[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 31-40

Get Full Version of the Exam

Question No.31

Which of the following are benefits of VLANs? (Choose three.)

  1. They increase the size of collision domains.

  2. They allow logical grouping of users by function.

  3. They can enhance network security.

  4. They increase the size of broadcast domains while decreasing the number of collision domains.

  5. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

  6. They simplify switch administration.

Correct Answer: BCE


When using VLAN the number and size of collision domains remain the same -gt;. VLANs allow to group users by function, not by location or geography -gt;.

VLANs help minimize the incorrect configuration of VLANs so it enhances the security of the network -gt;.

VLAN increases the size of broadcast domains but does not decrease the number of collision domains -gt;.

VLANs increase the number of broadcast domains while decreasing the size of the broadcast domains which increase the utilization of the links. It is also a big advantage of VLAN -gt;.

VLANs are useful but they are more complex and need more administration -gt;.

Question No.32

Which two benefits are provided by creating VLANs? (Choose two.)

  1. added security

  2. dedicated bandwidth

  3. provides segmentation

  4. allows switches to route traffic between subinterfaces

  5. contains collisions

Correct Answer: AC


A VLAN is a switched network that is logically segmented on an organizational basis, by functions, project teams, or applications rather than on a physical or geographical basis.


VLANs also improve security by isolating groups. High-security users can be grouped into a VLAN, possible on the same physical segment, and no users outside that VLAN can communicate with them.

LAN Segmentation

VLANs allow logical network topologies to overlay the physical switched infrastructure such that any arbitrary collection of LAN ports can be combined into an autonomous user group or community of interest. The technology logically segments the network into separate Layer 2 broadcast domains whereby packets are switched between ports designated to be within the same VLAN. By containing traffic originating on a particular LAN only to other LANs in the same VLAN, switched virtual networks avoid wasting bandwidth.

Question No.33

In a switched environment, what does the IEEE 802.1Q standard describe?

  1. the operation of VTP

  2. a method of VLAN trunking

  3. an approach to wireless LAN communication

  4. the process for root bridge selection

  5. VLAN pruning

Correct Answer: B


A broadcast domain must sometimes exist on more than one switch in the network. To accomplish this, one switch must send frames to another switch and indicate which VLAN a particular frame belongs to. On Cisco switches, a trunk link is created to accomplish this VLAN identification. ISL and IEEE 802.1Q are different methods of putting a VLAN identifier in a Layer 2 frame.

The IEEE 802.1Q protocol interconnects VLANs between multiple switches, routers, and servers. With 802.1Q, a network administrator can define a VLAN topology to span multiple physical devices.

Cisco switches support IEEE 802.1Q for FastEthernet and Gigabit Ethernet interfaces. An 802.1Q trunk link provides VLAN identification by adding a 4-byte tag to an Ethernet Frame as it leaves a trunk port.

Question No.34

Which three statements about RSTP are true? (Choose three.)

  1. RSTP significantly reduces topology reconverging time after a link failure.

  2. RSTP expands the STP port roles by adding the alternate and backup roles.

  3. RSTP port states are blocking, discarding, learning, or forwarding.

  4. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

  5. RSTP also uses the STP proposal-agreement sequence.

  6. RSTP uses the same timer-based process as STP on point-to-point links.

Correct Answer: ABD


One big disadvantage of STP is the low convergence which is very important in switched network. To overcome this problem, in 2001, the IEEE with document 802.1w introduced an evolution of the Spanning Tree Protocol: Rapid Spanning Tree Protocol (RSTP), which significantly reduces the convergence time after a topology change occurs in the network. While STP can take 30 to 50 seconds to transit from a blocking state to a forwarding state, RSTP is typically able to respond less than 10 seconds of a physical link failure. RSTP works by adding an alternative port and a backup port compared to STP. These ports are allowed to immediately enter the forwarding state rather than passively wait for the network to converge.

RSTP bridge port roles:



Root port – A forwarding port that is the closest to the root bridge in terms of path cost Designated port – A forwarding port for every LAN segment


Alternate port – A best alternate path to the root bridge. This path is different than using the root port. The alternative port moves to the forwarding state if there is a failure on the designated port for the segment.


Backup port – A backup/redundant path to a segment where another bridge port already connects. The backup port applies only when a single switch has two links to the same segment (collision domain). To have two links to the same collision domain, the switch must be attached to a hub.


Disabled port – Not strictly part of STP, a network administrator can manually disable a port.

Question No.35

Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over Fast Ethernet?

A. 802.3ad B. 802.1w C. 802.1D D. 802.1Q

Correct Answer: D


Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol for negotiating trunking on a link between two devices and for negotiating the type of trunking encapsulation (802.1Q) to be used.

Question No.36

Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?


  1. Switch3, port fa0/1

  2. Switch3, port fa0/12

  3. Switch4, port fa0/11

  4. Switch4, port fa0/2

  5. Switch3, port Gi0/1

  6. Switch3, port Gi0/2

Correct Answer: B


In this picture, there are 2 connections and four ports which the question is referencing. You should always remember that when it comes to STP, only ONE of the FOUR ports will be blocked(redundant connections). The bridge with the higher ID/Priority will not be the one to block any port(s). SWT3 would show both ports Fa0/1 and Fa0/12 as forwarding. The port blocking process happens closest to the bottom. It is the responsibility of the lower switch to block a port. Therefore the port states for SWT 4 would be ;

Fa0/2 鈥?FWD/ Forwarding Fa0/11 鈥?BLK/ Blocking

Also note that since both ports are connecting to the same switch through the same cost/ethernet medium (Fastethernet) and that the bridge ID / MAC would be the same for both ports headed to the other switch, they are not used as a factor of port blocking. The last criteria that is met as a TIEBREAKER is that the LOWER port will forward and the HIGHER will be placed into blocking.

Fa0/2 is the lower port. Fa0/11 is the higher port.

If you do not understand STP/RSTP/PVST, you will NEED to review/study the topic. STP technologies will make up ! percent of the exam.

Question No.37

Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch?

  1. 1 through 1001

  2. 2 through 1001

  3. 1 through 1002

  4. 2 through 1005

Correct Answer: B


VLAN 1 is the default VLAN on Cisco switch. It always exists and cannot be added, modified or removed.

VLANs 1002-1005 are default VLANs for FDDI amp; Token Ring and they can#39;t be deleted or used for Ethernet.


Question No.38

Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)


  1. SwitchA, Fa0/2, designated

  2. SwitchA, Fa0/1, root

  3. SwitchB, Gi0/2, root

  4. SwitchB, Gi0/1, designated

  5. SwitchC, Fa0/2, root

  6. SwitchD, Gi0/2, root

Correct Answer: ABF


The question says quot;no other configuration changes have been madequot; so we can understand these switches have the same bridge priority. Switch C has lowest MAC address so it will become root bridge and 2 of its ports (Fa0/1 amp; Fa0/2) will be designated ports.

Because SwitchC is the root bridge so the 2 ports nearest SwitchC on SwitchA (Fa0/1) and SwitchD (Gi0/2) will be root ports.

Now we come to the most difficult part of this question: SwitchB must have a root port so which port will it choose? To answer this question we need to know about STP cost and port cost.

In general, quot;costquot; is calculated based on bandwidth of the link. The higher the bandwidth on a link, the lower the value of its cost. Below are the cost values you should memorize:


SwitchB will choose the interface with lower cost to the root bridge as the root port so we must calculate the cost on interface Gi0/1 amp; Gi0/2 of SwitchB to the root bridge. This can be calculated from the quot;cost to the root bridgequot; of each switch because a switch always advertises its cost to the root bridge in its BPDU. The receiving switch will add its local port cost value to the cost in the BPDU.

One more thing to notice is that a root bridge always advertises the cost to the root bridge (itself)

with an initial value of 0.

Now let#39;s have a look at the topology again


SwitchC advertises its cost to the root bridge with a value of 0. Switch D adds 4 (the cost value of 1Gbps link) and advertises this value (4) to SwitchB. SwitchB adds another 4 and learns that it can reach SwitchC via Gi0/1 port with a total cost of 8. The same process happens for SwitchA and SwitchB learns that it can reach SwitchC via Gi0/2 with a total cost of 23 -gt; Switch B chooses Gi0/1 as its root port -gt;. Now our last task is to identify the port roles of the ports between SwitchA amp; SwitchB. It is rather easy as the MAC address of SwitchA is lower than that of SwitchB so Fa0/2 of SwitchA will be designated port while Gi0/2 of SwitchB will be alternative port.

Below summaries all the port roles of these switches:


DP: Designated Port (forwarding state)

RP: Root Port (forwarding state)

AP: Alternative Port (blocking state)

Question No.39

Refer to the exhibit. A technician is troubleshooting host connectivity issues on the switches. The hosts in VLANs 10 and 15 on Sw11 are unable to communicate with hosts in the same VLANs on Sw12. Hosts in the Admin VLAN are able to communicate. The port-to-VLAN assignments are identical on the two switches. What could be the problem?


  1. The Fa0/1 port is not operational on one of the switches.

  2. The link connecting the switches has not been configured as a trunk.

  3. At least one port needs to be configured in VLAN 1 for VLANs 10 and 15 to be able to communicate.

  4. Port FastEthernet 0/1 needs to be configured as an access link on both switches.

  5. A router is required for hosts on SW11 in VLANs 10 and 15 to communicate with hosts in the same VLAN on Sw12.

Correct Answer: B


In order for hosts in the same VLAN to communicate with each other over multiple switches, those switches need to be configured as trunks on their connected interfaces so that they can pass traffic from multiple VLANs.

Question No.40

Based on the network shown in the graphic. Which option contains both the potential networking problem and the protocol or setting that should be used to prevent the problem?


  1. routing loops, hold down timers

  2. switching loops, split horizon

  3. routing loops, split horizon

  4. switching loops, VTP

  5. routing loops, STP

  6. switching loops, STP

Correct Answer: F


The Spanning-Tree Protocol (STP) prevents loops from being formed when switches or bridges are interconnected via multiple paths. Spanning-Tree Protocol implements the 802.1D IEEE algorithm by exchanging BPDU messages with other switches to detect loops, and then removes the loop by shutting down selected bridge interfaces. This algorithm guarantees that there is one and only one active path between two network devices.

Get Full Version of the Exam
200-125 Dumps
200-125 VCE and PDF