This page was exported from Braindump2go Free Exams VCE and PDF [ ] Export date:Mon Aug 19 20:19:39 2019 / +0000 GMT ___________________________________________________ Title: [20th/11/2017]200-105 Exam Questions and Answers(Full Version)497Q Download in Braindump2go[239-250] --------------------------------------------------- 2017 November New 200-105 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 200-105 Questions:1.|2017 New 200-105 Exam Dumps (PDF & VCE) 497Q&As Download:|2017 New 200-105 Exam Questions & Answers Download: 239Which router command can be used to verify the type of cable connected to interface serial 0/0?A. show running-configB. show controllers serial 0/0C. show interfaces serial 0/0D. show ip interface serial 0/0Answer: BQUESTION 240Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?A. transport output allB. transport preferred allC. transport type allD. transport input allAnswer: DQUESTION 241Refer to the exhibit. A network technician enters the following line into the router.Tidmore1(config)# access-list 106 deny tcp any eq wwwWhat is the effect of this configuration?A. The change has no effect on the packets being filtered.B. All traffic from the LAN to the Internet is permitted.C. Web pages from the Internet cannot be accessed by hosts in the LAN.D. No hosts in the LAN except can access web pages from the Internet.Answer: AQUESTION 242Refer to the exhibit. What statement is true of the configuration for this network?A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.C. The number 1 referred to in the ip nat inside source command references access-list number 1.D. ExternalRouter must be configured with static routes to networks and CQUESTION 243Refer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?A. ACDBB. BADCC. DBACD. CDBAAnswer: DQUESTION 244A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks,,, and only. Which two ACL statements, when combined, are the best for accomplishing this task? (Choose two.)A. access-list 10 permit ip access-list 10 permit ip access-list 10 permit ip access-list 10 permit ip access-list 10 permit ip access-list 10 permit ip ACQUESTION 245In which solution is a router ACL used?A. filtering packets that are passing through a routerB. to change the default administrative distance of a route in the route tableC. protecting a server from unauthorized accessD. controlling path selection, based on the route metricAnswer: AQUESTION 246Which IPsec security protocol should be used when confidentiality is required?A. MD5B. PSKC. AHD. ESPAnswer: DQUESTION 247A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)A. The network administrator can apply port security to dynamic access ports.B. The network administrator can apply port security to EtherChannels.C. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.D. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.E. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.Answer: CDExplanation:Follow these guidelines when configuring port security:Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports.A secure port cannot be a dynamic access port.A secure port cannot be a destination port for Switched Port Analyzer (SPAN).A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group. You cannot configure static secure or sticky secure MAC addresses on a voice VLAN. When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two.If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN.When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.The switch does not support port security aging of sticky secure MAC addresses.The protect and restrict options cannot be simultaneously enabled on an interface.QUESTION 248What are two characteristics of a switch that is configured as a VTP client? (Choose two.)A. If a switch that is configured to operate in client mode cannot access a VTP server, then the switch reverts to transparent mode.B. On switches that are configured to operate in client mode, VLANs can be created, deleted, or renamed locally.C. The local VLAN configuration is updated only when an update that has a higher configuration revision number is received.D. VTP advertisements are not forwarded to neighboring switches that are configured in VTP transparent mode.E. VTP client is the default VTP mode.F. When switches in VTP client mode are rebooted, they send a VTP advertisement request to the VTP servers.Answer: CFExplanation:VLAN Trunking Protocol (VTP) ModesServer Mode Once VTP is configured on a Cisco switch, the default mode used is Server Mode. In any given VTP management domain, at least one switch must be in Server Mode. When in Server Mode, a switch can be used to add, delete, and modify VLANs, and this information will be passed to all other switches in the VTP management domain. Client Mode When a switch is configured to use VTP Client Mode, it is simply the recipient of any VLANs added, deleted, or modified by a switch in Server Mode within the same management domain. A switch in VTP client mode cannot make any changes to VLAN information.Transparent Mode A switch in VTP Transparent Mode will pass VTP updates received by switches in Server Mode to other switches in the VTP management domain, but will not actually process the contents of these messages. When individual VLANs are added, deleted, or modified on a switch running in transparent mode, the changes are local to that particular switch only, and are not passed to other switches in the VTP management domain.QUESTION 249Which two data link layers are supported by Cisco IOS Software for IPv6? (Choose two.)A. FDDIB. PPPC. NBMAD. Frame Relay SVCE. Frame Relay PVCAnswer: BEQUESTION 250Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.)A. SW1#show port-secure interface FastEthernet 0/12B. SW1#show switchport port-secure interface FastEthernet 0/12C. SW1#show running-configD. SW1#show port-security interface FastEthernet 0/12E. SW1#show switchport port-security interface FastEthernet 0/12Answer: CD!!!RECOMMEND!!!1.|2017 New 200-105 Exam Dumps (PDF & VCE) 497Q&As Download:|2017 New 200-105 Study Guide Video; YouTube Video: --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-11-20 03:29:18 Post date GMT: 2017-11-20 03:29:18 Post modified date: 2017-11-20 03:29:18 Post modified date GMT: 2017-11-20 03:29:18 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from