This page was exported from Lead2pass New Updated Exam Questions [ https://www.getfreevce.com ] Export date:Mon Dec 23 15:55:49 2024 / +0000 GMT ___________________________________________________ Title: [2017 New] Lead2pass Free 200-105 Exam Questions Download 100% Pass 200-105 Exam (26-50) --------------------------------------------------- 2017 June Cisco Official New Released 200-105 Dumps in Lead2pass.com! 100% Free Download! 100% Pass Guaranteed! Our PDF dumps of 200-105 exam is designed to ensure everything which you need to pass your exam successfully. At Lead2pass, we have a completely customer oriented policy. We invite the professionals who have rich experience and expert knowledge of the IT certification industry to guarantee the PDF details precisely and logically. Our customers' time is a precious concern for us. This requires us to provide you the products that can be utilized most efficiently. Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/200-105.html QUESTION 26How can you disable DTP on a switch port? A.    Configure the switch port as a trunk.B.    Add an interface on the switch to a channel group.C.    Change the operational mode to static access.D.    Change the administrative mode to access.Answer: A QUESTION 27Which two components are used to identify a neighbor in a BGP configuration? (Choose two.) A.    autonomous system numberB.    version numberC.    router IDD.    subnet maskE.    IP address Answer: AEExplanation:Use the show ip bgp neighbors (registered customers only) command to display information about the TCP and Border Gateway Protocol (BGP) connections and verify if the BGP peer is established. The output of the show ip bgp neighbors command below shows the BGP state as 'Established', which indicates that the BGP peer relationship has been established successfully.R1-AGS# show ip bgp neighbors | include BGPBGP neighbor is 10.10.10.2, remote AS 400, internal link BGP version 4, remote router ID 2.2.2.2BGP state = Established, up for 00:04:20BGP table version 1, neighbor version 1R1-AGS#The show ip bgp neighbors command has been used above with the modifier | include BGP. This makes the output more readable by filtering the the command output and displaying the relevant parts only.In addition, the show ip bgp summary (registered customers only) command can also be used to display the status of all BGP connections, as shown below.R1-AGS(9)# show ip bgp summaryBGP router identifier 10.1.1.2, local AS number 400 BGP table version is 1, main routing table version 1Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 10.10.10.2 4 400 3 3 1 0 0 00:00:26 0 QUESTION 28Which type of interface can negotiate an IP address for a PPPoE client? A.    EthernetB.    dialerC.    serialD.    Frame Relay Answer: B QUESTION 29What is the default VLAN on an access port? A.    0B.    1C.    10D.    1024 Answer: B QUESTION 30Which statement about QoS default behavior is true? A.    Ports are untrusted by default.B.    VoIP traffic is passed without being tagged.C.    Video traffic is passed with a well-known DSCP value of 46.D.    Packets are classified internally with an environment.E.    Packets that arrive with a tag are untagged at the edge of an administrative domain. Answer: EExplanation: Frames received from users in the administratively-defined VLANs are classified or tagged for transmission to other devices. Based on rules that you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is sent to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames. For IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used. Each port on the switch has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or CMS. A tagged frame continues to use its assigned CoS value when it passes through the ingress port. QUESTION 31Refer to the exhibit. While troubleshooting a switch, you executed the show interface port-channel 1 etherchannel command and it returned this output. Which information is provided by the Load value?   A.    the percentage of use of the linkB.    the preference of the linkC.    the session count of the linkD.    the number source-destination pairs on the link Answer: D QUESTION 32Which spanning-tree feature places a port immediately into a forwarding stated? A.    BPDU guardB.    PortFastC.    loop guardD.    UDLDE.    Uplink Fast Answer: BExplanation:PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state. QUESTION 33Which protocol authenticates connected devices before allowing them to access the LAN? A.    802.1dB.    802.11C.    802.1wD.    802.1x Answer: DExplanation:802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant's identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network. QUESTION 34Which identification number is valid for an extended ACL? A.    1B.    64C.    99D.    100E.    299F.    1099 Answer: D QUESTION 35Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.) A.    the type of cable that is connected to the interface.B.    The uptime of the interfaceC.    the status of the physical layer of the interfaceD.    the full configuration of the interfaceE.    the interface's duplex settings Answer: ACExplanation:The show controller command provides hardware-related information useful to troubleshoot and diagnose issues with Cisco router interfaces. The Cisco 12000 Series uses a distributed architecture with a central command-line interface (CLI) at the Gigabit Route Processor (GRP) and a local CLI at each line card. QUESTION 36Which EIGRP for IPv6 command can you enter to view the link-local addresses of the neighbors of a device? A.    show ipv6 eigrp 20 interfacesB.    show ipv6 route eigrpC.    show ipv6 eigrp neighborsD.    show ip eigrp traffic Answer: C QUESTION 37Which configuration can you apply to enable encapsulation on a subinterface? A.    interface FastEthernet 0/0encapsulation dot1Q 30ip address 10.1.1.30 255.255.255.0B.    interface FastEthernet 0/0.30ip address 10.1.1.30 255.255.255.0C.    interface FastEthernet 0/0.30description subinterface vlan 30D.    interface FastEthernet 0/0.30encapsulation dot1Q 30ip address 10.1.1.30 255.255.255.0 Answer: D QUESTION 38Which statement about slow inter VLAN forwarding is true? A.    The VLAN is experiencing slowness in the point-to-point collisionless connection.B.    The VLANs are experiencing slowness because multiple devices are connected to the same hub.C.    The local VLAN is working normally, but traffic to the alternate VLAN is forwarded slower than expected.D.    The entire VLAN is experiencing slowness.E.    The VLANs are experiencing slowness due to a duplex mismatch. Answer: EExplanation:Common Causes of Slow IntraVLAN and InterVLAN Connectivity The symptoms of slow connectivity on a VLAN can be caused by multiple factors on different network layers. Commonly the network speed issue may be occurring on a lower level, but symptoms can be observed on a higher level as the problem masks itself under the term "slow VLAN". To clarify, this document defines the following new terms: "slow collision domain", "slow broadcast domain" (in other words, slow VLAN), and "slow interVLAN forwarding". These are defined in the section Three Categories of Causes, below.In the following scenario (illustrated in the network diagram below), there is a Layer 3 (L3) switch performing interVLAN routing between the server and client VLANs. In this failure scenario, one server is connected to a switch, and the port duplex mode is configured half- duplex on the server side and full-duplex on the switch side. This misconfiguration results in a packet loss and slowness, with increased packet loss when higher traffic rates occur on the link where the server is connected. For the clients who communicate with this server, the problem looks like slow interVLAN forwarding because they do not have a problem communicating to other devices or clients on the same VLAN. The problem occurs only when communicating to the server on a different VLAN. Thus, the problem occurred on a single collision domain, but is seen as slow interVLAN forwarding.   Three Categories of CausesThe causes of slowness can be divided into three categories, as follows:Slow Collision Domain ConnectivityCollision domain is defined as connected devices configured in a half-duplex port configuration, connected to each other or a hub. If a device is connected to a switch port and full-duplex mode is configured, such a point-to-point connection is collisionless. Slowness on such a segment still can occur for different reasons.Slow Broadcast Domain Connectivity (Slow VLAN)Slow broadcast domain connectivity occurs when the whole VLAN (that is, all devices on the same VLAN) experiences slowness.Slow InterVLAN Connectivity (Slow Forwarding Between VLANs) Slow interVLAN connectivity (slow forwarding between VLANs) occurs when there is no slowness on the local VLAN, but traffic needs to be forwarded to an alternate VLAN, and it is not forwarded at the expected rate.Causes for Network SlownessPacket LossIn most cases, a network is considered slow when higher-layer protocols (applications) require extended time to complete an operation that typically runs faster. That slowness is caused by the loss of some packets on the network, which causes higher-level protocols like TCP or applications to time out and initiate retransmission.Hardware Forwarding IssuesWith another type of slowness, caused by network equipment, forwarding (whether Layer 2 [L2] or L3) is performed slowly. This is due to a deviation from normal (designed) operation and switching to slow path forwarding. An example of this is when Multilayer Switching (MLS) on the switch forwards L3 packets between VLANs in the hardware, but due to misconfiguration, MLS is not functioning properly and forwarding is done by the router in the software (which drops the interVLAN forwarding rate significantly). QUESTION 39Which statement about the IP SLAs ICMP Echo operation is true? A.    The frequency of the operation .s specified in milliseconds.B.    It is used to identify the best source interface from which to send traffic.C.    It is configured in enable mode.D.    It is used to determine the frequency of ICMP packets. Answer: DExplanation:This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices using IPv4 or IPv6. ICMP Echo is useful for troubleshooting network connectivity issues. This module also demonstrates how the results of the ICMP Echo operation can be displayed and analyzed to determine how the network IP connections are performing.ICMP Echo OperationThe ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply.In the figure below ping is used by the ICMP Echo operation to measure the response time between the source IP SLAs device and the destination IP device. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time measurements.   The IP SLAs ICMP Echo operation conforms to the same IETF specifications for ICMP ping testing and the two methods result in the same response times. Configuring a Basic ICMP Echo Operation on the Source Device SUMMARY STEPS1. enable 2. configure terminal 3. ip sla operation-number 4. icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} | source-interface interface-name] 5. frequency seconds 6. end QUESTION 40Which option describes how a switch in rapid PVST+ mode responds to a topology change? A.    It immediately deletes dynamic MAC addresses that were learned by all ports on the switch.B.    It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP instance.C.    It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch.D.    It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP instance. Answer: DExplanation:Rapid PVST+This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence based on the IEEE 802.1w standard. To provide rapid convergence, the rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a short aging time for dynamically learned MAC address entries.The rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only minimal extra configuration. The benefit of rapid PVST+ is that you can migrate a large PVST+ install base to rapid PVST+ without having to learn the complexities of the MSTP configuration and without having to reprovision your network. In rapid-PVST+ mode, each VLAN runs its own spanning-tree instance up to the maximum supported. QUESTION 41Which type of topology is required by DMVPN? A.    ringB.    full meshC.    hub-and-spokeD.    partial mesh Answer: C QUESTION 42Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency? (Choose two.)   A.    Set the subnet mask on edge-1 to 255 255.255.252.B.    Reduce the MTU on edge-1 to 1514.C.    Set the OSPF cost on edge-1 to 1522.D.    Reduce the MTU on edge-1 to 1500.E.    Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface. Answer: DEExplanation: A situation can occur where the interface MTU is at a high value, for example 9000, while the real value of the size of packets that can be forwarded over this interface is 1500.If there is a mismatch on MTU on both sides of the link where OSPF runs, then the OSPF adjacency will not form because the MTU value is carried in the Database Description (DBD) packets and checked on the other side. QUESTION 43Which statement about switch access ports is true? A.    They drop packets with 802.1Q tags.B.    A VLAN must be assigned to an access port before it is created.C.    They can receive traffic from more than one VLAN with no voice supportD.    By default, they carry traffic for VLAN 10. Answer: AExplanation:"If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that port drops the packet without learning its MAC source address." QUESTION 44Which option is a benefit of switch stacking? A.    It provides redundancy with no impact on resource usage.B.    It simplifies adding and removing hosts.C.    It supports better performance of high-needs applications.D.    It provides higher port density with better resource usage. Answer: DExplanation:A stackable switch is a network switch that is fully functional operating standalone but which can also be set up to operate together with one or more other network switches, with this group of switches showing the characteristics of a single switch but having the port capacity of the sum of the combined switches. QUESTION 45What is the first step you perform to configure an SNMPv3 user? A.    Configure server traps.B.    Configure the server group.C.    Configure the server host.D.    Configure the remote engine ID. Answer: BExplanation:The first task in configuring SNMPv3 is to define a view. To simplify things, we'll create a view that allows access to the entire internet subtree:router(config)#snmp-server view readview internet included This command creates a view called readview. If you want to limit the view to the system tree, for example, replace internet with system. The included keyword states that the specified tree should be included in the view; use excluded if you wanted to exclude a certain subtree.Next, create a group that uses the new view. The following command creates a group called readonly ; v3 means that SNMPv3 should be used. The auth keyword specifies that the entity should authenticate packets without encrypting them; read readview says that the view named readview should be used whenever members of the readonly group access the router.router(config)#snmp-server group readonly v3 auth read readview QUESTION 46Which statement about named ACLs is true? A.    They support standard and extended ACLs.B.    They are used to filter usernames and passwords for Telnet and SSH.C.    They are used to filter Layer 7 traffic.D.    They support standard ACLs only.E.    They are used to rate limit traffic destined to targeted networks. Answer: AExplanation:Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules. QUESTION 47Which two switch states are valid for 802.1w? (Choose two.) A.    listeningB.    backupC.    disabledD.    learningE.    discarding Answer: DEExplanation:Port StatesThere are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state.   QUESTION 48Which statement about MPLS is true? A.    It operates in Layer 1.B.    It operates between Layer 2 and Layer 3.C.    It operates in Layer 3.D.    it operates in Layer 2. Answer: BExplanation: MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol. QUESTION 49Which Cisco platform can verify ACLs? A.    Cisco Prime InfrastructureB.    Cisco Wireless LAN ControllerC.    Cisco APIC-EMD.    Cisco IOS-XE Answer: B QUESTION 50Which three options are the HSRP states for a router? (Choose three.) A.    initializeB.    learnC.    secondaryD.    listenE.    speakF.    primary Answer: BDEExplanation:HSRP States If you want to get more 200-105 exam preparation material, you can download the free 200-105 braindumps in PDF files on Lead2pass. It would be great helpful for your exam. All the 200-105 dumps are updated and cover every aspect of the examination. Welcome to choose. 200-105 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDVzY4ZElvSmlkb2M 2017 Cisco 200-105 exam dumps (All 402 Q&As) from Lead2pass: http://www.lead2pass.com/200-105.html [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-06-20 09:28:30 Post date GMT: 2017-06-20 09:28:30 Post modified date: 2017-06-20 09:28:30 Post modified date GMT: 2017-06-20 09:28:30 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com