Your success in Cisco ccna 200 105 is our sole target and we develop all our ccna routing and switching icnd2 200 105 official cert guide braindumps in a way that facilitates the attainment of this target. Not only is our 105 200 study material the best you can find, it is also the most detailed and the most updated. ccna routing and switching icnd2 200 105 official cert guide Practice Exams for Cisco CCNA Routing and Switching 200 105 icnd2 are written to the highest standards of technical accuracy.

P.S. Pinpoint 200-105 cram are available on Google Drive, GET MORE: https://drive.google.com/open?id=1LPOwiv-vOUqlzBFPqF4sLauwGHst3olw


New Cisco 200-105 Exam Dumps Collection (Question 3 - Question 12)

Q1. Which three options are the HSRP states for a router? (Choose three.)

A. initialize

B. learn

C. secondary

D. listen

E. speak

F. primary

Answer: B,D,E

Explanation:

HSRP States



Q2. What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C

Explanation:

Link State Routing Protocols http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4

Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are:

Open Shortest Path First (OSPF) for IP

The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V

Novell's NetWare Link Services Protocol (NLSP)

Although link state protocols are rightly considered more complex than distance vector

protocols, the basic functionality is not complex at all:

1. Each router establishes a relationshipu2014an adjacencyu2014with each of its neighbors.

2. Each router sends link state advertisements (LSAs), some

3. Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical.

4. The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table.



Q3. A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?

A. Router# show ip eigrp adjacency

B. Router# show ip eigrp topology

C. Router#show ip eigrp interfaces

D. Router#show ip eigrp neighbors

Answer: D

Explanation:

Implementing EIGRP http://www.ciscopress.com/articles/article.asp?p=1171169&seqNum=3

Below is an example of the show ip eigrp neighbors command. The retransmit interval (Smooth Round Trip Timer u2013 SRTT) and the queue counts (Q count, which shows the number of queued EIGRP packets) for the adjacent routers are listed:

R1#show ip eigrp neighbors

IP-EIGRP neighbors for process 1

H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 10.10.10.2 Fa0/0 12 00:00:39 1282 5000 0 3



Q4. What can be done to Frame Relay to resolve split-horizon issues?(Choose two.)

A. Disable Inverse ARP.

B. Create a full-mesh topology.

C. Develop multipoint subinterfaces.

D. Configure point-to-point subinterfaces.

E. Remove the broadcast keyword from the frame-relay map command.

Answer: B,D

Explanation:

IP split horizon checking is disabled by default for Frame Relay encapsulation to allow routing updates to go in and out of the same interface. An exception is the Enhanced Interior Gateway Routing Protocol (EIGRP) for which split horizon must be explicitly disabled.

Certain protocols such as AppleTalk, transparent bridging, and Internetwork Packet Exchange (IPX) cannot be supported on partially meshed networks because they require split horizon to be enabled (a packet received on an interface cannot be transmitted over the same interface, even if the packet is received and transmitted on different virtual circuits).

Configuring Frame Relay subinterfaces ensures that a single physical interface is treated as multiple virtual interfaces. This capability allows you to overcome split horizon rules so packets received on one virtual interface can be forwarded to another virtual interface, even if they are configured on the same physical interface.



Q5. What is the default administrative distance of OSPF?

A. 90

B. 100

C. 110

D. 120

Answer: C

Explanation:

Default Distance Value Table

This table lists the administrative distance default values of the protocols that Cisco supports:



Q6. CORRECT TEXTWhich protocol authenticates connected devices before allowing them to access the LAN?

A. 802.1d

B. 802.11

C. 802.1w

D. 802.1x

Answer: D

Explanation:

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the

software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicantu2021s identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.



Q7. Which protocol specified by RFC 2281 provides network redundancy for IP networks, ensuring that user traffic

immediately and transparently recovers from first-hop failures in network edge devices or access circuits?

A. ICMP

B. IRDP

C. HSRP

D. STP

Answer: C



Q8. Refer to the exhibit.

While troubleshooting a switch, you executed the show interface port-channel 1 etherchannel command and it returned this output. Which information is provided by the Load value?

A. the percentage of use of the link

B. the preference of the link

C. the session count of the link

D. the number source-destination pairs on the link

Answer: D



Q9. What are two benefits of using a single OSPF area network design? (Choose two.)

A. It is less CPU intensive for routers in the single area.

B. It reduces the types of LSAs that are generated.

C. It removes the need for virtual links.

D. It increases LSA response times.

E. It reduces the number of required OSPF neighbor adjacencies.

Answer: B,C

Explanation:

OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement). The link types are as follows:

u2711 LSA Type 1: Router LSA

u2711 LSA Type 2: Network LSA

u2711 LSA Type 3: Summary LSA

u2711 LSA Type 4: Summary ASBR LSA

u2711 LSA Type 5: Autonomous system external LSA

u2711 LSA Type 6: Multicast OSPF LSA

u2711 LSA Type 7: Not-so-stubby area LSA

u2711 LSA Type 8: External attribute LSA for BGP

If all routers are in the same area, then many of these LSA types (Summary ASBR LSA, external LSA, etc) will not be used and will not be generated by any router.

All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non- backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. Virtual links are not ideal and should really only be used for temporary network solutions or migrations. However, if all locations are in a single OSPF area this is not needed.



Q10. Which spanning-tree feature places a port immediately into a forwarding stated?

A. BPDU guard

B. PortFast

C. loop guard

D. UDLD

E. Uplink Fast

Answer: B

Explanation:

PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state.



100% Leading Cisco 200-105 Questions & Answers shared by Allfreedumps, Get HERE: https://www.allfreedumps.com/200-105-dumps.html (New 267 Q&As)