Download Interconnecting Cisco Networking Devices Part 2 (ICND2 v3-0).test-king.200-105.2019-09-30.1e.414q.vcex

Download Exam

File Info

Exam Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)
Number 200-105
File Name Interconnecting Cisco Networking Devices Part 2 (ICND2 v3-0).test-king.200-105.2019-09-30.1e.414q.vcex
Size 15.82 Mb
Posted September 30, 2019
Downloads 203
Download Interconnecting Cisco Networking Devices Part 2 (ICND2 v3-0).test-king.200-105.2019-09-30.1e.414q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

Which protocol authenticates connected devices before allowing them to access the LAN?

  • A: 802.1d
  • B: 802.11
  • C: 802.1w
  • D: 802.1x

Correct Answer: D

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.
The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant's identity has been validated and authorized. An analogy to this is providing a valid visa at the airport's arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.




Question 2

What is a difference between TACACS+ and RADIUS in AAA?

  • A: Only TACACS+ allows for separate authentication.
  • B: Only RADIUS encrypts the entire access-request packet.
  • C: Only RADIUS uses TCP.
  • D: Only TACACS+ couples authentication and authorization.

Correct Answer: A

Authentication and Authorization RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization. 
TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication  
solutions that can still use TACACS+ for authorization and accounting. For example, with  
TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information. During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism.




Question 3

Which statement about the IP SLAs ICMP Echo operation is true?

  • A: The frequency of the operation is specified in milliseconds.
  • B: It is used to identify the best source interface from which to send traffic to a destination.
  • C: It is configured in enable mode.
  • D: It is used to determine the one-way delay between devices.

Correct Answer: B

This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices using IPv4 or IPv6. ICMP Echo is useful for troubleshooting network connectivity issues. This module also demonstrates how the results of the ICMP Echo operation can be displayed and analyzed to determine how the network IP connections are performing. 
ICMP Echo Operation 
The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply. 
In the figure below ping is used by the ICMP Echo operation to measure the response time between the source IP SLAs device and the destination IP device. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time  
measurements. 

  

The IP SLAs ICMP Echo operation conforms to the same IETF specifications for ICMP ping testing and the two methods result in the same response times.  
Configuring a Basic ICMP Echo Operation on the Source Device SUMMARY STEPS 
enable  
configure terminal  
ip sla operation-number  
icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} | source-interface interface-name]  
frequency seconds  
end




Question 4

Which type of interface can negotiate an IP address for a PPPoE client?

  • A: Ethernet
  • B: dialer
  • C: serial
  • D: Frame Relay

Correct Answer: B

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-pppoe-client.html#GUID-FFFC40B9-3F50-484A-92FF-7458E7E4FC47




Question 5

Which spanning-tree feature places a port immediately into a forwarding state?

  • A: BPDU guard
  • B: PortFast
  • C: loop guard
  • D: UDLD
  • E: UplinkFast

Correct Answer: B

PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state.




Question 6

If host Z needs to send data through router R1 to a storage server, which destination MAC address does host Z use to transmit packets?

  • A: the host Z MAC address
  • B: the MAC address of the interface on R1 that connects to the storage server
  • C: the MAC address of the interface on R1 that connects to host Z.
  • D: the MAC address of the storage server interface.

Correct Answer: C




Question 7

Refer to the exhibit. 

  

Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency? (Choose two.)

  • A: Set the subnet mask on edge-1 to 255.255.255.252.
  • B: Reduce the MTU on edge-1 to 1514.
  • C: Set the OSPF cost on edge-1 to 1522.
  • D: Reduce the MTU on edge-1 to 1500.
  • E: Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface.

Correct Answer: DE

A situation can occur where the interface MTU is at a high value, for example 9000, while the real value of the size of packets that can be forwarded over this interface is 1500. 
If there is a mismatch on MTU on both sides of the link where OSPF runs, then the OSPF adjacency will not form because the MTU value is carried in the Database Description (DBD) packets and checked on the other side.




Question 8

Which statement about MPLS is true?

  • A: It operates in Layer 1.
  • B: It operates between Layer 2 and Layer 3.
  • C: It operates in Layer 3.
  • D: It operates in Layer 2.

Correct Answer: B

MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.




Question 9

Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?

  • A: It reduces the need for a backup data center.
  • B: It can redirect user requests to locations that are using fewer network resources.
  • C: It enables the ISP to maintain DNS records automatically.
  • D: It eliminates the need for a GSS.

Correct Answer: B




Question 10

Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)

  • A: the type of cable that is connected to the interface
  • B: the uptime of the interface
  • C: the status of the physical layer of the interface
  • D: the full configuration of the interface
  • E: the interface’s duplex settings

Correct Answer: AC

Example command:

  










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files