1 / 11

2020 Valid Cisco 200-105 Exam Questions

<br><br>It is highly recommended for every student to use 200-105 dumps for exceptional performance in your final IT exam. A team of experts have supervised its creation and has verified the content. You will find a series of questions and answers in PDF to develop concepts according to exam syllabus. The validity of 200-105 questions and answers can be estimated by viewing free demo questions. A thorough description will mould your thoughts to make them suitable for filed understanding. Latest exam updates will always be delivered to you on time by our customer support representatives. You can access our material quickly from Realexamcollection and can enjoy your study with 200-105 PDF exam material. Later, all of your learnt knowledge is tested with Online Practice Test to make you more confident about your attempt. You get here guarantee to pass your IT exam at the first attempt.https://www.realexamcollection.com/cisco/200-105-dumps.html

colinwade
Télécharger la présentation

2020 Valid Cisco 200-105 Exam Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cisco Exam 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Verson: Demo [ Total Questions: 10 ]

  2. Cisco 200-105 : Braindumps Questions Topic break down Topic No. of Questions Topic 1: New Set Questions Set 1 2 Topic 3: Routing Technologies 4 Topic 4: WAN Technologies 3 Topic 5: Infrastructure Services 1 100% Success with Our Dumps 2

  3. Cisco 200-105 : Braindumps Questions Topic 1, New Set Questions Set 1 Question No : 1 - (Topic 1) Which option describes how a switch in rapid PVST+ mode responds to a topology change? A. It immediately deletes dynamic MAC addresses that were learned by all ports on the switch. B. It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP instance. C. It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch. D. It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP instance. Answer: D Explanation: Rapid PVST+This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence based on the IEEE 802.1w standard. To provide rapid convergence, the rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a short aging time for dynamically learned MAC address entries. The rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only minimal extra configuration. The benefit of rapid PVST+ is that you can migrate a large PVST+ install base to rapid PVST+ without having to learn the complexities of the MSTP configuration and without having to reprovision your network. In rapid-PVST+ mode, each VLAN runs its own spanning-tree instance up to the maximum supported. Question No : 2 CORRECT TEXT - (Topic 1) Which protocol authenticates connected devices before allowing them to access the LAN? 802.1d 100% Success with Our Dumps 3

  4. Cisco 200-105 : Braindumps Questions 802.11 802.1w 802.1x Answer: D Explanation: 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols. The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant’s identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network. Topic 3, Routing Technologies Question No : 3 - (Topic 3) A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information? A. Router# show ip eigrp adjacency B. Router# show ip eigrp topology C. Router#show ip eigrp interfaces 100% Success with Our Dumps 4

  5. Cisco 200-105 : Braindumps Questions D. Router#show ip eigrp neighbors Answer: D Explanation: Implementing EIGRP http://www.ciscopress.com/articles/article.asp?p=1171169&seqNum=3 Below is an example of the show ip eigrp neighbors command. The retransmit interval (Smooth Round Trip Timer – SRTT) and the queue counts (Q count, which shows the number of queued EIGRP packets) for the adjacent routers are listed: R1#show ip eigrp neighbors IP-EIGRP neighbors for process 1 H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 10.10.10.2 Fa0/0 12 00:00:39 1282 5000 0 3 Question No : 4 - (Topic 3) Which two are advantages of static routing when compared to dynamic routing? (Choose two.) A. Configuration complexity decreases as network size increases. B. Security increases because only the network administrator may change the routing table. C. Route summarization is computed automatically by the router. D. Routing tables adapt automatically to topology changes. E. An efficient algorithm is used to build routing tables, using automatic updates. F. Routing updates are automatically sent to neighbors. G. Routing traffic load is reduced when used in stub network links. Answer: B,G Explanation: When reading (or being lectured about) all the glorious details of dynamic routing protocols, it's hard not to come away with the impression that dynamic routing is always better than static routing. It's important to keep in mind that the primary duty of a dynamic routing protocol is to automatically detect and adapt to topological changes in the internetwork. The price of this "automation" is paid in bandwidth, security, and maybe queue space, in memory, and in processing time. A frequent objection to static routing is that it is hard to administer. This criticism may be true of medium to large topologies with many alternative routes, but it is certainly not true of 100% Success with Our Dumps 5

  6. Cisco 200-105 : Braindumps Questions small internetworks with few or no alternative routes. References: http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=6 http://www.ciscopress.com/articles/article.asp?p=24090 Question No : 5 - (Topic 3) Refer to the exhibit. The network is converged. After link-state advertisements are received from Router_A, what information will Router_E contain in its routing table for the subnets 208.149.23.64 and 208.149.23.96? A. O 208.149.23.64 [110/13] via 190.173.23.10, 00:00:07, FastEthernet 0/0 O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0 B. O 208.149.23.64 [110/1] via 190.172.23.10, 00:00:07, Serial 1/0 O 208.149.23.96 [110/3] via 190.173.23.10, 00:00:16, FastEthernet 0/0 C. O 208.149.23.64 [110/13] via 190.172.23.10, 00:00:07, Serial 1/0 O 208.149.23.96 [110/13] via 190.172.23.10, 00:00:16, Serial 1/0 O 208.149.23.96 [110/13] via 190.173.23.10, 00:00:16, FastEthernet 0/0 D. O 208.149.23.64 [110/3] via 190.172.23.10, 00:00:07, Serial 1/0 O 208.149.23.96 [110/3] via 190.172.23.10, 00:00:16, Serial 1/0 100% Success with Our Dumps 6

  7. Cisco 200-105 : Braindumps Questions Answer: A Explanation: Router_E learns two subnets subnets 208.149.23.64 and 208.149.23.96 via Router_A through FastEthernet interface. The interface cost is calculated with the formula 108 / Bandwidth. For FastEthernet it is 108 / 100 Mbps = 108 / 100,000,000 = 1. Therefore the cost is 12 (learned from Router_A) + 1 = 13 for both subnets - B is not correct. The cost through T1 link is much higher than through T3 link (T1 cost = 108 / 1.544 Mbps = 64; T3 cost = 108 / 45 Mbps = 2) so surely OSPF will choose the path through T3 link -> Router_E will choose the path from Router_A through FastEthernet0/0, not Serial1/0 - C & D are not correct. In fact, we can quickly eliminate answers B, C and D because they contain at least one subnet learned from Serial1/0 - they are surely incorrect. Question No : 6 - (Topic 3) Refer to the exhibit. Assume that all of the router interfaces are operational and configured correctly. How will router R2 be affected by the configuration of R1 that is shown in the exhibit? A. Router R2 will not form a neighbor relationship with R1. B. Router R2 will obtain a full routing table, including a default route, from R1. C. R2 will obtain OSPF updates from R1, but will not obtain a default route from R1. 100% Success with Our Dumps 7

  8. Cisco 200-105 : Braindumps Questions D. R2 will not have a route for the directly connected serial network, but all other directly connected networks will be present, as well as the two Ethernet networks connected to R1. Answer: A Explanation: Open Shortest Path First http://en.wikipedia.org/wiki/Open_Shortest_Path_First The configuration of R1 shows "router ospf 1" however, the diagram also shows that both routers should be in the backbone OSPF Area of "0". When routers are in different OSPF areas they will not form a neighbor relationship. Neighbor relationships As a link state routing protocol, OSPF establishes and maintains neighbor relationships in order to exchange routing updates with other routers. The neighbor relationship table is called an adjacency database in OSPF. Provided that OSPF is configured correctly, OSPF forms neighbor relationships only with the routers directly connected to it. In order to form a neighbor relationship between two routers, the interfaces used to form the relationship must be in the same area. Generally an interface is only configured in a single area, however you can configure an interface to belong to multiple areas. In the second area, such an interface must be configured as a secondary interface. (A neighbor state simulation shows how neighbor state changes from Down to Full Adjacency progressively with exchanging Hello, DD, Request, Update, and Ack packets). Topic 4, WAN Technologies Question No : 7 - (Topic 4) From which PPPoE server configuration does a PPPoE client get an IP address? A. AAA authentication B. DHCP C. dialer interface D. virtual-template interface Answer: D 100% Success with Our Dumps 8

  9. Cisco 200-105 : Braindumps Questions Question No : 8 - (Topic 4) Which protocol specified by RFC 2281 provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from first-hop failures in network edge devices or access circuits? A. ICMP B. IRDP C. HSRP D. STP Answer: C Question No : 9 - (Topic 4) Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms? A. HDLC B. PPP C. X.25 D. Frame Relay Answer: B Explanation: High-Level Data Link Control (HDLC) - HDLC is the default encapsulation type on point-to- point, dedicated links, and circuit-switched connections. It is used typically when communicating between two Cisco devices. It is a bit-oriented synchronous data link layer protocol. Point-to-Point Protocol (PPP) - Provides router-to-router and host-to network connections over synchronous and asynchronous circuits. PPP was designed to work with several network layer protocols, such as IP, and IPX. PPP also has built in security mechanisms such as PAP and CHAP X.25/Link Access Procedure, Balanced (LAPB) - ITU-T standard that defines how connections between DTE and DCE are maintained for remote terminal access and computer communications in public data networks. X.25 specifies LAPB, a data line layer protocol. X.25 is a predecessor to Frame Relay. Frame Relay - Industry standard, switched data link layer protocol that handles multiple virtual circuits. It is a next-generation to X.25 that is streamlined to eliminate some of the time-consuming processes (such as error correction and flow control) that were employed 100% Success with Our Dumps 9

  10. Cisco 200-105 : Braindumps Questions in X.25. Topic 5, Infrastructure Services Question No : 10 - (Topic 5) What are three reasons to collect Netflow data on a company network? (Choose three.) A. To identify applications causing congestion B. To authorize user network access C. To report and alert link up / down instances D. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization E. To detect suboptimal routing in the network F. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service Answer: A,D,F Explanation: NetFlow facilitates solutions to many common problems encountered by IT professionals. + Analyze new applications and their network impact Identify new application network loads such as VoIP or remote site additions. + Reduction in peak WAN traffic 100% Success with Our Dumps 10

  11. Cisco 200-105 : Braindumps Questions Use NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network top talkers. + Troubleshooting and understanding network pain points Diagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command line interface or reporting tools. -> D is correct. + Detection of unauthorized WAN traffic Avoid costly upgrades by identifying the applications causing congestion. -> A is correct. + Security and anomaly detection NetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-Mars. + Validation of QoS parameters Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.-> F is correct. ference: http://www.c isco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/prod_white_paper0900aecd80406232.html https://www.realexamcollection.com/cisco/200-105-dumps.html 100% Success with Our Dumps 11

More Related