Master the ccna 200 105 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) content and be ready for exam day success quickly with this Examcollection 200 105 icnd2 testing engine. We guarantee it!We make it a reality and give you real icnd2 200 105 questions in our Cisco cisco 200 105 braindumps.Latest 100% VALID Cisco 200 105 icnd2 Exam Questions Dumps at below page. You can use our Cisco icnd2 200 105 braindumps and pass your exam.
♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 200-105 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q11. - (Topic 3)
What is the purpose of LCP?
A. to perform authentication
B. to negotiate control options
C. to encapsulate multiple protocols
D. to specify asynchronous versus synchronous
In order to be sufficiently versatile to be portable to a wide variety of environments, PPP provides a Link Control Protocol (LCP). The LCP is used to automatically agree upon the encapsulation format options, handle varying limits on sizes of packets, detect a looped-back link and other common misconfiguration errors, and terminate the link. Other optional facilities provided are authentication of the identity of its peer on the link, and determination when a link is functioning properly and when it is failing.
Reference: Link Control Protocol
Q12. - (Topic 2)
Which command is used to display the collection of OSPF link states?
A. show ip ospf link-state
B. show ip ospf lsa database
C. show ip ospf neighbors
D. show ip ospf database
http://www.cisco.com/en/US/docs/ios/iproute_ospf/command/reference/iro_osp3.html#wp1 01217 Examples The following is sample output from the show ip ospf database command when no arguments or keywords are used: Router# show ip ospf database OSPF Router with id(192.168.239.66) (Process ID 300)
Q13. - (Topic 2)
What is the default administrative distance of OSPF?
Default Distance Value Table This table lists the administrative distance default values of the protocols that Cisco supports:
Q14. - (Topic 2)
Refer to the exhibit.
Given the output from the “show ip eigrp topology” command, which router is the feasible successor?
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
To be the feasible successor, the Advertised Distance (AD) of that route must be less than the Feasible Distance (FD) of the successor. From the output of the “show ip eigrp topology
10.0.0.5 255.255.255.255 we learn that the FD of the successor is 41152000. Now we will mention about the answers, in the “Composite metric is (…/…)” statement the first parameter is the FD while the second parameter is the AD of that route. So we need to find out which route has the second parameter (AD) less than 41152000 -> only answer B satisfies this requirement with an AD of 128256.
Q15. - (Topic 3)
What can be done to Frame Relay to resolve split-horizon issues?(Choose two.)
A. Disable Inverse ARP.
B. Create a full-mesh topology.
C. Develop multipoint subinterfaces.
D. Configure point-to-point subinterfaces.
E. Remove the broadcast keyword from the frame-relay map command.
IP split horizon checking is disabled by default for Frame Relay encapsulation to allow routing updates to go in and out of the same interface. An exception is the Enhanced Interior Gateway Routing Protocol (EIGRP) for which split horizon must be explicitly disabled. Certain protocols such as AppleTalk, transparent bridging, and Internetwork Packet Exchange (IPX) cannot be supported on partially meshed networks because they require split horizon to be enabled (a packet received on an interface cannot be transmitted over the same interface, even if the packet is received and transmitted on different virtual circuits). Configuring Frame Relay subinterfaces ensures that a single physical interface is treated as multiple virtual interfaces. This capability allows you to overcome split horizon rules so packets received on one virtual interface can be forwarded to another virtual interface, even if they are configured on the same physical interface.
Q16. - (Topic 2)
Refer to the exhibit.
C-router is to be used as a "router-on-a-stick" to route between the VLANs. All the interfaces have been properly configured and IP routing is operational. The hosts in the VLANs have been configured with the appropriate default gateway. What is true about this configuration?
A. These commands need to be added to the configuration: C-router(config)# router eigrp 123 C-router(config-router)# network 172.19.0.0
B. These commands need to be added to the configuration: C-router(config)# router ospf 1 C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0
C. These commands need to be added to the configuration: C-router(config)# router rip C-router(config-router)# network 172.19.0.0
D. No further routing configuration is required.
http://www.cisco.com/en/US/tech/tk389/tk815/technologies_configuration_example09186a 00800949fd.shtml https://learningnetwork.cisco.com/servlet/JiveServlet/download/5669-2461/Router%20on%20a%20Stick.pdf.
Q17. - (Topic 1)
What are two characteristics of a switch that is configured as a VTP client? (Choose two.)
A. If a switch that is configured to operate in client mode cannot access a VTP server, then the switch reverts to transparent mode.
B. On switches that are configured to operate in client mode, VLANs can be created, deleted, or renamed locally.
C. The local VLAN configuration is updated only when an update that has a higher configuration revision number is received.
D. VTP advertisements are not forwarded to neighboring switches that are configured in VTP transparent mode.
E. VTP client is the default VTP mode.
F. When switches in VTP client mode are rebooted, they send a VTP advertisement request to the VTP servers.
VLAN Trunking Protocol (VTP) http://archive.networknewz.com/2004/0317.html
VTP Modes Server Mode Once VTP is configured on a Cisco switch, the default mode used is Server Mode. In any given VTP management domain, at least one switch must be in Server Mode. When in Server Mode, a switch can be used to add, delete, and modify VLANs, and this information will be passed to all other switches in the VTP management domain. Client Mode When a switch is configured to use VTP Client Mode, it is simply the recipient of any VLANs added, deleted, or modified by a switch in Server Mode within the same management domain. A switch in VTP client mode cannot make any changes to VLAN information. Transparent Mode A switch in VTP Transparent Mode will pass VTP updates received by switches in Server Mode to other switches in the VTP management domain, but will not actually process the contents of these messages. When individual VLANs are added, deleted, or modified on a switch running in transparent mode, the changes are local to that particular switch only, and are not passed to other switches in the VTP management domain.
Q18. DRAG DROP - (Topic 2)
+ holddown timer: prevents a router from improperly reinstating a route from a regular routing update
+ split horizon: prevents information about a route from being sent in the direction from which the route was learned
+ defining a maximum: prevents invalid updates from looping the internetwork indefinitely
+ route poisoning: causes a routing protocol to advertise an infinite metric for a failed route
+ triggered update: decreases convergence time by immediately sending route information in response to a topology change
Q19. - (Topic 3)
Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)
A. CHAP uses a two-way handshake.
B. CHAP uses a three-way handshake.
C. CHAP authentication periodically occurs after link establishment.
D. CHAP authentication passwords are sent in plaintext.
E. CHAP authentication is performed only upon link establishment.
F. CHAP has no protection from playback attacks.
Understanding and Configuring PPP CHAP Authentication http://www.cisco.com/en/US/tech/tk713/tk507/technologies_tech_note09186a00800b4131. shtml
One-Way and Two-Way Authentication CHAP is defined as a one-way authentication method. However, you use CHAP in both directions to create a two-way authentication. Hence, with two-way CHAP, a separate three-way handshake is initiated by each side. In the Cisco CHAP implementation, by default, the called party must authenticate the calling party (unless authentication is completely turned off). Therefore, a one-way authentication initiated by the called party is the minimum possible authentication. However, the calling party can also verify the identity of the called party, and this results in a two-way authentication. One-way authentication is often required when you connect to non-Cisco devices.
Q20. - (Topic 3)
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?
Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.