P.S. Realistic 200-105 bundle are available on Google Drive, GET MORE: https://drive.google.com/open?id=15qdYN17ESAKqiw2FrpOPw3870_4rbe12
Question No: 16
Which two options are primary responsibilities of the APIC-EM controller? (Choose two)
A. It automates network actions between different device types.
B. It provides robust asset management.
C. It tracks license usage and Cisco IOS versions.
D. It automates network actions between legacy equipment.
E. It makes network functions programmable.
Answer: D,E
Question No: 17
Refer to the exhibit.
Which WAN protocol is being used?
A. ATM
B. HDLC
C. Frame Relay
D. PPP
Answer: C
Explanation:
"Show interface pos8/0/0" command showing LMI enq sent which show frame-relay encapsulation enabled on this interface. Cisco supports three different Local Management Interface (LMI) types for Frame Relay: Cisco, ANSI Annex D, and Q933-A Annex A http://www.ciscopress.com/articles/article.asp?p=170741&seqNum=3
Question No: 18
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
A. A new switch has no VLANs configured.
B. Connectivity between VLANs requires a Layer 3 device.
C. VLANs typically decrease the number of collision domains.
D. Each VLAN uses a separate address space.
E. A switch maintains a separate bridging table for each VLAN.
F. VLANs cannot span multiple switches.
Answer: B,D,E
Explanation:
By default, all ports on a new switch belong to VLAN 1 (default & native VLAN). There are also some well-known VLANs (for example: VLAN 1002 for fddi-default; VLAN 1003 for token-ringu2026) configured by default -> A is not correct.
To communicate between two different VLANs we need to use a Layer 3 device like router or Layer 3 switch -> B is correct.
VLANs donu2021t affect the number of collision domains, they are the same -> C is not correct. Typically, VLANs increase the number of broadcast domains.We must use a different network (or sub-network) for each VLAN. For example we can use 192.168.1.0/24 for VLAN 1, 192.168.2.0/24 for VLAN 2 -> D is correct.
A switch maintains a separate bridging table for each VLAN so that it can send frame to ports on the same VLAN only. For example, if a PC in VLAN 2 sends a frame then the switch look-ups its bridging table and only sends frame out of its ports which belong to VLAN 2 (it also sends this frame on trunk ports) -> E is correct.
We can use multiple switches to expand VLAN -> F is not correct.
Question No: 19
Which two statements about the OSPF Router ID are true? (Choose two.)
A. It identifies the source of a Type 1 LSA.
B. It should be the same on all routers in an OSPF routing instance.
C. By default, the lowest IP address on the router becomes the OSPF Router ID.
D. The router automatically chooses the IP address of a loopback as the OSPF Router ID.
E. It is created using the MAC Address of the loopback interface.
Answer: A,D
Explanation:
From the output of the u201cshow ip ospf databaseu201d:
Question No: 20
What is the advantage of using a multipoint interface instead of point-to-point subinterfaces
when configuring a Frame Relay hub in a hub-and-spoke topology?
A. It avoids split-horizon issues with distance vector routing protocols.
B. IP addresses can be conserved if VLSM is not being used for subnetting.
C. A multipoint interface offers greater security compared to point-to-point subinterface configurations.
D. The multiple IP network addresses required for a multipoint interface provide greater addressing flexibility over point-to-point configurations.
Answer: B
Explanation:
You do not have to assign a separate subnet per sub-interface .if you're using a Class A network (10.x.x.x/8), you blow the whole network on a few connections (if you used VLSM, you could use a better mask, limit the addresses used). if you used 10.0.0.0/8, you would not be assigning the entire /8 to a single network. You would select a subnet mask for the network and then, you would have to use that mask with all subnets of the network. So if you chose a /24 mask, that would mean that you would have to use a /24 mask for even point-to-point links.
Question No: 21
Refer to the exhibit.
At the end of an RSTP election process, which access layer switch port will assume the discarding role?
A. Switch3, port fa0/1
B. Switch3, port fa0/12
C. Switch4, port fa0/11
D. Switch4, port fa0/2
E. Switch3, port Gi0/1
F. Switch3, port Gi0/2
Answer: C
Explanation:
In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4.
Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior than another if it has:
1. A lower Root Bridge ID2. A lower path cost to the Root3. A lower Sending Bridge ID4. A lower Sending Port ID
These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role)
Question No: 22
What can be done to secure the virtual terminal interfaces on a router? (Choose two.)
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
Answer: D,E
Explanation:
It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces -> A is not correct.
We can not physically secure a virtual interface because it is u201cvirtualu201d -> B is not correct. To apply an access list to a virtual terminal interface we must use the u201caccess-classu201d command. The u201caccess-groupu201d command is only used to apply an access list to a physical interface -> C is not correct; E is correct.
The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login -> D is correct.
Question No: 23
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?
A. RSA
B. L2TP
C. IPsec
D. PPTP
Answer: C
Explanation:
Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
Question No: 24
Which option describes how a switch in rapid PVST+ mode responds to a topology change?
A. It immediately deletes dynamic MAC addresses that were learned by all ports on the switch.
B. It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP instance.
C. It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch.
D. It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP instance.
Answer: D
Explanation:
Rapid PVST+This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence based on the IEEE 802.1w standard. To provide rapid convergence, the rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a short aging time for dynamically learned MAC address entries.
The rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only minimal extra configuration. The benefit of rapid PVST+ is that you can migrate a large PVST+ install base to rapid PVST+ without having to learn the complexities of the MSTP configuration and without having to reprovision your network. In rapid-PVST+ mode, each VLAN runs its own spanning-tree instance up to the maximum supported.
Question No: 25
It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit. Which of the following are required to solve this? (Choose three)
A. configure static frame relay map entries for each subinterface network.
B. remove the ip address from the physical interface
C. create the virtual interfaces with the interface command
D. configure each subinterface with its own IP address
E. disable split horizon to prevent routing loops between the subinterface networks
F. encapsulate the physical interface with multipoint PPP
Answer: B,C,D
Explanation:
How To Configure Frame Relay Subinterfaces
http://www.orbit-computer-solutions.com/How-To-Configure-Frame-Relay- Subinterfaces.php
Step to configure Frame Relay subinterfaces on a physical interface:
1. Remove any network layer address (IP) assigned to the physical interface. If the physical interface has an address, frames are not received by the local subinterfaces.
2. Configure Frame Relay encapsulation on the physical interface using the encapsulation frame-relay command.
3. For each of the defined PVCs, create a logical subinterface. Specify the port number, followed by a period (.) and the subinterface number. To make troubleshooting easier, it is suggested that the subinterface number matches the DLCI number.
4. Configure an IP address for the interface and set the bandwidth.
5. Configure the local DLCI on the subinterface using the frame-relay interface-dlci command.
Configuration Example: R1>enable R1#configure terminal
R1(config)#interface serial 0/0/0 R1(config-if)#no ip address
R1(config-if)#encapsulation frame-relay
R1(config-if)#no shutdown R1(config-if)#exit
R1(config-subif)#interface serial 0/0/0.102 point-to-point R1(config-subif)#ip address 192.168.1.245 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 102 R1(config-subif)#end
R1#copy running-config startup-config
P.S. Easily pass 200-105 Exam with Certleader Realistic Dumps & pdf vce, Try Free: https://www.certleader.com/200-105-dumps.html (267 New Questions)