200-105 ICND2 Interconnecting Cisco Networking Devices Part 2

Exam Number 200-105 ICND2
Associated Certifications CCNA Routing & Switching
Duration 90 Minutes (45-55 questions)
Available Languages English, Japanese

This exam tests a candidate’s knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance.

The Interconnecting Cisco Networking Devices Part 2 (200-105 ICND2) exam is a 90-minute, 45–55 question assessment that is associated with the associated with the CCNA Routing and Switching certification. This exam tests a candidate’s knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Subscribe to Cisco Learning Network Premium and access the most comprehensive e-learning training, resources and tools you’ll need to prepare for your CCENT, CCNA and CCNP Routing and Switching certifications.

1.0 LAN Switching Technologies 26%

1.1 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches

1.1.a Access ports (data and voice)
1.1.b Default VLAN

1.2 Configure, verify, and troubleshoot interswitch connectivity

1.2.a Add and remove VLANs on a trunk
1.2.b DTP and VTP (v1&v2)

1.3 Configure, verify, and troubleshoot STP protocols

1.3.a STP mode (PVST+ and RPVST+)
1.3.b STP root bridge selection

1.4 Configure, verify, and troubleshoot STP-related optional features

1.4.a PortFast
1.4.b BPDU guard

1.5 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel

1.5.a Static
1.5.b PAGP
1.5.c LACP

1.6 Describe the benefits of switch stacking and chassis aggregation

1.7 Describe common access layer threat mitigation techniques

1.7.a 802.1x
1.7.b DHCP snooping
1.7.c Nondefault native VLAN

2.0 Routing Technologies 29%

2.1 Configure, verify, and troubleshoot Inter-VLAN routing

2.1.a Router on a stick
2.1.b SVI

2.2 Compare and contrast distance vector and link-state routing protocols

2.3 Compare and contrast interior and exterior routing protocols

2.4 Configure, verify, and troubleshoot single area and multiarea OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

2.5 Configure, verify, and troubleshoot single area and multiarea OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

2.6 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)

2.7 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)

3.0 WAN Technologies 16%

3.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication

3.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication

3.3 Configure, verify, and troubleshoot GRE tunnel connectivity

3.4 Describe WAN topology options

3.4.a Point-to-point
3.4.b Hub and spoke
3.4.c Full mesh
3.4.d Single vs dual-homed

3.5 Describe WAN access connectivity options

3.5.a MPLS
3.5.b MetroEthernet
3.5.c Broadband PPPoE
3.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)

3.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)

4.0 Infrastructure Services 14%

4.1 Configure, verify, and troubleshoot basic HSRP

4.1.a Priority
4.1.b Preemption
4.1.c Version

4.2 Describe the effects of cloud resources on enterprise network architecture

4.2.a Traffic path to internal and external cloud services
4.2.b Virtual services
4.2.c Basic virtual network infrastructure

4.3 Describe basic QoS concepts

4.3.a Marking
4.3.b Device trust
4.3.c Prioritization
4.3.c. [i] Voice
4.3.c. [ii] Video
4.3.c. [iii] Data
4.3.d Shaping
4.3.e Policing
4.3.f Congestion management

4.4 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering

4.4.a Standard
4.4.b Extended
4.4.c Named

4.5 Verify ACLs using the APIC-EM Path Trace ACL analysis tool

5.0 Infrastructure Maintenance 15%

5.1 Configure and verify device-monitoring protocols

5.1.a SNMPv2
5.1.b SNMPv3

5.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA

5.3 Use local SPAN to troubleshoot and resolve problems

5.4 Describe device management using AAA with TACACS+ and RADIUS

5.5 Describe network programmability in enterprise network architecture

5.5.a Function of a controller
5.5.b Separation of control plane and data plane
5.5.c Northbound and southbound APIs

5.6 Troubleshoot basic Layer 3 end-to-end connectivity issues
QUESTION 1
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist
for that communication?

A. transport
B. network
C. presentation
D. session
E. application

Answer: E

Explanation:
This question is to examine the OSI reference model.
The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.


QUESTION 2
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?

A. application
B. presentation
C. session
D. transport
E. internet
F. data link

Answer: A
Explanation:
FTP belongs to Application layer and it is also the highest layer of the OSI model.


QUESTION 3
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)

A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

Answer: A,D

Explanation:
The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble the data on arrival.
The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to retransmit. For example, in TCP, basic flow control is implemented by acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment before sending the next part.
The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical addressing of devices. Second, the network layer determines the best path to a particular destination network, and routes the data appropriately.


QUESTION 4
Where does routing occur within the DoD TCP/IP reference model?

A. application
B. internet
C. network
D. transport

Answer: B


QUESTION 5
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?

A. This is a 10 Mb/s switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.

Answer: C

Explanation:
Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).


QUESTION 6
Which three statements accurately describe Layer 2 Ethernet switches? (Choose three.)

A. Spanning Tree Protocol allows switches to automatically share VLAN information.
B. Establishing VLANs increases the number of broadcast domains.
C. Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information.
D. Microsegmentation decreases the number of collisions on the network.
E. In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.
F. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

Answer: B,D,E

Explanation:
Microsegmentation is a network design (functionality) where each workstation or device on a network gets its own dedicated segment (collision domain) to the switch. Each network device gets the full bandwidth of the segment and does not have to share the segment with other devices. Microsegmentation reduces and can even eliminate collisions because each segment is its own collision domain ->.
Note: Microsegmentation decreases the number of collisions but it increases the number of collision domains.

Click here to view complete Q&A of 200-105 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Cisco 200-105 Certification, Cisco 200-105 Training at certkingdom.com