[Free] 2017(Oct) Dumps4cert Testinsides Cisco 200-125 Dumps with VCE and PDF Download 251-260

Dumps4Cert 2017 Oct Cisco Official New Released 200-125
100% Free Download! 100% Pass Guaranteed!

CCNA Cisco Certified Network Associate CCNA (v3.0)

Question No: 251 – (Topic 5)

Which command can you use to manually assign a static IPv6 address to a router interface?

A. ipv6 autoconfig 2001:db8:2222:7272::72/64

B. ipv6 address 2001:db8:2222:7272::72/64

  1. ipv6 address PREFIX_1 ::1/64

  2. ipv6 autoconfig

Answer: B Explanation:

To assign an IPv6 address to an interface, use the “ipv6 address” command and specify the IP address you wish to use.

Question No: 252 – (Topic 5)

Which statement describes VRRP object tracking?

  1. It monitors traffic flow and link utilization.

  2. It ensures the best VRRP router is the virtual router master for the group.

  3. It causes traffic to dynamically move to higher bandwidth links.

  4. It thwarts man-in-the-middle attacks.

Answer: B Explanation:

Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group.

Question No: 253 – (Topic 5)

In GLBP, which router will respond to client ARP requests?

  1. The active virtual gateway will reply with one of four possible virtual MAC addresses.

  2. All GLBP member routers will reply in round-robin fashion.

  3. The active virtual gateway will reply with its own hardware MAC address.

  4. The GLBP member routers will reply with one of four possible burned in hardware addresses.

Answer: A Explanation:

One disadvantage of HSRP and VRRP is that only one router is in use, other routers must wait for the primary to fail because they can be used. However, Gateway Load Balancing Protocol (GLBP) can use of up to four routers simultaneously. In GLBP, there is still only one virtual IP address but each router has a different virtual MAC address. First a GLBP group must elect an Active Virtual Gateway (AVG). The AVG is responsible for replying ARP requests from hosts/clients. It replies with different virtual MAC addresses that correspond to different routers (known as Active Virtual Forwarders – AVFs) so that clients can send traffic to different routers in that GLBP group (load sharing).

Question No: 254 – (Topic 5)

Refer to the exhibit.

Dumps4Cert 2017 PDF and VCE

Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?





Answer: B Explanation:

310 hosts lt; 512 = 29 -gt; We need a subnet mask of 9 bits 0 -gt; 1111 1111.1111 1111.1111

1110.0000 0000 -gt;

Question No: 255 – (Topic 5)

What authentication type is used by SNMPv2?

  1. HMAC-MD5


  3. CBC-DES

  4. community strings

Answer: D Explanation:

SNMP Versions

Cisco IOS software supports the following versions of SNMP:

鈥NMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

鈥NMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the quot;cquot; stands for quot;communityquot;) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

鈥NMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol

defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network.

SNMP Security Models and Levels

Model Level

Authentication Encryption What Happens v1 noAuthNoPriv

Community String No

Uses a community string match for authentication. v2c

noAuthNoPriv Community String No

Uses a community string match for authentication. v3

noAuthNoPriv Username


Uses a username match for authentication. v3

authNoPriv MD5 or SHA


Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. v3

authPriv MD5 or SHA DES

Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.h tml

Question No: 256 – (Topic 5)

Which of these represents an IPv6 link-local address?

A. FE80::380e:611a:e14f:3d69 B. FE81::280f:512b:e14f:3d69 C. FEFE:0345:5f1b::e14d:3d69 D. FE08::280e:611:a:f14f:3d69

Answer: A Explanation:

In the Internet Protocol Version 6 (IPv6), the address block fe80::/10 has been reserved for link-local unicast addressing. The actual link local addresses are assigned with the prefix fe80::/64. They may be assigned by automatic (stateless) or stateful (e.g. manual) mechanisms.

Question No: 257 – (Topic 5)

When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choose two.)

  1. network or subnetwork IP address

  2. broadcast address on the network

  3. IP address leased to the LAN

  4. IP address used by the interfaces

  5. manually assigned address to the clients

  6. designated IP address to the DHCP server

Answer: A,B Explanation:

Network or subnetwork IP address (for example or and broadcast address (for example should never be assignable to hosts. When try to assign these addresses to hosts, you will receive an error message saying that they can’t

be assignable.

Question No: 258 – (Topic 5)

A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)

  1. informational

  2. emergency

  3. warning

  4. critical

  5. debug

  6. error

Answer: B,D,F Explanation:

The Message Logging is divided into 8 levels as listed below:

Level Keyword Description 0

emergencies System is unusable 1


Immediate action is needed 2


Critical conditions exist 3


Error conditions exist 4


Warning conditions exist



Normal, but significant, conditions exist 6

informational Informational messages 7

debugging Debugging messages

If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged. For example, by using the “logging trap 3 command, all the logging of emergencies, alerts, critical, and errors, will be logged.

Question No: 259 – (Topic 5)

What are three benefits of GLBP? (Choose three.)

  1. GLBP supports up to eight virtual forwarders per GLBP group.

  2. GLBP supports clear text and MD5 password authentication between GLBP group members.

  3. GLBP is an open source standardized protocol that can be used with multiple vendors.

  4. GLBP supports up to 1024 virtual routers.

  5. GLBP can load share traffic across a maximum of four routers.

  6. GLBP elects two AVGs and two standby AVGs for redundancy.

Answer: B,D,E

Question No: 260 – (Topic 5)

What are the alert messages generated by SNMP agents called?

  1. TRAP


  3. GET

  4. SET

Answer: A,B Explanation:

A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they’re unacknowledged so you don’t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.

Topic 6, Infrastructure Security

100% Free Download!
Download Free Demo:200-125 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4Cert 200-125 Full Exam PDF and VCE

Dumps4Cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4Cert IT Certification PDF and VCE