200-101 Dumps

200-101 Free Practice Test

Cisco 200-101: Interconnecting Cisco Networking Devices Part 2 (ICND2)

QUESTION 1

CORRECT TEXT - (Topic 6)
200-101 dumps exhibit
200-101 dumps exhibit
200-101 dumps exhibit
Attention:
In practical examinations, please note the following, the actual information will prevail.
1. Name of the router is xxx
2. Enable secret password is xxx
3. Password In access user EXEC mode using the console is xxx
4. The password to allow telnet access to the router is xxx
5. IP information

Correct Answer: Router>enable
Router#config terminal
Router(config)#hostname Gotha
Gotha(config)#enable secret mi222ke
Gotha(config)#line console 0
Gotha(config-line)#password G8tors1
Gotha(config-line)#exit
Gotha(config)#line vty 0 4
Gotha(config-line)#password dun63lap
Gotha(config-line)#login
Gotha(config-line)#exit
Gotha(config)#interface fa0/0
Gotha(config-if)#no shutdown
Gotha(config-if)#ip address 209.165.201.4 255.255.255.224
Gotha(config)#interface s0/0/0
Gotha(config-if)#ip address 192.0.2.190 255.255.255.240
Gotha(config-if)#no shutdown
Gotha(config-if)#exit
Gotha(config)#router rip
Gotha(config-router)#version 2
Gotha(config-router)#network 209.165.201.0
Gotha(config-router)#network 192.0.2.176
Gotha(config-router)#end
Gotha#copy running-config startup-config

QUESTION 2

- (Topic 2)
Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

Correct Answer: B
What Is Administrative Distance? http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094195.shtml
Administrative distance is the feature that routers use in order to select the best path. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. Lowest Administrative distance will be chosen first.
200-101 dumps exhibit

QUESTION 3

- (Topic 5)
Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?

Correct Answer: B
High-Level Data Link Control (HDLC) - HDLC is the default encapsulation type on point-to- point, dedicated links, and circuit-switched connections. It is used typically when communicating between two Cisco devices. It is a bit-oriented synchronous data link layer protocol.
Point-to-Point Protocol (PPP) - Provides router-to-router and host-to network connections over synchronous and asynchronous circuits. PPP was designed to work with several network layer protocols, such as IP, and IPX. PPP also has built in security mechanisms such as PAP and CHAP X.25/Link Access Procedure, Balanced (LAPB) - ITU-T standard that defines how connections between DTE and DCE are maintained for remote terminal access and computer communications in public data networks. X.25 specifies LAPB, a data line layer protocol. X.25 is a predecessor to Frame Relay.
Frame Relay - Industry standard, switched data link layer protocol that handles multiple virtual circuits. It is a next-generation to X.25 that is streamlined to eliminate some of the time-consuming processes (such as error correction and flow control) that were employed in X.25.
200-101 dumps exhibit

QUESTION 4

- (Topic 5)
What are two enhancements that OSPFv3 supports over OSPFv2? (Choose two.)

Correct Answer: BD

QUESTION 5

- (Topic 6)
What are the benefit of using Netflow? (Choose three.)

Correct Answer: ACD
NetFlow traditionally enables several key customer applications including:
Network Monitoring—NetFlow data enables extensive near real time network monitoring capabilities. Flowbased analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.
Application Monitoring and Profiling—NetFlow data enables network managers to gain a detailed, timebased, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands.
User Monitoring and Profiling—NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.
Network Planning—NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications.
NetFlow will give you valuable information to reduce the cost of operating your network. Security Analysis—NetFlow identifies and classifies DDOS attacks, viruses and worms in
real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents.
Accounting/Billing—NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization.
NetFlow Data Warehousing and Data Mining—NetFlow data (or derived information) can be warehoused for later retrieval and analysis in support of proactive marketing and customerservice programs (e.g. figure out which applications and services are being utilized by internal and external users and target them for improved service, advertising, etc.). In addition, NetFlow data gives Market Researchers access to the "who", "what", "where", and "how long" information relevant to enterprises and service providers.