[Free] 2018(Mar) EnsurePass Pass4sure Cisco 200-125 Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar Cisco Official New Released 200-125
100% Free Download! 100% Pass Guaranteed!

CCNA Cisco Certified Network Associate CCNA (v3.0)

Question No: 201 – (Topic 5)

What are two benefits of using NAT? (Choose two.)

  1. NAT facilitates end-to-end communication when IPsec is enabled.

  2. NAT eliminates the need to re-address all hosts that require external access.

  3. NAT conserves addresses through host MAC-level multiplexing.

  4. Dynamic NAT facilitates connections from the outside of the network.

  5. NAT accelerates the routing process because no modifications are made on the


  6. NAT protects network security because private networks are not advertised.

Answer: B,F Explanation:

By not revealing the internal IP addresses, NAT adds some security to the inside network –

gt; F is correct.

NAT has to modify the source IP addresses in the packets -gt; E is not correct.

Connection from the outside of the network through a “NAT” network is more difficult than a more network because IP addresses of inside hosts are hidden -gt; C is not correct.

In order for IPsec to work with NAT we need to allow additional protocols, including Internet Key Exchange (IKE), Encapsulating Security Payload (ESP) and Authentication Header (AH) -gt; more complex -gt; A is not correct.

By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re- address the inside hosts -gt; B is correct.

NAT does conserve addresses but not through host MAC-level multiplexing. It conserves addresses by allowing many private IP addresses to use the same public IP address to go to the Internet -gt; C is not correct.

Question No: 202 – (Topic 5)

The network administrator has been asked to give reasons for moving from IPv4 to IPv6. What are two valid reasons for adopting IPv6 over IPv4? (Choose two.)

  1. no broadcast

  2. change of source address in the IPv6 header

  3. change of destination address in the IPv6 header

  4. Telnet access does not require a password

  5. autoconfiguration

  6. NAT

Answer: A,E


IPv6 does not use broadcasts, and autoconfiguration is a feature of IPV6 that allows for hosts to automatically obtain an IPv6 address.

Question No: 203 – (Topic 5)

What command instructs the device to timestamp Syslog debug messages in milliseconds?

  1. service timestamps log datetime localtimelt;input type

  2. service timestamps debug datetime mseclt;input type

  3. service timestamps debug datetime localtimelt;input type

  4. service timestamps log datetime msec

Answer: B Explanation:

Enable millisecond (msec) timestamps using the service timestamps command: router(config)#service timestamps debug datetime msec.

router(config)#service timestamps log datetime msec The “service timestamps debug”. command configures the system to apply a time stamp to debugging messages. The time- stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD is the date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additional keyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm, where .mmm is milliseconds.

Question No: 204 – (Topic 5)

Given an IP address with a subnet mask of, what is the correct network address?





Answer: A Explanation:

For this example, the network range is –, the network address is and the broadcast IP address is

Question No: 205 – (Topic 5)

Refer to the diagram.

Ensurepass 2018 PDF and VCE

All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three.)

  1. The subnet mask in use is

  2. The subnet mask in use is

  3. The IP address can be assigned to hosts in VLAN1

  4. The IP address can be assigned to hosts in VLAN1

  5. The LAN interface of the router is configured with one IP address.

  6. The LAN interface of the router is configured with multiple IP addresses.

Answer: B,C,F Explanation:

The subnet mask in use is This is subnet mask will support up to 126 hosts, which is needed.

The IP address can be assigned to hosts in VLAN1: The usable host range in this subnet is

The LAN interface of the router is configured with multiple IP addresses: The router will need 2 subinterfaces for the single physical interface, one with an IP address that belongs in each VLAN.

Question No: 206 – (Topic 5)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

In this VLSM addressing scheme, what summary address would be sent from router A?

A. /16

B. /20

C. /24

D. /16

E. /17

F. /16

Answer: A Explanation:

Router A receives 3 subnets:, and

All these 3 subnets have the same form of 172.16.x.x so our summarized subnet must be also in that form -gt; Only A, B or .

The smallest subnet mask of these 3 subnets is /18 so our summarized subnet must also have its subnet mask equal or smaller than /18.

-gt; Only answer A has these 2 conditions -gt;.

Question No: 207 – (Topic 5)

A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?

  1. standard

  2. extended

  3. dynamic

  4. reflexive

Answer: C Explanation:

We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS or RADIUS server. The configuration of dynamic ACL can be read here: http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524. shtml

Question No: 208 – (Topic 5)

What will happen if a private IP address is assigned to a public interface connected to an ISP?

  1. Addresses in a private range will not be routed on the Internet backbone.

  2. Only the ISP router will have the capability to access the public network.

  3. The NAT process will be used to translate this address to a valid IP address.

  4. A conflict of IP addresses happens, because other public routers can use the same range.

Answer: A Explanation:

Private RFC 1918 IP addresses are meant to be used by organizations locally within their own network only, and cannot be used globally for Internet use.

Question No: 209 – (Topic 5)

The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?

A. subnetted with mask B. subnetted with mask C. subnetted with mask D. subnetted with mask E. subnetted with mask

Answer: D Explanation:

We need 113 point-to-point links which equal to 113 sub-networks lt; 128 so we need to borrow 7 bits (because 2^7 = 128).

The network used for point-to-point connection should be /30. So our initial network should be 30 – 7 = 23.

So is the correct answer.

You can understand it more clearly when writing it in binary form:

/23 = 1111 1111.1111 1110.0000 0000

/30 = 1111 1111.1111 1111.1111 1100 (borrow 7 bits)

Question No: 210 – (Topic 5)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

What statement is true of the configuration for this network?

  1. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.

  2. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.

  3. The number 1 referred to in the ip nat inside source command references access-list number 1.

  4. ExternalRouter must be configured with static routes to networks and

Answer: C Explanation:

The “list 1 refers to the access-list number 1.

100% Ensurepass Free Download!
Download Free Demo:200-125 Demo PDF
100% Ensurepass Free Guaranteed!
200-125 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com