Download ICND Interconnecting Cisco Networking Devices Part 2.actualtests.200-105.2019-04-26.1e.379q.vcex

Download Exam

File Info

Exam Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)
Number 200-105
File Name ICND Interconnecting Cisco Networking Devices Part 2.actualtests.200-105.2019-04-26.1e.379q.vcex
Size 13.32 Mb
Posted April 26, 2019
Downloads 218
Download ICND Interconnecting Cisco Networking Devices Part 2.actualtests.200-105.2019-04-26.1e.379q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

Which protocol authenticates connected devices before allowing them to access the LAN?

  • A: 802.1d
  • B: 802.11
  • C: 802.1w
  • D: 802.1x

Correct Answer: D

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.
The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant's identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.




Question 2

What is a difference between TACACS+ and RADIUS in AAA?

  • A: Only TACACS+ allows for separate authentication.
  • B: Only RADIUS encrypts the entire access-request packet.
  • C: Only RADIUS uses TCP.
  • D: Only TACACS+ couples authentication and authorization.

Correct Answer: A

Authentication and Authorization RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization. 
TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication  
solutions that can still use TACACS+ for authorization and accounting. For example, with  
TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information. During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism.




Question 3

Which option is a benefit of switch stacking?

  • A: It provides redundancy with no impact on resource usage.
  • B: It simplifies adding and removing hosts.
  • C: It supports better performance of high-needs applications.
  • D: It provides higher port density with better resource usage.

Correct Answer: D

A stackable switch is a network switch that is fully functional operating standalone but which can also be set up to operate together with one or more other network switches, with this group of switches showing the characteristics of a single switch but having the port capacity of the sum of the combined switches.




Question 4

What is the first step you perform to configure an SNMPv3 user?

  • A: Configure server traps.
  • B: Configure the server group.
  • C: Configure the server host.
  • D: Configure the remote engine ID.

Correct Answer: B

To configure an SNMP server user, specify an SNMP group or a table that maps SNMP users to SNMP views. Then, specify the IP address or port number for the remote SNMP agent of the device where the user resides. Also, before you configure remote users for a particular agent, configure the SNMP engine ID by using the snmp-server engineID command for the remote agent. The SNMP engine ID of the remote agent is required to compute the authentication or privacy digests for the SNMP password. If the remote engine ID is not configured first, the configuration command will fail. 
SUMMARY STEPS 
1. enable 
2. configure terminal 
3. snmp-server group [group-name {v1 | v2c | v3 [auth | noauth | priv]}] [read read-view] [writewrite-view] [notify notify-view] [access access-list] 
4. snmp-server engineID {local engine-id | remote ip-address [udp-port udp-port-number] [vrfvrf-name] engine-id-string} 
5. snmp-server user user-name group-name [remote ip-address [udp-port port]] {v1 | v2c | v3[encrypted] [auth {md5 | sha} auth-password]} [access access-list] 
6. end 
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html#GUID-E9B523ED-2DEE-44AE-BBEC-ABE75EF40B2A




Question 5

Which spanning-tree feature places a port immediately into a forwarding state?

  • A: BPDU guard
  • B: PortFast
  • C: loop guard
  • D: UDLD
  • E: UplinkFast

Correct Answer: B

PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state.




Question 6

Which Cisco platform can verify ACLs?

  • A: Cisco Prime Infrastructure
  • B: Cisco Wireless LAN Controller
  • C: Cisco APIC-EM
  • D: Cisco IOS-XE

Correct Answer: A




Question 7

Which statement about QoS default behavior is true?

  • A: Ports are untrusted by default.
  • B: VoIP traffic is passed without being tagged.
  • C: Video traffic is passed with a well-known DSCP value of 46.
  • D: Packets are classified internally with an environment.
  • E: Packets that arrive with a tag are untagged at the edge of an administrative domain.

Correct Answer: A

Trust means to accept as valid and use as the basis of the initial internal DSCP value. Ports are untrusted by default, which sets the initial internal DSCP value to zero. 
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/qos.html




Question 8

Which statement about MPLS is true?

  • A: It operates in Layer 1.
  • B: It operates between Layer 2 and Layer 3.
  • C: It operates in Layer 3.
  • D: It operates in Layer 2.

Correct Answer: B

MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.




Question 9

Which statement about named ACLs is true?

  • A: They support standard and extended ACLs.
  • B: They are used to filter usernames and passwords for Telnet and SSH.
  • C: They are used to filter Layer 7 traffic.
  • D: They support standard ACLs only.
  • E: They are used to rate limit traffic destined to targeted networks.

Correct Answer: A

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new  
statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.




Question 10

Which two switch states are valid for 802.1w? (Choose two.)

  • A: listening
  • B: backup
  • C: disabled
  • D: learning
  • E: discarding

Correct Answer: DE

Port States 
There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state. 

  










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files