200-125 CCNA Routing and Switching free questions
If you are configuring syslog messages specifying `logging trap warning', which log messages will the router send? A. 0-4 B. 0-5 C. 0-6 D. 0-2 E. 0-1
Answer: A
What is the authoritative source for an address lookup? A. a recursive DNS search B. the operating system cache C. the ISP local cache D. the browser cache
Answer: A
What will happen if a private IP address is assigned to a public interface connected to an ISP? A. Addresses in a private range will be not routed on the Internet backbone. B. Only the ISP router will have the capability to access the public network. C. The NAT process will be used to translate this address in a valid IP address. D. Several automated methods will be necessary on the private network. E. A conflict of IP addresses happens, because other public routers can use the same range.
Answer: A
Which command can you enter to set the default route for all traffic to an interface? A. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1 B. router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1 C. router(config-router)#default-information originate D. router(config-router)#default-information originate always
Answer: A
Which spanning-tree protocol rides on top of another spanning-tree protocol? A. MSTP B. RSTP C. PVST+ D. Mono Spanning Tree
Answer: A
Which statement about RADIUS security is true? A. It supports EAP authentication for connecting to wireless networks. B. It provides encrypted multiprotocol support. C. Device-administration packets are encrypted in their entirety. D. It ensures that user activity is fully anonymous.
Answer: A
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.) A. to uniquely identify devices at Layer 2 B. to allow communication with devices on a different network C. to differentiate a Layer 2 frame from a Layer 3 packet D. to establish a priority system to determine which device gets to transmit first E. to allow communication between different devices on the same network F. to allow detection of a remote device when its physical address is unknown
Answer: A,E
What are types of IPv6 static routes? (Choose Three.) A. Recursive routes B. Directly connected routes C. Fully specified routes D. Advertised routes E. Virtual links F. Redistributed routes
Answer: ABC
Which of the following describes the roles of devices in a WAN? (Choose three.) A. A CSU/DSU terminates a digital local loop B. A modem terminates a digital local loop C. A CSU/DSU terminates an analog local loop D. A modem terminates an analog local loop E. A router is commonly considered a DTE device F. A router is commonly considered a DCE device
Answer: ADE
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table? A. the OSPF route B. the EIGRP route C. the RIPv2 route D. all three routes E. the OSPF and RIPv2 routes
Answer: B
Two hosts are attached to a switch with the default configuration. Which statement about the configuration is true? A. IP routing must be enabled to allow the two hosts to communicate. B. The two hosts are in the same broadcast domain. C. The switch must be configured with a VLAN to allow the two hosts to communicate. D. Port security prevents the hosts from connecting to the switch.
Answer: B
Which technology supports the stateless assignment of IPv6 addresses (Choose two) ? A. DNS B. DHCPv6 C. DHCP D. autoconfiguration
Answer: BD
Which mode is compatible with Trunk, Access, and desirable ports? A. Trunk Ports B. Access Ports C. Dynamic Auto D. Dynamic Desirable
Answer: C
What is the status of port-channel if LACP is misconfigured? A. Forwarding B. Enabled C. Disabled D. errdisabled
Answer: D
When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU? A. It continues operating normally. B. It goes into a down/down state. C. It becomes the root bridge for the configured VLAN. D. It goes into an errdisable state.
Answer: D