[Free] 2019(Nov) EnsurePass Cisco 200-125 Dumps with VCE and PDF 131-140

Get Full Version of the Exam

Question No.131

Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)


  1. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.

  2. Router1 is acting as a TFTP server for other routers.

  3. Router1 cannot locate a valid IOS image in flash memory.

  4. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.

  5. Cisco routers will first attempt to load an image from TFTP for management purposes.

Correct Answer: AC


The loading sequence of CISCO IOS is as follows: Booting up the router and locating the Cisco IOS

  1. POST (power on self-test)

  2. Bootstrap code executed

  3. Check Configuration Register value (NVRAM) which can be modified using the config- register command

    0 = ROM Monitor mode 1 = ROM IOS

    2 – 15 = startup-config in NVRAM

  4. Startup-config filE. Check for boot system commands (NVRAM) If boot system commands in startup-config

    1. Run boot system commands in order they appear in startup-config to locate the IOS

    2. [If boot system commands fail, use default fallback sequence to locate the IOS (Flash, TFTP, ROM)?]

      If no boot system commands in startup-config use the default fallback sequence in locating the IOS:

    3. Flash (sequential)

    4. TFTP server (netboot)

    5. ROM (partial IOS) or keep retrying TFTP depending upon router model

  5. If IOS is loaded, but there is no startup-config file, the router will use the default fallback sequence for locating the IOS and then it will enter setup mode or the setup dialogue.

Question No.132

What two things will a router do when running a distance vector routing protocol? (Choose two.)

  1. Send periodic updates regardless of topology changes.

  2. Send entire routing table to all routers in the routing domain.

  3. Use the shortest-path algorithm to the determine best path.

  4. Update the routing table based on updates from their neighbors.

  5. Maintain the topology of the entire network in its database.

Correct Answer: AD


Distance means how far and Vector means in which direction. Distance Vector routing protocols pass periodic copies of routing table to neighbor routers and accumulate distance vectors. In distance vector routing protocols, routers discover the best path to destination from each neighbor. The routing updates proceed step by step from router to router.

Question No.133

Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this router?






Correct Answer: C


The highest IP address of all loopback interfaces will be chosen -gt; Loopback 0 will be chosen as the router ID.

Question No.134

Which statement describes the process ID that is used to run OSPF on a router?

  1. It is globally significant and is used to represent the AS number.

  2. It is locally significant and is used to identify an instance of the OSPF database.

  3. It is globally significant and is used to identify OSPF stub areas.

  4. It is locally significant and must be the same throughout an area.

Correct Answer: B


The Process ID for OSPF on a router is only locally significant and you can use the same number on each router, or each router can have a different number-it just doesn#39;t matter. The numbers you can use are from 1 to 65,535. Don#39;t get this confused with area numbers, which can be from 0 to 4.2 billion.

Question No.135

Which command is used to display the collection of OSPF link states?

  1. show ip ospf link-state

  2. show ip ospf lsa database

  3. show ip ospf neighbors

  4. show ip ospf database

Correct Answer: D


The quot;show ip ospf databasequot; command displays the link states. Here is an example: Here is the lsa database on R2.

R2#show ip ospf database

OSPF Router with ID ( (Process ID 1) Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count 793 0x80000003 0x004F85 2 776 0x80000004 0x005643 1 755 0x80000005 0x0059CA 2 775 0x80000005 0x00B5B1 2

Net Link States (Area 0)

Link ID ADV Router Age Seq# Checksum 794 0x800000010x001E8B 812 0x800000010x004BA9 755 0x800000010x007F16 775 0x800000010x00C31F

Question No.136

Which characteristics are representatives of a link-state routing protocol? (Choose three.)

  1. provides common view of entire topology

  2. exchanges routing tables with neighbors

  3. calculates shortest path

  4. utilizes event-triggered updates

  5. utilizes frequent periodic updates

Correct Answer: ACD


Each of routers running link-state routing protocol learns paths to all the destinations in its quot;areaquot; so we can say although it is a bit unclear. Link-state routing protocols generate routing updates only (not the whole routing table) when a change occurs in the network topology so

Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path – gt;. Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state routing protocol utilizes event-triggered updates (only sends update when a change occurs) -gt;.

Question No.137

Refer to the exhibit. What can be determined about the router from the console output?


  1. No configuration file was found in NVRAM.

  2. No configuration file was found in flash.

  3. No configuration file was found in the PCMCIA card.

  4. Configuration file is normal and will load in 15 seconds.

Correct Answer: A


When no startup configuration file is found in NVRAM, the System Configuration Dialog will appear to ask if we want to enter the initial configuration dialog or not.

Question No.138

A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?

  1. service password-encryption

    access-list 1 permit

    line vty 0 4 login

    password cisco access-class 1

  2. enable password secret line vty 0


    password cisco

  3. service password-encryption line vty 1


    password cisco

  4. service password-encryption line vty 0 4


password cisco

Correct Answer: C


Only one VTY connection is allowed which is exactly what#39;s requested. Incorrect answer: command.

line vty0 4

would enable all 5 vty connections.

Question No.139

A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

  1. It checks the configuration register.

  2. It attempts to boot from a TFTP server.

  3. It loads the first image file in flash memory.

  4. It inspects the configuration file in NVRAM for boot instructions.

Correct Answer: A


Default (normal) Boot Sequence

Power on Router – Router does POST – Bootstrap starts IOS load – Check configuration register to see what mode the router should boot up in (usually 0x2102 to read startup- config in NVRAM / or 0x2142 to start in quot;setup-modequot;) – check the startup-config file in NVRAM for boot-system commands – load IOS from Flash.

Question No.140

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

  1. hello packets

  2. SAP messages sent by other routers

  3. LSAs from other routers

  4. beacons received on point-to-point links

  5. routing tables received from other link-state routers

  6. TTL packets from designated routers

Correct Answer: AC


Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.

After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA is copied and forwarded to every neighbor except the one that sent the LSA.

Get Full Version of the Exam
200-125 Dumps
200-125 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.