[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 341-350

Get Full Version of the Exam

Question No.341

What is the first step in the NAT configuration process?

  1. Define inside and outside interfaces.

  2. Define public and private IP addresses.

  3. Define IP address pools.

  4. Define global and local interfaces.

Correct Answer: A

Question No.342

Which two commands can you enter to verify that a configured NetFlow data export is operational? (Choose two.)

  1. show ip flow export

  2. show ip cache flow

  3. ip flow ingress

  4. ip flow egress

  5. interface ethernet 0/0

  6. ip flow-export destination

Correct Answer: AB

Question No.343

Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)


  1. It ensures that data will be forwarded by RouterB.

  2. It provides stability for the OSPF process on RouterB.

  3. It specifies that the router ID for RouterB should be

  4. It decreases the metric for routes that are advertised from RouterB.

  5. It indicates that RouterB should be elected the DR for the LAN.

Correct Answer: BC


A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) – The router-ID is chosen in the order below:


The highest IP address assigned to a loopback (logical) interface.


If a loopback interface is not defined, the highest IP address of all active router#39;s physical interfaces will be chosen.

gt; The loopback interface will be chosen as the router ID of RouterB

Question No.344

Which two features can dynamically assign IPv6 addresses? (Choose two.)

  1. IPv6 stateless autoconfiguration

  2. DHCP

  3. NHRP

  4. IPv6 stateful autoconfiguration

  5. ISATAP tunneling

Correct Answer: AB

Question No.345

Which NAT function can map multiple inside addresses to a single outside address?

  1. PAT

  2. SFTP

  3. RARP

  4. ARP

  5. TFTP

Correct Answer: A

Question No.346

Which command can you enter to view the ports that are assigned to VLAN 20?

  1. Switch#show vlan id 20

  2. Switch#show ip interface brief

  3. Switch#show interface vlan 20

  4. Switch#show ip interface vlan 20

Correct Answer: A

Question No.347

Which technology can enable multiple VLANs to communicate with one another?

  1. inter-VLAN routing using a Layer 3 switch

  2. inter-VLAN routing using a Layer 2 switch

  3. intra-VLAN routing using router on a stick

  4. intra-VLAN routing using a Layer 3 switch

Correct Answer: A

Question No.348

What are two requirements for an HSRP group? (Choose two.)

  1. exactly one active router

  2. one or more standby routers

  3. one or more backup virtual routers

  4. exactly one standby active router

  5. exactly one backup virtual router

Correct Answer: AB

Question No.349

What should be part of a comprehensive network security plan?

  1. Allow users to develop their own approach to network security.

  2. Physically secure network equipment from potential access by unauthorized individuals.

  3. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.

  4. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

  5. Minimize network overhead by deactivating automatic antivirus client updates.

Correct Answer: B


Computer systems and networks are vulnerable to physical attack; therefore, procedures should be implemented to ensure that systems and networks are physically secure. Physical access to a system or network provides the opportunity for an intruder to damage, steal, or corrupt computer equipment, software, and information. When computer systems are networked with other departments or agencies for the purpose of sharing information, it is critical that each party to the network take appropriate measures to ensure that its system will not be physically breached, thereby compromising the entire network. Physical security procedures may be the least expensive to implement but can also be the most costly if not implemented. The most expensive and sophisticated computer protection software can be overcome once an intruder obtains physical access to the network.

Question No.350

Which command can you use to set the hostname on a switch?

  1. switch-mdf-c1(config)#hostname switch-mdf1

  2. switch-mdf-c1gt;hostname switch-mdf1

  3. switch-mdf-c1#hostname switch-mdf1

  4. switch-mdf-c1(config-if)#hostname switch-mdf1

Correct Answer: A

Get Full Version of the Exam
200-125 Dumps
200-125 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com