Actual Cisco 200-105 Exam Questions

Choose DumpsSchool 200-105 exam questions to get most authentic information about WAN technologies, infrastructure services, and infrastructure maintenance exam topics. These exam questions are relevant to the real exam and enhance your preparation to pass the 200-105 exam.

Try it Latest DumpsSchool 200-105 Exam dumps. Buy Full File here: https://www.dumpsschool.com/200-105-exam-dumps.html (691 As Dumps)

Download the DumpsSchool 200-105 braindumps from Google Drive: https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view (FREE VERSION!!!)

Question No. 1

After you configure a new router to connect to a host through the GigabitEthernet0/0 port of the router, you log in to the router and observe that the new link is down Which action corrects the Problem?

Answer: A

Question No. 2

Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?

Answer: B

map will show frame relay encapsulation (cisco or ietf)

http://www.cisco.com/en/US/docs/ios/12_2/wan/command/reference/wrffr4.html#wp1029343

“show frame-relay map” will show frame relay encapsulation type (CISCO or IETF)

Question No. 3

What is the default VLAN on an access port?

Answer: B

Question No. 4

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch.

The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server

online.

What can the administrator do to ensure that only the MAC address of the server is allowed by switch port

Fa0/1? (Choose two.)

Answer: C, E

Question No. 5

Which two statements describe the process identifier that is used in the command to configure OSPF on a router? (Choose two.)

Router(config)# router ospf 1

Answer: C, D

The areas can be any number from 0 to 4.2 billion and 1 to 65,535 for the Process ID.

The process ID is the ID of the OSPF process to which the interface belongs. The process ID is local to the router, and two OSPF neighboring routers can have different OSPF process IDs. (This is not true of Enhanced Interior Gateway Routing Protocol [EIGRP], in which the routers need to be in the same autonomous system). Cisco IOS Software can run multiple OSPF processes on the same router, and the process ID merely distinguishes one process from the other. The process ID should be a positive integer.

Question No. 6

What are three benefits of GLBP? (Choose three.)

Answer: B, D, E

http://www.cisco.com/en/US/docs/ios/12_2s/feature/guide/fs_glbp2.html

Load Sharing

You can configure GLBP in such a way that traffic from LAN clients can be shared by multiple routers, thereby sharing the traffic load more equitably among available routers.

Multiple Virtual Routers GLBP supports up to 1024 virtual routers (GLBP groups) on each physical interface of a router, and up to four virtual forwarders per group.

Preemption

The redundancy scheme of GLBP enables you to preempt an active virtual gateway with a higher priority backup virtual gateway that has become available. Forwarder preemption works in a similar way, except that forwarder preemption uses weighting instead of priority and is enabled by default.

Authentication

You can use a simple text password authentication scheme between GLBP group members to detect configuration errors. A router within a GLBP group with a different authentication string than other routers will be ignored by other group members.

http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-s/unicast/configuration/guide/l3_glbp.html

GLBP Authentication

GLBP has three authentication types:

MD5 authentication

Plain text authentication

No authentication

MD5 authentication provides greater security than plain text authentication. MD5 authentication allows each GLBP group member to use a secret key to generate a keyed MD5 hash that is part of the outgoing packet. At the receiving end, a keyed hash of an incoming packet is generated. If the hash within the incoming packet does not match the generated hash, the packet is ignored. The key for the MD5 hash can either be given directly in the configuration using a key string or supplied indirectly through a key chain. You can also choose to use a simple password in plain text to authenticate GLBP packets, or choose no authentication for GLBP.

Question No. 7

Exhibit:

Refer to the output above. Applying this configuration will result in which outcome?

Answer: A

Question No. 8

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)

Answer: A, C, E

Question No. 9

Which protocol provides a method of sharing VLAN configuration information between two Cisco switches?

Answer: B

Understanding VLAN Trunk Protocol (VTP)

http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094c52.shtml

Introduction

VLAN Trunk Protocol (VTP) reduces administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain. This reduces the need to configure the same VLAN everywhere. VTP is a Cisco-proprietary protocol that is available on most of the Cisco Catalyst series products.

Question No. 10

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?

Answer: C

Question No. 11

Refer to the exhibit.

What is the most appropriate summarization for these routes?

Answer: B

Question No. 12

Which two statements about VLAN port assignment are true? (Choose two.)

Answer: C, E

Question No. 13

Which statements are true about EIGRP successor routes? (Choose two.)

Answer: A, D

Introduction to EIGRP

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f07.shtml

Feasible Successors

A destination entry is moved from the topology table to the routing table when there is a feasible successor. All minimum cost paths to the destination form a set. From this set, the neighbors that have an advertised metric less than the current routing table metric are considered feasible successors.

Feasible successors are viewed by a router as neighbors that are downstream with respect to the destination.

These neighbors and the associated metrics are placed in the forwarding table.

When a neighbor changes the metric it has been advertising or a topology change occurs in the network, the set of feasible successors may have to be re-evaluated. However, this is not categorized as a route recomputation.

200-105 Dumps Google Drive: (Limited Version!!!)
https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view

Related Certification: CCNA Routing & Switching dumps