[Q11-Q20] Free Sharing Of Updated 200-105 VCE And PDF Dumps From Lead2pass

[Q11-Q20] Free Sharing Of Updated 200-105 VCE And PDF Dumps From Lead2pass

Free Updated Lead2pass 200-105 Exam Dumps Download:

https://www.lead2pass.com/200-105.html

QUESTION 11
Hotspot Questions

111

112

Why did Branch1 router lose WAN connectivity with R1 router?

A.    The IP address is misconfigured on PPP multilink interface on the Branch1 router.
B.    The PPP multilink group is misconfigured on the î–¸anch1 serial interfaces.
C.    The PPP multilink group is misconfigured on the R1 serial interfaces.
D.    The Branch1 serial interfaces are placed in a shutdown condition.

Answer: A

QUESTION 12
While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?

A.    show ip interface brief
B.    show ip nat statistics
C.    show ip statistics
D.    show ip route

Answer: A
Explanation:
Initiate a ping from an end device in one VLAN to the interface VLAN on another VLAN in order to verify that the switch routes between VLANs. In this example, ping from VLAN 2 (10.1.2.1) to Interface VLAN 3 (10.1.3.1) or Interface VLAN 10 (10.1.10.1). If the ping fails, verify that IP routing is enabled and that the VLAN interfaces status is up with the show ip interface brief command.

QUESTION 13
Which statement about DTP is true?

A.    It uses the native VLAN.
B.    It negotiates a trunk link after VTP has been configured.
C.    It uses desirable mode by default.
D.    It sends data on VLAN 1.

Answer: D

QUESTION 14

Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?

A.    copy run start
B.    traceroute
C.    the ICMP Echo IP SLA
D.    SPAN

Answer: D
Explanation:
A source port, also called a monitored port, is a switched or routed port that you monitor for network traffic analysis. In a single local SPAN session or RSPAN source session, you can monitor source port traffic, such as received (Rx), transmitted (Tx), or bidirectional (both). The switch supports any number of source ports (up to the maximum number of available ports on the switch) and any number of source VLANs.
A source port has these characteristics:
It can be any port type, such as EtherChannel, Fast Ethernet, Gigabit Ethernet, and so forth.
It can be monitored in multiple SPAN sessions.
It cannot be a destination port.
Each source port can be configured with a direction (ingress, egress, or both) to monitor. For EtherChannel sources, the monitored direction applies to all physical ports in the group.
Source ports can be in the same or different VLANs. For VLAN SPAN sources, all active ports in the source VLAN are included as source ports.

QUESTION 15

Which two circumstances can cause collision domain issues on VLAN domain? (Choose two.)

A.    duplex mismatches on Ethernet segments in the same VLAN
B.    multiple errors on switchport interfaces
C.    congestion on the switch inband path
D.    a failing NIC in an end device
E.    an overloaded shared segment

Answer: AC
Explanation:
Collision Domains
A collision domain is an area of a single LAN where end stations contend for access to the network because all end stations are connected to a shared physical medium. If two connected devices transmit onto the media at the same time, a collision occurs. When a collision occurs, a JAM signal is sent on the network, indicating that a collision has occurred and that devices should ignore any fragmented data associated with the collision. Both sending devices back off sending their data for a random amount and then try again if the medium is free for transmission. Therefore, collisions effectively delay transmission of data, lowering the effective throughput available to a device. The more devices that are attached to a collision domain, the greater the chances of collisions; this results in lower bandwidth and performance for each device attached to the collision domain. Bridges and switches terminate the physical signal path of a collision domain, allowing you to segment separate collision domains, breaking them up into multiple smaller pieces to provide more bandwidth per user within the new collision domains formed.

QUESTION 16
What is a difference between TACACS+ and RADIUS in AAA?

A.    Only TACACS+ allows for separate authentication.
B.    Only RADIUS encrypts the entire access-request packet.
C.    Only RADIUS uses TCP.
D.    Only TACACS+ couples authentication and authorization.

Answer: A
Explanation: Authentication and Authorization
RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization.
TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still use TACACS+ for authorization and accounting. For example, with TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information. During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism.

QUESTION 17
Which version of SNMP first allowed user-based access?

A.    SNMPv3 with RBAC
B.    SNMPv3
C.    SNMPv1
D.    SNMPv2

Answer: B

QUESTION 18
Which IEEE standard does PVST+ use to tunnel information?

A.    802.1x
B.    802 1q
C.    802.1w
D.    802.1s

Answer: B

QUESTION 19
Which option describes the purpose of traffic policing?

A.    It prioritizes routing protocol traffic.
B.    It remarks traffic that is below the CIR
C.    It drops traffic that exceeds the CIR.
D.    It queues and then transmits traffic that exceeds the CIR.

Answer: C
Explanation:
Traffic policing allows you to control the maximum rate of traffic transmitted or received on an interface. Traffic policing is often configured on interfaces at the edge of a network to limit traffic into or out of the network. In most Traffic Policing configurations, traffic that falls within the rate parameters is transmitted, whereas traffic that exceeds the parameters is dropped or transmitted with a different priority.

QUESTION 20
Which component of the Cisco SDN solution serves as the centralized management system?

A.    Cisco OpenDaylight
B.    Cisco ACI
C.    Cisco APIC
D.    Cisco IWAN

Answer: C

200-105 dumps full version (PDF&VCE): https://www.lead2pass.com/200-105.html

Large amount of free 200-105 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDX09LZEFNYnpfM2c

You may also need:

100-105 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDdDNkZEswTDRMaVE

200-125 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDM0s1aXlFTXBWdGM

         

Author: admin