Free 2014 Cisco 200-101 Dump (21-30) Download!
QUESTION 21
A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. A ping from Host1 to Host2 fails, but the technician is able to ping the S0/0 interface of R2 from Host1. The configurations of the hosts have been verified as correct. What is the cause of the problem?
A. The serial cable on R1 needs to be replaced.
B. The interfaces on R2 are not configured properly.
C. R1 has no route to the 192.168.1.128 network.
D. The IP addressing scheme has overlapping subnetworks.
E. The ip subnet-zero command must be configured on both routers.
Answer: C
Explanation:
Whenever a node needs to send data to another node on a network, it must first know where to send it. If the node cannot directly connect to the destination node, it has to send it via other nodes along a proper route to the destination node. A remote network is a network that can only be reached by sending the packet to another router. Remote networks are added to the routing table using either a dynamic routing protocol or by configuring static routes. Static routes are routes to networks that a network administrator manually configured.So R should have static route for the 192.168.1.128.
QUESTION 22
What does the frame-relay interface-dlci command configure?
A. local DLCI on the subinterface
B. remote DLCI on the main interface
C. remote DCLI on the subinterface
D. local DLCI on the main interface
Answer: A
Explanation:
To assign a data-link connection identifier (DLCI) to a specified Frame Relay subinterface on the router or access server, or to assign a specific permanent virtual circuit (PVC) to a DLCI, or to apply a virtual template configuration for a PPP session, use the frame-relay interface-dlci interface configuration command
QUESTION 23
What can be done to secure the virtual terminal interfaces on a router? (Choose two.)
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
Answer: DE
Explanation:
It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual terminal interfaces via other interfaces -> A is not correct. We can not physically secure a virtual interface because it is “virtual” -> B is not correct. To apply an access list to a virtual terminal interface we must use the “access-class” command. The “access-group” command is only used to apply an access list to a physical interface -> C is not correct; E is correct.
The most simple way to secure the virtual terminal interface is to configure a username & password to prevent unauthorized login -> D is correct.
QUESTION 24
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
A. A new switch has no VLANs configured.
B. Connectivity between VLANs requires a Layer 3 device.
C. VLANs typically decrease the number of collision domains.
D. Each VLAN uses a separate address space.
E. A switch maintains a separate bridging table for each VLAN.
F. VLANs cannot span multiple switches.
Answer: BDE
well-known VLANs (for example: VLAN 1002 for fddi-default; VLAN 1003 for token-ring…) configured by default -> A is not correct.
To communicate between two different VLANs we need to use a Layer 3 device like router or
Layer 3 switch -> B is correct.
VLANs don’t affect the number of collision domains, they are the same -> C is not correct.
Typically, VLANs increase the number of broadcast domains.We must use a different network (or
sub-network) for each VLAN. For example we can use 192.168.1.0/24 for VLAN 1, 192.168.2.0/24 for VLAN 2 -> D is correct.
A switch maintains a separate bridging table for each VLAN so that it can send frame to ports on
the same VLAN only. For example, if a PC in VLAN 2 sends a frame then the switch look-ups its
bridging table and only sends frame out of its ports which belong to VLAN 2 (it also sends this
frame on trunk ports) -> E is correct.
We can use multiple switches to expand VLAN -> F is not correct.
QUESTION 25
The output of the show frame-relay pvc command shows “PVC STATUS = INACTIVE”. What does this mean?
A. The PVC is configured correctly and is operating normally, but no data packets have been detected
for more than five minutes.
B. The PVC is configured correctly, is operating normally, and is no longer actively seeking the address
of the remote router.
C. The PVC is configured correctly, is operating normally, and is waiting for interesting traffic to trigger
a call to the remote router.
D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC
E. The PVC is not configured on the local switch.
Answer: D
Explanation:
The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses:
ACTIVE: the PVC is operational and can transmit dataINACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not availableDELETED:
the PVC is not present and no LMI information is being received from the Frame Relay switch STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen.
QUESTION 26
What command is used to verify the DLCI destination address in a Frame Relay static configuration?
A. show frame-relay pvc
B. show frame-relay lmi
C. show frame-relay map
D. show frame relay end-to-end
Answer: C
Explanation:
This command is used to verify whether the frame-relay inverse-arp command resolved a remote IP address to a local DLCI. Use the show frame-relay map command to display the current map entries and information about the connections.
QUESTION 27
What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?
A. It avoids split-horizon issues with distance vector routing protocols.
B. IP addresses can be conserved if VLSM is not being used for subnetting.
C. A multipoint interface offers greater security compared to point-to-point subinterface configurations.
D. The multiple IP network addresses required for a multipoint interface provide greater addressing flexibility
over point-to-point configurations.
Answer: B
Explanation:
you do not have to assign a separate subnet per sub-interface .if you’re using a Class A network (10.x.x.x/8), you blow the whole network on a few connections (if you used VLSM, you could use a better mask, limit the addresses used). if you used 10.0.0.0/8, you would not be assigning the entire /8 to a single network. You would select a subnet mask for the network and then, you would have to use that mask with all subnets of the network. So if you chose a /24 mask, that would mean that you would have to use a /24 mask for even point-to-point links.
QUESTION 28
Which two statistics appear in show frame-relay map output? (Choose two.)
A. the number of BECN packets that are received by the router
B. the value of the local DLCI
C. the number of FECN packets that are received by the router
D. the status of the PVC that is configured on the router
E. the IP address of the local router
Answer: BD
Explanation:
http://www.cisco.com/en/US/docs/ios/12_2/wan/command/reference/wrffr4.html#wp1029343
QUESTION 29
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?
A. RSA
B. L2TP
C. IPsec
D. PPTP
Answer: C
Explanation:
Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
QUESTION 30
At which layer of the OSI model does PPP perform?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
Answer: A
Explanation:
Point-to-Point Protocol (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption (using ECP, RFC 1968), and compression.
If you want to pass the Cisco 200-101 Exam sucessfully, recommend to read latest Cisco 200-101 Dumpfull version.