Certification Exam Prep Questions For (200-125) Cisco Certified Network Associate (CCNA)


QuickStart is now offering assessment questions for (200-125) Cisco Certified Network Associate (CCNA). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for (200-125) Cisco Certified Network Associate (CCNA).


Arrow
 

1

How many times has IP SLA been executed successfully on R1?

A. 100
Incorrect.
B. 146
Correct!
C. 0
Incorrect.
D. 1
Incorrect.
2

What is the HSRP priority of R2?

A. 120
Correct!
B. 90
Incorrect.
C. 110
Incorrect.
D. 100
Incorrect.
3

What is the unique device identifier of R1?

A. CISCO887VA-K9
Incorrect.
B. FCZ1121C119
Incorrect.
C. C880data-universalk9-mz.152-3.T.bin
Incorrect.
D. CISCO887VA-K9:FCZ1121C119
Correct!
4

CORE2 has been configured to send its configuration file to the TFTP Server every five minutes. What is the IP address of the TFTP server?

A. 10.10.10.199
Correct!
B. 10.10.10.201
Incorrect.
C. 10.10.10.202
Incorrect.
D. 10.10.10.200
Incorrect.
5

This is a rogue switch connected to CORE1. You know that the switch runs vendor neutral link layer discovery protocol. To which port is the rogue switch connected?

A. Fa1/0/2
Incorrect.
B. Fa2/0/2
Incorrect.
C. Fa1/0/1
Incorrect.
D. Fa2/0/1
Correct!
6

What is the severity level for buffer logging on R1?

7

Which switch was elected root bridge for VLAN 20?

A. Sw_2
Incorrect.
B. Sw_3
Incorrect.
C. Sw_4
Correct!
D. Core_Sw_A
Incorrect.
8

If you wanted to configure Swi as Spanning-tree root bridge for VLAN 10 and Sw_2 as Spanning-tree root bridge for VLAN 20, which commands would you use? (Choose two.)

9

Which device is causing network connectivity issues?

A. Core-Rtr_A
Correct!
B. Sw_4
Incorrect.
C. Sw_3
Incorrect.
D. Sw_2
Incorrect.
10

The security team updated your vulnerability scanner with current plug-ins. The result after running a non-credentialed scan of the network shows an increase in reported vulnerabilities. A custom application running on several hosts is reported as vulnerable. The security team suspects a false positive. What action should the security team take first?

11

Which two commands would you issue on Core_Rtr_A to resolve the network connectivity issues? (Choose two.)

12

You are the network administrator of a company. Router A is connected to four different routers through different interfaces. The exhibit shows the output of the show ip route command issued on the network router. Which router interface would be used to forward a packet with a destination IP address of 192.168.10.1?

A. Serial2
Incorrect.
B. Ethernet0
Incorrect.
C. Serial1
Incorrect.
D. Serial0
Correct!
13

Which field in an ethernet frame is 7 bytes long and is responsible for synchronization?

A. FCS
Incorrect.
B. Source MAC address
Incorrect.
C. Destination MAC address
Incorrect.
D. Preamble
Correct!
14

What are the default administrative distances of RIP and OSPF?

A. 120 and 90
Incorrect.
B. 90 and 120
Incorrect.
C. 120 and 110
Correct!
D. 110 and 120
Incorrect.
15

You need to enable the 802.1x standard in the network shown in the exhibit. Which devices or device is considered an authenticator?

A. Server
Incorrect.
B. PC1
Incorrect.
C. PC1 and Switch
Incorrect.
D. Switch
Correct!
16

You are the network administrator for your company. You decide to implement Enhanced Interior Gateway Routing Protocol (EIGRP) as the routing protocol on the network. You need to configure EIGRP for Autonomous System (AS) 5 and advertise the network 192.168.10.0, which is directly connected to the router on interface Fa0/0. Which set of commands should you use?

17

Based on the information provided in the exhibit, what is the Spanning Tree port role for interface Gi0/1 on Core Sw_A. assuming that you are running the default Per-VLAN Spanning Tree Protocol Plus (PVST+)?

A. Non-Designated Port
Incorrect.
B. Designated Port
Correct!
C. Backup Port
Incorrect.
D. Root Port
Incorrect.
18

Which three statements are true about enabling port-security? (Choose three.)

19

You have made changes to the running configuration of the Cisco switch. You need to save the current configuration to the NVRAM and verify that the changes made to the current configuration have been actually saved in the NVRAM. Which two commands will help you complete the task? (Choose two.)

20

Inter-vlan routing has been configured on the network shown in the exhibit. Which IP address should you configure on PC1 as the default gateway?

A. 192.168.111.1
Incorrect.
B. 192.168.111.2
Incorrect.
C. 192.168.110.1
Correct!
D. 192.168.110.2
Incorrect.
21

Which Cisco router runs IOS XE and can be deployed as a virtual machine in a data center?

A. CSR
Correct!
B. CE
Incorrect.
C. LDP
Incorrect.
D. VRF
Incorrect.
22

Which address type can be used to send a message from one device to a group of devices that subscribe to the information?

A. Unicast address
Incorrect.
B. Broadcast address
Incorrect.
C. IP address
Correct!
D. Multicast address
Incorrect.
23

You are the network administrator for your company. You have enabled port security on a Cisco 2960 switch on the network. You manually added some secured Media Access Control (MAC) addresses on the secured port. You want to remove one of the secured MAC addresses from the address table. Which Cisco 105 command would you use to remove the MAC address?

24

You manage a network with multiple Cisco routers and switches. You receive a new product activation key (PAK) for the routers. You need to install the licenses on each router. What should you do?

25

You issue the show logging command on your router, and you see the output shown in the exhibit. Where will messages with a severity of informational be logged? (Choose two.)

A. Console
Incorrect.
B. Monitor Connections
Incorrect.
C. Syslog Server
Correct!
D. Buffer
Correct!
26

The exhibit displays a sample network diagram. In this network, Host A is able to communicate with Host C, but it is not able to communicate with Host B. You are using the Open System Interconnect (051)-layered model approach for troubleshooting the problem. You replace the cable connecting Switch A to Host B with a known working cable. Which 051 layer should you troubleshoot next to solve the problem?

A. Layer 4
Incorrect.
B. Layer 2
Correct!
C. Layer 7
Incorrect.
D. Layer 3
Incorrect.
27

You are configuring the network with the topology shown in the exhibit. The relevant output from each switch is also shown in the exhibit. You discover that the switches do not create an etherchannel group. What should you do?

28

What is the name of the router that an ISP uses to connect to a customer site and form the edge of a tunnel in Multiprotocol Label Switching (MPLS)?

A. CE
Incorrect.
B. PE
Correct!
C. LDP
Incorrect.
D. P
Incorrect.
29

Which command should you use to verify the interfaces that have been configured on a router and are included in the RIP routing process? (Choose two.)

A. show ip route
Incorrect.
B. show ip protocols
Correct!
C. show running-config
Correct!
D. show ip rip database
Incorrect.
30

You manage the network shown in the exhibit. Which interface or interfaces should be designated as the monitored ports for a SPAN session?

A. GO/2 only
Incorrect.
B. GO/1 and GO/2
Correct!
C. GO/1 only
Incorrect.
D. None of the ports
Incorrect.
PDP Url

Sample Question - Cisco Certified Network Associate (CCNA) (200-125)


Self-Paced

Learning Style

Beginner

Difficulty

1 Hour

Course Duration

Certificate

See Sample

Buy Individually
About Individual Course:
  • Individual course plan gives you access to this course
$109.00
$109.00
/ Each

Outline

More Information

More Information
Lab Access No
Learning Style Self-Paced Learning
Difficulty Beginner
Course Duration 1 Hour
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here