200-105 | how many questions of 200-105 exam dumps?


P.S. Vivid 200-105 forum are available on Google Drive, GET MORE: https://drive.google.com/open?id=17xcyZW-Vd6eZbaGV28ocMyVubJ6pL5PW


New Cisco 200-105 Exam Dumps Collection (Question 7 - Question 16)

Question No: 7

Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

A. hop count

B. administrative distance

C. link bandwidth

D. link delay

E. link cost

Answer: B

Explanation:

What Is Administrative Distance? http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094195.shtml

Administrative distance is the feature that routers use in order to select the best path. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. Lowest Administrative distance will be chosen first.

Question No: 8

Which statement about the IP SLAs ICMP Echo operation is true?

A. It is configured in enable mode.

B. It is used to determine the one-way delay between devices.

C. It is used to identify the best source interface from which to send traffic to a destination.

D. The frequency of the operation is specified in milliseconds.

Answer: C

Question No: 9

Refer to the exhibit.

Assume that all of the router interfaces are operational and configured correctly. How will router R2 be affected by the configuration of R1 that is shown in the exhibit?

A. Router R2 will not form a neighbor relationship with R1.

B. Router R2 will obtain a full routing table, including a default route, from R1.

C. R2 will obtain OSPF updates from R1, but will not obtain a default route from R1.

D. R2 will not have a route for the directly connected serial network, but all other directly connected networks will be present, as well as the two Ethernet networks connected to R1.

Answer: A

Explanation:

Open Shortest Path First http://en.wikipedia.org/wiki/Open_Shortest_Path_First

The configuration of R1 shows "router ospf 1" however, the diagram also shows that both routers should be in the backbone OSPF Area of "0". When routers are in different OSPF areas they will not form a neighbor relationship.

Neighbor relationships

As a link state routing protocol, OSPF establishes and maintains neighbor relationships in order to exchange routing updates with other routers. The neighbor relationship table is

called an adjacency database in OSPF.

Provided that OSPF is configured correctly, OSPF forms neighbor relationships only with the routers directly connected to it. In order to form a neighbor relationship between two routers, the interfaces used to form the relationship must be in the same area. Generally an interface is only configured in a single area, however you can configure an interface to belong to multiple areas. In the second area, such an interface must be configured as a secondary interface. (A neighbor state simulation shows how neighbor state changes from Down to Full Adjacency progressively with exchanging Hello, DD, Request, Update, and Ack packets).

Question No: 10

Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?

A. show frame-relay lmi

B. show frame-relay map

C. show frame-relay pvc

D. show interfaces serial

Answer: B

Explanation: map will show frame relay encapsulation (cisco or ietf) http://www.cisco.com/en/US/docs/ios/12_2/wan/command/reference/wrffr4.html#wp102934 3

"show frame-relay map" will show frame relay encapsulation type (CISCO or IETF)

Question No: 11

Which statement about MPLS is true?

A. It operates in Layer 1.

B. It operates between Layer 2 and Layer 3.

C. It operates in Layer 3.

D. it operates in Layer 2.

Answer: B

Explanation: MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

Question No: 12

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Answer: D,E

Explanation:

It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces -> A is not correct.

We can not physically secure a virtual interface because it is u201cvirtualu201d -> B is not correct. To apply an access list to a virtual terminal interface we must use the u201caccess-classu201d command. The u201caccess-groupu201d command is only used to apply an access list to a physical interface -> C is not correct; E is correct.

The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login -> D is correct.

Question No: 13

Refer to the exhibit.

A packet with a source IP address of 192.168.2.4 and a destination IP address of 10.1.1.4 arrives at the AcmeB router. What action does the router take?

A. forwards the received packet out the Serial0/0 interface

B. forwards a packet containing an EIGRP advertisement out the Serial0/1 interface

C. forwards a packet containing an ICMP message out the FastEthemet0/0 interface

D. forwards a packet containing an ARP request out the FastEthemet0/1 interface

Answer: C

Explanation:

CCNA - EIGRP Common Question

http://www.orbitco-ccna-pastquestions.com/CCNA---EIGRP-Common-Question.php

Looking at the output above, there is no IP route for 10.1.1.4 address on AcmeB routing table. If the router can no find a specific path in its routing table to a particular route,( In this case no path is found so AcmeB) the router will inform the source host with an ICMP message that the destination is unreachable and this will be through the same interface it has received the packet (interface Fa0/0 network 192.168.3.0/28 from the exhibit).

Question No: 14

Which two statements about the spanning-tree bridge ID are true? (Choose two)

A. It is composed of a 4-bit bridge priority and a 12-bit system ID extension.

B. The bridge ID is transmitted in the IP header to elect the root bridge.

C. The system ID extension is a value between 1 and 4095.

D. It is composed of an 8-bit bridge priority and a 16-bit system ID extension.

E. The bridge priority must be incremented in blocks of 4096.

Answer: A,E

Question No: 15

Refer to the exhibit.

While troubleshooting a switch, you executed the show interface port-channel 1 etherchannel command and it returned this output. Which information is provided by the Load value?

A. the percentage of use of the link

B. the preference of the link

C. the session count of the link

D. the number source-destination pairs on the link

Answer: D

Question No: 16

Which IPsec security protocol should be used when confidentiality is required?

A. MD5

B. PSK

C. AH

D. ESP

Answer: D

100% Far out Cisco 200-105 Questions & Answers shared by Surepassexam, Get HERE: https://www.surepassexam.com/200-105-exam-dumps.html (New 267 Q&As)