200-105 Exam PDF Questions

DumpsSchool assist you along the way to pass the 200-105 exam of the CCNA Routing and Switching Certification with upgraded 200-105 exam dumps.

Try it Latest DumpsSchool 200-105 Exam dumps. Buy Full File here: https://www.dumpsschool.com/200-105-exam-dumps.html (691 As Dumps)

Download the DumpsSchool 200-105 braindumps from Google Drive: https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view (FREE VERSION!!!)

Question No. 1

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?

Answer: A

Cisco supports two Frame Relay encapsulation types: the Cisco encapsulation and the IETF Frame Relay encapsulation, which is in conformance with RFC 1490 and RFC 2427. The former is often used to connect two Cisco routers while the latter is used to connect a Cisco router to a non-Cisco router. You can test with your Cisco router when typing the command Router(config-if)#encapsulation frame-relay ? on a WAN link.

Note: Three LMI options are supported by Cisco routers are ansi, Cisco, and Q933a. They represent the ANSI Annex D, Cisco, and ITU Q933-A (Annex A) LMI types, respectively.

HDLC is a WAN protocol same as Frame-Relay and PPP so it is not a Frame Relay encapsulation type.

Question No. 2

After you configure a new IP SLA, you notice that it is failing to run or generate statistics. Which step do you

take first to identify the problem?

Answer: D

Question No. 3

What are three components that comprise the SNMP framework? (Choose three.)

Answer: A, B, F

Question No. 4

Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

Answer: B

What Is Administrative Distance?

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094195.shtml

Administrative distance is the feature that routers use in order to select the best path. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. Lowest Administrative distance will be chosen first.

Question No. 5

A router has learned three possible routes that could be used to reach a destination network One route is from

EIGRP and has a composite metric of 07104371. Another route is from OSPF with a metric of 782 The last is

from RIPv2 and has a metric of 4.

Which route or routes will the router install in the routing table?

Answer: A

Question No. 6

Which three features are QoS congestion-management tools? (Choose three.)

Answer: B, C, F

Question No. 8

Which function does traffic shaping perform?

Answer: D

Question No. 9

What are the benefit of using Netflow? (Choose three.)

Answer: A, C, D

NetFlow Definitions and Benefits

http://www.cisco.com/en/US/products/sw/netmgtsw/ps1964/products_implementation_design_guide09186a00800d6a11.html#wp1030045

NetFlow traditionally enables several key customer applications including:

Network Monitoring—NetFlow data enables extensive near real time network monitoring capabilities. Flowbased analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

Application Monitoring and Profiling—NetFlow data enables network managers to gain a detailed, timebased, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.

User Monitoring and Profiling—NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.

Network Planning—NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications.

NetFlow will give you valuable information to reduce the cost of operating your network.

Security Analysis—NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.

Accounting/Billing—NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.

NetFlow Data Warehousing and Data Mining—NetFlow data (or derived information) can be warehoused for later retrieval and analysis in support of proactive marketing and customer service programs (e.g. figure out which applications and services are being utilized by internal and external users and target them for improved service, advertising, etc.). In addition, NetFlow data gives Market Researchers access to the “who”, “what”, “where”, and “how long” information relevant to enterprises and service providers.

Question No. 10

Which two authentication methods are compatible with MLPPP on a serial interface? (Choose two.)

Answer: C, E

PPP Authentication Methods

In this part we will learn more about two authentication methods used in Authentication Phase of PPP.

PPP has two built-in security mechanisms which are Password Authentication Protocol (PAP) and Challenge

Handshake Authentication Protocol (CHAP).

Question No. 11

Refer to the exhibit.

Which statement describes DLCI 17?

Answer: C

DLCI stands for Data Link Connection Identifier. DLCI values are used on Frame Relay interfaces to distinguish between different virtual circuits. DLCIs have local significance because, the identifier references the point between the local router and the local Frame Relay switch to which the DLCI is connected.

Question No. 12

In which three circumstances may your organization require a high-bandwidth Internet connection? (Choose

three.)

Answer: A, C, E

Question No. 13

What three pieces of information can be used in an extended access list to filter traffic? (Choose three)

Answer: B, D, E

Question No. 14

Which two values can HSRP use to determine the device with the highest priority? (Choose two.)

Answer: A, D

200-105 Dumps Google Drive: (Limited Version!!!)
https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view

Related Certification: CCNA Routing & Switching dumps