[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 221-230

Get Full Version of the Exam

Question No.221

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?






Correct Answer: B


A subnet mask of will allow for up to 6 hosts to reside in this network. A subnet mask of will allow for only 2 usable IP addresses, since we cannot use the network or broadcast address.

Question No.222

Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)

  1. Emergencies

  2. Alerts

  3. Critical

  4. Errors

  5. Warnings

Correct Answer: ABCD


The Message Logging is divided into 8 levels as listed below:

Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

  1. errors Error conditions exist

  2. warnings Warning conditions exist

  3. notification Normal, but significant, conditions exist 6 informational Informational messages 7 debugging Debugging messages

The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the quot;logging console levelquot; command, that level and all the higher levels will be displayed. For example, by using the quot;logging console warningsquot; command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.

Question No.223

What are the Popular destinations for syslog messages to be saved? (Choose three)

  1. Flash

  2. The logging buffer .RAM

  3. The console terminal

  4. Other terminals

  5. Syslog server

Correct Answer: BCE


By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.

Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename.

Question No.224

In a GLBP network, who is responsible for the ARP request?

  1. AVF

  2. AVG

  3. Active Router

  4. Standby Router

Correct Answer: B


Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address. The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.

Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

Question No.225

Which statement is correct regarding the operation of DHCP?

  1. A DHCP client uses a ping to detect address conflicts.

  2. A DHCP server uses a gratuitous ARP to detect DHCP clients.

  3. A DHCP client uses a gratuitous ARP to detect a DHCP server.

  4. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

  5. If an address conflict is detected, the address is removed from the pool for an amount of time configurable by the administrator.

  6. If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted.

Correct Answer: D


An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html

Question No.226

What are three approaches that are used when migrating from an IPv4 addressing scheme to an

IPv6 scheme. (Choose three.)

  1. enable dual-stack routing

  2. configure IPv6 directly

  3. configure IPv4 tunnels between IPv6 islands

  4. use proxying and translation to translate IPv6 packets into IPv4 packets

  5. statically map IPv4 addresses to IPv6 addresses

  6. use DHCPv6 to map IPv4 addresses to IPv6 addresses

Correct Answer: ACD


Several methods are used terms of migration including tunneling, translators, and dual stack. Tunnels are used to carry one protocol inside another, while translators simply translate IPv6 packets into IPv4 packets. Dual stack uses a combination of both native IPv4 and IPv6. With dual stack, devices are able to run IPv4 and IPv6 together and if IPv6 communication is possible that is the preferred protocol. Hosts can simultaneously reach IPv4 and IPv6 content.

Question No.227

Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)


  1. host A IP address:

  2. host A IP address:

  3. host A default gateway:

  4. host B IP address:

  5. host B default gateway:

  6. host B IP address:

Correct Answer: ACF


It#39;s a quot;router-on-a-stickquot; configuration. Which means each host in the VLAN must corresponds with the VLAN configured on the sub-interfaces.

VLAN 10 is configured on fa0/0.10 and VLAN 20 on fa0/0.20. So each hosts in VLAN 10 must use fa0/0.10 IP address as their default gateway, each hosts must also be in the same subnet as fa0/0.10 IP – same with hosts in VLAN 20.

So find out the usable IP addresses on each sub-interfaces – for /27: –

.94 and for /26: -.190.

Host A (using port 6 – VLAN 10) must use IP, default gateway Host B (using port 9 – VLAN 20) must use IP, default gateway

Question No.228

Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)


A. Network A – B. Network A – C. Network A – D. Link A –

E. Link A – F. Link A –

Correct Answer: BD


Only a /30 is needed for the point to point link and sine the use of the ip subnet-zero was used, is valid. Also, a /25 is required for 120 hosts and again is the best, valid option.

Question No.229

What are the alert messages generated by SNMP agents called?

  1. TRAP


  3. GET

  4. SET

Correct Answer: AB


A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they#39;re unacknowledged so you don#39;t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP.

Question No.230

Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three.)


  1. The subnet mask in use is

  2. The subnet mask in use is

  3. The IP address can be assigned to hosts in VLAN1

  4. The IP address can be assigned to hosts in VLAN1

  5. The LAN interface of the router is configured with one IP address.

  6. The LAN interface of the router is configured with multiple IP addresses.

Correct Answer: BCF


The subnet mask in use is This is subnet mask will support up to 126 hosts, which is needed.

The IP address can be assigned to hosts in VLAN1: The usable host range in this subnet is

The LAN interface of the router is configured with multiple IP addresses: The router will need 2 subinterfaces for the single physical interface, one with an IP address that belongs in each VLAN.

Get Full Version of the Exam
200-125 Dumps
200-125 VCE and PDF