.

VII.41. DRAG DROP. Drag and drop the extended traceroute options from the left onto the correct descriptions on the right.

Select and Place:

Correct Answer:

VII.42. Refer to the exhibit. The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?

  • 3 MB
  • 4 MB
  • 5 MB
  • 7 MB
  • 8 MB
Show (Hide) Explanation/Reference
In this example, there are a total of 8 MB, but 3.8 are being used already, so another file as large as 4MB can be loaded in addition to the original file.

VII.43. Before installing a new, upgraded version of the IOS, what should be checked on the router, and Which command should be used to gather this information? (Choose two.)

  • the amount of available ROM
  • the amount of available flash and RAM memory
  • the version of the bootstrap software presents on the router
  • show version
  • show processes
  • show running-config
Show (Hide) Explanation/Reference
When upgrading new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.

VII.44. Which command reveals the last method used to powercycle a router?

  • show reload
  • show boot
  • show running-config
  • show version
Show (Hide) Explanation/Reference
The “show version” command can be used to show the last method to powercycle (reset) a router.

VII.45. Which command would you use on a Cisco router to verify the Layer 3 path to a host?

  • tracert address
  • traceroute address
  • telnet address
  • ssh address
Show (Hide) Explanation/Reference
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. Traceroute proceedsunless all (three) sent packets are lost more than twice, then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.

VII.46. Refer to the exhibit. A network administrator configures a new router and enters the copy startup- config running-config command on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enters the system configuration dialog as shown. What is the cause of the problem?

  • The network administrator failed to save the configuration.
  • The configuration register is set to 0x2100.
  • The boot system flash command is missing from the configuration.
  • The configuration register is set to 0x2102.
  • The router is configured with the boot system startup command.
Show (Hide) Explanation/Reference
The “System Configuration Dialog” appears only when no startup configuration file is found. The network administrator has made a mistake because the command “copy startup-config running- config” will copy the startup config (Which is empty) over the running config (Which is configured by the administrator). So everything configured was deleted. Note: We can tell the router to ignore the start-up configuration on the next reload by setting the register to 0?142. This will make the “System Configuration Dialog” appear at the next reload.

VII.47. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)

  • RAM
  • NVRAM
  • flash memory
  • HTTP server
  • TFTP server
  • Telnet server
Show (Hide) Explanation/Reference
The following locations can be configured as a source for the IOS image:
1. + Flash (the default location)
2. + TFTP server3. + ROM (used if no other source is found)

VII.48. Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)

  • Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.
  • Router1 is acting as a TFTP server for other routers.
  • Router1 cannot locate a valid IOS image in flash memory.
  • Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
  • Cisco routers will first attempt to load an image from TFTP for management purposes.
Show (Hide) Explanation/Reference
The loading sequence of CISCO IOS is as follows:
Booting up the router and locating the Cisco IOS
1. POST (power on self test)
2. Bootstrap code executed
3. Check Configuration Register value (NVRAM) Which can be modified using the config-register command
0 = ROM Monitor mode
1 = ROM IOS
2 – 15 = startup-config in NVRAM
4. Startup-config filE. Check for boot system commands (NVRAM) If boot system commands in startup-config
a. Run boot system commands in order they appear in startup-config to locate the IOS b. [If boot system commands fail, use default fallback sequence to locate the IOS (Flash, TFTP, ROM)?] If no boot system commands in startup-config use the default fallback sequence in locating the IOS:
a. Flash (sequential)
b. TFTP server (netboot)
c. ROM (partial IOS) or keep retrying TFTP depending upon router model
5. If IOS is loaded, but there is no startup-config file, the router will use the default fallback sequence for locating the IOS and then it will enter setup mode or the setup dialogue.

VII.49. Refer to the exhibit. What can be determined about the router from the console output?

  • No configuration file was found in NVRAM.
  • No configuration file was found in flash.
  • No configuration file was found in the PCMCIA card.
  • Configuration file is normal and will load in 15 seconds.
Show (Hide) Explanation/Reference
When no startup configuration file is found in NVRAM, the System Configuration Dialog will appear to ask if
we want to enter the initial configuration dialog or not.

VII.50. What is a global command?

  • a command that is set once and affects the entire router
  • a command that is implemented in all foreign and domestic IOS versions
  • a command that is universal in application and supports all protocols
  • a command that is available in every release of IOS, regardless of the version or deployment status
  • a command that can be entered in any configuration mode
Show (Hide) Explanation/Reference
When you enter global configuration mode and enter a command, it is applied to the running configuration file that is currently running in ram. The configuration of a global command affects the entire router. An example of a global command is one used for the hostname of the router.

VII.51. What are three factors a network administrator must consider before implementing Netflow in the network?

  • CPU utilization
  • where Netflow data will be sent
  • number of devices exporting Netflow data
  • port availability
  • SNMP version
  • WAN encapsulation

VII.52. What SNMP message alerts the manager to a condition on the network?

  • trap
  • get
  • response
  • capture

VII.53. What are three reasons to collect Netflow data on a company network? (Choose three.)

  • To identify applications causing congestion.
  • To authorize user network access.
  • To report and alert link up / down instances.
  • To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.
  • To detect suboptimal routing in the network.
  • To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

VII.54. What Netflow component can be applied to an interface to track IPv4 traffic?

  • flow monitor
  • flow record
  • flow sampler
  • flow exporter
Show (Hide) Explanation/Reference

Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring process based on the key and nonkey fields in the record, Which is configured for the flow monitor and stored in the flow monitor cache.
For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters Flexible
NetFlow flow monitor configuration mode:
Router(config)# flow monitor FLOW-MONITOR-1
Router(config-flow-monitor)#

VII.55. Which command displays CPU utilization?

  • show protocols
  • show process
  • show system
  • show version
Show (Hide) Explanation/Reference
The “show process” (in fact, the full command is “show processes”) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted)

A more friendly way to check the CPU utilization is the command “show processes cpu history”, in Which the total CPU usage on the router over a period of time: one minute, one hour, and 72 hours are clearly shown:

+ The Y-axis of the graph is the CPU utilization.+ The X-axis of the graph is the increment within the period displayed in the graph For example, from the last graph (last 72 hours) we learn that the highest CPU utilization within 72 hours is 37% about six hours ago.

VII.56. Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three.)

  • ping
  • tracert
  • ipconfig
  • show ip route
  • winipcfg
  • show interfaces
Show (Hide) Explanation/Reference
Ping, show ip route, and show interfaces are all valid troubleshooting IOS commands. Tracert, ipconfig, and
winipcfg are PC commands, not IOS.

VII.57. Syslog was configured with a level 3 trap. Which 4 types of logs would be generated (Choose four.)

  • Emergencies
  • Alerts
  • Critical
  • Errors
  • E. Warnings
Show (Hide) Explanation/Reference

The Message Logging is divided into 8 levels as listed below:
Level Keyword Description
0 emergencies System is unusable
1 alerts Immediate action is needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist 6 informational Informational messages
7 debugging Debugging messages
The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be displayed.
For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.

VII.58. What are the benefit of using Netflow? (Choose three.)

  • Network, Application & User Monitoring
  • Network Planning
  • Security Analysis
  • Accounting/Billing

VII.59. Which protocol can cause overload on a CPU of a managed device?

  • Netflow
  • WCCP
  • IP SLA
  • SNMP
Show (Hide) Explanation/Reference

Sometimes, messages like this might appear in the router console:
%SNMP-3-CPUHOG: Processing [chars] of [chars]
They mean that the SNMP agent on the device has taken too much time to process a request.
You can determine the cause of high CPU use in a router by using the output of the show process cpu command.
Note: A managed device is a part of the network that requires some form of monitoring and management (routers, switches, servers, workstations, printers…).

VII.60. What are the three things that the Netflow uses to consider the traffic to be in a same flow? (Choose three.)

  • IP address
  • Interface name
  • Port numbers
  • L3 protocol type
  • MAC address
Show (Hide) Explanation/Reference

What is an IP Flow?
Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets. Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.
IP Packet attributes used by NetFlow:
+ IP source address
+ IP destination address
+ Source port
+ Destination port
+ Layer 3 protocol type
+ Class of Service
+ Router or switch interface

VII.61. What is the alert message generated by SNMP agents called?

  • TRAP
  • INFORM
  • GET
  • SET
Show (Hide) Explanation/Reference

A TRAP is a SNMP message sent from one application to another (Which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they’re unacknowledged so you don’t actually know if the remote application received your oh-so-important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, Which is nothing more than an acknowledged TRAP.

VII.62. Which three features are added in SNMPv3 over SNMPv2? (Choose three.)

  • Message Integrity
  • Compression
  • Authentication
  • Encryption
  • Error Detection

VII.63. Which three statements about Syslog utilization are true? (Choose three.)

  • Utilizing Syslog improves network performance
  • The Syslog server automatically notifies the network administrator of network problems
  • A Syslog server provides the storage space necessary to store log files without using router disk space
  • There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.
  • Enabling Syslog on a router automatically enables NTP for accurate time stamping
  • A Syslog server helps in aggregation of logs and alerts.

VII.64. A network administrator enters the following command on a router:logging trap 3 . What are three message types that will be sent to the Syslog server?(choose three)

  • warning
  • informational
  • error
  • emergency
  • debug
  • critical

VII.65. What is the default Syslog facility level?

  • local4
  • local5
  • local6
  • local7

VII.66. What is the cause of the Syslog output messages?

  • The EIGRP neighbor on Fa0/1 went down due to a failed link.
  • The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.
  • A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.
  • Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.
Show (Hide) Explanation/Reference
From the second line of the output, we learned that Fa0/1 interface was shut down so we see the “changed state to administratively down”. The third and fourth line is the result of this action, Which cause Fa0/1 interface “changed state to down” and the EIGRP neighbor relationship with 10.10.11.2 was down.

VII.67. What Cisco IOS feature can be enabled to pinpoint an application that is causing slow network performance?

  • SNMP
  • Netflow
  • WCCP
  • IP SLA

VII.68. What command visualizes the general NetFlow data on the command line?

  • show ip flow export
  • show ip flow top-talkers
  • show ip cache flow
  • show mls sampling
  • show mls netflow ip
Show (Hide) Explanation/Reference
The “show ip cache flow” command displays a summary of the NetFlow

VII.69. What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

  • source IP address
  • source MAC address
  • egress interface
  • ingress interface
  • destination IP address
  • IP next-hop

VII.70. Which three are the components of SNMP? (Choose three)

  • MIB
  • SNMP Manager
  • SysLog Server
  • SNMP Agent
  • Set
Show (Hide) Explanation/Reference

SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
The SNMP framework has three parts:
+ An SNMP manager
+ An SNMP agent
+ A Management Information Base (MIB)
The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP.
The most common managing system is called a Network Management System (NMS). The term NMS can be applied to either a dedicated device used for network management, or the applications used on such a device.
A variety of network management applications are available for use with SNMP. These features range from simple command-line applications to feature-rich graphical user interfaces (such as the CiscoWorks2000 line of products).
The SNMP agent is the software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. The agent and MIB reside on the routing device (router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you must define the relationship between the manager and the agent.
The Management Information Base (MIB) is a virtual information storage area for network management information, Which consists of collections of managed objects.

VII.71. What are the Popular destinations for syslog messages to be saved?

  • Flash
  • The logging buffer .RAM
  • The console terminal
  • Other terminals
  • Syslog server
Show (Hide) Explanation/Reference

By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.
Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename.

VII.72. What levels will be trapped if the administrator executes the command router(config)# logging trap 4? (Choose four.)

  • Emergency
  • Notice
  • Alert
  • Error
  • Warning
Show (Hide) Explanation/Reference

The Message Logging is divided into 8 levels as listed below:
Level Keyword Description
0 emergencies System is unusable
1 alerts Immediate action is needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist 6 informational Informational messages 7 debugging
Debugging messages
If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged.
For example, by using the “logging trap 4 command, all the logging of emergencies, alerts, critical, errors,
warnings will be logged.

VII.73. When upgrading the IOS image, the network administrator receives the exhibited error message. What could be the cause of this error?

  • The new IOS image is too large for the router flash memory.
  • The TFTP server is unreachable from the router.
  • The new IOS image is not correct for this router platform.
  • The IOS image on the TFTP server is corrupt.
  • There is not enough disk space on the TFTP server for the IOS image.

VII.74. Refer to the exhibit. What could be possible causes for the “Serial0/0 is down” interface status? (Choose two.)

  • A Layer 1 problem exists.
  • The bandwidth is set too low.
  • A protocol mismatch exists.
  • An incorrect cable is being used.
  • There is an incorrect IP address on the Serial 0/0 interface.

VII.75. Refer to the exhibit. What does the address 192.168.2.167 represent?

  • the TFTP server from Which the file startup-config is being transferred
  • the router from Which the file startup-config is being transferred
  • the TFTP server from Which the file router-confg is being transferred
  • the TFTP server to Which the file router-confg is being transferred
  • the router to Which the file router-confg is being transferred
  • the router to Which the file startup-config is being transferred

VII.76. How can an administrator determine if a router has been configured when it is first powered up?

  • A configured router prompts for a password.
  • A configured router goes to the privileged mode prompt.
  • An unconfigured router goes into the setup dialog.
  • An unconfigured router goes to the enable mode prompt.

VII.77. Which two commands can you enter to verify that a configured NetFlow data export is operational? (Choose two.)

  • show ip flow export
  • show ip cache flow
  • ip flow ingress
  • ip flow egress
  • interface ethernet 0/0
  • ip flow-export destination

VII.78. What is the first step you perform to configure an SNMPv3 user?

  • Configure server traps.
  • Configure the server group.
  • Configure the server host.
  • Configure the remote engine ID.
Show (Hide) Explanation/Reference
The first step we need to do when configuring an SNMPv3 user is to configure the server group to enable authentication for members of a specified named access list via the “snmp-server group” command. For example:

Router(config)# snmp-server group MyGroup v3 auth access snmp_ac

In this example, the SNMP server group MyGroup is configured to enable user authentication for members of the named access list snmp_acl.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html

VII.79. A network administrator has configured access list 173 to prevent Telnet and ICMP traffic from reaching a server with the address of 192.168.13.26. Which commands can the administrator issue to verify that the access list is working properly? (Choose three.)

  • Router# ping 192.168.13.26
  • Router# debug access-list 173
  • Router# show open ports 192.168.13.26
  • Router# show access-lists
  • Router# show ip interface

VII.80. DRAG DROP. Drag and drop the descriptions of performing an initial device configuration from the left onto the correct features or components on the right.

Select and Place:

Correct Answer:

VII.81. DRAG DROP. Drag and drop the descriptions of logging from the left onto the correct logging features or components on the right.

Select and Place:

Correct Answer:

VII.82. DRAG DROP. You are performing the initial configuration on a new Cisco device. Drag the task from the left onto the required or optional category on the right.

Select and Place:

Correct Answer:

Show (Hide) Explanation/Reference

https://www.cisco.com/c/en/us/td/docs/routers/access/2900/hardware/installation/guide/
Hardware_Installation_Guide/Configure.html#91811

VII.83. DRAG DROP. Drag and drop the network programmability features from the left onto the correct description on the right.

Select and Place:

Correct Answer:

VII.84. Which configuration register value can you set on a Cisco device so that it ignores the NVRAM when it boots?

  • 0x2124
  • 0x2120
  • 0x2142
  • 0x2102
Show (Hide) Explanation/Reference
To reset the password we can type “confreg 0x2142” under rommon mode to set the configuration register to 2142 in hexadecimal (the prefix 0x means hexadecimal (base 16)). With this setting when that router reboots, it bypasses the startup-config.

VII.85. Which version of SNMP first allowed user-based access?

  • SNMPv3 with RBAC
  • SNMPv3
  • SNMPv1
  • SNMPv2
Show (Hide) Explanation/Reference
The user-based access control implemented by SNMPv3 is based on contexts and user names, rather than on IP addresses and community strings. It is a partial implementation of the view-based access control model (VACM).

VII.86. Which two criteria must be met to support the ICMP echo IP SLA? (Choose two)

  • The destination device must support the echo protocol
  • default gateway must be configured for the source and destination devices
  • The source device must be running Layer 2 services.
  • The source and destination devices must be Cisco devices
  • The source device must be a Cisco device but the destination device can be from any vendor

VII.87. Which two characteristics of an ICMP echo-based IP SLA are true? (Choose two)

  • It can use RSPAN to report network statistics to a designated remote port
  • It aggregates traffic statistics for reporting on a configurable basis
  • It requires a remote device to log and maintain collected data
  • It measures traffic to determine the reliability of a connection from a Cisco router to a designated end device
  • It generates continuous traffic to monitor network performance

VII.88. Which two commands can you use to verify an IP SLA? (Choose two.)

  • show ip sla application
  • show ip sla history
  • show ip sla configuration
  • show ip sla reaction-configuration
  • show ip sla statistics

VII.89. Which effect of the terminal monitor command is true?

  • It displays the configuration of the syslog server
  • It configures a syslog server
  • It configures the device to log messages to the console
  • It puts the device into global configuration mode

VII.90. Which command is configured on a switch to enable neighbor discovery in a multivendor environment?

  • lldp run
  • lldp transmit
  • lldp receive
  • cdp run

VII.91. Which API uses HTTP messages to transfer data to applications residing on different hosts?

  • OpenStack
  • REST
  • OpenFlow
  • OpFlex

VII.92. You are configuring an IP SLA ICMP Echo operation to troubleshoot a network connectivity issue. When do you enter an IP address to test the IP SLA?

  • when you define the ICMP Echo operation
  • when you enable the ICMP Echo operation
  • when you verify the IP SLA operation
  • when you specify the test frequency

Related Articles

113
Leave a Reply

avatar
62 Comment threads
51 Thread replies
17 Followers
 
Most reacted comment
Hottest comment thread
66 Comment authors
Null0NarcisAlexGaboAndreas Recent comment authors
newest oldest most voted
Null0
Guest
Null0

For everyone that is gonna take the test these days, just wanna say that more that 80% of the questions in here where in the test that i took today. Just pay attention to details. About LAB i had ACL one and EIGRP, but careful because configuration at EIGRP was a bit diffrent. Cheers

Narcis
Guest
Narcis

Question VII.15…the correct answer is c. hop-by-hop response time

Alex
Guest
Alex

VI.A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?

Answer: C

Null0
Guest
Null0

145. Question is wrong, you need to switch single homed with single multihomed…multihomed means two or more different ISP and homed mean to only one ISP.

Null0
Guest
Null0

VIII.136. Which access layer threat mitigation technique provides security by acting as a filter between trusted and untrusted traffic sources?

DHCP snooping
dynamic packet inspection
a nondefault native VLAN
802.1X

It is DHCP Snooping and not 802.1X the correct answer.

” DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. The DHCP snooping feature performs the following activities: ….
The DHCP snooping feature determines whether traffic sources are trusted or untrusted….” from cisco site.

alex
Guest
alex

II.112 Refer to the exhibit. The two exhibited devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? (Choose three.)

correct answer:

The Manchester serial address is 10.1.1.1
The London router is a Cisco 2610
The CDP information was received on port Serial0/0 of the Manchester router

Andreas
Guest
Andreas

qestion II.24 Which three commands MUST you enter
we cant enter 2 modes. in layer 3 switches we have to put switchport trunk encapsulation dot1q but the question doesnt mention layer 3. any suggestions?

Andreas
Guest
Andreas

question I.71 the answer is different than the explanation. pls be more specific

Adam
Guest
Adam

what does these sections means which pages is current and valid?

Germán Castro
Guest
Germán Castro

hi, guys. I believe the ansewer to the first question “. Which three statements about DWDM are true?” is wrong. It seems to me that the correct ones are A B D, instead of C D E as shown. Could you please comment on that?

Gabo
Guest
Gabo

I think the same too. That question appear in Sect II and IV. In the 2nd is answered correct.

****************************************************
DWDM circuits are used in all modern submarine communications cable systems and other long-haul circuits.

Specifically, DWDM

Enables bidirectional communications over one strand of fiber
Assigns incoming optical signals to specific wavelengths of light (i.e., frequencies)
Each channel is capable of carrying a 10-Gbps multiplexed signal
Can multiplex more than 80 different channels of data (i.e., wavelengths) onto a single fiber
Can amplify these wavelengths to boost the signal strength
Supports SONET and SDH standards

Alin
Guest
Alin

Question 159 the correct answer is 2 no 3 . I’m right?

Null0
Guest
Null0

Nope, its 3… 3 host to one port of a switch with a hub ( one collision), 2 hosts in another port ( two collision) and one port of the switch to the router and we have 3 collision, because it is asking how many collision are seen from the router and the router should be connected to the switch. Hope it helps

Khan
Guest
Khan

did anyone attempt the Cisco 200-125 exam in feb? Plz help out with the lab that came?

Bart
Guest
Bart

I.124. Which three are characteristics of an IPv6 anycast address? (Choose three.)

in that question you have only 2 answers marked instead of 3.

alex
Guest
alex

the third answer is: one-to-nearest communication model

Robin Hatton
Guest
Robin Hatton

I.34. – SA is the only possible answer as DA (although 6bytes) does not have to be a unique address as it can also be a broadcast address.

– Robin

Meek Mars
Guest
Meek Mars

Question 32

Why is not switch 1 the Root as it has the lowest priority?

Is it because switch 3 is at the distribution level?

Festus Morumbasi
Guest
Festus Morumbasi

VIII.232. Which port security violation mode drop traffic from unknown MAC addresses and sends an SNMP trap?

Correct answer: restrict

wasd22
Guest
wasd22

question 201 and 232 are the same with different answers.
VIII.232. Which port security violation mode drop traffic from unknown MAC addresses and sends an SNMP trap?

Protect
Resrict
Shutdown
Shutdown VLAN

still not sure about the answer, becuase the snmp trap is sent on different IOS version of the catalyst series ( https://community.cisco.com/t5/switching/snmp-trap-port-security-violation-shutdown-problem-stumper/td-p/1894494 )
3560X and 3750X, 3570 sent the snmp trap only on restrict, don’t know about newer models.

can somebody please clarify this? even in the netacad platform there isn’t a clear explanation (5.2.2.3 CCNA module 2)

hmm
Guest
hmm

I think #214 is wrong

should be Verify that the devices of interest are included in the device inventory

source: https://www.econfigs.com/ccna-6-4-verify-acls-using-the-apic-em-path-trace-acl-analysis-tool/

Before You Begin
Make sure that you have devices in your inventory. If not, discover devices using the Discovery function.
Ensure that the controller has SSH or Telnet access to the device

Abeer
Guest
Abeer

is it updated ?

vinoth
Guest
vinoth

hi i study CCNA version 6 .next month i will sit for the exam which dump is perfect for me please can you tell me

Alex
Guest
Alex

In qestion 221 I think the corect annswerd is pc to router crossover and sw to hub strait I think

Tanvir
Guest
Tanvir

Someones told me ccna dumps change today last dumps didn’t work, can you give me the latest dumps please

Sabbir
Guest
Sabbir

Q221: PC to Router cable is Crossover and Switch to Wireless Point is Staright-Through.

Farid
Guest
Farid

Hey guys, I wanted to ask a question on if we will get exact same questions on the real exam, and if this is made for practice only?

soni.ritika220@gmail.com
Guest
soni.ritika220@gmail.com

72. Which two statements about VTP are true? (Choose two.)

All switches must be configured with the same VTP domain name*
All switches must be configured to perform trunk negotiation.
All switches must be configured with a unique VTP domain name
The VTP server must have the highest revision number in the domain*
All switches must use the same VTP version.

The answer should be
All switches must be configured with the same VTP domain name*
All switches must use the same VTP version.
Please correct me if I am wrong

Abdi
Guest
Abdi

hey guys. the current CCNA is version 6. but the dump is i think its version 3 how can its compatible? please reply.

Abdi
Guest
Abdi

no one reply?

harlock
Guest
harlock

Is it still vaild?

Jin Kas
Guest
Jin Kas

Hi, is this still valid the questions and labs?

Nirmesh
Guest
Nirmesh

Is it still relevant?

John
Guest
John

Hello,
Can you please provide a downloaded pdf version?
Thank you.

Sasi
Guest
Sasi

Are these questions still valid

xhh
Guest
xhh

are the exams strick about mobile phone in room

Kamil
Guest
Kamil

VIII. 113. Show license udi and show version are correct. There is no command like show license status at all.

Ron
Guest
Ron

I don’t see IP SLA questions in this website. Does anyone know which session it belongs to ?
Thanks,

*.onion
Guest
*.onion

VIII.147
Correct Answer are:
–>Define a dialer interface*
–>**Create a dialer pool and bind it to the physical interface**

(Create a dialer pool and bind it to the virtual template* its not a correct anwser)

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-xe-3s-book/bba-pppoe-client-xe.html

*.onion
Guest
*.onion

VIII.108
corrects answer are:
–>The interface is error-disabled if packets arrive from a new unknown source address*
–>**It has dynamically learned two secure MAC addresses.**

When violation-mode is protect, violation counter does NOT increment.

(The security violation counter increments if packets arrive from a new unknown source address* its not a correct anwser)

https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/nxos/commands/l2/switchport-port-security-violation.html

Mati
Guest
Mati

–>The interface is error-disabled if packets arrive from a new unknown source address* INCORRECT

–>**It has dynamically learned two secure MAC addresses.** CORRECT

*.onion
Guest
*.onion

VIII.92.
I think, the correct answer is strict:
Strict is used to specify the hop(s) that you want the packet to go through, but no other hop(s) are allowed to be visited.

Record is a very useful option because it displays the address(es) of the hops (up to nine) the packet goes through.

https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13730-ext-ping-trace.html

Joseph
Guest
Joseph

VIII.147.Which two actions must you take to correctly configure PPPoE on a client? (Choose two.)
The right answer is a : Define a dialer interface and Create a dialer pool and bind it to the physical
interface.

Rey
Guest
Rey

III.42. According to the routing table, where will the router send a packet destined for 10.1.5.65? – The multiple choice answers given in the VCE file needs to be corrected to the ones displayed here. III.15. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1? – No routing table is displayed 🙁 III.109. Which two are advantages of static routing when compared to dynamic routing? (Choose two.) – In the VCE file it only lets you choose one option even though it says choose two. III.65. A router receives… Read more »

Andrew
Guest
Andrew

VIII.25. Which two statements about configuring an Ether Channel on a Cisco switch are true?(Choose two)

The right answers are:
The interfaces configured in the Ether Channel must operate at the same speed and duplex mode*
The interfaces configured in the Ether Channel must be part of the same VLAN or trunk

But not:
The interfaces configured in the Ether Channel must be on the same physical switch*

Kevin
Guest
Kevin

Thank you for the information on your site, it really is very useful. About the file in VCE format please update it with all questions.

Andrew
Guest
Andrew

The question:
I.87. Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?

The right answer is a NDP, not an ARP

Andrey
Guest
Andrey

Question:
I.87.Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?
Right answer is NDP, not an ARP!!!

Tony
Guest
Tony

Are these questions still valid as i will be writing the exam in 2weeks time?

Rey
Guest
Rey

Routing Technologies – III.123. You have configured a router with an OSPF router ID, but its IP address still reflects the physical interface. Which action can you take to correct the problem in the least disruptive way?

Reload the OSPF process
Reboot the router
Specify a loopback address*
Save the router configuration

This one is really confusing. I think the correct answer is Reload the OSPF process.

Rey
Guest
Rey

Section V: Infrastructure Services, Q51: What statement is true about this configuration?

The answer should be C: the number 1 referred to in the ip inside source command references access-list number 1.

Agustin
Guest
Agustin

I had the exam last week. I gave it wrong. But 80% or more of the questions are here. Especially in section 8. My recommendation is to study a lot of labs, section 8 and all drag and drop

Andreea
Guest
Andreea

Hello,

I will go to the exam on 4 November. Could you please tell me if these dumps are still available?

Thank you very much!

tom
Guest
tom

Did you pass it?

Andreea
Guest
Andreea

Yes

tom
Guest
tom

Did you use another source except this website? Or just this questions are enough to pass it? Becase I’ll go memorize it. Thank you

ivan
Guest
ivan

Passed my exam past weekend. This site is very good, highly reccomend.

T.G.
Guest
T.G.

This is a great piece of job. I thank you all for taking the time to put this together. Very helpful. 🙂