Proper study guides for Latest Cisco Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) certified begins with Cisco cisco 200 105 preparation products which designed to deliver the 100% Correct icnd2 200 105 questions by making you pass the icnd2 200 105 test at your first time. Try the free icnd2 200 105 demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 200-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 200-105 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/200-105-exam-dumps.html

Q11. - (Topic 2) 

Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used? 

A. hop count 

B. administrative distance 

C. link bandwidth 

D. link delay 

E. link cost 

Answer:

Explanation: 

What Is Administrative Distance? 

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094195.shtml 

Administrative distance is the feature that routers use in order to select the best path. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. Lowest Administrative distance will be chosen first. 


Q12. - (Topic 3) 

Which two statistics appear in show frame-relay map output? (Choose two.) 

A. the number of BECN packets that are received by the router 

B. the value of the local DLCI 

C. the number of FECN packets that are received by the router 

D. the status of the PVC that is configured on the router 

E. the IP address of the local router 

Answer: B,D 

Explanation: 

Frame Relay Commands (map-class frame-relay through threshold ecn) 

http://www.cisco.com/en/US/docs/ios/12_2/wan/command/reference/wrffr4.html#wp102934 

Examples 

The following is sample output from the show frame-relay map command: 

Router#show frame-relay map Serial 1 (administratively down): ip 10.108.177.177 

dlci 177 (0xB1,0x2C10), static, broadcast, 

CISCO 

TCP/IP Header Compression (inherited), passive (inherited) 


Q13. - (Topic 2) 

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.) 

A. hello packets 

B. SAP messages sent by other routers 

C. LSAs from other routers 

D. beacons received on point-to-point links 

E. routing tables received from other link-state routers 

F. TTL packets from designated routers 

Answer: A,C 

Explanation: 

Link State Routing Protocols http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4 

Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are: Open Shortest Path First (OSPF) for IP The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V Novell's NetWare Link Services Protocol (NLSP) Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all: 

1. Each router establishes a relationship—an adjacency—with each of its neighbors. 

2. Each router sends link state advertisements (LSAs), some 

3. Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical. 

4. The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table. 


Q14. - (Topic 2) 

Which statement describes an EIGRP feasible successor route? 

A. A primary route, added to the routing table 

B. A backup route, added to the routing table 

C. A primary route, added to the topology table 

D. A backup route, added to the topology table 

Answer:

Explanation: 

Two terms that appear often in the EIGRP world are "successor" and "feasible successor". A successor is the route with the best metric to reach a destination. That route is stored in the routing table. A feasible successor is a backup path to reach that same destination that can be used immediately if the successor route fails. These backup routes are stored in the topology table. 

Reference: http://study-ccna.com/eigrp-overview 


Q15. DRAG DROP - (Topic 2) 

Answer: 

Explanation: 

Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietary routing protocol, so it is vendor-specific. By default, EIGRP internal routes have an administrative distance value of 90. OSPF uses cost as its metric. By default, the cost of an interface is calculated based on bandwidth with the formula cost= 10000 0000/bandwidth (in bps). OSPF elects a DR on each broadcast and nonbroadcast multiaccess networks (like Ethernet and Frame Relay environments, respectively). It doesn’t elect a DR on point-to-point link (like a serial WAN). 


Q16. - (Topic 1) 

Refer to the exhibit. 

What commands must be configured on the 2950 switch and the router to allow communication between host 1 and host 2? (Choose two.) 

A. Router(config)# interface fastethernet 0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shut down 

B. Router(config)# interface fastethernet 0/0 Router(config-if)# no shut down Router(config)# interface fastethernet 0/0.1 Router(config-subif)# encapsulation dot1q 10 Router(config-subif)# ip address 192.168.10.1 255.255.255.0 

Router(config)# interface fastethernet 0/0.2 Router(config-subif)# encapsulation dot1q 20 Router(config-subif)# ip address 192.168.20.1 255.255.255.0 

C. Router(config)# router eigrp 100 Router(config-router)# network 192.168.10.0 Router(config-router)# network 192.168.20.0 

D. Switch1(config)# vlan database Switch1(config-vlan)# vtp domain XYZ Switch1(config-vlan)# vtp server 

E. Switch1(config)# interface fastethernet 0/1 Switch1(config-if)# switchport mode trunk 

F. Switch1(config)# interface vlan 1 Switch1(config-if)# ip default-gateway 192.168.1.1 

Answer: B,E 

Explanation: 

The two answers B and E list all the commands needed to configure interVLAN routing. Please notice that Cisco switch 2950, 2960 only support dot1Q trunking so we don’t need to specify which trunking encapsulation to use in this case. For Cisco switches 3550 or above we have to use these commands instead: 

Switch3550(config-if)#switchport trunk encapsulation dot1q Switch3550(config-if)#switchport mode trunk 

References: http://www.cisco.com/en/US/tech/tk389/tk815/technologies_configuration_example09186a 00800949fd.shtml https://learningnetwork.cisco.com/servlet/JiveServlet/download/5669-2461/Router%20on%20a%20Stick.pdf. 


Q17. - (Topic 3) 

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.) 

A. CHAP uses a two-way handshake. 

B. CHAP uses a three-way handshake. 

C. CHAP authentication periodically occurs after link establishment. 

D. CHAP authentication passwords are sent in plaintext. 

E. CHAP authentication is performed only upon link establishment. 

F. CHAP has no protection from playback attacks. 

Answer: B,C 

Explanation: 

Understanding and Configuring PPP CHAP Authentication http://www.cisco.com/en/US/tech/tk713/tk507/technologies_tech_note09186a00800b4131. shtml 

One-Way and Two-Way Authentication CHAP is defined as a one-way authentication method. However, you use CHAP in both directions to create a two-way authentication. Hence, with two-way CHAP, a separate three-way handshake is initiated by each side. In the Cisco CHAP implementation, by default, the called party must authenticate the calling party (unless authentication is completely turned off). Therefore, a one-way authentication initiated by the called party is the minimum possible authentication. However, the calling party can also verify the identity of the called party, and this results in a two-way authentication. One-way authentication is often required when you connect to non-Cisco devices. 


Q18. - (Topic 2) 

Which two statements describe the process identifier that is used in the command to configure OSPF on a router? (Choose two.) 

Router(config)# router ospf 1 

A. All OSPF routers in an area must have the same process ID. 

B. Only one process number can be used on the same router. 

C. Different process identifiers can be used to run multiple OSPF processes 

D. The process number can be any number from 1 to 65,535. 

E. Hello packets are sent to each neighbor to determine the processor identifier. 

Answer: C,D 

Explanation: 

The areas can be any number from 0 to 4.2 billion and 1 to 65,535 for the Process ID. The process ID is the ID of the OSPF process to which the interface belongs. The process ID is local to the router, and two OSPF neighboring routers can have different OSPF process IDs. (This is not true of Enhanced Interior Gateway Routing Protocol [EIGRP], in which the routers need to be in the same autonomous system). Cisco IOS Software can run multiple OSPF processes on the same router, and the process ID merely distinguishes one process from the other. The process ID should be a positive integer. 


Q19. - (Topic 2) 

Refer to the exhibit. 

Given the output from the “show ip eigrp topology” command, which router is the feasible successor? 

A) 

B) 

C) 

D) 

A. Exhibit A 

B. Exhibit B 

C. Exhibit C 

D. Exhibit D 

Answer:

Explanation: 

To be the feasible successor, the Advertised Distance (AD) of that route must be less than the Feasible Distance (FD) of the successor. From the output of the “show ip eigrp topology 

10.0.0.5 255.255.255.255 we learn that the FD of the successor is 41152000. Now we will mention about the answers, in the “Composite metric is (…/…)” statement the first parameter is the FD while the second parameter is the AD of that route. So we need to find out which route has the second parameter (AD) less than 41152000 -> only answer B satisfies this requirement with an AD of 128256. 

Reference: http://networklessons.com/eigrp/eigrp-neighbor-and-topology-table-explained/ 


Q20. - (Topic 2) 

Refer to the exhibit. 

Host A pings interface S0/0 on router 3, what is the TTL value for that ping? 

A. 253 

B. 252 

C. 255 

D. 254 

Answer:

Explanation: 

From the CCNA ICND2 Exam book: “Routers decrement the TTL by 1 every time they forward a packet; if a router decrements the TTL to 0, it throws away the packet. This prevents packets from rotating forever.” I want to make it clear that before the router forwards a packet, the TTL is still remain the same. For example in the topology above, pings to S0/1 and S0/0 of Router 2 have the same TTL. 

The picture below shows TTL values for each interface of each router and for Host B. 

Notice that Host A initializes ICMP packet with a TTL of 255: