Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

Cisco 200-105 Dumps

verified by experts

3 products

  • Verified by experts

200-105 Premium Bundle

  • Premium File 626 Questions & Answers

  • Training Course 66 Lectures

  • Study Guide 624 Pages

$89.97

$34.99
Cisco
ICND Interconnecting Cisco Networking Devices Part 2
Cisco
ICND Interconnecting Cisco Networking Devices Part 2

Files

Views

466

Size

13.1 MB

Downloads

498

Views

169

Size

13.1 MB

Downloads

367

Views

169

Size

26.1 MB

Downloads

612

Views

173

Size

1.5 MB

Downloads

402

Purchase Individually

  • 200-105

    Premium File

    626 Questions & Answers
    $39.99
    $27.99
  • 200-105

    Training Course

    66 Lectures
    $24.99
    $17.49
  • 200-105

    Study Guide

    624 Pages
    $24.99
    $17.49

Questions & Answers for Cisco 200-105

Showing 1-15 of 204 Questions

Question #1 - Topic 1

Which component of the Cisco SDN solution serves as the centralized management
system?

A. Cisco OpenDaylight

B. Cisco ACI

C. Cisco APIC

D. Cisco IWAN

Explanation:
Cisco ACI is a comprehensive SDN architecture. This policy-based automation solution
supports a business-relevant application policy language, greater scalability through a
distributed enforcement system, and greater network visibility. These benefits are achieved
through the integration of physical and virtual environments under one policy model for
networks, servers, storage, services, and security.

Question #2 - Topic 1

Which two switch states are valid for 802.1w? (Choose two.)

A. listening

B. backup

C. disabled

D. learning

E. discarding

Explanation:
Port States
There are only three port states left in RSTP that correspond to the three possible
operational states. The 802.1D disabled, blocking, and listening states are merged into a
unique 802.1w discarding state.

Question #3 - Topic 1

Which two pieces of information are provided by the show controllers serial 0 command?
(Choose two.)

A. the type of cable that is connected to the interface.

B. The uptime of the interface

C. the status of the physical layer of the interface

D. the full configuration of the interface

E. the interface's duplex settings

Explanation:
The show controller command provides hardware-related information useful to
troubleshoot and diagnose issues with Cisco router interfaces. The Cisco 12000 Series
uses a distributed architecture with a central command-line interface (CLI) at the Gigabit
Route Processor (GRP) and a local CLI at each line card.

Question #4 - Topic 1

Which option is the benefit of implementing an intelligent DNS for a cloud computing
solution?

A. It reduces the need for a backup data center.

B. It can redirect user requests to locations that are using fewer network resources.

C. It enables the ISP to maintain DNS records automatically.

D. It eliminates the need for a GSS.

Question #5 - Topic 1

What is the default VLAN on an access port?

A. 0

B. 1

C. 10

D. 1024

Question #6 - Topic 1

What is the best way to verify that a host has a path to other hosts in different networks?

A. Ping the loopback address.

B. Ping the default gateway.

C. Ping the local interface address.

D. Ping the remote network.

Explanation:
Ping is a tool that helps to verify IP-level connectivity; PathPing is a tool that detects packet
loss over multiple-hop trips. When troubleshooting, the ping command is used to send an
ICMP Echo Request to a target host name or IP address. Use Ping whenever you want to
verify that a host computer can send IP packets to a destination host. You can also use the
Ping tool to isolate network hardware problems and incompatible configurations.
If you call ipconfig /all and receive a response, there is no need to ping the loopback
address and your own IP address Ipconfig has already done so in order to generate the
report.
It is best to verify that a route exists between the local computer and a network host by first
using ping and the IP address of the network host to which you want to connect. The
command syntax is:
ping < IP address >
Perform the following steps when using Ping:
✑ Ping the loopback address to verify that TCP/IP is installed and configured
correctly on the local computer.
ping 127.0.0.1
If the loopback step fails, the IP stack is not responding. This might be because the TCP
drivers are corrupted, the network adapter might not be working, or another service is
interfering with IP.
✑ Ping the IP address of the local computer to verify that it was added to the network
correctly. Note that if the routing table is correct, this simply forwards the packet to
the loopback address of 127.0.0.1.
ping < IP address of local host >
✑ Ping the IP address of the default gateway to verify that the default gateway is
functioning and that you can communicate with a local host on the local network.
ping < IP address of default gateway >
✑ Ping the IP address of a remote host to verify that you can communicate through a
router.
ping < IP address of remote host >
✑ Ping the host name of a remote host to verify that you can resolve a remote host
name.
ping < Host name of remote host >
✑ Run a PathPing analysis to a remote host to verify that th

Question #7 - Topic 1

Which protocol authenticates connected devices before allowing them to access the LAN?
802.1d
802.11
802.1w
802.1x

D

Explanation:
802.1X authentication involves three parties: a supplicant, an authenticator, and an
authentication server. The supplicant is a client device (such as a laptop) that wishes to
attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the
software running on the client that provides credentials to the authenticator. The
authenticator is a network device, such as an Ethernet switch or wireless access point;
and the authentication server is typically a host running software supporting the RADIUS
and EAP protocols.
The authenticator acts like a security guard to a protected network. The supplicant (i.e.,
client device) is not allowed access through the authenticator to the protected side of the
network until the supplicants identity has been validated and authorized. An analogy to this
is providing a valid visa at the airport's arrival immigration before being allowed to enter the
country. With 802.1X port-based authentication, the supplicant provides credentials, such
as user name/password or digital certificate, to the authenticator, and the authenticator
forwards the credentials to the authentication server for verification. If the authentication
server determines the credentials are valid, the supplicant (client device) is allowed to
access resources located on the protected side of the network.

Question #8 - Topic 1

Which process is associated with spanning-tree convergence?

A. determining the path cost

B. electing designated ports

C. learning the sender bridge ID

D. assigning the port ID

Explanation:
Spanning Tree Protocol (STP) convergence (Layer 2 convergence) happens when bridges
and switches have transitioned to either the forwarding or blocking state. When layer 2 is
converged, Root Switch is elected and Root Ports, Designated Ports and Non-Designated
ports in all switches are selected. At Converged condition, the Root Ports and the
Designated ports are in forwarding state, and all other ports are in blocking state.

Question #9 - Topic 1

How can you disable DTP on a switch port?

A. Configure the switch port as a trunk.

B. Add an interface on the switch to a channel group.

C. Change the operational mode to static access.

D. Change the administrative mode to access.

Question #10 - Topic 1

Which two circumstances can cause collision domain issues on VLAN domain? (Choose
two.)

A. duplex mismatches on Ethernet segments in the same VLAN

B. multiple errors on switchport interfaces

C. congestion on the switch inband path

D. a failing NIC in an end device

E. an overloaded shared segment

Explanation:
Collision Domains
A collision domain is an area of a single LAN where end stations contend for access to the
network because all end stations are connected to a shared physical medium. If two
connected devices transmit onto the media at the same time, a collision occurs. When a
collision occurs, a JAM signal is sent on the network, indicating that a collision has
occurred and that devices should ignore any fragmented data associated with the collision.
Both sending devices back off sending their data for a random amount and then try again if
the medium is free for transmission. Therefore, collisions effectively delay transmission of
data, lowering the effective throughput available to a device. The more devices that are
attached to a collision domain, the greater the chances of collisions; this results in lower
bandwidth and performance for each device attached to the collision domain. Bridges and
switches terminate the physical signal path of a collision domain, allowing you to segment
separate collision domains, breaking them up into multiple smaller pieces to provide more
bandwidth per user within the new collision domains formed.

Question #11 - Topic 1

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Explanation:
Named Access Control Lists (ACLs) allows standard and extended ACLs to be given
names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit
Named Access Control Lists. Another benefit of using named access configuration mode is
that you can add new statements to the access list, and insert them wherever you like. With
the legacy syntax, you must delete the entire access list before reapplying it using the
updated rules.

Question #12 - Topic 1

You enter the show ipv6 route command on an OSPF device and the device displays a
route. Which conclusion can you draw about the environment?

A. OSPF is distributing IPv6 routes to BGP.

B. The router is designated as an ABR.

C. The router is designated as totally stubby.

D. OSPFv3 is in use.

Question #13 - Topic 1

Which identification number is valid for an extended ACL?

A. 1

B. 64

C. 99

D. 100

E. 299

F. 1099

Question #14 - Topic 1

Which option describes a difference between EIGRP for IPv4 and IPv6?

A. Only EIGRP for IPv6 advertises all connected networks.

B. Only EIGRP for IPv6 requires a router ID to be configured under the routing process-

C. AS numbers are configured in EIGRP but not in EIGRPv3.

D. Only EIGRP for IPv6 is enabled in the global configuration mode.

Explanation:
Router ID - Both EIGRP for IPv4 and EIGRP for IPv6 use a 32-bit number for the EIGRP
router ID. The 32-bit router ID is represented in dotted-decimal notation and is commonly
referred to as an IPv4 address. If the EIGRP for IPv6 router has not been configured with
an IPv4 address, the eigrp router-id command must be used to configure a 32-bit router
ID. The process for determining the router ID is the same for both EIGRP for IPv4 and
IPv6.

Question #15 - Topic 1








Why is the Branch2 network 10.1 0.20.0/24 unable to communicate with the Server farm1
network 10.1 0.10.0/24 over the GRE tunnel?

A. The GRE tunnel destination is not configured on the R2 router.

B. The GRE tunnel destination is not configured on the Branch2 router.

C. The static route points to the tunnel0 interface that is misconfigured on the Branch2 router.

D. The static route points to the tunnel0 interface that is misconfigured on the R2 router.

×