getcertified4sure.com

Getting Smart with: ccna routing and switching icnd2 200 105 official cert guide




Exam Code: cisco 200 105 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: ICND2 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass icnd2 200 105 Exam.

P.S. Realistic 200-105 testing engine are available on Google Drive, GET MORE: https://drive.google.com/open?id=1LPOwiv-vOUqlzBFPqF4sLauwGHst3olw


New Cisco 200-105 Exam Dumps Collection (Question 2 - Question 11)

Q1. What is a difference between TACACS+ and RADIUS in AAA?

A. Only TACACS+ allows for separate authentication.

B. Only RADIUS encrypts the entire access-request packet.

C. Only RADIUS uses TCP.

D. Only TACACS+ couples authentication and authorization.

Answer: A

Explanation: Authentication and Authorization

RADIUS combines authentication and authorization. The access-accept packets sent by

the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization.

TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still use TACACS+ for authorization and accounting. For example, with TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information.

During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism.


Q2. Which statement about QoS default behavior is true?

A. Ports are untrusted by default.

B. VoIP traffic is passed without being tagged.

C. Video traffic is passed with a well-known DSCP value of 46.

D. Packets are classified internally with an environment.

E. Packets that arrive with a tag are untagged at the edge of an administrative domain.

Answer: E

Explanation: Frames received from users in the administratively-defined VLANs are classified or tagged for transmission to other devices. Based on rules that you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is sent to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames. For IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used.

Each port on the switch has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or CMS. A tagged frame continues to use its assigned CoS value when it passes through the ingress port.


Q3. Refer to the exhibit.

While troubleshooting a switch, you executed the show interface port-channel 1 etherchannel command and it returned this output. Which information is provided by the Load value?

A. the percentage of use of the link

B. the preference of the link

C. the session count of the link

D. the number source-destination pairs on the link

Answer: D


Q4. At which layer of the OSI model is RSTP used to prevent loops?

A. physical

B. data link

C. network

D. transport

Answer: B

Explanation: RSTP and STP operate on switches and are based on the exchange of Bridge Protocol Data Units (BPDUs) between switches. One of the most important fields in BPDUs is the Bridge Priority in which the MAC address is used to elect the Root Bridge ,

RSTP operates at Layer 2. http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cf a.shtml


Q5. Which statement describes the process ID that is used to run OSPF on a router?

A. It is globally significant and is used to represent the AS number.

B. It is locally significant and is used to identify an instance of the OSPF database.

C. It is globally significant and is used to identify OSPF stub areas.

D. It is locally significant and must be the same throughout an area.

Answer: B

Explanation: The Process ID for OSPF on a router is only locally significant and you can use the same number on each router, or each router can have a different number-it just

doesn't matter. The numbers you can use are from 1 to 65,535. Don't get this confused with area numbers, which can be from 0 to 4.2 billion.


Q6. Which spanning-tree feature places a port immediately into a forwarding stated?

A. BPDU guard

B. PortFast

C. loop guard

D. UDLD

E. Uplink Fast

Answer: B

Explanation:

PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state.


Q7. R1# show running-config interface Loopback0

description ***Loopback***

ip address 192.168.1.1 255.255.255.255

ip ospf 1 area 0

!

interface Ethernet0/0

description **Connected to R1-LAN** ip address 10.10.110.1 255.255.255.0

ip ospf 1 area 0

!

interface Ethernet0/1

description **Connected to L2SW**

ip address 10.10.230.1 255.255.255.0

ip ospf hello-interval 25 ip ospf 1 area 0

!

router ospf 1

log-adjacency-changes

R2# show running-config

R2

!

interface Loopback0 description **Loopback**

ip address 192.168.2.2 255.255.255.255

ip ospf 2 area 0

!

interface Ethernet0/0

description **Connected to R2-LAN** ip address 10.10.120.1 255.255.255.0

ip ospf 2 area 0

!

interface Ethernet0/1

description **Connected to L2SW**

ip address 10.10.230.2 255.255.255.0

ip ospf 2 area 0

!

router ospf 2

log-adjacency-changes

R3# show running-config R3

username R6 password CISCO36

!

interface Loopback0 description **Loopback**

ip address 192.168.3.3 255.255.255.255

ip ospf 3 area 0

!

interface Ethernet0/0

description **Connected to L2SW**

ip address 10.10.230.3 255.255.255.0

ip ospf 3 area 0

!

interface Serial1/0

description **Connected to R4-Branch1 office** ip address 10.10.240.1 255.255.255.252

encapsulation ppp ip ospf 3 area 0

!

interface Serial1/1

description **Connected to R5-Branch2 office** ip address 10.10.240.5 255.255.255.252

encapsulation ppp

ip ospf hello-interval 50 ip ospf 3 area 0

!

interface Serial1/2

description **Connected to R6-Branch3 office** ip address 10.10.240.9 255.255.255.252

encapsulation ppp ip ospf 3 area 0

ppp authentication chap

!

router ospf 3

router-id 192.168.3.3

!

R4# show running-config R4

!

interface Loopback0 description **Loopback**

ip address 192.168.4.4 255.255.255.255

ip ospf 4 area 2

!

interface Ethernet0/0

ip address 172.16.113.1 255.255.255.0

ip ospf 4 area 2

!

interface Serial1/0

description **Connected to R3-Main Branch office** ip address 10.10.240.2 255.255.255.252

encapsulation ppp ip ospf 4 area 2

!

router ospf 4

log-adjacency-changes

R5# show running-config R5

!

interface Loopback0 description **Loopback**

ip address 192.168.5.5 255.255.255.255

ip ospf 5 area 0

!

interface Ethernet0/0

ip address 172.16.114.1 255.255.255.0

ip ospf 5 area 0

!

interface Serial1/0

description **Connected to R3-Main Branch office** ip address 10.10.240.6 255.255.255.252

encapsulation ppp ip ospf 5 area 0

!

router ospf 5

log-adjacency-changes

R6# show running-config R6

username R3 password CISCO36

!

interface Loopback0 description **Loopback**

ip address 192.168.6.6 255.255.255.255

ip ospf 6 area 0

!

interface Ethernet0/0

ip address 172.16.115.1 255.255.255.0

ip ospf 6 area 0

!

interface Serial1/0

description **Connected to R3-Main Branch office** ip address 10.10.240.10 255.255.255.252

encapsulation ppp ip ospf 6 area 0

ppp authentication chap

!

router ospf 6

router-id 192.168.3.3

!

An OSPF neighbor adjacency is not formed between R3 in the main office and R4 in the Branch1 office. What is causing the problem?

A. There is an area ID mismatch.

B. There is a Layer 2 issue; an encapsulation mismatch on serial links.

C. There is an OSPF hello and dead interval mismatch.

D. The R3 router ID is configured on R4.

Answer: A


Q8. Which two statements about the OSPF Router ID are true? (Choose two.)

A. It identifies the source of a Type 1 LSA.

B. It should be the same on all routers in an OSPF routing instance.

C. By default, the lowest IP address on the router becomes the OSPF Router ID.

D. The router automatically chooses the IP address of a loopback as the OSPF Router ID.

E. It is created using the MAC Address of the loopback interface.

Answer: A,D

Explanation:

From the output of the u201cshow ip ospf databaseu201d:


Q9. Which statement about switch access ports is true?

A. They drop packets with 802.1Q tags.

B. A VLAN must be assigned to an access port before it is created.

C. They can receive traffic from more than one VLAN with no voice support

D. By default, they carry traffic for VLAN 10.

Answer: A

Explanation:

"If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that port drops the packet without learning its MAC source address."


Q10. Which three statements about DTP are true? (Choose three)

A. It is enabled by default.

B. It is a universal protocol.

C. It is a proprietary protocol.

D. It is disabled by default.

E. It is a Layer 3-based protocol.

F. It is a Layer 2-based protocol.

Answer: A,C,F


Recommend!! Get the Realistic 200-105 dumps in VCE and PDF From Surepassexam, Welcome to download: https://www.surepassexam.com/200-105-exam-dumps.html (New 267 Q&As Version)