web analytics

Free Share Real PDF Exam Questions Of Exam Cisco 200-120 To Help You Pass Exam (121-130)

What occurs on a Frame Relay network when the CIR is exceeded?

A.    All TCP traffic is marked discard eligible.
B.    All UDP traffic is marked discard eligible and a BECN is sent.
C.    All TCP traffic is marked discard eligible and a BECN is sent.
D.    All traffic exceeding the CIR is marked discard eligible.

Answer: D
Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network. Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

A.    CHAP uses a two-way handshake.
B.    CHAP uses a three-way handshake.
C.    CHAP authentication periodically occurs after link establishment.
D.    CHAP authentication passwords are sent in plaintext.
E.    CHAP authentication is performed only upon link establishment.
F.    CHAP has no protection from playback attacks.

Answer: BC
CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user’s password).

What is the result of issuing the frame-relay map ip 202 broadcast command?

A.    defines the destination IP address that is used in all broadcast packets on DCLI 202
B.    defines the source IP address that is used in all broadcast packets on DCLI 202
C.    defines the DLCI on which packets from the IP address are received
D.    defines the DLCI that is used for all packets that are sent to the IP address

Answer: D
This command identifies the DLCI that should be used for all packets destined to the address. In this case, DLCI 202 should be used.

Which PPP subprotocol negotiates authentication options?

A.    NCP
B.    ISDN
C.    SLIP
D.    LCP
E.    DLCI

Answer: D
The PPP Link Control Protocol (LCP) is documented in RFC 1661. LPC negotiates link and PPP parameters to dynamically configure the data link layer of a PPP connection. Common LCP options include the PPP MRU, the authentication protocol, compression of PPP header fields, callback, and multilink options.

What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two.)

A.    They create split-horizon issues.
B.    They require a unique subnet within a routing domain.
C.    They emulate leased lines.
D.    They are ideal for full-mesh topologies.
E.    They require the use of NBMA options when using OSPF.

Answer: BC
Subinterfaces are used for point to point frame relay connections, emulating virtual point to point leased lines. Each subinterface requires a unique IP address/subnet. Remember, you can not assign multiple interfaces in a router that belong to the same IP subnet.



What command is used to verify the DLCI destination address in a Frame Relay static configuration?

A.    show frame-relay pvc
B.    show frame-relay lmi
C.    show frame-relay map
D.    show frame relay end-to-end

Answer: C
Sample “show frame-relay map” output:
R1#sh frame mapSerial0/0 (up): ip dlci 401(0x191,0x6410), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip dlci 403(0x193,0x6430), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip dlci 401(0x191,0x6410), static,CISCO, status defined, active

What is the purpose of Inverse ARP?

A.    to map a known IP address to a MAC address
B.    to map a known DLCI to a MAC address
C.    to map a known MAC address to an IP address
D.    to map a known DLCI to an IP address
E.    to map a known IP address to a SPID
F.    to map a known SPID to a MAC address

Answer: D
Dynamic address mapping relies on the Frame Relay Inverse Address Resolution Protocol (Inverse ARP), defined by RFC 1293, to resolve a next hop network protocol (IP) address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its Frame Relay PVC to discover the protocol address of the remote device connected to the Frame Relay network. The responses to the Inverse ARP requests are used to populate an address-to-DLCI mapping table on the Frame Relay router or access server. The router builds and maintains this address-to- DLCI mapping table, which contains all resolved Inverse ARP requests, including both dynamic and static mapping entries.

How does using the service password-encryption command on a router provide additional security?

A.    by encrypting all passwords passing through the router
B.    by encrypting passwords in the plain text configuration file
C.    by requiring entry of encrypted passwords for access to the device
D.    by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E.    by automatically suggesting encrypted passwords for use in configuring the router

Answer: B
By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?

A.    the OSPF route
B.    the EIGRP route
C.    the RIPv2 route
D.    all three routes
E.    the OSPF and RIPv2 routes

Answer: B

A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?

A.    service password-encryption
access-list 1 permit
line vty 0 4
password cisco
access-class 1
B.    enable password secret
line vty 0
password cisco
C.    service password-encryption
line vty 1
password cisco
D.    service password-encryption
line vty 0 4
password cisco

Answer: C
Only one VTY connection is allowed which is exactly what’s requested.
Incorrect answer: command.
line vty0 4
would enable all 5 vty connections.

Free Share Real PDF Exam Questions Of Exam Cisco 200-120 To Help You Pass Exam