Cisco 200-105 Exam Dumps

If you are fed up with invalid exam materials, then get DumpsSchool Cisco 200-105 exam dumps and makes sure your success.

Try it Latest DumpsSchool 200-105 Exam dumps. Buy Full File here: (691 As Dumps)

Download the DumpsSchool 200-105 braindumps from Google Drive: (FREE VERSION!!!)

Question No. 1

Refer to the exhibit.

Which address range efficiently summarizes the routing table of the addresses for router Main?

Answer: B

Question No. 2

Refer to the exhibit.

The company uses EIGRP as the routing protocol. What path will packets take from a host on network to a host on the LAN attached to router R1?

R3# show ip route

Gateway of last resort is not set

192 168.20.0/24 is variably subnetted, 6 subnets, 2 masks

D [90/2195456] via, 00:03:31, Serial0/0

D [90/2681856] via, 00:03:31, Serial0/0

C is directly connected, Serial0/1

C is directly connected, Serial0/0

C is directly connected, FastEthernet0/0

D [90/2195456] via,00:03:31, Serial0/1

Answer: D—EIGRP-Common-Question.php

Looking at the output display above, the LAN attached to router R1 belongs to subnet and learned this network via which will be an IP address in sub-network. This means that packets destined for will be routed from R3 to R1.

Question No. 3

Refer to the exhibit.

What is the result of setting the no login command?

Answer: A

Question No. 4

Lab – Access List Simulation

A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed.

The task is to create and apply a numbered access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted.

Access to the router CLI can be gained by clicking on the appropriate host.

All passwords have been temporarily set to ‘cisco’.

The Core connection uses an IP address of

The computers in the Hosts LAN have been assigned addresses of —

Host A

Host B

Host C

Host D

The servers in the Server LAN have been assigned addresses of —

The Finance Web Server is assigned an IP address of

The Public Web Server is assigned an IP address of

Answer: A

Select the console on Corp1 router

Configuring ACL


Corp1#configure terminal

Comment: To permit only Host C (192. 168. 33. 3){source addr} to access finance server address (172.

22.242. 23){destination addr} on port number 80 (web) Corp1(config)# access-list 100 permit tcp host host eq 80

Comment: To deny any source to access finance server address (172. 22. 242. 23) {destination addr} on port number 80 (web)

Corp1(config)# access-list 100 deny tcp any host eq 80

Comment: To permit ip protocol from any source to access any destination because of the implicit deny any any statement at the end of ACL.

Corp1(config)# access-list 100 permit ip any any

Applying the ACL on the Interface

Comment: Check show ip interface brief command to identify the interface type and number by checking the IP address configured.

Corp1(config)#interface fa 0/1

If the ip address configured already is incorrect as well as the subnet mask. this should be corrected in order ACL to work type this commands at interface mode :

no ip address 192. x. x. x 255. x. x. x (removes incorrect configured ip address and subnet mask) Configure

Correct IP Address and subnet mask :

ip address 172. 22. 242. 30 255. 255. 255. 240 ( range of address specified going to server is given as 172.

22. 242. 17 172. 22. 242. 30 )

Comment: Place the ACL to check for packets going outside the interface towards the finance web server.

Corp1(config-if)#ip access-group 100 out


Important: To save your running config to startup before exit.

Corp1#copy running-config startup-config

Verifying the Configuration :

Step1: Show ip interface brief command identifies the interface on which to apply access list . Step2: Click on each host A, B, C & D . Host opens a web browser page , Select address box of the web browser and type the

ip address of finance web server(172. 22. 242. 23) to test whether it permits /deny access to the finance web Server.

Question No. 5

What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)

Answer: B, C

Configuring Frame Relay Subinterfaces

On partially meshed Frame Relay networks, the problem of split horizon can be overcome by using Frame Relay subinterfaces. Frame Relay provides a mechanism to allow a physical interface to be partitioned into multiple virtual interfaces. In a similar way, using subinterfaces allows a partially meshed network to be divided into a number of smaller, fully meshed point-to-point networks. Generally, each point-to-point subnetwork is assigned a unique network address. This allows packets received on one physical interface to be sent out from the same physical interface, albeit forwarded on VCs in different subinterfaces.

There are two types of subinterfaces supported by Cisco routers: point-to-point and multipoint subinterfaces.

Question No. 6

What is the effect of the switchport voice vlan 20 command?

Answer: A

Question No. 7

Refer to the exhibit

While you troubleshoot a connectivity issue to a PC behind R1, you enter the show access-lists command to generate this output. Which reason for the problem is most likely true?

Answer: D

Question No. 8

For which type of connection is broadband PPPoE most appropriate?

Answer: B

Question No. 9

While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?

Answer: A

Initiate a ping from an end device in one VLAN to the interface VLAN on another VLAN in order to verify that the switch routes between VLANs. In this example, ping from VLAN 2 ( to Interface VLAN 3 ( or Interface VLAN 10 ( If the ping fails, verify that IP routing is enabled and that the VLAN interfaces status is up with the show ip interface briefcommand.

Question No. 10

Refer to the exhibit.

RTA is configured with a basic configuration. The link between the two routers is operational and no routing protocols are configured on either router. The line shown in the exhibit is then added to router RTA. Should interface Fa0/0 on router RTB shut down, what effect will the shutdown have on router RTA?

Answer: A

Static routes remain in the routing table even if the specified gateway becomes unavailable. If the specified gateway becomes unavailable, you need to remove the static route from the routing table manually. However, static routes are removed from the routing table if the specified interface goes down, and are reinstated when the interface comes back up. Therefore the static route will only be removed from the routing table if the S0/0 interface on RTA is shutdown.

Question No. 11

Refer to the exhibit.

At the end of an RSTP election process, which access layer switch port will assume the discarding role?

Answer: C

In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4.

Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior than another if it has:

1. A lower Root Bridge ID

2. A lower path cost to the Root

3. A lower Sending Bridge ID

4. A lower Sending Port ID

These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role)

Question No. 12

Which WAN technology is secure and encrypted by default?

Answer: A

Question No. 13

Which interior routing protocol reduces the size of route tables by advertising default routes for all destinations

outside of the default area?

Answer: A

Question No. 14

What can be done to Frame Relay to resolve split-horizon issues?(Choose two.)

Answer: B, D

IP split horizon checking is disabled by default for Frame Relay encapsulation to allow routing updates to go in and out of the same interface. An exception is the Enhanced Interior Gateway Routing Protocol (EIGRP) for which split horizon must be explicitly disabled.

Certain protocols such as AppleTalk, transparent bridging, and Internetwork Packet Exchange (IPX) cannot be supported on partially meshed networks because they require split horizon to be enabled (a packet received on an interface cannot be transmitted over the same interface, even if the packet is received and transmitted on different virtual circuits).

Configuring Frame Relay subinterfaces ensures that a single physical interface is treated as multiple virtual interfaces. This capability allows you to overcome split horizon rules so packets received on one virtual interface can be forwarded to another virtual interface, even if they are configured on the same physical interface.

200-105 Dumps Google Drive: (Limited Version!!!)

Related Certification: CCNA Routing & Switching dumps