CCNA 200-125 Exam: Miscellaneous Questions With Answers

CCNA 200-125 Exam: Miscellaneous Questions With Answers


Question 1. What is the authoritative source for an address lookup?
A. a recursive DNS search
B. the operating system cache
C. the ISP local cache
D. the browser cache

Answer: A

Question 2. Which feature builds a FIB and an adjacency table to expedite packet forwarding?
A. cut through
B. fast switching
C. process switching
D. Cisco Express Forwarding

Answer: D

Question 3. Which two statements about late collisions are true? (Choose two)
A. They may indicate a duplex mismatch.
B. By definition, they occur after the 512th bit of the frame has been transmitted.
C. They indicate received frames that did not pass the FCS match.
D. They are frames that exceed 1518 bytes.
E. They occur when CRC errors and interference occur on the cable.

Answer: A B

Question 4. Which option describes the purpose of traffic policing?
A. It prioritizes routing protocol traffic.
B. It remarks traffic that is below the CIR
C. It drops traffic that exceeds the CIR.
D. It queues and then transmits traffic that exceeds the CIR.

Answer: C

Question 5. Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?
A. It reduces the need for a backup data center.
B. It can redirect user requests to locations that are using fewer network resources.
C. It enables the ISP to maintain DNS records automatically.
D. It eliminates the need for a GSS.

Answer: B

Question 6. Which statement about QoS default behavior is true?
A. Ports are untrusted by default.
B. VoIP traffic is passed without being tagged.
C. Video traffic is passed with a well-known DSCP value of 46.
D. Packets are classified internally with an environment.
E. Packets that arrive with a tag are untagged at the edge of an administrative domain.

Answer: E

Question 7. What 8-bit field exists in IP packet for QoS?
A. Tos Field
B. DSCP
C. IP Precedence
D. Cos
E. ?

Answer: A

Question 8. What feature uses a random time to re-sent a frame?
A. CSMA/CA
B. ?
C. ?
D. CSMA/CD

Answer: D

Question 9. Which command can you enter to verify echo request and echo reply?
A. ping
B. traceroute
C. tracert
D. telnet

Answer: A

Question 10. End-to-end response timeWhat are the three major components of Cisco network virtualization? (Choose three)
A. network access control
B. path isolation
C. virtual network services
D. policy enforcement

Answer: A B C

Question 11. Two features of the extended ping command? (Choose two)
A. It can send a specific number of packet
B. It can send packet from specified interface of IP address
C. It can resolve the destination host name
D. It can ping multiple host at the same time

Answer: A B

Question 12. What utility is used for shadowed rules?
A. Create an action plan
B. Implement an action plan
C. Gather facts
D. ?

Answer: B

Question 13. Which feature can you implement to reserve bandwidth for VoIP calls across the call path?
A. round robin
B. CBWFQ
C. PQ
D. RSVP

Answer: D

Question 14. Which option is a benefit of switch stacking?
A. It provides redundancy with no impact on resource usage.
B. It simplifies adding and removing hosts.
C. It supports better performance of high-needs applications.
D. It provides higher port density with better resource usage.

Answer: D

More Resources

About the author

Prasanna

Leave a Comment