Free 2014 Latest Cisco 200-120 Dump (51-60) Download!

QUESTION 51
On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?

A.    a router with subinterfaces configured on the physical interface that is connected to the switch
B.    a router with an IP address on the physical interface connected to the switch
C.    a switch with an access link that is configured between the switches
D.    a switch with a trunk link that is configured between the switches

Answer: A
Explanation:
Different VLANs can’t communicate with each other , they can communicate with the help of Layer3 router. Hence , it is needed to connect a router to a switch , then make the sub-interface on the router to connect to the switch, establishing Trunking links to achieve communications of devices which belong to different VLANs.
When using VLANs in networks that have multiple interconnected switches, you need to use VLAN trunking between the switches. With VLAN trunking, the switches tag each frame sent between switches so that the receiving switch knows to what VLAN the frame belongs. End user devices connect to switch ports that provide simple connectivity to a single VLAN each. The attached devices are unaware of any VLAN structure.
By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch.
Here is the example of configuring the router for inter-vlan communication RouterA(config)#int f0/0.1
RouterA(config-subif)#encapsulation ?
dot1Q IEEE 802.1Q Virtual LAN
RouterA(config-subif)#encapsulation dot1Q or isl VLAN ID RouterA(config-subif)# ip address x.x.x.x y.y.y.y

QUESTION 52
Which command displays CPU utilization?

A.    show protocols
B.    show process
C.    show system
D.    show version

Answer: B
Explanation:
The “show process” (in fact, the full command is “show processes”) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted)

clip_image002
A more friendly way to check the CPU utilization is the command “show processes cpu history”, in which the total CPU usage on the router over a period of time: one minute, one hour, and 72 hours are clearly shown:

clip_image002[4]
+ The Y-axis of the graph is the CPU utilization.+ The X-axis of the graph is the increment within the period displayed in the graph
For example, from the last graph (last 72 hours) we learn that the highest CPU utilization within 72 hours is 37% about six hours ago.

QUESTION 53
What two things will a router do when running a distance vector routing protocol? (Choose two.)

A.    Send periodic updates regardless of topology changes.
B.    Send entire routing table to all routers in the routing domain.
C.    Use the shortest-path algorithm to the determine best path.
D.    Update the routing table based on updates from their neighbors.
E.    Maintain the topology of the entire network in its database.

Answer: AD
Explanation:
Distance means how far and Vector means in which direction. Distance Vector routing protocols pass periodic copies of routing table to neighbor routers and accumulate distance vectors. In distance vector routing protocols, routers discover the best path to destination from each neighbor. The routing updates proceed step by step from router to router.

QUESTION 54
Which command is used to display the collection of OSPF link states?

A.    show ip ospf link-state
B.    show ip ospf lsa database
C.    show ip ospf neighbors
D.    show ip ospf database

Answer: D
Explanation:
The “show ip ospf database” command displays the link states. Here is an example:
Here is the lsa database on R2.
R2#show ip ospf database
OSPF Router with ID (2.2.2.2) (Process ID 1)
Router Link States (Area 0)
Link ID ADV Router Age Seq# Checksum Link count2.2.2.2 2.2.2.2 793 0x80000003 0x004F85 210.4.4.4 10.4.4.4 776 0x80000004 0x005643 1111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA 2133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0)
Link ID ADV Router Age Seq# Checksum10.1.1.1 111.111.111.111 794 0x80000001 0x001E8B10.2.2.3 133.133.133.133 812 0x80000001 0x004BA910.4.4.1 111.111.111.111 755 0x80000001 0x007F1610.4.4.3 133.133.133.133 775 0x80000001 0x00C31F

QUESTION 55
If IP routing is enabled, which two commands set the gateway of last resort to the default gateway? (Choose two.)

A.    ip default-gateway 0.0.0.0
B.    ip route 172.16.2.1 0.0.0.0 0.0.0.0
C.    ip default-network 0.0.0.0
D.    ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E.    ip route 0.0.0.0 0.0.0.0 172.16.2.1

Answer: CE
Explanation:
Both the “ip default-network” and “ip route 0.0.0.0 0.0.0.0 (next hop)” commands can be used to set the default gateway in a Cisco router.

QUESTION 56
Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

A.    hop count
B.    administrative distance
C.    link bandwidth
D.    link delay
E.    link cost

Answer: B
Explanation:
By default the administrative distance of a static route is 1, meaning it will be preferred over all dynamic routing protocols. If you want to have the dynamic routing protocol used and have the static route be used only as a backup, you need to increase the AD of the static route so that it is higher than the dynamic routing protocol.

QUESTION 57
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.)

A.    the amount of available ROM
B.    the amount of available flash and RAM memory
C.    the version of the bootstrap software present on the router
D.    show version
E.    show processes
F.    show running-config

Answer: BD
Explanation:
When upgrading new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.

QUESTION 58
Which command reveals the last method used to powercycle a router?

A.    show reload
B.    show boot
C.    show running-config
D.    show version

Answer: D
Explanation:
The “show version” command can be used to show the last method to powercycle (reset) a router

clip_image001

QUESTION 59
Which command would you use on a Cisco router to verify the Layer 3 path to a host?

A.    tracert address
B.    traceroute address
C.    telnet address
D.    ssh address

Answer: B
Explanation:
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and
measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. Traceroute proceeds unless all (three) sent packets are lost more than twice, then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.

QUESTION 60
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A.    hello packets
B.    SAP messages sent by other routers
C.    LSAs from other routers
D.    beacons received on point-to-point links
E.    routing tables received from other link-state routers
F.    TTL packets from designated routers

Answer: AC
Explanation:
Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.
After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA is copied and forwarded to every neighbor except the one that sent the LSA.

If you want to pass the Cisco 200-120 Exam sucessfully, recommend to read latest Cisco 200-120 Dump full version.

clip_image001

Free 2014 Latest Cisco 200-120 Dump (41-50) Download!

QUESTION 41
How is an EUI-64 format interface ID created from a 48-bit MAC address?

A.    by appending 0xFF to the MAC address
B.    by prefixing the MAC address with 0xFFEE
C.    by prefixing the MAC address with 0xFF and appending 0xFF to it
D.    by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address
E.    by prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes

Answer: D
Explanation:
The modified EUI-64 format interface identifier is derived from the 48-bit link-layer (MAC) address by inserting the hexadecimal number FFFE between the upper three bytes (OUI field) and the lower three bytes (serial number) of the link layer address.

QUESTION 42
Which option is a valid IPv6 address?

A.    2001:0000:130F::099a::12a
B.    2002:7654:A1AD:61:81AF:CCC1
C.    FEC0:ABCD:WXYZ:0067::2A4
D.    2004:1:25A4:886F::1

Answer: D
Explanation:
An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The leading 0’s in a group can be collapsed using ::, but this can only be done once in an IP address.

QUESTION 43
Which three are characteristics of an IPv6 anycast address? (Choose three.)

A.    one-to-many communication model
B.    one-to-nearest communication model
C.    any-to-many communication model
D.    a unique IPv6 address for each device in the group
E.    the same address for multiple devices in the group
F.    delivery of packets to the group interface that is closest to the sending device

Answer: BEF
Explanation:
A new address type made specifically for IPv6 is called the Anycast Address. These IPv6 addresses are global addresses, these addresses can be assigned to more than one interface unlike an IPv6 unicast
address. Anycast is designed to send a packet to the nearest interface that is apart of that anycast group.
The sender creates a packet and forwards the packet to the anycast address as the destination address which goes to the nearest router. The nearest router or interface is found by using the metric of a routing protocol currently running on the network. However in a LAN setting the nearest interface is found depending on the order the neighbors were learned. The anycast packet in a LAN setting forwards the packet to the neighbor it learned about first.

QUESTION 44
A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme? (Choose two.)

A.    255.255.255.0
B.    255.255.255.128
C.    255.255.252.0
D.    255.255.255.224
E.    255.255.255.192
F.    255.255.248.0

Answer: BE
Explanation:
Subnetting is used to break the network into smaller more efficient subnets to prevent excessive rates of Ethernet packet collision in a large network. Such subnets can be arranged hierarchically, with the organization’s network address space (see also Autonomous System) partitioned into a tree-like structure. Routers are used to manage traffic and constitute borders between subnets. A routing prefix is the sequence of leading bits of an IP address that precede the portion of the address used as host identifier. In IPv4 networks, the routing prefix is often expressed as a “subnet mask”, which is a bit mask covering the number of bits used in the prefix. An IPv4 subnet mask is frequently expressed in quad-dotted decimal representation, e.g., 255.255.255.0 is the subnet mask for the 192.168.1.0 network with a 24-bit routing prefix (192.168.1.0/24).

QUESTION 45
Which IPv6 address is the all-router multicast group?

A.    FF02::1
B.    FF02::2
C.    FF02::3
D.    FF02::4

Answer: B
Explanation:
Well-known IPv6 multicast addresses:
Address
Description
ff02::1
All nodes on the local network segment
ff02::2
All routers on the local network segment

QUESTION 46
Which IPv6 address is valid?

A.    2001:0db8:0000:130F:0000:0000:08GC:140B
B.    2001:0db8:0:130H::87C:140B
C.    2031::130F::9C0:876A:130B
D.    2031:0:130F::9C0:876A:130B

Answer: D
Explanation:
An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The leading 0’s in a group can be collapsed using ::, but this can only be done once in an IP address.

QUESTION 47
Which command can you use to manually assign a static IPv6 address to a router interface?

A.    ipv6 autoconfig 2001:db8:2222:7272::72/64
B.    ipv6 address 2001:db8:2222:7272::72/64
C.    ipv6 address PREFIX_1 ::1/64
D.    ipv6 autoconfig

Answer: B
Explanation:
To assign an IPv6 address to an interface, use the “ipv6 address” command and specify the IP address you wish to use.

QUESTION 48
Which of these represents an IPv6 link-local address?

A.    FE80::380e:611a:e14f:3d69
B.    FE81::280f:512b:e14f:3d69
C.    FEFE:0345:5f1b::e14d:3d69
D.    FE08::280e:611:a:f14f:3d69

Answer: A
Explanation:
In the Internet Protocol Version 6 (IPv6), the address block fe80::/10 has been reserved for link- local unicast addressing. The actual link local addresses are assigned with the prefix fe80::/64. They may be assigned by automatic (stateless) or stateful (e.g. manual) mechanisms.

QUESTION 49
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?

A.    10.10.0.0/16 subnetted with mask 255.255.255.252
B.    10.10.0.0/18 subnetted with mask 255.255.255.252
C.    10.10.1.0/24 subnetted with mask 255.255.255.252
D.    10.10.0.0/23 subnetted with mask 255.255.255.252
E.    10.10.1.0/25 subnetted with mask 255.255.255.252

Answer: D
Explanation:
We need 113 point-to-point links which equal to 113 sub-networks < 128 so we need to borrow 7 bits (because 2^7 = 128).
The network used for point-to-point connection should be /30.
So our initial network should be 30 ?7 = 23.
So 10.10.0.0/23 is the correct answer.
You can understand it more clearly when writing it in binary form:
/23 = 1111 1111.1111 1110.0000 0000
/30 = 1111 1111.1111 1111.1111 1100 (borrow 7 bits)

QUESTION 50
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

A.    It checks the configuration register.
B.    It attempts to boot from a TFTP server.
C.    It loads the first image file in flash memory.
D.    It inspects the configuration file in NVRAM for boot instructions.

Answer: A
Explanation:
Default (normal) Boot SequencePower on Router – Router does POST – Bootstrap starts IOS load – Check configuration registerto see what mode the router should boot up in (usually 0x2102
to read startup-config in NVRAM / or 0x2142 to start in “setup-mode”) – check the startup-config file in NVRAM for boot-system commands – load IOS from Flash.

If you want to pass the Cisco 200-120 Exam sucessfully, recommend to read latest Cisco 200-120 Dump full version.

clip_image001

Free 2014 Latest Cisco 200-120 Dump (31-40) Download!

QUESTION 31
Three switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?

A.    the switch with the highest MAC address
B.    the switch with the lowest MAC address
C.    the switch with the highest IP address
D.    the switch with the lowest IP address

Answer: B
Explanation:
Each switch in your network will have a Bridge ID Priority value, more commonly referred to as a BID. This BID is a combination of a default priority value and the switch’s MAC address, with the priority value listed first. The lowest BID will win the election process.
For example, if a Cisco switch has the default priority value of 32,768 and a MAC address of 11- 22-33-44-55-66, the BID would be 32768:11-22-33-44-55-66. Therefore, if the switch priority is left at the default, the MAC address is the deciding factor in the root bridge election.

QUESTION 32
What are three advantages of VLANs? (Choose three.)

A.    VLANs establish broadcast domains in switched networks.
B.    VLANs utilize packet filtering to enhance network security.
C.    VLANs provide a method of conserving IP addresses in large networks.
D.    VLANs provide a low-latency internetworking alternative to routed networks.
E.    VLANs allow access to network services based on department, not physical location.
F.    VLANs can greatly simplify adding, moving, or changing hosts on the network.

Answer: AEF
Explanation:
VLAN technology is often used in practice, because it can better control layer2 broadcast to improve network security. This makes network more flexible and scalable. Packet filtering is a function of firewall instead of VLAN.

QUESTION 33
Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two.)

A.    reduces routing table entries
B.    auto-negotiation of media rates
C.    efficient utilization of MAC addresses
D.    dedicated communications between devices
E.    ease of management and troubleshooting

Answer: AE
Explanation:
Here are some of the benefits of hierarchical addressing:
Reference: http://www.ciscopress.com/articles/article.asp?p=174107

QUESTION 34
What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?

A.    B514 : 82C3 : 0029 : EC7A : EC72
B.    B514 : 82C3 :: 0029 : EC7A : EC72
C.    B514 : 82C3 : 0029 :: EC7A : 0000 : EC72
D.    B514 : 82C3 :: 0029 : EC7A : 0 : EC72

Answer: D
Explanation:
There are two ways that an IPv6 address can be additionally compressed: compressing leading
zeros and substituting a group of consecutive zeros with a single double colon (::). Both of these can be used in any number of combinations to notate the same address. It is important to note that the double colon (::) can only be used once within a single IPv6 address notation. So, the extra 0’s can only be compressed once.

QUESTION 35
Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)

A.    Global addresses start with 2000::/3.
B.    Link-local addresses start with FE00:/12.
C.    Link-local addresses start with FF00::/10.
D.    There is only one loopback address and it is ::1.
E.    If a global address is assigned to an interface, then that is the only allowable address for the interface.

Answer: AD
Explanation:
Below is the list of common kinds of IPv6 addresses:
QUESTION 36
The network administrator has been asked to give reasons for moving from IPv4 to IPv6. What are two valid reasons for adopting IPv6 over IPv4? (Choose two.)

A.    no broadcast
B.    change of source address in the IPv6 header
C.    change of destination address in the IPv6 header
D.    Telnet access does not require a password
E.    autoconfiguration
F.    NAT

Answer: AE
Explanation:
IPv6 does not use broadcasts, and autoconfiguration is a feature of IPV6 that allows for hosts to automatically obtain an IPv6 address.

QUESTION 37
An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?

A.    IP address: 192.168.20.14
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.9
B.    IP address: 192.168.20.254
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.20.1
C.    IP address: 192.168.20.30
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.25
D.    IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.17
E.    IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.25

Answer: C
Explanation:
For the 192.168.20.24/29 network, the usable hosts are 192.168.24.25 (router) ?192.168.24.30 (used for the sales server).

QUESTION 38
Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?

A.    0.0.0.240
B.    255.255.255.252
C.    255.255.255.0
D.    255.255.255.224
E.    255.255.255.240

Answer: D
Explanation:
For a class C network, a mask of 255.255.255.224 will allow for up to 8 networks with 32 IP addresses each (30 usable).

QUESTION 39
How many bits are contained in each field of an IPv6 address?

A.    24
B.    4
C.    8
D.    16

Answer: D
Explanation:
An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

QUESTION 40
What are three approaches that are used when migrating from an IPv4 addressing scheme to an IPv6 scheme. (Choose three.)

A.    enable dual-stack routing
B.    configure IPv6 directly
C.    configure IPv4 tunnels between IPv6 islands
D.    use proxying and translation to translate IPv6 packets into IPv4 packets
E.    statically map IPv4 addresses to IPv6 addresses
F.    use DHCPv6 to map IPv4 addresses to IPv6 addresses

Answer: ACD
Explanation:
Several methods are used terms of migration including tunneling, translators, and dual stack. Tunnels are used to carry one protocol inside another, while translators simply translate IPv6 packets into IPv4 packets. Dual stack uses a combination of both native IPv4 and IPv6. With dual stack, devices are able to run IPv4 and IPv6 together and if IPv6 communication is possible that is the preferred protocol. Hosts can simultaneously reach IPv4 and IPv6 content.

If you want to pass the Cisco 200-120 Exam sucessfully, recommend to read latest Cisco 200-120 Dump full version.

clip_image001