200-105 Exam PDF Questions

Make your 200-105 exam  easier and simpler. Our Cisco 200-105 exam practice test software which simulates the real exam testing environment.

Try it Latest DumpsSchool 200-105 Exam dumps. Buy Full File here: https://www.dumpsschool.com/200-105-exam-dumps.html (691 As Dumps)

Download the DumpsSchool 200-105 braindumps from Google Drive: https://drive.google.com/file/d/1TwCxP9R2WPXn5O77CUBND73niqczpZDp/view (FREE VERSION!!!)

Question No. 1

Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?

Answer: B

High-Level Data Link Control (HDLC) – HDLC is the default encapsulation type on point-to-point, dedicated links, and circuit-switched connections. It is used typically when communicating between two Cisco devices. It is a bit-oriented synchronous data link layer protocol.

Point-to-Point Protocol (PPP) – Provides router-to-router and host-to network connections over synchronous and asynchronous circuits. PPP was designed to work with several network layer protocols, such as IP, and IPX. PPP also has built in security mechanisms such as PAP and CHAP X.25/Link Access Procedure, Balanced (LAPB) – ITU-T standard that defines how connections between DTE and DCE are maintained for remote terminal access and computer communications in public data networks. X.25 specifies LAPB, a data line layer protocol. X.25 is a predecessor to Frame Relay.

Frame Relay – Industry standard, switched data link layer protocol that handles multiple virtual circuits. It is a next-generation to X.25 that is streamlined to eliminate some of the time-consuming processes (such as error correction and flow control) that were employed in X.25.

Question No. 2

Which feature does PPP use to encapsulate multiple protocols?

Answer: A

PPP permits multiple network layer protocols to operate on the same communication link. For every network layer protocol used, a separate Network Control Protocol (NCP) is provided in order to encapsulate and negotiate options for the multiple network layer protocols. It negotiates network-layer information, e.g. network address or compression options, after the connection has been established

Question No. 3

Which two services can the ICMP Echo IP SLA provide? (Choose two.)

Answer: A, E

Question No. 4

In which two ways can you isolate the location of a connectivity issue between two devices on your network?

(Choose two.)

Answer: C, E

Question No. 5

Which statement about access lists that are applied to an interface is true?

Answer: C

Question No. 6

Which RPVST+ port state is excluded from all STP operations?

Answer: D

Question No. 7


Answer: D, E, F

Question No. 8

Disadvantages of using proxy ARP?

Answer: B

Question No. 9

Which three types of multicast messages do HSRP-configured routers use to communicate? (choose three.)

Answer: A, B, D

Question No. 10

What authentication type is used by SNMPv2?

Answer: D

Question No. 11

Which two statements are characteristics of a distance vector routing protocol? (Choose two.)

Answer: B, E

Question No. 12

Which two characteristics of a distance-vector routing protocol are true? (Choose two)

Answer: D, E

Question No. 13

Which technology can identify and classify mission-critical applications for path selection?

Answer: C

Question No. 14

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)

Answer: A, D, E

Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar to other packets.

Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.

IP Packet attributes used by NetFlow:

* IP source address

* IP destination address

* Source port

* Destination port

* Layer 3 protocol type

* Class of Service

* Router or switch interface

All packets with the same source/destination IP address, source/destination ports, protocol interface and class of service are grouped into a flow and then packets and bytes are tallied. This methodology of fingerprinting or determining a flow is scalable because a large amount of network information is condensed into a database of NetFlow information called the NetFlow cache.


Question No. 15

Which IPv6 address is the all-router multicast group?

Answer: B

200-105 Dumps Google Drive: (Limited Version!!!)

Related Certification: CCNA Routing & Switching dumps

Facebook Comments