getcertified4sure.com

Tips for cisco 200 105




It is impossible to pass Cisco cisco 200 105 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Cisco ccna routing and switching icnd2 200 105 official cert guide practice questions. You will get a surprising result by our Replace Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) practice guides.

Q31. - (Topic 3) 

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.) 

A. CHAP uses a two-way handshake. 

B. CHAP uses a three-way handshake. 

C. CHAP authentication periodically occurs after link establishment. 

D. CHAP authentication passwords are sent in plaintext. 

E. CHAP authentication is performed only upon link establishment. 

F. CHAP has no protection from playback attacks. 

Answer: B,C 

Explanation: 

Understanding and Configuring PPP CHAP Authentication http://www.cisco.com/en/US/tech/tk713/tk507/technologies_tech_note09186a00800b4131. shtml 

One-Way and Two-Way Authentication CHAP is defined as a one-way authentication method. However, you use CHAP in both directions to create a two-way authentication. Hence, with two-way CHAP, a separate three-way handshake is initiated by each side. In the Cisco CHAP implementation, by default, the called party must authenticate the calling party (unless authentication is completely turned off). Therefore, a one-way authentication initiated by the called party is the minimum possible authentication. However, the calling party can also verify the identity of the called party, and this results in a two-way authentication. One-way authentication is often required when you connect to non-Cisco devices. 


Q32. - (Topic 2) 

Refer to the exhibit. 

Which two statements are true about the loopback address that is configured on RouterB? (Choose two.) 

A. It ensures that data will be forwarded by RouterB. 

B. It provides stability for the OSPF process on RouterB. 

C. It specifies that the router ID for RouterB should be 10.0.0.1. 

D. It decreases the metric for routes that are advertised from RouterB. 

E. It indicates that RouterB should be elected the DR for the LAN. 

Answer: B,C 

Explanation: A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) - B is correct. 

The router-ID is chosen in the order below: 

The highest IP address assigned to a loopback (logical) interface. If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. 

-The loopback interface will be chosen as the router ID of RouterB - C is correct. 


Q33. - (Topic 2) 

What can be done to secure the virtual terminal interfaces on a router? (Choose two.) 

A. Administratively shut down the interface. 

B. Physically secure the interface. 

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command. 

D. Configure a virtual terminal password and login process. 

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command. 

Answer: D,E 

Explanation: 

It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces -> A is not correct. 

We can not physically secure a virtual interface because it is “virtual” -> B is not correct. 

To apply an access list to a virtual terminal interface we must use the “access-class” command. The “access-group” command is only used to apply an access list to a physical interface -> C is not correct; E is correct. 

The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login -> D is correct. 


Q34. - (Topic 2) 

Refer to the exhibit. 

The network associate is configuring OSPF on the Core router. All the connections to the branches should be participating in OSPF. The link to the ISP should NOT participate in OSPF and should only be advertised as the default route. What set of commands will properly configure the Core router? 

A. Core(config-router)# default-information originate Core(config-router)# network 10.0.0.0 0.255.255.255 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14 

B. Core(config-router)# default-information originate Core(config-router)# network 10.10.2.13 0.0.0.242 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14 

C. Core(config-router)# default-information originate Core(config-router)# network 10.10.2.16 0.0.0.15 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14 

D. Core(config-router)# default-information originate Core(config-router)# network 10.10.2.32 0.0.0.31 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.0 0.0.0.0 10.10.2.14 

Answer:

Explanation: 

There are two ways to inject a default route into a normal area.1. If the ASBR already has the default route in its routing table, you can advertise theexisting 0.0.0.0/0 into the OSPF domain with the default-information originate router configuration command.2. If the ASBR doesn’t have a default route, you can add the keyword always to the default-information originate command (default-information originate always).This command will advertise a default route into the OSPF domain, regardless of whether it has a route to 0.0.0.0. Another benefit of adding always keyword is that it can add stability to the internetwork. For example, if the ASBR is learning a default route from another routing domain such as RIP and this route is flapping, then without the always keyword, each time the route flaps, the ASBR will send a new Type 5 LSA into the OSPF domain causing some instability inside the OSPF domain. With the always keyword, the ASBR will advertise the default inside the OSPF domain always, In the example shown here, only choice C is correct as the wildcard mask correctly specifies the 10.10.2.16 0.0.0.15 networks, which include all IP addresses in the 10.10.2.16-10.10.2.31 range. In this question we were told that the ISP link should NOT be configured for OSPF, making choice A incorrect. http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a00801 ec9f0.shtml 


Q35. - (Topic 3) 

At which layer of the OSI model does PPP perform? 

A. Layer 2 

B. Layer 3 

C. Layer 4 

D. Layer 5 

Answer:

Explanation: 

Point-to-Point Protocol (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression. 


Q36. - (Topic 3) 

Which feature does PPP use to encapsulate multiple protocols? 

A. NCP 

B. LCP 

C. IPCP 

D. IPXP 

Answer:

Explanation: 

PPP permits multiple network layer protocols to operate on the same communication link. For every network layer protocol used, a separate Network Control Protocol (NCP) is provided in order to encapsulate and negotiate options for the multiple network layer protocols. It negotiates network-layer information, e.g. network address or compression options, after the connection has been established 


Q37. - (Topic 2) 

Refer to the exhibit. 

Given the output from the “show ip eigrp topology” command, which router is the feasible successor? 

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer:

Explanation: 

To be the feasible successor, the Advertised Distance (AD) of that route must be less than the Feasible Distance (FD) of the successor. From the output of the “show ip eigrp topology 

10.0.0.5 255.255.255.255 we learn that the FD of the successor is 41152000. Now we will mention about the answers, in the “Composite metric is (…/…)” statement the first parameter is the FD while the second parameter is the AD of that route. So we need to find out which route has the second parameter (AD) less than 41152000 -> only answer B satisfies this requirement with an AD of 128256. 

Reference: http://networklessons.com/eigrp/eigrp-neighbor-and-topology-table-explained/ 


Q38. - (Topic 2) 

Refer to the exhibit. 

How will the router handle a packet destined for 192.0.2.156? 

A. The router will drop the packet. 

B. The router will return the packet to its source. 

C. The router will forward the packet via Serial2. 

D. The router will forward the packet via either Serial0 or Serial1. 

Answer:

Explanation: 

Router has pointed default router to 192.168.4.1 and this subnet is connected via serial 2 interface. Router does not have router for the 192.0.2.156. so it will use the default gateway 

192.168.4.1. A default route identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route. 


Q39. - (Topic 2) 

Refer to the exhibit. 

Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1? 

A. The router will forward packets from R3 to R2 to R1. 

B. The router will forward packets from R3 to R1 to R2. 

C. The router will forward packets from R3 to R2 to R1 AND from R3 to R1. 

D. The router will forward packets from R3 to R1. 

Answer:

Explanation: 

From the routing table we learn that network 192.168.10.0/30 is learned via 2 equal- cost paths (192.168.10.9 &192.168.10.5) - traffic to this network will be load-balanced. 


Q40. - (Topic 3) 

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology? 

A. It avoids split-horizon issues with distance vector routing protocols. 

B. IP addresses can be conserved if VLSM is not being used for subnetting. 

C. A multipoint interface offers greater security compared to point-to-point subinterface configurations. 

D. The multiple IP network addresses required for a multipoint interface provide greater addressing flexibility over point-to-point configurations. 

Answer:

Explanation: 

You do not have to assign a separate subnet per sub-interface .if you're using a Class A network (10.x.x.x/8), you blow the whole network on a few connections (if you used VLSM, you could use a better mask, limit the addresses used). if you used 10.0.0.0/8, you would not be assigning the entire /8 to a single network. You would select a subnet mask for the network and then, you would have to use that mask with all subnets of the network. So if you chose a /24 mask, that would mean that you would have to use a /24 mask for even point-to-point links.