[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 291-300

Get Full Version of the Exam

Question No.291

Refer to the exhibit. A network administrator attempts to ping Host2 from Host1 and receives the results that are shown. What is the problem?


  1. The link between Host1 and Switch1 is down.

  2. TCP/IP is not functioning on Host1

  3. The link between Router1 and Router2 is down.

  4. The default gateway on Host1 is incorrect.

  5. Interface Fa0/0 on Router1 is shutdown.

  6. The link between Switch1 and Router1 is down.

Correct Answer: C


Host1 tries to communicate with Host2. The message destination host unreachable from Router1 indicates that the problem occurs when the data is forwarded from Host1 to Host2. According to the topology, we can infer that the link between Router1 and Router2 is down.

Question No.292

Refer to the exhibit. HostA cannot ping HostB. Assuming routing is properly configured, what is the cause of this problem?


  1. HostA is not on the same subnet as its default gateway.

  2. The address of SwitchA is a subnet address.

  3. The Fa0/0 interface on RouterA is on a subnet that can#39;t be used.

  4. The serial interfaces of the routers are not on the same subnet.

  5. The Fa0/0 interface on RouterB is using a broadcast address.

Correct Answer: D


Now let#39;s find out the range of the networks on serial link: For the network

Increment: 32

Network address:

Broadcast address: For the network Increment: 32

Network address:

Broadcast address: gt; These two IP addresses don#39;t belong to the same network and they can#39;t see each other.

Question No.293

What are three reasons to collect Netflow data on a company network? (Choose three.)

  1. To identify applications causing congestion.

  2. To authorize user network access.

  3. To report and alert link up / down instances.

  4. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.

  5. To detect suboptimal routing in the network.

  6. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

Correct Answer: ADF



NetFlow facilitates solutions to many common problems encountered by IT professionals. Analyze new applications and their network impact

Identify new application network loads such as VoIP or remote site additions.


Reduction in peak WAN traffic

Use NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network top talkers.


Troubleshooting and understanding network pain points

Diagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command line interface or reporting tools. -gt; D is correct.


Detection of unauthorized WAN traffic


Avoid costly upgrades by identifying the applications causing congestion. -gt; A is correct. Security and anomaly detection

NetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars.


Validation of QoS parameters

Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.-gt; F is correct.

Question No.294

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of thisproblem?


  1. The OSPF area is not configured properly.

  2. The priority on R1 should be set higher.

  3. The cost on R1 should be set higher.

  4. The hello and dead timers are not configured properly.

  5. A backup designated router needs to be added to the network.

  6. The OSPF process ID numbers must match.

Correct Answer: D


In OSPF, the hello and dead intervals must match and here we can see the hello interval is set to 5 on R1 and 10 on R2. The dead interval is also set to 20 on R1 but it is 40 on R2.

Question No.295

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

  1. during high traffic periods

  2. after broken links are re-established

  3. when upper-layer protocols require high reliability

  4. in an improperly implemented redundant topology

  5. when a dual ring topology is in use

Correct Answer: D


If we connect two switches via 2 or more links and do not enable STP on these switches then a loop (which creates multiple copies of the same unicast frame) will occur. It is an example of an improperly implemented redundant topology.

Question No.296

What are three factors a network administrator must consider before implementing Netflow in the network? (Choose three.)

  1. CPU utilization

  2. where Netflow data will be sent

  3. number of devices exporting Netflow data

  4. port availability

  5. SNMP version

  6. WAN encapsulation

Correct Answer: ABC


NetFlow has a reputation for increasing CPU utilization on your network devices. Cisco#39;s performance testing seems to indicate that newer hardware can accommodate this load pretty well, but you will still want to check it out before you turn on the feature. Some symptoms of high CPU utilization are very large jitter and increased delay. Services running on the device may also be affected.

Another thing to keep in mind is the amount of data you#39;re going to be sending across the network. Depending on how much traffic you have and how you configure it, the traffic can be substantial. For example, you may not want to send NetFlow data from a datacenter switch to a NetFlow collector on the other side of a small WAN circuit. Also bear in mind that the flows from aggregating large numbers of devices can add up.

Reference: http://searchenterprisewan.techtarget.com/tip/How-the-NetFlow-protocol-monitors- your-WAN

Question No.297

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

  1. source IP address

  2. source MAC address

  3. egress interface

  4. ingress interface

  5. destination IP address

  6. IP next-hop

Correct Answer: ADE


Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets. Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.

IP Packet attributes used by NetFlow:


IP source address




IP destination address Source port Destination port



Layer 3 protocol type Class of Service


Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html

Question No.298



Correct Answer:


Question No.299

What are two reasons that duplex mismatches can be difficult to diagnose? (Choose two.)

  1. The interface displays a connected (up/up) state even when the duplex settings are mismatched.

  2. The symptoms of a duplex mismatch may be intermittent.

  3. Autonegotiation is disabled.

  4. Full-duplex interfaces use CSMA/CD logic, so mismatches may be disguised by collisions.

  5. 1-Gbps interfaces are full-duplex by default.

Correct Answer: AB

Question No.300

Which statement about LLDP is true?

  1. It is a Cisco proprietary protocol.

  2. It is configured in global configuration mode.

  3. The LLDP update frequency is a fixed value.

  4. It runs over the transport layer.

Correct Answer: B


LLDP runs over the Data Link Layer, so devices that use different Network so Answer D is wrong. LLDP or Link Layer Discovery Protocol is vendor neutral.

The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet The protocol is formally referred to by the IEEE as Station and Media Access Control Connectivity Discovery specified in IEEE 802.1AB[2] and IEEE 802.3-2012 section 6 clause 79. LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery Protocol (CDP), Extreme Discovery Protocol, Foundry Discovery Protocol (FDP), Nortel Discovery Protocol (also known as SONMP), and Microsoft#39;s Link Layer Topology Discovery (LLTD).

Get Full Version of the Exam
200-125 Dumps
200-125 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com