Certification Exam Prep Questions For (200-125) Cisco Certified Network Associate (CCNA)
QuickStart is now offering assessment questions for (200-125) Cisco Certified Network Associate (CCNA). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for (200-125) Cisco Certified Network Associate (CCNA).
Can you choose the right option that tells the number of times IP SLA has been executed successfully on R1?
Identify the option that represents the HSRP priority of R2.
Can you identify the unique device identifier of R1?
- A. CISCO887VA-K9:FCZ1121C119
-
Correct!
- B. FCZ1121C119
-
Incorrect.
- C. CISCO887VA-K9
-
Incorrect.
- D. C880data-universalk9-mz.152-3.T.bin
-
Incorrect.
The configuration file of CORE2 is set to be sent to the TFTP Server every five minutes. Can you identify the TFTP’s IP address?
- A. 10.10.10.200
-
Incorrect.
- B. 10.10.10.201
-
Incorrect.
- C. 10.10.10.199
-
Correct!
- D. 10.10.10.202
-
Incorrect.
CORE1 is connected to a rogue switch. Vendor neutral link layer discovery protocol is run by this rogue switch. Can you identify the port to which this rogue switch is connected?
There are four severity levels mentioned in the options. Can you identify the severity level for buffer logging on R1?
Can you identify from the options below, which switch was elected root bridge for VLAN 20?
Which two commands will you use if you are to configure Sw_2 as Spanning-tree root bridge for VLAN 20 and Swi as Spanning-tree root bridge for VLAN 10? (opt any TWO)
- A. Sw_2(config)#spanning-tree vlan 20 priority 16384
-
Incorrect.
- B. Sw_1(config)#spanning-tree vlan 10 priority 0
-
Incorrect.
- D. Sw_1(config)#spanning-tree vlan 10 priority 61440
-
Incorrect.
Identify a device that is causing network connectivity issues?
Some current plug-ins are installed by the security team to update your vulnerability scanner. A non-credentialed scan of the network is run, and the result reflects a spike in reported vulnerabilities. Run of multiple hosts, there is a custom application reported as vulnerable. The security team believes it is a false positive. Can you identify the first action the security team must take?
- A. Interface vlan association
-
Correct!
- B. Interface vlan encapsulation type.
-
Incorrect.
- C. Interface status
-
Incorrect.
- D. Interface native vlan association
-
Incorrect.
If there are network connectivity issues, which two commands would you issue on Core_Rtr_A? (opt any TWO)
- A. Core_Rtr_A(config)#interface gi0/0.20
-
Incorrect.
- B. Core_Rtr_A(config)#interface gi0/0.10
-
Incorrect.
- C. Core_Rtr_A(config-subif)#encapsulation dot1Q 1
-
Incorrect.
- D. Core_Rtr_A(config-subif)#encapsulation dot1 Q 20
-
Correct!
Identify the field in an ethernet frame that has following properties: -7 bytes long -Responsible for synchronization
- A. Preamble
-
Correct!
- B. Source MAC address
-
Incorrect.
- C. FCS
-
Incorrect.
- D. Destination MAC address
-
Incorrect.
RIP and OSPF are two different routing protocol types. Identify from the options below the default administrative distances of RIP and OSPF?
You are working for an organization as a network administrator. You are required to implement Enhanced Interior Gateway Routing Protocol (EIGRP) as the routing protocol on the network. You need to configure EIGRP for Autonomous System (AS) 5. You also need to advertise the network 192.168.10.0. This network is directly connected to the router on interface Fa0/0. Can you choose the right set of commands you should use?
Choose three of the below given statements that stand true about enabling port-security? (opt any THREE)
- A. You should use the show port-security interface command to verify that a violation has occurred.
-
Correct!
- B. The default violation mode is shutdown.
-
Correct!
- C. The switchport port-security command is used to enable port-security under an interface.
-
Correct!
- D. The protect violation mode sends log and SNMP messages.
-
Incorrect.
Being a network administrator for your company, there is a running configuration of the Cisco switch to which you have made changes. The changes in configuration need to be saved to the NVRAM and then verified that the changes are saved. Identify the two commands that you think will help you complete the task? (opt any TWO)
- A. Show startup-config
-
Correct!
- B. Copy startup-config running-config
-
Incorrect.
- C. Copy startup-config running-config
-
Incorrect.
- D. Copy running-config startup-config
-
Correct!
You want to run IOS XE on a Cisco router and deploy it as a virtual machine in a data center. Which Cisco router will you choose?
You want to send a message from one device to multiple devices who have subscribed for the message information. Which address type can be used for this purpose?
- A. Multicast address
-
Incorrect.
- B. IP address
-
Correct!
- C. Unicast address
-
Incorrect.
- D. Broadcast address
-
Incorrect.
You are working for an organization as a network administrator. There is a Cisco 2960 switch on the network for which you have enabled port security. on the secured port some secured Media Access Control (MAC) addresses were manually added. You want to remove one of the secured MAC addresses from the address table. Can you identify a Cisco 105 command to use in order for the MAC address to be removed?
- A. no switchport port-security mac-address
-
Correct!
- B. Clear mac-address-table dynamic
-
Incorrect.
- C. Clear port-security dynamic interface
-
Incorrect.
- D. no switchport port-security mac-address sticky
-
Incorrect.
There are a number of Cisco routers and switches you are managing. There is a fresh product activation key (PAK) received by you for the routers. Each router needs to have licenses installed by you. What would be your step of action?
- A. On each router, run the license install command.
-
Incorrect.
Can you identify the router’s name that an internet service provider uses for the sake of connecting to a customer site and forming the edge of a tunnel in Multiprotocol Label Switching (MPLS)?
You want to verify the interfaces configured on a router. Those interfaces are also included in the RIP routing process. Can you identify two commands to verify the interfaces? (opt any TWO)
- A. show ip rip database
-
Incorrect.
- B. show ip route
-
Incorrect.
- C. show running-config
-
Correct!
- D. show ip protocols
-
Correct!
- Home
- Sample Question - Cisco Certified Network Associate (CCNA) (200-125)
Sample Question - Cisco Certified Network Associate (CCNA) (200-125)
More Information:
- Learning Style: On Demand
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Duration: 1 Hour
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information