[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 241-250

Get Full Version of the Exam

Question No.241

Refer to the exhibit. The Bigtime router is unable to authenticate to the Littletime router. What is

the cause of the problem?


  1. The usernames are incorrectly configured on the two routers.

  2. The passwords do not match on the two routers.

  3. CHAP authentication cannot be used on a serial interface.

  4. The routers cannot be connected from interface S0/0 to interface S0/0.

  5. With CHAP authentication, one router must authenticate to another router. The routers cannot be configured to authenticate to each other.

Correct Answer: B


With CHAP authentication, the configured passwords must be identical on each router. Here, it is configured as little123 on one side and big123 on the other.

Question No.242

Which statement describes VRRP object tracking?

  1. It monitors traffic flow and link utilization.

  2. It ensures the best VRRP router is the virtual router master for the group.

  3. It causes traffic to dynamically move to higher bandwidth links.

  4. It thwarts man-in-the-middle attacks.

Correct Answer: B


Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group.

Question No.243

What are two benefits of using NAT? (Choose two.)

  1. NAT facilitates end-to-end communication when IPsec is enabled.

  2. NAT eliminates the need to re-address all hosts that require external access.

  3. NAT conserves addresses through host MAC-level multiplexing.

  4. Dynamic NAT facilitates connections from the outside of the network.

  5. NAT accelerates the routing process because no modifications are made on the packets.

  6. NAT protects network security because private networks are not advertised.

Correct Answer: BF


By not revealing the internal IP addresses, NAT adds some security to the inside network – gt; F is correct.

NAT has to modify the source IP addresses in the packets -gt; E is not correct.

Connection from the outside of the network through a quot;NATquot; network is more difficult than a more network because IP addresses of inside hosts are hidden -gt; C is not correct.

In order for IPsec to work with NAT we need to allow additional protocols, including Internet Key Exchange (IKE), Encapsulating Security Payload (ESP) and Authentication Header (AH) -gt; more complex -gt; A is not correct.

By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re- address the inside hosts -gt; B is correct.

NAT does conserve addresses but not through host MAC-level multiplexing. It conserves addresses by allowing many private IP addresses to use the same public IP address to go to the Internet -gt; C is not correct.

Question No.244

Given an IP address with a subnet mask of, what is the correct network address?





Correct Answer: A


For this example, the network range is –, the network address is and the broadcast IP address is

Question No.245

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)

  1. Global addresses start with 2000::/3.

  2. Link-local addresses start with FE00:/12.

  3. Link-local addresses start with FF00::/10.

  4. There is only one loopback address and it is ::1.

  5. If a global address is assigned to an interface, then that is the only allowable address for the interface.

Correct Answer: AD


Below is the list of common kinds of IPv6 addresses:


Question No.246

What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?

A. B514 : 82C3 : 0029 : EC7A : EC72 B. B514 : 82C3 :: 0029 : EC7A : EC72

C. B514 : 82C3 : 0029 :: EC7A : 0000 : EC72 D. B514 : 82C3 :: 0029 : EC7A : 0 : EC72

Correct Answer: D


There are two ways that an IPv6 address can be additionally compressed: compressing leading zeros and substituting a group of consecutive zeros with a single double colon (::). Both of these can be used in any number of combinations to notate the same address. It is important to note that the double colon (::) can only be used once within a single IPv6 address notation. So, the extra 0#39;s can only be compressed once.

Question No.247

What are three components that comprise the SNMP framework? (Choose three.)

  1. MIB

  2. agent

  3. set

  4. AES

  5. supervisor

  6. manager

Correct Answer: ABF


The SNMP framework consists of three parts:


An SNMP manager The system used to control and monitor the activities of network devices using SNMP.


An SNMP agent The software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. Cisco Nexus 1000V supports the agent and MIB. To enable the SNMP agent, you must define the relationship between the manager and the agent.


A managed information base (MIB) The collection of managed objects on the SNMP agent. SNMP is defined in RFCs 3411 to 3418.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3/system


Question No.248

What SNMP message alerts the manager to a condition on the network?

  1. response

  2. get

  3. trap

  4. capture

Correct Answer: C


An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection

to a neighbor, or other significant events.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12- 1_9_ea1/configuration/guide/scg/swsnmp.html

Question No.249

Which two are features of IPv6? (Choose two.)

  1. anycast

  2. broadcast

  3. multicast

  4. podcast

  5. allcast

Correct Answer: AC


IPv6 addresses are classified by the primary addressing and routing methodologies common in networking: unicast addressing, anycast addressing, and multicast addressing. A unicast address identifies a single network interface. The Internet Protocol delivers packets sent to a unicast address to that specific interface. An anycast address is assigned to a group of interfaces, usually belonging to different nodes. A packet sent to an anycast address is delivered to just one of the member interfaces, typically the nearest host, according to the routing protocol#39;s definition of distance. Anycast addresses cannot be identified easily, they have the same format as unicast addresses, and differ only by their presence in the network at multiple points. Almost any unicast address can be employed as an anycast address.

A multicast address is also used by multiple hosts, which acquire the multicast address destination by participating in the multicast distribution protocol among the network routers. A packet that is sent to a multicast address is delivered to all interfaces that have joined the corresponding multicast group.

Question No.250

The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?

A. subnetted with mask B. subnetted with mask C. subnetted with mask D. subnetted with mask E. subnetted with mask

Correct Answer: D


We need 113 point-to-point links which equal to 113 sub-networks lt; 128 so we need to borrow 7 bits (because 2^7 = 128).

The network used for point-to-point connection should be /30. So our initial network should be 30 – 7 = 23.

So is the correct answer.

You can understand it more clearly when writing it in binary form:

/23 = 1111 1111.1111 1110.0000 0000

/30 = 1111 1111.1111 1111.1111 1100 (borrow 7 bits)

Get Full Version of the Exam
200-125 Dumps
200-125 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com