[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 251-260

Get Full Version of the Exam

Question No.251

Which three features are added in SNMPv3 over SNMPv2?

  1. Message Integrity

  2. Compression

  3. Authentication

  4. Encryption

  5. Error Detection

Correct Answer: ACD


Cisco IOS software supports the following versions of SNMP:

SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

SNMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the quot;cquot; stands for quot;communityquot;) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are as follows:



Message integrity: Ensuring that a packet has not been tampered with in transit. Authentication: Determining that the message is from a valid source.


Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source.

Question No.252

Which IPv6 address is the equivalent of the IPv4 interface loopback address

A. ::1

B. ::

C. 2000::/3 D. 0::/10

Correct Answer: A


In IPv6 the loopback address is written as, ::1

This is a 128bit number, with the first 127 bits being #39;0#39; and the 128th bit being #39;1#39;. It#39;s just a single address, so could also be written as ::1/128.

Question No.253

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

  1. SNMPv3 enhanced SNMPv2 security features.

  2. SNMPv3 added the Inform protocol message to SNMP.

  3. SNMPv2 added the Inform protocol message to SNMP.

  4. SNMPv3 added the GetBulk protocol messages to SNMP.

  5. SNMPv2 added the GetBulk protocol message to SNMP.

  6. SNMPv2 added the GetNext protocol message to SNMP.

Correct Answer: ACE


SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read- only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -gt; A is correct. The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -gt; E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -gt; C is correct.

Note: These two messages are carried over SNMPv3.

Question No.254

Refer to the exhibit. A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?






Correct Answer: C


A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62

  • bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet. 8bits 8bits 8bits 2bits = /26

  • /26 bits subnet is 24bits 11000000 = 24bits 192 256 – 192 = 64

    0 -63

    64 – 127

    Question No.255

    Which three statements about Syslog utilization are true? (Choose three.)

    1. Utilizing Syslog improves network performance.

    2. The Syslog server automatically notifies the network administrator of network problems.

    3. A Syslog server provides the storage space necessary to store log files without using router disk space.

    4. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.

    5. Enabling Syslog on a router automatically enables NTP for accurate time stamping.

    6. A Syslog server helps in aggregation of logs and alerts.

    Correct Answer: CDF


    The Syslog sender sends a small (less than 1KB) text message to the Syslog receiver. The Syslog receiver is commonly called quot;syslogd,quot; quot;Syslog daemon,quot; or quot;Syslog server.quot; Syslog messages can be sent via UDP (port 514) and/or TCP (typically, port 5000). While there are some exceptions, such as SSL wrappers, this data is typically sent in clear text over the network. A Syslog server provides the storage space necessary to store log files without using router disk space.

    In general, there are significantly more Syslog messages available within IOS as compared to SNMP Trap messages. For example, a Cisco Catalyst 6500 switch running Cisco IOS Software Release 12.2(18)SXF contains about 90 SNMP trap notification messages, but has more than 6000 Syslog event messages.

    System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a UNIX-style syslog service. A syslog service accepts messages and stores them in files, or prints them according to a simple configuration file.

    Reference: http://www.cisco.com/c/en/us/products/collateral/services/high- availability/white_paper_c11-557812.html

    Question No.256

    Refer to the exhibit. What is the most appropriate summarization for these routes?


    A. /21

    B. /22

    C. /23

    D. /24

    Correct Answer: B


    The subnet mask will include the,,, and networks, and only those four networks.

    Question No.257

    Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?


    1. The address is removed from the pool until the conflict is resolved.

    2. The address remains in the pool until the conflict is resolved.

    3. Only the IP detected by Gratuitous ARP is removed from the pool.

    4. Only the IP detected by Ping is removed from the pool.

    5. The IP will be shown, even after the conflict is resolved.

    Correct Answer: A


    An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

    Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html

    Question No.258

    An administrator must assign static IP addresses to the servers in a network. For network, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?

    A. IP address:

    Subnet Mask:

    Default Gateway: B. IP address:

    Subnet Mask:

    Default Gateway: C. IP address:

    Subnet Mask:

    Default Gateway: D. IP address:

    Subnet Mask:

    Default Gateway: E. IP address:

    Subnet Mask:

    Default Gateway:

    Correct Answer: C


    For the network, the usable hosts are (router) – (used for the sales server).

    Question No.259

    What are three benefits of GLBP? (Choose three.)

    1. GLBP supports up to eight virtual forwarders per GLBP group.

    2. GLBP supports clear text and MD5 password authentication between GLBP group members.

    3. GLBP is an open source standardized protocol that can be used with multiple vendors.

    4. GLBP supports up to 1024 virtual routers.

    5. GLBP can load share traffic across a maximum of four routers.

    6. GLBP elects two AVGs and two standby AVGs for redundancy.

    Correct Answer: BDE

    Question No.260

    A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks,,, and only. Which two ACL

    statements, when combined, would you use to accomplish this task? (Choose two.)

    A. access-list 10 permit ip

    B. access-list 10 permit ip

    C. access-list 10 permit ip

    D. access-list 10 permit ip

    E. access-list 10 permit ip

    F. access-list 10 permit ip

    Correct Answer: AC


    quot;access-list 10 permit ip; would allow only the and networks, and quot;access-list 10 permit ip; would allow only

    the and networks.

    Get Full Version of the Exam
    200-125 Dumps
    200-125 VCE and PDF