cisco.certkey.200-120.v2014-06-27.by.ronda...2014/06/27  · hsrp vrrp glbp 2. syslog netflow snmp...

27
Cisco.Certkey.200-120.v2014-06-27.by.RONDA.33q Number : 200-120 Passing Score : 800 Time Limit : 120 min File Version : 16.5 http://www.gratisexam.com/ Exam Code: 200-120 Exam Name: CCNA Cisco Certified Network Associate CCNA (803) Sections 1. HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations

Upload: others

Post on 21-Jan-2021

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Cisco.Certkey.200-120.v2014-06-27.by.RONDA.33q

Number: 200-120Passing Score: 800Time Limit: 120 minFile Version: 16.5

http://www.gratisexam.com/

Exam Code: 200-120

Exam Name: CCNA Cisco Certified Network Associate CCNA (803)

Sections1. HSRP VRRP GLBP2. Syslog Netflow SNMP3. Other4. Simulations

Page 2: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Exam A

QUESTION 1Which one of these is a valid HSRP Virtual Mac Address?

A. 0000.0C07.AC01B. 0000.5E00.0110C. 0007.B400.1203D. 0000.C007.0201

Correct Answer: ASection: HSRP VRRP GLBPExplanation

Explanation/Reference:With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IPaddress. There are two version of HSRP.

+ With HSRP version 1, the virtual router’s MAC address is 0000.0c07.ACxx , in which xx is the HSRPgroup.+ With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group.

Note: Another case is HSRP for IPv6, in which the MAC address range from 0005.73A0.0000 through0005.73A0.0FFF.

QUESTION 2Which three statements about HSRP operation are true? (Choose three)

A. The virtual IP address and virtual MAC address are active on the HSRP Master router.B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C. HSRP supports only clear-text authentication.D. The HSRP virtual IP address must be on a different subnet than the routers’ interfaces on the same

LAN.E. The HSRP virtual IP address must be the same as one of the router’s interface addresses on the LAN.F. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

Correct Answer: ABFSection: HSRP VRRP GLBPExplanation

Explanation/Reference:The virtual MAC address of HSRP version 1 is 0000.0C07.ACxx, where xx is the HSRP group number inhexadecimal based on the respective interface. For example, HSRP group 10 uses the HSRP virtual MACaddress of 0000.0C07.AC0A. HSRP version 2 uses a virtual MAC address of 0000.0C9F.FXXX (XXX:HSRP group in hexadecimal)

QUESTION 3Which statement describes VRRP object tracking?

A. It monitors traffic flow and link utilization.B. It ensures the best VRRP router is the virtual router master for the group.C. It causes traffic to dynamically move to higher bandwidth links.D. It thwarts man-in-the-middle attacks.

Correct Answer: BSection: HSRP VRRP GLBPExplanation

Explanation/Reference:Object tracking is the process of tracking the state of a configured object and uses that state to determine

Page 3: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

the priority of the VRRP router in a VRRP group -> B is correct.

Note: Unlike HSRP which can track interface status directly, VRRP can only track interface status through atracked object.

QUESTION 4In GLBP, which router will respond to client ARP requests?

A. The active virtual gateway will reply with one of four possible virtual MAC addresses.B. All GLBP member routers will reply in round-robin fashion.C. The active virtual gateway will reply with its own hardware MAC address.D. The GLBP member routers will reply with one of four possible burned in hardware addresses.

Correct Answer: ASection: HSRP VRRP GLBPExplanation

Explanation/Reference:One disadvantage of HSRP and VRRP is that only one router is in use, other routers must wait for theprimary to fail because they can be used. However, Gateway Load Balancing Protocol (GLBP) can use ofup to four routers simultaneously. In GLBP, there is still only one virtual IP address but each router has adifferent virtual MAC address. First a GLBP group must elect an Active Virtual Gateway (AVG). The AVG isresponsible for replying ARP requests from hosts/clients. It replies with different virtual MAC addresses thatcorrespond to different routers (known as Active Virtual Forwarders – AVFs) so that clients can send trafficto different routers in that GLBP group (load sharing).

QUESTION 5In a GLBP network, who is responsible for the arp request?

A. AVFB. AVGC. Active RouterD. Standby Router

Correct Answer: BSection: HSRP VRRP GLBPExplanation

Explanation/Reference:

QUESTION 6What are three benefits of GLBP? (Choose three)

A. GLBP supports up to eight virtual forwarders per GLBP group.B. GLBP supports clear text and MD5 password authentication between GLBP group members.C. GLBP is an open source standardized protocol that can be used with multiple vendors.D. GLBP supports up to 1024 virtual routers.E. GLBP can load share traffic across a maximum of four routers.F. GLBP elects two AVGs and two standby AVGs for redundancy.

Correct Answer: BDESection: HSRP VRRP GLBPExplanation

Explanation/Reference:

QUESTION 7Which three are the components of SNMP? (Choose three)

Page 4: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

http://www.gratisexam.com/

A. MIB.B. SNMP Manager.C. SysLog Server.D. SNMP Agent.

Correct Answer: ABDSection: Syslog Netflow SNMPExplanation

Explanation/Reference:SNMP is an application-layer protocol that provides a message format for communication between SNMPmanagers and agents. SNMP provides a standardized framework and a common language used for themonitoring and management of devices in a network.The SNMP framework has three parts:

+ An SNMP manager+ An SNMP agent+ A Management Information Base (MIB)

The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP.The most common managing system is called a Network Management System (NMS). The term NMS canbe applied to either a dedicated device used for network management, or the applications used on such adevice. A variety of network management applications are available for use with SNMP. These featuresrange from simple command-line applications to feature-rich graphical user interfaces (such as theCiscoWorks2000 line of products).

The SNMP agent is the software component within the managed device that maintains the data for thedevice and reports these data, as needed, to managing systems. The agent and MIB reside on the routingdevice (router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you mustdefine the relationship between the manager and the agent.

The Management Information Base (MIB) is a virtual information storage area for network managementinformation, which consists of collections of managed objects.

QUESTION 8Which protocol can cause overload on a CPU of a managed device?

A. Netflow.B. WCCP.C. IP SLA.D. SNMP.

Correct Answer: DSection: Syslog Netflow SNMPExplanation

Explanation/Reference:Sometimes, messages like this might appear in the router console:

%SNMP-3-CPUHOG: Processing [chars] of [chars]

They mean that the SNMP agent on the device has taken too much time to process a request.

Page 5: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

You can determine the cause of high CPU use in a router by using the output of the show process cpucommand.

Note: A managed device is a part of the network that requires some form of monitoring and management(routers, switches, servers, workstations, printers…).

QUESTION 9What is the alert message generated by SNMP agents called ? Choose Two

A. TRAPB. INFORMC. GETD. SET

Correct Answer: ABSection: Syslog Netflow SNMPExplanation

Explanation/Reference:A TRAP is a SNMP message sent from one application to another (which is typically on a remote host).Their purpose is merely to notify the other application that something has happened, has been noticed, etc.The big problem with TRAPs is that they’re unacknowledged so you don’t actually know if the remoteapplication received your oh-so-important message to it. SNMPv2 PDUs fixed this by introducing the notionof an INFORM, which is nothing more than an acknowledged TRAP.

QUESTION 10Which three features are added in SNMPv3 over SNMPv2?

A. Message IntegrityB. CompressionC. AuthenticationD. EncryptionE. Error Detection

Correct Answer: ACDSection: Syslog Netflow SNMPExplanation

Explanation/Reference:Cisco IOS software supports the following versions of SNMP:

+ SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157.(RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security isbased on community strings.

+ SNMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the “c”stands for “community”) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic),and uses the community-based security model of SNMPv1.

+ SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating andencrypting packets over the network. The security features provided in SNMPv3 are as follows:

– Message integrity: Ensuring that a packet has not been tampered with in transit.– Authentication: Determining that the message is from a valid source.– Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source.

QUESTION 11What is SNMPv3 authentication protocol?

Page 6: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

A. HMAC-MD5B. HMAC-SHAC. anyD. any

Correct Answer: ABSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

QUESTION 12Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three)

A. SNMPv3 enhanced SNMPv2 security features.B. SNMPv3 added the Inform protocol message to SNMP.C. SNMPv2 added the Inform protocol message to SNMP.D. SNMPv3 added the GetBulk protocol messages to SNMP.E. SNMPv2 added the GetBulk protocol message to SNMP.F. SNMPv2 added the GetNext protocol message to SNMP.

Correct Answer: ACESection: Syslog Netflow SNMPExplanation

Explanation/Reference:SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption.Without authentication, it is possible for nonauthorized users to exercise SNMP network managementfunctions. It is also possible for nonauthorized users to eavesdrop on management information as it passesfrom managed systems to the management system. Because of these deficiencies, many SNMPv1/v2implementations are limited to simply a read-only capability, reducing their utility to that of a networkmonitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct.

The two additional messages are added in SNMP2 (compared to SNMPv1)

GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks ofdata. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU.Agents that cannot provide values for all variables in a list will send partial information. -> E is correct.

InformRequest The InformRequest message allows NMS stations to share trap information. (Traps areissued by SNMP agents when a device change occurs.) InformRequest messages are generally usedbetween NMS stations, not between NMS stations and agents. -> C is correct.

Note: These two messages are carried over SNMPv3.

QUESTION 13What are the benefit of using Netflow? (Choose three)

A. Network, Application & User Monitoring.B. Network Planning.C. Security Analysis.D. Accounting/Billing.

Correct Answer: ACDSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

Page 7: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

NetFlow traditionally enables several key customer applications including:

+ Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities.Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individualrouters and switches as well as on a network-wide basis (providing aggregate traffic or application basedviews) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.

+ Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand newservices, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) toresponsively meet customer demands.

+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understandingof customer/user utilization of network and application resources. This information may then be utilized toefficiently plan and allocate access, backbone and application resources as well as to detect and resolvepotential security and policy violations.

+ Network Planning – NetFlow can be used to capture data over a long period of time producing theopportunity to track and anticipate network growth and plan upgrades to increase the number of routingdevices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning includingpeering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total costof network operations while maximizing network performance, capacity, and reliability. NetFlow detectsunwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of newnetwork applications. NetFlow will give you valuable information to reduce the cost of operating yournetwork.

+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time.Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data isalso a valuable forensic tool to understand and replay the history of security incidents.

+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such asIP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highlyflexible and detailed resource utilization accounting. Service providers may utilize the information for billingbased on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customersmay utilize the information for departmental charge-back or cost allocation for resource utilization.

QUESTION 14What are the three things that the NetFlow uses to consider the traffic to be in a same flow?

A. IP addressB. Interface nameC. Port numbersD. Layer 3 protocol typeE. MAC address

Correct Answer: ACDSection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

What is an IP Flow?Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. Theseattributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique orsimilar to other packets.Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.IP Packet attributes used by NetFlow:+ IP source address+ IP destination address+ Source port+ Destination port+ Layer 3 protocol type

Page 8: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

+ Class of Service+ Router or switch interface

QUESTION 15What NetFlow component can be applied to an interface to track IPv4 traffic?

A. flow monitorB. flow recordC. flow samplerD. flow exporter

Correct Answer: ASection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network trafficmonitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after youcreate the flow monitor. The flow monitor cache is automatically created at the time the flow monitor isapplied to the first interface. Flow data is collected from the network traffic during the monitoring processbased on the key and nonkey fields in the record, which is configured for the flow monitor and stored in theflow monitor cache.For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters FlexibleNetFlow flow monitor configuration mode:Router(config)# flow monitor FLOW-MONITOR-1Router(config-flow-monitor)#

QUESTION 16What command visualizes the general NetFlow data on the command line?

A. show ip flow exportB. show ip flow top-talkersC. show ip cache flowD. show mls samplingE. show mls netflow ip

Correct Answer: CSection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

The “show ip cache flow” command displays a summary of the NetFlow accounting statistics.

Page 9: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

QUESTION 17What are three reasons to collect NetFlow data on a company network? (Choose three)

A. To identify applications causing congestion.B. To authorize user network access.C. To report and alert link up / down instances.D. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.E. To detect suboptimal routing in the network.F. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

Correct Answer: ADFSection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

NetFlow facilitates solutions to many common problems encountered by IT professionals.+ Analyze new applications and their network impactIdentify new application network loads such as VoIP or remote site additions.+ Reduction in peak WAN trafficUse NetFlow statistics to measure WAN traffic improvement from application-policy changes; understandwho is utilizing the network and the network top talkers.+ Troubleshooting and understanding network pain pointsDiagnose slow network performance, bandwidth hogs and bandwidth utilization quickly with command lineinterface or reporting tools. -> D is correct.+ Detection of unauthorized WAN trafficAvoid costly upgrades by identifying the applications causing congestion. -> A is correct.+ Security and anomaly detectionNetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CS-

Page 10: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Mars.+ Validation of QoS parametersConfirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS isover- or under-subscribed.-> F is correct.

QUESTION 18What are three factors a network administrator must consider before implementing Netflow in the network?(Choose three)

A. CPU utilizationB. where Netflow data will be sentC. number of devices exporting Netflow dataD. port availabilityE. SNMP versionF. WAN encapsulation

Correct Answer: ABCSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

QUESTION 19What Cisco IOS feature can be enabled to pinpoint an application that is causing slow networkperformance?

A. SNMPB. Netflow C. WCCPD. IP SLA

Correct Answer: BSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

QUESTION 20What are the popular destinations for Syslog messages to be saved? Choose Three

A. FlashB. The logging buffer RAMC. The console terminalD. Other terminalsE. Syslog server

Correct Answer: BCESection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

By default, switches send the output from system messages and debug privileged EXEC commands to alogging process. The logging process controls the distribution of logging messages to various destinations,such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, dependingon your configuration. The process also sends messages to the console.

Page 11: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use.We can configure this feature with the command logging file flash:filename.

QUESTION 21Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose four)

A. EmergenciesB. AlertsC. ErrorsD. Warnings E. Critical

Correct Answer: ABCESection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

The Message Logging is divided into 8 levels as listed below:

Level Keyword Description0 emergencies System is unusable1 alerts Immediate action is needed2 critical Critical conditions exist3 errors Error conditions exist4 warnings Warning conditions exist5 notification Normal, but significant, conditions exist6 informational Informational messages7 debugging Debugging messagesThe highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “loggingconsole level” command, that level and all the higher levels will be displayed. For example, by using the“logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will bedisplayed.

In this question level 3 trap is configured so Emergencies, Alerts, critical and Errors messages aredisplayed. Although this question only requires to choose 3 correct answers but maybe something ismissing here.

QUESTION 22Which three statements about Syslog utilization are true? (Choose three)

A. Utilizing Syslog improves network performance. B. The Syslog server automatically notifies the network administrator of network problems. C. A Syslog server provides the storage space necessary to store log files without using router disk space. D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap

messages. E. Enabling Syslog on a router automatically enables NTP for accurate time stamping. F. A Syslog server helps in aggregation of logs and alerts.

Correct Answer: CDFSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

QUESTION 23What command instructs the device to timestamp Syslog debug messages in milliseconds?

Page 12: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

A. service timestamps log datetime localtime B. service timestamps debug datetime msecC. service timestamps debug datetime localtimeD. service timestamps log datetime msec

Correct Answer: BSection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

The “service timestamps debug” command configures the system to apply a time stamp to debuggingmessages. The time-stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD isthe date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additionalkeyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm,where .mmm is milliseconds

QUESTION 24What is the default Syslog facility level?

A. local4B. local5C. local6D. local7

Correct Answer: DSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

QUESTION 25What levels will be trapped if the administrator executes the command

router(config)# logging trap 4

A. EmergencyB. NoticeC. AlertD. ErrorE. Warning

Correct Answer: ACDESection: Syslog Netflow SNMPExplanation

Explanation/Reference:Explanation

The Message Logging is divided into 8 levels as listed below:

Level Keyword Description0 emergencies System is unusable1 alerts Immediate action is needed2 critical Critical conditions exist3 errors Error conditions exist4 warnings Warning conditions exist5 notification Normal, but significant, conditions exist

Page 13: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

6 informational Informational messages7 debugging Debugging messagesIf you specify a level with the “logging trap level” command, that level and all the higher levels will belogged. For example, by using the “logging trap 4″ command, all the logging of emergencies, alerts, critical,errors, warnings will be logged.

QUESTION 26A network administrator enters the following command on a router: logging trap 3. What are three messagetypes that will be sent to the Syslog server? (Choose three)

A. informationalB. emergencyC. warningD. criticalE. debugF. error

Correct Answer: BDFSection: Syslog Netflow SNMPExplanation

Explanation/Reference:

QUESTION 27etherchannel issue. If you can look very carefully, there is speed mismatched to cause that problem. Iselected “speed mismatch”

A. speed mismatch

Correct Answer: ASection: OtherExplanation

Explanation/Reference:

QUESTION 28Refer to the exhibit. Etherchannel has been configured on Switch1 as shown.

Switch1# conf tSwitch1(config)# interface range gigabitethernet 1/1Switch1(config)# Channel-group 5 Mode “AUTO”Switch1#Switch1(config)# interface range gigabitethernet 1/2Switch1(config)# Channel-group 5 Mode “AUTO”

Which is the correct command set to configure etherchannel on Switch2?

A. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode auto

B. Switch2# configure terminalSwitch2(config)# interface range gigabitethemet3/1 -2Switch2(config-if)# channel-group 5 mode passive

C. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode desirable

D. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode ACTIVE

Page 14: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Correct Answer: CSection: OtherExplanation

Explanation/Reference:

QUESTION 29Which OSPF command turn OSPF on all interfaces of a router?

A. network 0.0.0.0 255.255.255.255

Correct Answer: ASection: OtherExplanation

Explanation/Reference:

QUESTION 30Network admin creates a layer 3 Etherchannel, bounding 4 interfaces into channel group 1. On whatinterface is the IP address configured?

A. the port-channel 1 interfaceB. the highest number member interfaceC. all member interfacesD. the lowest number member interface

Correct Answer: ASection: OtherExplanation

Explanation/Reference:

QUESTION 31

This task requires you to use the CLI of Sw-AC3 to answer five multiple-choice questions. This does not require any configuration. To answer the multiple-choice questions, click on the numbered boxes in the right panel. There are five multiple-choice questions with this task.

Page 15: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Be sure to answer all five questions before leaving this item.

A. Answer

Correct Answer: ASection: SimulationsExplanation

Explanation/Reference:

Question 1:

What interface did Sw-AC3 associate with source MAC address 0010.5a0c.ffba ?

a. Fa0/1 b. Fa0/3 c. Fa0/6 d. Fa0/8 e. Fa0/9 f. Fa0/12

Explanation:

We need find out a device that connected to Sw-AC3 with MAC-Address (0010.5a0c.ffba).

Command: show mac-address-table If this command not works try show mac address-table

Find the port name that has mac-address (0010.5a0c.ffba).

Answer : D. Fa0/8

Question 2:

What ports on Sw-AC3 are operating has trunks (choose three)?

a. Fa0/1 b. Fa0/3 c. Fa0/4 d. Fa0/6

Page 16: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

e. Fa0/9 f. Fa0/12

Explanation:

We need to find the 3 trunk interfaces of Sw-AC3.

Command: show interface trunk

Answers : B. Fa0/3, E. Fa0/9, F. Fa0/12

Question 3:

What kind of router is VLAN-R1?

a. 1720 b. 1841 c. 2611 d. 2620

Explanation:

We need to find the Router model number. The router VLAN-R1 is directly connected to Sw-AC3. So wecan use CDP (Cisco Discovery Protocol) to find the basic information about neighbor devices.

Command: show cdp neighbors

Check the Platform of VLAN-R1, and the Answer is D 2620

Question 4:

Which switch is the root bridge for VLAN 1?

a. Sw-DS1 b. Sw-AC1

Page 17: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

c. Sw-AC2 d. Sw-AC3

Explanation:

Step 1: Find the root port of Sw-AC3.

Command: show spanning-tree vlan 1

If all the three ports were Desg then Answer is D. Sw-AC3

Step 2: Find the device that connected to Root port

Command: show cdp neighbors

Answer : A. Sw-DS1

Question 5:

What address should be configured as the default-gateway for the host connected to interface fa0/4 of SW-Ac3?

a. 192.168.1.254 b. 192.168.22.254 c. 192.168.33.254 d. 192.168.44.254

Explanation:

A PC is connected to Fa0/4 port Sw-AC3. We need to find out VLAN that Fa0/4 port mapped. Also eachVLAN’s Default Gateway IP addresses were found in the Topology.

Step 1: Check the IP addresses in the Topology

Page 18: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Step 2: Find the VLAN of Fa0/4.

Command: show vlan brief

Port Fa0/24 just mapped to VLAN 44. And Default Gateway IP address of VLAN44 is 192.168.44.254

Answer: D. 192.168.44.254

Question 6:

From which switch did Sw-Ac3 receive VLAN information?

a. Sw-DS1 b. Sw-AC1 c. Sw-AC2 d. Sw-AC3(locally)

Explanation:

Step 1: Find the IP address of Switch that update the VLAN database of Sw-AC3.

Command: show vtp status

Page 19: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Step 2: Using CDP, we can find the hostname of Switch that has IP address 163.5.8.3.

Command: show cdp neighbors detail

The hostname of IP address 163.5.8.3 is Sw-AC2

Answer : C. Sw-AC2

Question 7:

Refer to the exibit, SwX was taken out of the production network for maintenance. It will be reconnected tothe Fa 0/16 port of Sw-Ac3. What happens to the network when it is reconnected and a trunk existsbetween the two switches?

a. All VLANs except the default VLAN win be removed from all switches b. All existing switches will have the students, admin, faculty, Servers, Management, Production, and no-where VLANs c. The VLANs Servers, Management, Production and no-where will replace the VLANs on SwX d. The VLANs Servers, Management, Production and no-where will be removed from existing switches

Explanation:

The switch that has highest Configuration Revision has update the VLAN Database with its VLANDatabase.

Wrong Answers: A and B (There is no way VLANs will be removed and also there is no way that all

Page 20: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

switches will have all VLANs.

The Answer will be either C or D. If Switch Sw-AC3 has highest Configuration Revision, then Sw-AC3 willreplace its VLAN database with Sw-X VLAN database. If switch SwX has highest Configuration Revision,then SwX will replace its VLAN database with Sw-AC3 and other switches VLAN database.

Command: show vtp status

Check the Configuration Revision of SwX in exhibit.

The Configuration Revision of Sw-AC3 is 5 and the Configuration Revision of SwX is 6.

Answer: D. The VLANs Servers, Management, Production and no-where will be removed from existingswitches

If Configuration Revision of Sw-AC3 is above 6, then the answer will be C. The VLANs Servers,Management, Production and no-where will replace the VLANs on SwX.

Question 8:

Out of which ports will a frame be forwarded that has source mac-address 0010.5a0c.fd86 and destinationmac-address 000a.8a47.e612? (Choose three)

a. Fa0/1 b. Fa0/3 c. Fa0/4 d. Fa0/6 e. Fa0/8 f. Fa0/12

Explanation:

Step 1: Check the VLAN and Interface of Source MAC Address (0010.5a0c.fd86).

Command: show mac-address-table If the above command not works, then try show mac address-table

Page 21: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

The interface used to connect the MAC Address (0010.5a0c.fd86) is Fa0/6 and the VLAN that mapped tothis interface is VLAN33.

Also there is no sign of Destination MAC Address is MAC Address Table. In that case the switch willbroadcast the packet to all interface of VLAN33 except the interface that has source mac addressassociated (Fa0/6). Also Sw-AC3 will forward the packet to all trunk interfaces.

Step 2: Find the Interface list of VLAN33.

Command: show vlan brief

The switch will forward the packet to Fa0/1, Fa0/2, Fa0/5, Fa0/7. But it will not forward to Fa0/6.

Step 3: Find the trunk interfaces.

Command: show interface trunk

Page 22: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

The trunk interfaces are Fa0/3, Fa0/9, Fa0/12.

In this case the Answer would be Fa0/1, Fa0/2, Fa0/5, Fa0/7, Fa0/3, Fa0/9, Fa0/12.

Answer: A. Fa0/1, B. Fa0/3, F. Fa0/12

Question 9:

If one of the host connected to Sw-AC3 wants to send something for the ip 190.0.2.5 (or any ip that is noton the same subnet) what will be the destination MAC address?

a. 0009.e8b2.c28c b. 000a.b7e9.8360 c. 000c.ce8d.8720 d. 0010.5a0c.fd86 e. 0010.5a0c.feae f. 0010.5a0c.ff9f

Explanation:

If a host of Sw-AC3 send data to outside the network (not in same subnet), then it will be forwarded toDefault Gateway (Router). The router VLAN-R1 is serving internetwork communication. So the packet willbe forwarded to VLAN-R1. All we need to find is, what is the MAC Address of VLAN-R1 interface.

Step 1: Find the interface used to connect the VLAN-R1 and Sw-AC3.

Command: show cdp neighbors

Step 2: Find the MAC address of device that connects to Fa0/3 port of Sw-AC3.

Command: show mac-address-table If the above command not works, then try show mac address-table

Page 23: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

The MAC address that associated with Fa0/3 is 000a.b7e9.8360

Answer: B. 000a.b7e9.8360

QUESTION 32Simulation Source is EXAMTUT.com

A network associate is configuring a router for the weaver company to provide internet access. The ISP hasprovided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14hosts that need to access the internet simultaneously. The hosts in the company LAN have been assignedprivate space addresses in the range of 192.168.100.17 – 192.168.100.30.

The following have already been configured on the router: - The basic router configuration - The appropriate interfaces have been configured for NAT inside and NAT outside. - The appropriate static route have also been configured (since the company will be a stub network, norouting protocol will be required) - All passwords have been temporarily set to “cisco”.

The task is to complate the NAT configuration using all IP addresses assigned by the ISP to provideInternet access for the hosts in the Weaver LAN. Functionality can be tested by clicking on the hostprovided for testing.

Page 24: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Configuration information router name – Weaver inside global addresses – 198.18.184.105 198.18.184.110/29 inside local addresses – 192.168.100.17 – 192.168.100.30/28 number of inside hosts – 14

A. Answer

Correct Answer: ASection: SimulationsExplanation

Explanation/Reference:Step 1: Change the hostname to Weaver

Router#configure terminal Router(config)#hostname Weaver Weaver(config)#

Step 2: Configure NAT

1. Specify the private IP address using Access Control List (ACL) statement

First we need to find the Network address of the hosts.

Note: The inside local addresses have been assigned from 192.168.100.17 to 192.168.100.30/28. Subnet Mask of /28 = 11111111 . 11111111 . 11111111 . 11110000 = 255.255.255.240 For network address, the network bits of the IP address remain same but the host bits turned to 0′s The last octet of first local IP address is 17, and binary of 17 = 00010001 Network Address = 192.168.100.00010000 = 192.168.100.16

Second, we need to find the wildcard mask of /28

Note: The wildcard mask is the inverse of the subnet mask. Network bits are 0′s and Host bits are 1′s. Subnet Mask = 11111111 . 11111111 . 11111111 . 11110000 Wildcard Mask = 00000000 . 00000000 . 00000000 . 00001111 = 0.0.0.15

Weaver(config)#access-list 1 permit 192.168.100.16 0.0.0.15

2. Specify the public IP address (198.18.184.105 – 198.18.184.110/29)

Subnet Mask of /29 = 11111111 . 11111111 . 11111111 . 11111000 = 255.255.255.248

Weaver(config)#ip nat pool mynat 198.18.184.105 198.18.184.110 netmask 255.255.255.248

3. Link private IP address list and public IP address list

From above 2 command, the ACL number is 1 and NAT pool name is mynat

Weaver(config)#ip nat inside source list 1 pool mynat overload Weaver(config)#end Weaver#

Step 3: Save the configuration

Weaver#copy run start Destination filename [startup-config]? [ENTER]

Step 4: Test the NAT configuration

The IP address of ISP is 192.0.2.114, if the test connectivity of ISP IP address success then the above NATconfiguration is working properly.

Page 25: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Click Show Topology button, then click on the icon “Host for Testing”. In the command prompt of PC,execute command ping 192.0.2.114

QUESTION 33Simulation source is EXAMTUT.COM

Central Florida Widgets recently installed a new router in their Apopka office. Complete the networkinstallation by performing the initial router configurations and configuring RIPv2 routing using the routercommand line interface (CLI) on the Apopka router.

Page 26: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

To configure the router (Apopka) click on the console host icon that is connected to a router by a serialconsole cable (shown in the diagram as a dashed black line).

Each of the windows can be minimized by clicking on the [-]. You can also reposition a window by draggingit by the title bar.

The “Tab” key and most commands that use the “Control” or “Esc” keys are not supported and are notnecessary to complete this simulation. The help command does not display all commands of the helpsystem.

Configure the router per the following requirements:Name of the router is Apopka Enable-secret password is ish555ana The password to access user EXEC mode using the console is New2Rtr The password to allow telnet access to the router is sir890usIPv4 addresses must be configured as follows:Ethernet network 209.165.201.0/27 – router has second assignable host address in subnet. Serial network is 192.0.1.128/28 – router has last assignable host address in the subnet. Interfaces should be enabled. Routing protocol is RIP v2.

A. press show answer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Step 1: Change the Hostname

Router>enable Router#configure terminal Router(config)#hostname Apopka

Step 2: Configure enable secret password

Apopka(config)#enable secret cisco20

Step 3: Configure console password

Apopka(config)#line con 0 Apopka(config-line)#password RouterApass Apopka(config-line)#login Apopka(config-line)#exit

Step 4: Configure telnet (VTY) password

Apopka(config)#line vty 0 4 Apopka(config-line)#password scan180 Apopka(config-line)#login Apopka(config-line)#exit

Step 5: Assign IP address for LAN and WAN interfaces

Note: With reference to the topology, interface Fa0/0 used to connected to Apopka LAN Switch andinterface S0/0/0 used to connect to the router Tamba.The IP address of Fa0/0 should be the second usable IP address of the subnet 209.165.200.0/27.

the network address will be 209.165.200.0 and the broadcast address will be 209.165.200.31. The secondassignable host address is 209.165.200.2

Page 27: Cisco.Certkey.200-120.v2014-06-27.by.RONDA...2014/06/27  · HSRP VRRP GLBP 2. Syslog Netflow SNMP 3. Other 4. Simulations Exam A QUESTION 1 Which one of these is a valid HSRP Virtual

Apopka(config)#interface fa0/0 Apopka(config-if)#ip address 209.165.200.2 255.255.255.224 Apopka(config-if)#no shutdown Apopka(config-if)#exit

The IP address of S0/0/0 must be the last IP address of the subnet 192.0.1.142/28.we can find the last IP address of this subnet will be 192.0.1.142 and the subnet mask will be255.255.255.240.

Apopka(config)#interface s0/0/0 Apopka(config-if)#ip address 192.0.1.142 255.255.255.240 Apopka(config-if)#no shutdown Apopka(config-if)#exit

Step 6: Enable routing protocol RIPv2

Apopka(config)#router rip Apopka(config-router)#version 2 Apopka(config-router)#network 209.165.200.0 Apopka(config-router)#network 192.0.1.0 Apopka(config-router)#end

Step 7: Save the configuration

Apopka#copy run start Destination Filename [startup-config]: [ENTER]

http://www.gratisexam.com/