getcertified4sure.com

Surprising ccna routing and switching icnd2 200 105 official cert guide




we provide Guaranteed Cisco 105 200 dumps which are the best for clearing 105 200 test, and to get certified by Cisco Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0). The ccna routing and switching icnd2 200 105 official cert guide Questions & Answers covers all the knowledge points of the real ccna routing and switching icnd2 200 105 official cert guide exam. Crack your Cisco ccna 200 105 Exam with latest dumps, guaranteed!

Q21. - (Topic 1) 

Which three statements are typical characteristics of VLAN arrangements? (Choose three.) 

A. A new switch has no VLANs configured. 

B. Connectivity between VLANs requires a Layer 3 device. 

C. VLANs typically decrease the number of collision domains. 

D. Each VLAN uses a separate address space. 

E. A switch maintains a separate bridging table for each VLAN. 

F. VLANs cannot span multiple switches. 

Answer: B,D,E 

Explanation: 

By default, all ports on a new switch belong to VLAN 1 (default & native VLAN). There are also some well-known VLANs (for example: VLAN 1002 for fddi-default; VLAN 1003 for token-ring…) configured by default -> A is not correct. To communicate between two different VLANs we need to use a Layer 3 device like router or Layer 3 switch -> B is correct. VLANs don’t affect the number of collision domains, they are the same -> C is not correct. Typically, VLANs increase the number of broadcast domains.We must use a different network (or sub-network) for each VLAN. For example we can use 192.168.1.0/24 for VLAN 1, 192.168.2.0/24 for VLAN 2 -> D is correct. A switch maintains a separate bridging table for each VLAN so that it can send frame to 

ports on the same VLAN only. For example, if a PC in VLAN 2 sends a frame then the 

switch look-ups its bridging table and only sends frame out of its ports which belong to 

VLAN 2 (it also sends this frame on trunk ports) -> E is correct. 

We can use multiple switches to expand VLAN -> F is not correct. 


Q22. - (Topic 2) 

Which statements are true about EIGRP successor routes? (Choose two.) 

A. A successor route is used by EIGRP to forward traffic to a destination. 

B. Successor routes are saved in the topology table to be used if the primary route fails. 

C. Successor routes are flagged as 'active' in the routing table. 

D. A successor route may be backed up by a feasible successor route. 

E. Successor routes are stored in the neighbor table following the discovery process. 

Answer: A,D 

Explanation: 

Introduction to EIGRP http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f07.shtml 

Feasible Successors A destination entry is moved from the topology table to the routing table when there is a feasible successor. All minimum cost paths to the destination form a set. From this set, the neighbors that have an advertised metric less than the current routing table metric are considered feasible successors. 

Feasible successors are viewed by a router as neighbors that are downstream with respect to the destination. 

These neighbors and the associated metrics are placed in the forwarding table. 

When a neighbor changes the metric it has been advertising or a topology change occurs in the network, the set of feasible successors may have to be re-evaluated. However, this is not categorized as a route recomputation. 


Q23. - (Topic 1) 

Refer to the exhibit. 

Why has this switch not been elected the root bridge for VLAN1? 

A. It has more than one interface that is connected to the root network segment. 

B. It is running RSTP while the elected root bridge is running 802.1d spanning tree. 

C. It has a higher MAC address than the elected root bridge. 

D. It has a higher bridge ID than the elected root bridge. 

Answer:

Explanation: 

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a008009482f.s html When a switch receives a BPDU, it first compares priority, the lower number wins. If a tie, compare MAC, the smaller one wins. Here Switch has 32769 priority which is greater than 20481 so switch will not elect for root bridge. It says the bridge priority for Switch is 32769, and the root priority is 20481. Which means that some other switch has the lower priority and won the election for VLAN 1. 


Q24. DRAG DROP - (Topic 2) 

Answer: 

Explanation: 

+ holddown timer: prevents a router from improperly reinstating a route from a regular routing update 

+ split horizon: prevents information about a route from being sent in the direction from which the route was learned 

+ defining a maximum: prevents invalid updates from looping the internetwork indefinitely 

+ route poisoning: causes a routing protocol to advertise an infinite metric for a failed route 

+ triggered update: decreases convergence time by immediately sending route information in response to a topology change 


Q25. - (Topic 3) 

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications? 

A. RSA 

B. L2TP 

C. IPsec 

D. PPTP 

Answer:

Explanation: 

Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. 


Q26. - (Topic 3) 

Which command is used to enable CHAP authentication, with PAP as the fallback method, on a serial interface? 

A. Router(config-if)# ppp authentication chap fallback ppp 

B. Router(config-if)# ppp authentication chap pap 

C. Router(config-if)# authentication ppp chap fallback ppp 

D. Router(config-if)# authentication ppp chap pap 

Answer:

Explanation: 

The command “ppp authentication chap pap” command indicates the CHAP authentication is used first. If it fails or is rejected by other side then uses PAP instead. If you want to use PAP first (then CHAP) you can use the “ppp authentication pap chap” command 

Reference: http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfathen.html 


Q27. - (Topic 3) 

Refer to the exhibit. 

A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. A ping from Host1 to Host2 fails, but the technician is able to ping the S0/0 interface of R2 from Host1. The configurations of the hosts have been verified as correct. What is the cause of the problem? 

A. The serial cable on R1 needs to be replaced. 

B. The interfaces on R2 are not configured properly. 

C. R1 has no route to the 192.168.1.128 network. 

D. The IP addressing scheme has overlapping subnetworks. 

E. The ip subnet-zero command must be configured on both routers. 

Answer:

Explanation: 

Whenever a node needs to send data to another node on a network, it must first know where to send it. If the node cannot directly connect to the destination node, it has to send it via other nodes along a proper route to the destination node. A remote network is a network that can only be reached by sending the packet to another router. Remote networks are added to the routing table using either a dynamic routing protocol or by configuring static routes. Static routes are routes to networks that a network administrator manually configured.So R should have static route for the 192.168.1.128. 


Q28. - (Topic 2) 

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.) 

A. hello packets 

B. SAP messages sent by other routers 

C. LSAs from other routers 

D. beacons received on point-to-point links 

E. routing tables received from other link-state routers 

F. TTL packets from designated routers 

Answer: A,C 

Explanation: 

Link State Routing Protocols http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4 

Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are: Open Shortest Path First (OSPF) for IP The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V Novell's NetWare Link Services Protocol (NLSP) Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all: 

1. Each router establishes a relationship—an adjacency—with each of its neighbors. 

2. Each router sends link state advertisements (LSAs), some 

3. Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical. 

4. The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table. 


Q29. - (Topic 2) 

Refer to the exhibit. 

If the router R1 returns the given output and has not had its router ID set manually, what address will EIGRP use as its router ID? 

A. 192.168.1.2 

B. 172.16.4.1 

C. 192.168.10.2 

D. 1.1.1.1 

Answer:

Explanation: 

The router ID is selected according to the following rules: manual configuration highest up/up loopback highest up/up physical interface 


Q30. - (Topic 2) 

Refer to the exhibit. 

The company uses EIGRP as the routing protocol. What path will packets take from a host on 192.168.10.192/26 network to a host on the LAN attached to router R1? 

R3# show ip route Gateway of last resort is not set 192 168.20.0/24 is variably subnetted, 6 subnets, 2 masks D 192.168.20.64/26 [90/2195456] via 192.168.20.9, 00:03:31, Serial0/0 D 192.168.20.0/30 [90/2681856] via 192.168.20.9, 00:03:31, Serial0/0 C 192.168.20.4/30 is directly connected, Serial0/1 C 192.168.20.8/30 is directly connected, Serial0/0 

C 192.168.20.192/26 is directly connected, FastEthernet0/0 

D 192.168.20.128/26 [90/2195456] via 192.168.20.5,00:03:31, Serial0/1 

A. The path of the packets will be R3 to R2 to R1 

B. The path of the packets will be R3 to R1 to R2 

C. The path of the packets will be both R3 to R2 to R1 and R3 to R1 

D. The path of the packets will be R3 to R1 

Answer:

Explanation: 

http://www.orbitco-ccna-pastquestions.com/CCNA---EIGRP-Common-Question.php 

Looking at the output display above, the LAN attached to router R1 belongs to 192.168.20.64/26 subnet and learned this network via 192.168.20.9 which will be an IP address in 192.168.20.8/30 sub-network. This means that packets destined for 

192.168.20.64 will be routed from R3 to R1.