200-105 | Improve Cisco 200-105 braindumps


P.S. Verified 200-105 interactive bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=17xcyZW-Vd6eZbaGV28ocMyVubJ6pL5PW


New Cisco 200-105 Exam Dumps Collection (Question 6 - Question 15)

Q6. If you configure syslog messages without specifying the logging trap level, which log messages will the router send?

A. error conditions only

B. warning and error conditions only

C. normal but significant conditions only

D. all levels except debugging

E. informational messages only

Answer: D

Q7. Refer to the exhibit

Which switch provides the spanning-tree designated port role for the network segment that services the printers?

A. Switch1

B. Switch2

C. Switch3

D. Switch4

Answer: C

Explanation:

First, the question asks what switch services the printers, so it can be Switch 3 or Switch 4 which is connected directly to the Printers.

Designated port is a port that is in the forwarding state. All ports of the root bridge are designated ports.

Switch 3 and Switch 4 has same priority so it will see on lowest MAC address and here switch 3 has lowest MAC address. So switch 3 segment will play a Designated port role. By comparing the MAC address of Switch 3 and Switch 4 we found that the MAC of Switch 3 is smaller. Therefore the interface connected to the Printers of Switch 3 will become designated interface and the interface of Switch 4 will be blocked.

Q8. Which WAN topology provides a direct connection from each site to all other sites on the network?

A. single-homed

B. full mesh

C. point-to-point

D. hub-and-spoke

Answer: B

Q9. How does a router handle an incoming packet whose destination network is missing from the Routing table?

A. it discards the packet.

B. it broadcasts the packet to each network on the router.

C. it routes the packet to the default route.

D. it broadcasts the packet to each interface on the router.

Answer: C

Q10.

R1# show running-config interface Loopback0

description ***Loopback***

ip address 192.168.1.1 255.255.255.255

ip ospf 1 area 0

!

interface Ethernet0/0

description **Connected to R1-LAN** ip address 10.10.110.1 255.255.255.0

ip ospf 1 area 0

!

interface Ethernet0/1

description **Connected to L2SW**

ip address 10.10.230.1 255.255.255.0

ip ospf hello-interval 25 ip ospf 1 area 0

!

router ospf 1

log-adjacency-changes

R2# show running-config R2

!

interface Loopback0 description **Loopback**

ip address 192.168.2.2 255.255.255.255

ip ospf 2 area 0

!

interface Ethernet0/0

description **Connected to R2-LAN**

ip address 10.10.120.1 255.255.255.0

ip ospf 2 area 0

!

interface Ethernet0/1

description **Connected to L2SW**

ip address 10.10.230.2 255.255.255.0

ip ospf 2 area 0

!

router ospf 2

log-adjacency-changes

R3# show running-config R3

username R6 password CISCO36

!

interface Loopback0 description **Loopback**

ip address 192.168.3.3 255.255.255.255

ip ospf 3 area 0

!

interface Ethernet0/0

description **Connected to L2SW**

ip address 10.10.230.3 255.255.255.0

ip ospf 3 area 0

!

interface Serial1/0

description **Connected to R4-Branch1 office** ip address 10.10.240.1 255.255.255.252

encapsulation ppp ip ospf 3 area 0

!

interface Serial1/1

description **Connected to R5-Branch2 office** ip address 10.10.240.5 255.255.255.252

encapsulation ppp

ip ospf hello-interval 50 ip ospf 3 area 0

!

interface Serial1/2

description **Connected to R6-Branch3 office** ip address 10.10.240.9 255.255.255.252

encapsulation ppp ip ospf 3 area 0

ppp authentication chap

!

router ospf 3

router-id 192.168.3.3

!

R4# show running-config R4

!

interface Loopback0 description **Loopback**

ip address 192.168.4.4 255.255.255.255

ip ospf 4 area 2

!

interface Ethernet0/0

ip address 172.16.113.1 255.255.255.0

ip ospf 4 area 2

!

interface Serial1/0

description **Connected to R3-Main Branch office** ip address 10.10.240.2 255.255.255.252

encapsulation ppp ip ospf 4 area 2

!

router ospf 4

log-adjacency-changes

R5# show running-config R5

!

interface Loopback0 description **Loopback**

ip address 192.168.5.5 255.255.255.255

ip ospf 5 area 0

!

interface Ethernet0/0

ip address 172.16.114.1 255.255.255.0

ip ospf 5 area 0

!

interface Serial1/0

description **Connected to R3-Main Branch office** ip address 10.10.240.6 255.255.255.252

encapsulation ppp ip ospf 5 area 0

!

router ospf 5

log-adjacency-changes

R6# show running-config R6

username R3 password CISCO36

!

interface Loopback0 description **Loopback**

ip address 192.168.6.6 255.255.255.255

ip ospf 6 area 0

!

interface Ethernet0/0

ip address 172.16.115.1 255.255.255.0

ip ospf 6 area 0

!

interface Serial1/0

description **Connected to R3-Main Branch office** ip address 10.10.240.10 255.255.255.252

encapsulation ppp ip ospf 6 area 0

ppp authentication chap

!

router ospf 6

router-id 192.168.3.3

!

An OSPF neighbor adjacency is not formed between R3 in the main office and R6 in the Branch3 office. What is causing the problem?

A. There is an area ID mismatch.

B. There is a PPP authentication issue; the username is not configured on R3 and R6.

C. There is an OSPF hello and dead interval mismatch.

D. The R3 router ID is configured on R6.

Answer: D

Q11. What can cause two OSPF neighbors to be stuck in the EXSTART state?

A. There is a low bandwidth connection between neighbors.

B. The neighbors have different MTU settings.

C. The OSPF interfaces are in a passive state.

D. There is only layer one connectivity between neighbors.

Answer: B

Explanation:

Neighbors Stuck in Exstart/Exchange State

The problem occurs most frequently when attempting to run OSPF between a Cisco router and another vendor's router. The problem occurs when the maximum transmission unit (MTU) settings for neighboring router interfaces don't match. If the router with the higher MTU sends a packet larger that the MTU set on the neighboring router, the neighboring router ignores the packet.0 When this problem occurs, the output of the show ip ospf neighbor command displays output similar that shown below:

router-6# show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface 170.170.11.7 1 EXCHANGE/ - 00:00:36 170.170.11.7 Serial2.7

router-6#

router-7# show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface 170.170.11.6 1 EXSTART/ - 00:00:33 170.170.11.6 Serial0.6

Reference: http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first- ospf/13684-12.html

Q12. Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

A. RSA

B. L2TP

C. IPsec

D. PPTP

Answer: C

Explanation:

Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.

Q13. Refer to the exhibit.

If the router R1 returns the given output and has not had its router ID set manually, what address will EIGRP use as its router ID?

A. 192.168.1.2

B. 172.16.4.1

C. 192.168.10.2

D. 1.1.1.1

Answer: D

Explanation:

The router ID is selected according to the following rules:

u2711 manual configuration

u2711 highest up/up loopback

u2711 highest up/up physical interface

Q14. CORRECT TEXTWhich protocol authenticates connected devices before allowing them to access the LAN?

A. 802.1d

B. 802.11

C. 802.1w

D. 802.1x

Answer: D

Explanation:

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the

software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicantu2021s identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.

Q15. Which of the following HSRP router states does an active router enter when it is preempted by a higher priority

router?

A. Active

B. Speak

C. Learn

D. Listen

E. Init

F. Standby

Answer: B

Recommend!! Get the Verified 200-105 dumps in VCE and PDF From Dumpscollection, Welcome to download: http://www.dumpscollection.net/dumps/200-105/ (New 267 Q&As Version)