[Free] 2017(Oct) Dumps4cert Testinsides Cisco 200-125 Dumps with VCE and PDF Download 291-300

Dumps4Cert 2017 Oct Cisco Official New Released 200-125
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4Cert.com/200-125.html

CCNA Cisco Certified Network Associate CCNA (v3.0)

Question No: 291 – (Topic 7)

What are the benefits of using Netflow? (Choose three.)

  1. Network, Application amp; User Monitoring

  2. Network Planning

  3. Security Analysis

  4. Accounting/Billing

Answer: A,C,D

Explanation:

NetFlow traditionally enables several key customer applications including:

Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g.

Web server sizing and VoIP deployment) to responsively meet customer demands.

User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network.

Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting.

Service providers may utilize the information for billing based on time-of-day, bandwidth

usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.

Question No: 292 – (Topic 7)

Refer to the exhibit.

Dumps4Cert 2017 PDF and VCE

A network administrator attempts to ping Host2 from Host1 and receives the results that are shown. What is the problem?

  1. The link between Host1 and Switch1 is down.

  2. TCP/IP is not functioning on Host1

  3. The link between Router1 and Router2 is down.

  4. The default gateway on Host1 is incorrect.

  5. Interface Fa0/0 on Router1 is shutdown.

  6. The link between Switch1 and Router1 is down.

Answer: C Explanation:

Host1 tries to communicate with Host2. The message destination host unreachable from Router1 indicates that the problem occurs when the data is forwarded from Host1 to Host2. According to the topology, we can infer that the link between Router1 and Router2 is down.

Question No: 293 – (Topic 7)

Scenario

Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Study the following output taken on R1: R1# Ping 10.5.5.55 source 10.1.1.1 Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 10.5.5.55, timeout is 2 seconds:

Packet sent with a source address of 10.1.1.1

…….

Success rate is 0 percent (0/5) Why are the pings failing?

  1. The network statement is missing on R5.

  2. The loopback interface is shut down on R5.

  3. The network statement is missing on R1.

  4. The IP address that is configured on the Lo1 interface on R5 is incorrect.

Answer: C Explanation:

R5 does not have a route to the 10.1.1.1 network, which is the loopback0 IP address of R1. When looking at the EIGRP configuration on R1, we see that the 10.1.1.1 network statement is missing on R1.

Dumps4Cert 2017 PDF and VCE

Question No: 294 – (Topic 7)

Scenario

Refer to the topology. Your company has connected the routers R1, R2, and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various

routers.

Use the appropriate show commands to troubleshoot the issues.

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Router R6 does not form an EIGRP neighbor relationship correctly with router R1. What is the cause for this misconfiguration?

  1. The K values mismatch.

  2. The AS does not match.

  3. The network command is missing.

  4. The passive interface command is enabled.

Answer: C Explanation:

The link from R1 to R6 is shown below:

Dumps4Cert 2017 PDF and VCE

As you can see, they are both using e0/0. The IP addresses are in the 192.168.16.0 network:

Dumps4Cert 2017 PDF and VCE

But when we look at the EIGRP configuration, the “network 192.168.16.0” command is missing on R6.

Dumps4Cert 2017 PDF and VCE

Question No: 295 – (Topic 7)

Scenario:

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

R1 does not form an OSPF neighbor adjacency with R2. Which option would fix the issue?

  1. R1 ethernet0/1 is shutdown. Configure no shutdown command.

  2. R1 ethernet0/1 configured with a non-default OSPF hello interval of 25; configure no ip ospf hello-interval 25.

  3. R2 ethernet0/1 and R3 ethernet0/0 are configured with a non-default OSPF hello

    interval of 25; configure no ip ospf hello-interval 25.

  4. Enable OSPF for R1 ethernet0/1; configure ip ospf 1 area 0 command under ethernet0/1.

Answer: B Explanation:

Looking at the configuration of R1, we see that R1 is configured with a hello interval of 25 on interface Ethernet 0/1 while R2 is left with the default of 10 (not configured).

Dumps4Cert 2017 PDF and VCE

Question No: 296 – (Topic 7)

Refer to the exhibit.

Dumps4Cert 2017 PDF and VCE

An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?

  1. data link layer

  2. application layer

  3. access layer

  4. session layer

  5. network layer

Answer: E Explanation:

The command ping uses ICMP protocol, which is a network layer protocol used to propagate control message between host and router. The command ping is often used to verify the network connectivity, so it works at the network layer.

Question No: 297 – (Topic 7)

What are three factors a network administrator must consider before implementing Netflow in the network? (Choose three.)

  1. CPU utilization

  2. where Netflow data will be sent

  3. number of devices exporting Netflow data

  4. port availability

  5. SNMP version

  6. WAN encapsulation

Answer: A,B,C Explanation:

NetFlow has a reputation for increasing CPU utilization on your network devices. Cisco#39;s performance testing seems to indicate that newer hardware can accommodate this load pretty well, but you will still want to check it out before you turn on the feature. Some symptoms of high CPU utilization are very large jitter and increased delay. Services running on the device may also be affected.

Another thing to keep in mind is the amount of data you#39;re going to be sending across the network. Depending on how much traffic you have and how you configure it, the traffic can

be substantial. For example, you may not want to send NetFlow data from a datacenter switch to a NetFlow collector on the other side of a small WAN circuit. Also bear in mind that the flows from aggregating large numbers of devices can add up.

Reference: http://searchenterprisewan.techtarget.com/tip/How-the-NetFlow-protocol- monitors-your-WAN

Question No: 298 CORRECT TEXT – (Topic 7)

The following have already been configured on the router:

->The basic router configuration

->The appropriate interfaces have been configured for NAT inside and NAT outside.

->The appropriate static routes have also been configured (since the company will be a stub network, no routing protocol will be required)

->All passwords have been temporarily set to “cisco”.

The task is to complete the NAT configuration using all IP addresses assigned by the ISP to provide Internet access for the hosts in the Weaver LAN. Functionality can be tested by clicking on the host provided for testing.

Configuration information: router name – Weaver

inside global addresses – 198.18.184.105 – 198.18.184.110/29 inside local addresses – 192.168.100.17 – 192.168.100.30/28 number of inside hosts – 14

Dumps4Cert 2017 PDF and VCE

A network associate is configuring a router for the weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 – 192.168.100.30.

Answer: The company has 14 hosts that need to access the internet simultaneously but we just have 6 public IP addresses from 198.18.184.105 to 198.18.184.110/29.

Therefore we have to use NAT overload (or PAT) Double click on the Weaver router to open it Routergt;enable

Router#configure terminal

First you should change the router#39;s name to Weaver

Router(config)#hostname Weaver

Create a NAT pool of global addresses to be allocated with their netmask. Weaver(config)#ip nat pool mypool 198.18.184.105 198.18.184.110 netmask 255.255.255.248

Create a standard access control list that permits the addresses that are to be translated.

Weaver(config)#access-list 1 permit 192.168.100.16 0.0.0.15

Establish dynamic source translation, specifying the access list that was defined in the prior step.

Weaver(config)#ip nat inside source list 1 pool mypool overload

This command translates all source addresses that pass access list 1, which means a source address from 192.168.100.17 to 192.168.100.30, into an address from the pool named mypool (the pool contains addresses from 198.18.184.105 to 198.18.184.110). Overload keyword allows to map multiple IP addresses to a single registered IP address

(many-to-one) by using different ports.

The question said that appropriate interfaces have been configured for NAT inside and NAT outside statements.

This is how to configure the NAT inside and NAT outside, just for your understanding:

Weaver(config)#interface fa0/0 Weaver(config-if)#ip nat inside Weaver(config-if)#exit Weaver(config)#interface s0/0 Weaver(config-if)#ip nat outside Weaver(config-if)#end

Finally, we should save all your work with the following command:

Weaver#copy running-config startup-config

Check your configuration by going to quot;Host for testingquot; and type:

C :\gt;ping 192.0.2.114

The ping should work well and you will be replied from 192.0.2.114

Question No: 299 – (Topic 7)

Scenario

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

Dumps4Cert 2017 PDF and VCE

An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office. What is causing the problem?

  1. There is an area ID mismatch.

  2. There is a PPP authentication issue; a password mismatch.

  3. There is an OSPF hello and dead interval mismatch.

  4. There is a missing network command in the OSPF process on R5.

    Answer: C Explanation:

    The “show ip ospf interface command on R3 and R5 shows that the hello and dead intervals do not match. They are 50 and 200 on R3 and 10 and 40 on R5.

    Dumps4Cert 2017 PDF and VCE

    Question No: 300 CORRECT TEXT – (Topic 7)

    A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.

    The task is to create and apply an access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted.

    Dumps4Cert 2017 PDF and VCE

    Access to the router CLI can be gained by clicking on the appropriate host. All passwords have been temporarily set to quot;ciscoquot;.

    The Core connection uses an IP address of 198.18.247.65

    The computers in the Hosts LAN have been assigned addresses of 192.168.240.1 – 192.168.240.254

    ->host A 192.168.240.1

    ->host B 192.168.240.2

    ->host C 192.168.240.3

    Answer: Corp1#conf t

    Corp1(config)# access-list 128 permit tcp host 192.168.240.1 host 172.22.141.26 eq www Corp1(config)# access-list 128 deny tcp any host 172.22.141.26 eq www

    Corp1(config)# access-list 128 permit ip any any Corp1(config)#int fa0/1

    Corp1(config-if)#ip access-group 128 out Corp1(config-if)#end

    Corp1#copy run startup-config

    100% Free Download!
    Download Free Demo:200-125 Demo PDF
    100% Pass Guaranteed!
    Download 2017 Dumps4Cert 200-125 Full Exam PDF and VCE

    Dumps4Cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 Dumps4Cert IT Certification PDF and VCE