[Free] 2017(Feb) Ensurepass Testinsides Cisco 200-125 Practice Test 251-260

Ensurepass

CCNA Routing and Switching v3.0

 

QUESTION 251

Which three features are added in SNMPv3 over SNMPv2?

 

A.

Message Integrity

B.

Compression

C.

Authentication

D.

Encryption

E.

Error Detection

 

Correct Answer: ACD

Explanation:

Cisco IOS software supports the following versions of SNMP:

 

+ SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings.

 

+ SNMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the “c” stands for “community”) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1.

 

+ SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are as follows:

 

clip_image002Message integrity: Ensuring that a packet has not been tampered with in transit.

clip_image002[1]Authentication: Determining that the message is from a valid source.

clip_image002[2]Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source.

 

 

QUESTION 252

Which IPv6 address is the equivalent of the IPv4 interface loopback address 127.0.0.1?

 

A.

::1

B.

::

C.

2000::/3

D.

0::/10

 

Correct Answer: A

Explanation:

In IPv6 the loopback address is written as, ::1

This is a 128bit number, with the first 127 bits being ‘0’ and the 128th bit being ‘1’. It’s just a single address, so could also be written as ::1/128.

 

 

QUESTION 253

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

 

A.

SNMPv3 enhanced SNMPv2 security features.

B.

SNMPv3 added the Inform protocol message to SNMP.

C.

SNMPv2 added the Inform protocol message to SNMP.

D.

SNMPv3 added the GetBulk protocol messages to SNMP.

E.

SNMPv2 added the GetBulk protocol message to SNMP.

F.

SNMPv2 added the GetNext protocol message to SNMP.

 

Correct Answer: ACE

Explanation:

SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct. The two additional messages are added in SNMP2 (compared to SNMPv1)

 

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

 

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.

 

Note: These two messages are carried over SNMPv3.

 

 

QUESTION 254

Refer to the exhibit. A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?

 

clip_image004

 

A.

192.168.1.56/26

B.

192.168.1.56/27

C.

192.168.1.64/26

D.

192.168.1.64/27

 

Correct Answer: C

Explanation:

A subnet with 60 host is 2*2*2*2*2*2 = 64 -2 == 62

6 bits needed for hosts part. Therefore subnet bits are 2 bits (8-6) in fourth octet.

8bits+ 8bits+ 8bits + 2bits = /26

/26 bits subnet is 24bits + 11000000 = 24bits + 192

256 – 192 = 64

0 -63

64 – 127

 

 

QUESTION 255

Which three statements about Syslog utilization are true? (Choose three.)

 

A.

Utilizing Syslog improves network performance.

B.

The Syslog server automatically notifies the network administrator of network problems.

C.

A Syslog server provides the storage space necessary to store log files without using router disk space.

D.

There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.

E.

Enabling Syslog on a router automatically enables NTP for accurate time stamping.

F.

A Syslog server helps in aggregation of logs and alerts.

 

Correct Answer: CDF

Explanation:

The Syslog sender sends a small (less than 1KB) text message to the Syslog receiver. The Syslog receiver is commonly called “syslogd,” “Syslog daemon,” or “Syslog server.” Syslog messages can be sent via UDP (port 514) and/or TCP (typically, port 5000). While there are some exceptions, such as SSL wrappers, this data is typically sent in clear text over the network. A Syslog server provides the storage space necessary to store log files without using router disk space.

In general, there are significantly more Syslog messages available within IOS as compared to SNMP Trap messages. For example, a Cisco Catalyst 6500 switch running Cisco IOS Software Release 12.2(18)SXF contains about 90 SNMP trap notification messages, but has more than 6000 Syslog event messages.

System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a UNIX-style syslog service. A syslog service accepts messages and stores them in files, or prints them according to a simple configuration file.

Reference: http://www.cisco.com/c/en/us/products/collateral/services/high-availability/white_paper_c11-557812.html

 

 

QUESTION 256

Refer to the exhibit. What is the most appropriate summarization for these routes?

 

clip_image006

 

A.

10.0.0.0 /21

B.

10.0.0.0 /22

C.

10.0.0.0 /23

D.

10.0.0.0 /24

 

Correct Answer: B

Explanation:

The 10.0.0.0/22 subnet mask will include the 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 networks, and only those four networks.

 

 

QUESTION 257

Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?

 

clip_image008

 

A.

The address is removed from the pool until the conflict is resolved.

B.

The address remains in the pool until the conflict is resolved.

C.

Only the IP detected by Gratuitous ARP is removed from the pool.

D.

Only the IP detected by Ping is removed from the pool.

E.

The IP will be shown, even after the conflict is resolved.

 

Correct Answer: A

Explanation:

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html

 

 

 

 

 

 

QUESTION 258

An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?

 

A.

IP address: 192.168.20.14

Subnet Mask: 255.255.255.248

Default Gateway: 192.168.20.9

B.

IP address: 192.168.20.254

Subnet Mask: 255.255.255.0

Default Gateway: 192.168.20.1

C.

IP address: 192.168.20.30

Subnet Mask: 255.255.255.248

Default Gateway: 192.168.20.25

D.

IP address: 192.168.20.30

Subnet Mask: 255.255.255.240

Default Gateway: 192.168.20.17

E.

IP address: 192.168.20.30

Subnet Mask: 255.255.255.240

Default Gateway: 192.168.20.25

 

Correct Answer: C

Explanation:

For the 192.168.20.24/29 network, the usable hosts are 192.168.24.25 (router) – 192.168.24.30 (used for the sales server).

 

 

QUESTION 259

What are three benefits of GLBP? (Choose three.)

 

A.

GLBP supports up to eight virtual forwarders per GLBP group.

B.

GLBP supports clear text and MD5 password authentication between GLBP group members.

C.

GLBP is an open source standardized protocol that can be used with multiple vendors.

D.

GLBP supports up to 1024 virtual routers.

E.

GLBP can load share traffic across a maximum of four routers.

F.

GLBP elects two AVGs and two standby AVGs for redundancy.

 

Correct Answer: BDE

 

 

QUESTION 260

A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, would you use to accomplish this task? (Choose two.)

 

A.

access-list 10 permit ip 192.168.146.0 0.0.1.255

B.

access-list 10 permit ip 192.168.147.0 0.0.255.255

C.

access-list 10 permit ip 192.168.148.0 0.0.1.255

D.

access-list 10 permit ip 192.168.149.0 0.0.255.255

E.

access-list 10 permit ip 192.168.146.0 0.0.0.255

F.

access-list 10 permit ip 192.168.146.0 255.255.255.0

 

Correct Answer: AC

Explanation:

“access-list 10 permit ip 192.168.146.0 0.0.1.255” would allow only the 192.168.146.0 and 192.168.147.0 networks, and “access-list 10 permit ip 192.168.148.0 0.0.1.255” would allow only the 192.168.148.0 and 192.168.149.0 networks.

 

Free VCE & PDF File for Cisco 200-125 Practice Test

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …