It is more faster and easier to pass the Cisco 200-125 exam by using Certified Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) questuins and answers. Immediate access to the Improved 200-125 Exam and find the same core area 200-125 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Sep 200-125 practice test

Q11. DRAG DROP - (Topic 7) 


Answer: 



Q12. - (Topic 9) 

What is the purpose of the POST operation on a router? 

A. determine whether additional hardware has been added 

B. locate an IOS image for booting 

C. enable a TFTP server 

D. set the configuration register 

Answer: A 


Q13. - (Topic 5) 

Which three statements about HSRP operation are true? (Choose three.) 

A. The virtual IP address and virtual MA+K44C address are active on the HSRP Master router. 

B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval. 

C. HSRP supports only clear-text authentication. 

D. The HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same LAN. 

E. The HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN. 

F. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing. 

Answer: A,B,F 


Q14. - (Topic 1) 

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation? 

A. application 

B. presentation 

C. session 

D. transport 

E. internet 

F. data link 

Answer: A 


Q15. - (Topic 7) 

What are the three things that the Netflow uses to consider the traffic to be in a same flow? (Choose three) 

A. IP address 

B. Interface name 

C. Port numbers 

D. L3 protocol type 

E. MAC address 

Answer: A,C,D 


200-125 exam question

Leading 200-125 test preparation:

Q16. - (Topic 7) 

Scenario 

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links. 

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices. 









An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office. What is causing the problem? 

A. There is an area ID mismatch. 

B. There is a PPP authentication issue; a password mismatch. 

C. There is an OSPF hello and dead interval mismatch. 

D. There is a missing network command in the OSPF process on R5. 

Answer: C 


Q17. - (Topic 2) 

Which switch would STP choose to become the root bridge in the selection process? 

A. 32768: 11-22-33-44-55-66 

B. 32768: 22-33-44-55-66-77 

C. 32769: 11-22-33-44-55-65 

D. 32769: 22-33-44-55-66-78 

Answer: A 


Q18. - (Topic 1) 

Refer to the exhibit. 


Which three statements correctly describe Network Device A? (Choose three.) 

A. With a network wide mask of 255.255.255.128, each interface does not require an IP address. 

B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet. 

C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other. 

D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other. 

E. With a network wide mask of 255.255.254.0, each interface does not require an IP address. 

Answer: B,D,E 


Q19. - (Topic 9) 

After you configure the Loopback0 interface, which command can you enter to verify the status of the interface and determine whether fast switching is enabled? 

A. Router#show ip interface loopback 0 

B. Router#show run 

C. Router#show interface loopback 0 

D. Router#show ip interface brief 

Answer: A 


Q20. - (Topic 6) 

What can be done to secure the virtual terminal interfaces on a router? (Choose two.) 

A. Administratively shut down the interface. 

B. Physically secure the interface. 

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command. 

D. Configure a virtual terminal password and login process. 

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command. 

Answer: D,E