Our preparation material has guided multiple candidates to pass this exam. Your success is also not so far by using DumpsSchool 200-105 exam dumps.
Question No. 1
You work as a network engineer for SASCOM Network Ltd company. On router HQ, a provider link has been
enabled and you must configure an IPv6 default route on HQ and make sure that this route is advertised in
IPv6 OSPF process. Also, you must troubleshoot another issue. The router HQ is not forming an IPv6 OSPF
neighbor relationship with router BR.
Two routers HQ and BR are connected via serial links.
Router HQ has interface Ethernet0/1 connected to the provider cloud and interface Ethernet0/0 connected to
Router BR has interface Ethernet 0/0 connected to another router RA2.
IPv6 Routing Details
Ail routers are running IPv6 OSPF routing with process ID number 100 Refer to the topology diagram for
information about the OSPF areas The Loopback 0 IPv4 address is the OSPF router ID on each router
Special Note: To gain the maximum number of points, you must complete the necessary configurations and
fix IPv6 OSPF neighbor issue with router BR IPv6 OSPFv3 must be configured without using address families.
Do not change the IPv6 OSPF process ID.
Question No. 2
Which protocol is a Cisco proprietary implementation of STP?
Question No. 3
Refer to the exhibit.
RTA is configured with a basic configuration. The link between the two routers is operational and no routing protocols are configured on either router. The line shown in the exhibit is then added to router RTA. Should interface Fa0/0 on router RTB shut down, what effect will the shutdown have on router RTA?
Static routes remain in the routing table even if the specified gateway becomes unavailable. If the specified gateway becomes unavailable, you need to remove the static route from the routing table manually. However, static routes are removed from the routing table if the specified interface goes down, and are reinstated when the interface comes back up. Therefore the static route will only be removed from the routing table if the S0/0 interface on RTA is shutdown.
Question No. 4
Which type of attack can be mitigated by configuring the default native VLAN to be unused?
Question No. 5
At which layer of the OSI model does PPP perform?
Question No. 6
Which two steps must you perform on each device that is configured for ipv4 routing before you implement
OSPFv3? (Choose two.)
Question No. 7
Refer to the exhibit. A technician is testing connection problems in the internetwork. What is the problem
indicated by the output from HostA?
Question No. 8
Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied
to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet
172.21.1.128/28) from accessing the network. But as is, the ACL does not restrict anyone from the network.
How can the ACL statements be re-arranged so that the system works as intended?
Question No. 9
Which statement describes VRRP object tracking?
VRRP object tracking provides a way to ensure the best VRRP router is virtual router master for the group by altering VRRP priorities to the status of tracked objects such as interface or IP route states.
Question No. 10
Which command do you enter to permit IPv6 functionality on an EIGRPv3 interface?
Question No. 11
You attempt to execute the APIC-EM ACL path trace feature without specifying the protocol. How does the
ACL path trace respond?
Question No. 12
Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)
Understanding and Configuring PPP CHAP Authentication
One-Way and Two-Way Authentication
CHAP is defined as a one-way authentication method. However, you use CHAP in both directions to create a two-way authentication. Hence, with two-way CHAP, a separate three-way handshake is initiated by each side. In the Cisco CHAP implementation, by default, the called party must authenticate the calling party (unless authentication is completely turned off). Therefore, a one-way authentication initiated by the called party is the minimum possible authentication. However, the calling party can also verify the identity of the called party, and this results in a two-way authentication.
One-way authentication is often required when you connect to non-Cisco devices.
Question No. 13
What is one benefit of PVST+?
Per VLAN Spanning Tree (PVST)
Per VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in the network. This means a switch can be the root bridge of a VLAN while another switch can be the root bridge of other VLANs in a common topology. For example, Switch 1 can be the root bridge for Voice data while Switch 2 can be the root bridge for Video data. If designed correctly, it can optimize the network traffic.