icnd2 200-105 Exam Dumps Questions

Our200-125 dumps give you a guarantee of success in the exam comprehensive knowledge about LAN switching technologies, IPv4 and IPv6 routing technologies.

Try it Latest DumpsSchool 200-105 Exam dumps. Buy Full File here: https://www.dumpsschool.com/200-105-exam-dumps.html (691 As Dumps)

Download the DumpsSchool 200-105 braindumps from Google Drive: https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view (FREE VERSION!!!)

Question No. 1

What are three features of the IPv6 protocol? (Choose three.)

Answer: B, C, E

Question No. 2

Which command do you enter so that R1 advertises the loopback0 interface to the BGP

Peers?

Answer: A

Question No. 3

Refer to the exhibit.

Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency? (Choose two.)

Answer: D, E

A situation can occur where the interface MTU is at a high value, for example 9000, while the real value of the size of packets that can be forwarded over this interface is 1500.

If there is a mismatch on MTU on both sides of the link where OSPF runs, then the OSPF adjacency will not form because the MTU value is carried in the Database Description (DBD) packets and checked on the other side.

Question No. 4

Which WAN technology is secure and encrypted by default?

Answer: A

Question No. 5

Refer to the exhibit.

At the end of an RSTP election process, which access layer switch port will assume the discarding role?

Answer: C

In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4.

Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior than another if it has:

1. A lower Root Bridge ID

2. A lower path cost to the Root

3. A lower Sending Bridge ID

4. A lower Sending Port ID

These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role)

Question No. 6

Which term describes a spanning-tree network that has all switch ports in either the blocking or fowarding state?

Answer: A

Spanning Tree Protocol convergence (Layer 2 convergence) happens when bridges and switches have transitioned to either the forwarding or blocking state. When layer 2 is converged, root bridge is elected and all port roles (Root, Designated and Non-Designated) in all switches are selected.

Question No. 7

What are the benefit of using Netflow? (Choose three.)

Answer: A, C, D

NetFlow Definitions and Benefits

http://www.cisco.com/en/US/products/sw/netmgtsw/ps1964/products_implementation_design_guide09186a00800d6a11.html#wp1030045

NetFlow traditionally enables several key customer applications including:

Network Monitoring—NetFlow data enables extensive near real time network monitoring capabilities. Flowbased analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

Application Monitoring and Profiling—NetFlow data enables network managers to gain a detailed, timebased, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

User Monitoring and Profiling—NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

Network Planning—NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications.

NetFlow will give you valuable information to reduce the cost of operating your network.

Security Analysis—NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

Accounting/Billing—NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.

NetFlow Data Warehousing and Data Mining—NetFlow data (or derived information) can be warehoused for later retrieval and analysis in support of proactive marketing and customer service programs (e.g. figure out which applications and services are being utilized by internal and external users and target them for improved service, advertising, etc.). In addition, NetFlow data gives Market Researchers access to the “who”, “what”, “where”, and “how long” information relevant to enterprises and service providers.

Question No. 8

Which type of EIGRP route entry describes a feasible successor?

Answer: C

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f07.shtml

Feasible Successors

A destination entry is moved from the topology table to the routing table when there is a feasible successor. All minimum cost paths to the destination form a set. From this set, the neighbors that have an advertised metric less than the current routing table metric are considered feasible successors.

Feasible successors are viewed by a router as neighbors that are downstream with respect to the destination.

These neighbors and the associated metrics are placed in the forwarding table.

When a neighbor changes the metric it has been advertising or a topology change occurs in the network, the set of feasible successors may have to be re-evaluated. However, this is not categorized as a route recomputation.

Feasible successor is a route whose Advertised Distance (AD) is less than the Feasible Distance (FD) of the current best path. A feasible successor is a backup route, which is not stored in the routing table but, stored in the topology table.

Question No. 9

What command is used to verify the DLCI destination address in a Frame Relay static configuration?

Answer: C

Cisco Frame Relay Configurations

http://www.ciscopress.com/articles/article.asp?p=170741&seqNum=9

show frame-relay map

The show frame-relay map privileged EXEC mode command shows the contents of the next hop protocol address to DLCI mapping table on the router. The table contains both dynamic mapped and static mapped entries. The below example shows a sample output of the show frame-relay map command.

Router#show frame-relay map

Serial1/2 (up): ip 172.16.1.4 dlci 401(0x191,0x6410), dynamic,

broadcast,, status defined, active

Serial1/2 (up): ip 172.16.1.5 dlci 501(0x1F5,0x7C50), dynamic,

broadcast,, status defined, active

Serial1/2 (up): ip 172.16.1.2 dlci 301(0x12D,0x48D0), dynamic,

broadcast,, status defined, active

Question No. 10

Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location?

(Choose two)

Answer: B, C

Question No. 11

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary

switch can take over?

Answer: A

Question No. 12

Which VLAN bridge priority value will make a switch as root for a given VLAN from the below options by the spanning-tree vlan vlan-id root command?

Answer: B

Question No. 13

Which three effects of using local SPAN are true? (Choose three.)

Answer: A, B, C

To avoid disrupting traffic, do not oversubscribe any of these points in your SPAN topology. Some

oversubscription and performance considerations are:

* SPAN doubles traffic internally

* SPAN adds to the traffic being processed by the switch fabric

* SPAN doubles forwarding engine load

Because SPAN destination ports drop ingress traffic, these features are incompatible with SPAN destination

ports:

— Private VLANs

— IEEE 802.1X port-based authentication

— Port security

https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/12-2SXF/configuration/guide/swcg/

span.pdf

200-105 Dumps Google Drive: (Limited Version!!!)
https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view

Related Certification: CCNA Routing & Switching dumps