200 105 Test Certification}

200-105 Test Certification

by

Judith M. Ehlers

Question: 1

Which statement about QoS default behavior is true?

A. Ports are untrusted by default.

B. VoIP traffic is passed without being tagged.

C. Video traffic is passed with a well-known DSCP value of 46.

D. Packets are classified internally with an environment.

E. Packets that arrive with a tag are untagged at the edge of an administrative domain.

Answer: E

Frames received from users in the administratively-defined VLANs are classified or tagged for transmission to other devices. Based on rules that you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is sent to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames.

For IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used.

Each port on the switch has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or CMS. A tagged frame continues to use its assigned CoS value when it passes through the ingress port.

Question: 2

Refer to the exhibit.

Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency? (Choose two.)

A. Set the subnet mask on edge-1 to 255 255.255.252.

B. Reduce the MTU on edge-1 to 1514.

C. Set the OSPF cost on edge-1 to 1522.

D. Reduce the MTU on edge-1 to 1500.

E. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface.

Answer: D, E

A situation can occur where the interface MTU is at a high value, for example 9000, while the real value of the size of packets that can be forwarded over this interface is 1500.

If there is a mismatch on MTU on both sides of the link where OSPF runs, then the OSPF adjacency will not form because the MTU value is carried in the Database Description (DBD) packets and checked on the other side.

Question: 3

Which statement about MPLS is true?

A. It operates in Layer 1.

B. It operates between Layer 2 and Layer 3.

C. It operates in Layer 3.

D. it operates in Layer 2.

Answer: B

MPLS belongs to the family of packet-switched networks. MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

Question: 4

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Answer: A

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.

Question: 5

Which two switch states are valid for 802.1w? (Choose two.)

A. listening

B. backup

C. disabled

D. learning

E. discarding

Answer: D, E

Port States

There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w discarding state.

Question: 6

Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?

A. It reduces the need for a backup data center.

B. It can redirect user requests to locations that are using fewer network resources.

C. It enables the ISP to maintain DNS records automatically.

D. It eliminates the need for a GSS.

Answer: B

Question: 7

Which identification number is valid for an extended ACL?

A. 1

B. 64

C. 99

D. 100

E. 299

F. 1099

Answer: D

Question: 8

Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)

A. the type of cable that is connected to the interface.

B. The uptime of the interface

C. the status of the physical layer of the interface

D. the full configuration of the interface

E. the interface’s duplex settings

Answer: A, C

The show controller command provides hardware-related information useful to troubleshoot and diagnose issues with Cisco router interfaces. The Cisco 12000 Series uses a distributed architecture with a central command-line interface (CLI) at the Gigabit Route Processor (GRP) and a local CLI at each line card.

Question: 9

Which three options are the HSRP states for a router? (Choose three.)

A. initialize

B. learn

C. secondary

D. listen

E. speak

F. primary

Answer: B, D, E

HSRP States

Question: 10

While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?

A. show ip interface brief

B. show ip nat statistics

C. show ip statistics

D. show ip route

Answer: A

Initiate a ping from an end device in one VLAN to the interface VLAN on another VLAN in order to verify that the switch routes between VLANs. In this example, ping from VLAN 2 (10.1.2.1) to Interface VLAN 3 (10.1.3.1) or Interface VLAN 10 (10.1.10.1). If the ping fails, verify that IP routing is enabled and that the VLAN interfaces status is up with the show ip interface brief command.

Question: 11

Which protocol authenticates connected devices before allowing them to access the LAN?

A. 802.1d

B. 802.11

C. 802.1w

D. 802.1x

Answer: D

Explanation:

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term ‘supplicant’ is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicants identity has been validated and authorized. An analogy to this is providing a valid visa at the airport’s arrival immigration before being allowed to enter the country. With 802.1X port-based authentication, the supplicant provides credentials, such as user name/password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.

Question: 12

What is a difference between TACACS+ and RADIUS in AAA?

A. Only TACACS+ allows for separate authentication.

B. Only RADIUS encrypts the entire access-request packet.

C. Only RADIUS uses TCP.

D. Only TACACS+ couples authentication and authorization.

Answer: A

Authentication and Authorization

RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization.

TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still use TACACS+ for authorization and accounting. For example, with TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information.

During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism.

Question: 13

Which statement about the IP SLAs ICMP Echo operation is true?

A. The frequency of the operation .s specified in milliseconds.

B. It is used to identify the best source interface from which to send traffic.

C. It is configured in enable mode.

D. It is used to determine the frequency of ICMP packets.

Answer: D

This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices using IPv4 or IPv6. ICMP Echo is useful for troubleshooting network connectivity issues. This module also demonstrates how the results of the ICMP Echo operation can be displayed and analyzed to determine how the network IP connections are performing.

ICMP Echo Operation

The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP. Response time is computed by measuring the time taken between sending an ICMP Echo request message to the destination and receiving an ICMP Echo reply.

In the figure below ping is used by the ICMP Echo operation to measure the response time between the source IP SLAs device and the destination IP device. Many customers use IP SLAs ICMP-based operations, in-house ping testing, or ping-based dedicated probes for response time measurements.

Figure 1. ICMP Echo Operation

The IP SLAs ICMP Echo operation conforms to the same IETF specifications for ICMP ping testing and the two methods result in the same response times.

Configuring a Basic ICMP Echo Operation on the Source Device

SUMMARY STEPS

1. enable

2. configure terminal

3. ip sla operation-number

4. icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} | source-interface interface-name]

5. frequency seconds

6. end

Question: 14

Which type of interface can negotiate an IP address for a PPPoE client?

A. Ethernet

B. dialer

C. serial

D. Frame Relay

Answer: B

Question: 15

Which option is a benefit of switch stacking?

A. It provides redundancy with no impact on resource usage.

B. It simplifies adding and removing hosts.

C. It supports better performance of high-needs applications.

D. It provides higher port density with better resource usage.

Answer: D

A stackable switch is a network switch that is fully functional operating standalone but which can also be set up to operate together with one or more other network switches, with this group of switches showing the characteristics of a single switch but having the port capacity of the sum of the combined switches.

Question: 16

What is the first step you perform to configure an SNMPv3 user?

A. Configure server traps.

B. Configure the server group.

C. Configure the server host.

D. Configure the remote engine ID.

Answer: B

The first task in configuring SNMPv3 is to define a view. To simplify things, we’ll create a view that allows access to the entire internet subtree:

router(config)#snmp-server view readview internet included

This command creates a view called readview. If you want to limit the view to the system tree, for example, replace internet with system. The included keyword states that the specified tree should be included in the view; use excluded if you wanted to exclude a certain subtree.

Next, create a group that uses the new view. The following command creates a group called readonly ; v3 means that SNMPv3 should be used. The auth keyword specifies that the entity should authenticate packets without encrypting them; read readview says that the view named readview should be used whenever members of the readonly group access the router.

router(config)#snmp-server group readonly v3 auth read readview

Question: 17

Which spanning-tree feature places a port immediately into a forwarding stated?

A. BPDU guard

B. PortFast

C. loop guard

D. UDLD

E. Uplink Fast

Answer: B

PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state.

Question: 18

How can you disable DTP on a switch port?

A. Configure the switch port as a trunk.

B. Add an interface on the switch to a channel group.

C. Change the operational mode to static access.

D. Change the administrative mode to access.

Answer: A

Question: 19

If host Z needs to send data through router R1 to a storage server, which destination MAC address does host Z use to transmit packets?

A. the host Z MAC address

B. the MAC address of the interface on R1 that connects to the storage server

C. the MAC address of the interface on R1 that connects to host Z

D. the MAC address of the storage server interface

Answer: C

Question: 20

Which Cisco platform can verify ACLs?

A. Cisco Prime Infrastructure

B. Cisco Wireless LAN Controller

C. Cisco APIC-EM

D. Cisco IOS-XE

Answer: B

Test Information:Total Questions 228Test Number: 200-105Vendor Name: CISCOCert Name :. CCNATest Name: Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)Official Site: http://www.examkill.co.ukFor More Details: http://www.examkill.co.uk/200-105.htmlGet20% Immediate Discount on Full Training MaterialDiscount Coupon Code: 3219R845096

Article Source:

eArticlesOnline.com }

Ax Financials Certification Mb6 893 Study Guide}

Submitted by: Kruis Barry

Microsoft MB6-893 exam is one of those preferred certification tests.Our AX Financials Certification MB6-893 study guide gives you every little thing you will have to consider the Microsoft qualifications examination. in the occasion you get ready to the MB6-893 examination making use of our Passcert AX Financials Certification MB6-893 study guide, we ensure your achievement inside the primary attempt.

Today, I will tell you a good way to pass the exam which is to choose Passcert AX Financials Certification MB6-893 study guide. It MB6-893 help you to pass the exam, and we MB6-893 guarantee 100% pass rate. So you will have no losses.The quality of Passcert AX Financials Certification MB6-893 study guide are very good and also have the fastest update rate. If you purchase the AX Financials Certification MB6-893 study guide we provide, you MB6-893 pass Microsoft certification MB6-893 exam successfully.

The site of Passcert is well-known on a global scale. Because AX Financials Certification MB6-893 study guide provides to the IT industry have no-limited applicability. This is the achievement made by IT experts in Passcert after a long period of time. They used their knowledge and experience as well as the ever-changing IT industry to produce the material. The effect of Passcert AX Financials Certification MB6-893 study guide is reflected particularly good by the use of the many candidates. If you participate in the IT exam, you should not hesitate to choose Passcert AX Financials Certification MB6-893 study guide. After you use, you will know that it is really good.

This AX Financials Certification MB6-893 study guide comprehensively covers all syllabus areas and contains explanations for complicated problems. AX Financials Certification MB6-893 study guide is essential to polish your skills and mind set for real exam challenges. While talking about the Microsoft Certification Training Exams, it is hard to neglect Passcert reliability and pass ratio. AX Financials Certification MB6-893 study guide is especially designed to maximize your productivity and only emphasis on main parts of the MB6-893 Exam.

Passcert has a huge IT industry elite team. They all have high authority in the IT area. They use professional knowledge and experience to provide Exam MB6-893 Microsoft Dynamics AX Financials dumps for people ready to participate in different IT certification exams. The accuracy rate of Exam MB6-893 Microsoft Dynamics AX Financials dumps provided by Passcert is very high and they can 100% guarantee you pass the exam successfully for one time. Besides, we will provide you a free one-year update service.

So Passcert Exam MB6-893 Microsoft Dynamics AX Financials dumps are so popular among the candidates participating in the Microsoft certification MB6-893 exam. You choosing Passcert to help you pass Microsoft certification MB6-893 exam is a wise choice. You can first online free download Passcert trial version of Exam MB6-893 Microsoft Dynamics AX Financials dumps as a try, then you will be more confident to choose Passcert product to prepare for Microsoft certification MB6-893 exam.

Passcert is an excellent IT certification examination information website. In Passcert you can find Exam MB6-893 Microsoft Dynamics AX Financials dumps about Microsoft certification MB6-893 exam. You can also free download part of examination questions and answers about Microsoft MB6-893 in Passcert. Passcert will timely provide you free updates about Exam MB6-893 Microsoft Dynamics AX Financials dumps. Our IT experts team will continue to take advantage of professional experience to come up with accurate and detailed Exam MB6-893 Microsoft Dynamics AX Financials dumps to help you pass the exam. In short, we will provide you with everything you need about Microsoft certification MB6-893 exam.

Passcert is a website to improve the pass rate of Microsoft certification MB6-893 exam. Senior IT experts in the Passcert constantly developed a variety of successful programs of passing Microsoft certification MB6-893 exam, so the results of their research can 100% guarantee you Microsoft certification MB6-893 exam for one time. Passcert Exam MB6-893 Microsoft Dynamics AX Financials dumps are very effective and many people who have passed a number of IT certification exams used the Exam MB6-893 Microsoft Dynamics AX Financials dumps provided by Passcert. Some of them who have passed the Microsoft certification MB6-893 exam also use Passcert products. Selecting Passcert means choosing a success?

About the Author: Passcert offers you the latest AX Financials Certification MB6-893 study guide to help you best prepare for your test.

passcert.com/MB6-893.html

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1968179&ca=Education}

Best Ideas &Amp; Tips To Keep Your Lawn And Garden Free Of Weeds}

Submitted by: Phil Maunder

You’re thinking of throwing a party over the weekend and while looking over your property, notice your garden could do with some urgent de-weeding. A few weeds here and there will go unnoticed but a lot of it will mar the beauty of your lawn. Here are a few best ideas and tips to keep your lawn and garden free of weeds.

Tip # 1 to keep lawn free of weeds: Apply Weed-suppressing mulch

Weed suppressing mulch should be applied to the ground prior to seeding the soil for the lawn.

All garden nurseries in Australia stock weed-suppressing mulch. Some brands come mixed with chemical fertiliser and anti-weed agents while others have natural, bio-friendly ingredients. But remember, if you already have a fully grown lawn; do not apply weed-suppressing mulch as it will also kill the grass. Along the same lines as, you could use a contact weedkiller (prior to sowing).

Tip # 2 manual de-weeding

You can either catch the weed by its main stock or pull it out gently but firmly (so as not to break the plant and leave the roots in the soil). Removing the weed along with the root is vital. To accomplish this, some folks prefer to use a fork (or Gardening Franchises Businesses For Sale de-weeding available at the local green nursery).

Gently push the fork (or whatever tool you are using), about an inch-and-a-half into the soil roughly a centimetre away from base of the weed. Then press your hand downwards so the fork (or tool) lifts out the weed along with the root.

Tip # 3 Home Remedies – Salt and Vinega

If you are the Earth-friendly type and hate to use chemicals, then this remedy is for you. Salt and Vinegar makes an excellent weed killer. Just combine one cup of salt (table salt will do), with 2 cups of Vinegar, stir the mixture well and then pour it directly on weeds.

The acidity in the vinegar helps eliminate the weeds. You can also directly spray white vinegar or apple-cider vinegar on the weed stems, leaves and weed flowers.

Tip # 4 Home Remedies Vodka and soap

If you have some poor quality Vodka in the house, combine 1 ounce of vodka with 2 cups of water and add a few drops of liquid dish-washing soap. Put the mixture into a spray bottle. The Vodka dissolves the waxy coating on their leaves. Once the coating is gone, the weed dehydrates and dies. Best time to apply this home-made Lawn And Garden Business For Sale for killing remedy is, in the afternoon.

He subsequently sold over 500 franchises over the next 15 years, before selling the Jims Mowing South Australian Regional Franchise in 2005. Philip also developed the second largest Jims Customer Contact Centre in Adelaide servicing five States and Territories and over 600 franchisees before selling this in early 2007. From May 2007 thru to October 2009, Philip worked for Jim’s Group as the Divisional Manager for Jim’s Mowing. Philip also consulted to the Jims Group National Office from September 2011 thru to February 2012.

About the Author: Philip purchased a Jims Mowing franchise in Melbourne in 1989, before purchasing the Regional Franchise for South Australia in 1990, becoming the first ever Regional Franchisor in the Jims Group.Visit Here For More Information :

foxmowing.com.au/

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1968141&ca=Gardening}