200-105 Exam PDF Questions

 Our preparation material has guided multiple candidates to pass this exam. Your success is also not so far by using DumpsSchool 200-105 exam dumps.

Try it Latest DumpsSchool 200-105 Exam dumps. Buy Full File here: https://www.dumpsschool.com/200-105-exam-dumps.html (691 As Dumps)

Download the DumpsSchool 200-105 braindumps from Google Drive: https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view (FREE VERSION!!!)

Question No. 1

What occurs on a Frame Relay network when the CIR is exceeded?

Answer: D

Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network.

Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

Question No. 2

When you configure a new switch interface, to which VLAN it is automatically assigned?

Answer: B

Question No. 3

Refer to the exhibit. Which two statements about the configuration of the switch interface are correct? (Choose

Answer: A, E

Question No. 4

A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which

802.1x mode allows these actions?

Answer: A

Question No. 5

Which utility can you use to identify redundant or shadow rules?

Answer: B

Question No. 6

Scenario

Refer to the topology. Your company has connected the routers R1. R2. and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5.

The EIGRP routing protocol is configured.

You are required to troubleshoot and resolve the EIGRP issues between the various routers.

Use the appropriate show commands to troubleshoot the issues.

The loopback interfaces on R4 with the IP addresses of 10.4.4.4 /32, 10.4.4.5/32. and 10.4.4.6/32 are not appearing in the routing table of R5 Why are the interfaces missing?

Answer: B

For an EIGRP neighbor to form, the following must match:

– Neighbors must be in the same subnet

– K values

– AS numbers

– Authentication method and key strings

Here, we see that R4 is configured for EIGRP AS 2, when it should be AS 1.

Question No. 7

What is the effect of the switchport voice vlan 20 command?

Answer: A

Question No. 8

Which type of IPv6 ACL is applied first in the order of precedence?

Answer: D

Question No. 9

What are the Popular destinations for syslog messages to be saved? (Choose three.)

Answer: B, C, E

Question No. 10

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?

Answer: B

Question No. 11

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

Answer: A, D, E

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.

IP Packet attributes used by NetFlow:

* IP source address

* IP destination address

* Source port

* Destination port

* Layer 3 protocol type

* Class of Service

* Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.

http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.html

Question No. 12

Refer to the exhibit.

What three actions will the switch take when a frame with an unknown source MAC address arrives at the interface? (Select three.)

Answer: A, B, C

Switchport Security Concepts and Configuration

http://www.ciscopress.com/articles/article.asp?p=1722561

Switchport Security Violations

The second piece of switchport port-security that must be understood is a security violation including what it is what causes it and what the different violation modes that exist. A switchport violation occurs in one of two situations:

When the maximum number of secure MAC addresses has been reached (by default, the maximum number of secure MAC addresses per switchport is limited to 1)

An address learned or configured on one secure interface is seen on another secure interface in the same VLAN

The action that the device takes when one of these violations occurs can be configured:

Protect—This mode permits traffic from known MAC addresses to continue to be forwarded while dropping traffic from unknown MAC addresses when over the allowed MAC address limit. When configured with this mode, no notification action is taken when traffic is dropped.

Restrict—This mode permits traffic from known MAC addresses to continue to be forwarded while dropping traffic from unknown MAC addresses when over the allowed MAC address limit. When configured with this mode, a syslog message is logged, a Simple Network Management Protocol (SNMP) trap is sent, and a violation counter is incremented when traffic is dropped.

Shutdown—This mode is the default violation mode; when in this mode, the switch will automatically force the switchport into an error disabled (err-disable) state when a violation occurs. While in this state, the switchport forwards no traffic. The switchport can be brought out of this error disabled state by issuing the errdisable recovery cause CLI command or by disabling and re-enabling the switchport.

Shutdown VLAN—This mode mimics the behavior of the shutdown mode but limits the error disabled state the specific violating VLAN.

Question No. 13

What does the frame-relay interface-dlci command configure?

Answer: A

Frame Relay for ICND Exam

http://www.ciscopress.com/articles/article.asp?p=100603&seqNum=3

To assign a data-link connection identifier (DLCI) to a specified Frame Relay subinterface on the router or access server, or to assign a specific permanent virtual circuit (PVC) to a DLCI, or to apply a virtual template configuration for a PPP session, use the frame-relay interface-dlci interface configuration command

Example 4-23 Example of frame-relay interface-dlci Command and the Output of show frame-relay map

R4(config)#interface s1/2.403 point-to-point

R4(config-subif)#frame-relay interface-dlci ?

<16-1007> Define a switched or locally terminated DLCI

R4(config-subif)#frame-relay interface-dlci 403 ?

cisco Use CISCO Encapsulation

ietf Use RFC1490/RFC2427 Encapsulation

ppp Use RFC1973 Encapsulation to support PPP over FR protocol Optional protocol information for remote end

R4#show frame-relay map

Serial1/2.403 (up): point-to-point dlci, dlci 403(0xC9,0x3090), broadcast status defined, active

R4#

200-105 Dumps Google Drive: (Limited Version!!!)
https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view

Related Certification: CCNA Routing & Switching dumps