Home Page > Cisco > 200-101

Download Cisco.Lead2pass.200-101.v2013-06-26.by.Cristiano.95q.vce

Exam: Interconnecting Cisco Networking Devices Part 2 (ICND2)
Size: 6.6 MB
Posted: 2013-06-26
Votes: 2
Download: Cisco.Lead2pass.200-101.v2013-06-26.by.Cristiano.95q.vce

Vote For This File

Type the characters from the picture.


* The most recent comments are at the top.

    • 2ni from France 09 26 2013, 4:51 PM Report Spam
      sorry, I studied the corrected version v2013-09-19.kraven
    • 2ni from France 09 26 2013, 4:48 PM Report Spam
      just passed today with 910
      50 quest / 3 lab (eigrp, vtp, acl2 from 9tut)
      most quest was in this dump, FYI I studied 500 of the 670 items + 1 or 2 "exam"
      It was very useful, especially for ambigous quest
      thanks kraven, 9tut
    • Gopi from India 09 22 2013, 5:35 PM Report Spam
      Hi Guys,

      This is Gopi from Chennai, India.

      Hope everyone is safe and good.

      I booked the CCNA exam at 28 sep 13. Now i scared about CCNA exam bcoz someone told current valid dump is Cisco "Lead2pass 640-802 v2013-09-19 by Kraven 670q.vce" but i studied thoroughly "Cisco.Lead2pass.200-120.v2013-08-28.by.Spike.267q.vce"(267Q)

      Some one pls give the suggestion for which one is valid dump and can i proceed with spike(267Q) dump for my sceduled exam. you can reach me via gopimanees@gmail.com

      Advance thanks for your response.


    • khan from Pakistan 09 20 2013, 11:17 AM Report Spam
      for the 1st question
      Answers A B C are correct because A and B are the short form of 0:0:0:0:192:168:0:1 and 2002:c0a8:0101:0:0:0:0:0042 while C are normal IPv6 address.

      Answer D is correct because “::” is named the “unspecified” address and is typically used in the source field of a datagram that is sent by a device that seeks to have its IP address configured.

      Answer E is not correct because a global-unicast IPv6 address is started with binary 001, denoted as 2000::/3 in IPv6 and it also known as an aggregatable global unicast address.The 2000:: (in particular, 2000::/3) is just a prefix and is not a valid IPv6 address.

      The entire global-unicast IPv6 address range is from 2000::/128 to 3FFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF/128, resulting in a total usable space of over 42,535,295,865,117,307,932,921,825,928,971,000,000 addresses, which is only 1/8th of the entire IPv6 address space!


      for 2nd question

      only Point to Point option is correct. Because only in P2P links full duplex communication can occur. All other options are related to shared medium and are therefore half duplex

    • khan from Pakistan 09 20 2013, 11:07 AM Report Spam

      Also See: https://supportforums.cisco.com/thread/2187794

      Dynamic access-list doesn't provide time based security policy, you can set the idle and absolute time out, however, you can not set a specific time for the user to access resources.



      […]lock-and-key also has the following security benefits over standard and static extended access lists:

      •Lock-and-key uses a challenge mechanism to authenticate individual users.

      •Lock-and-key provides simpler management in large internetworks.

      •In many cases, lock-and-key reduces the amount of router processing required for access lists.

      •Lock-and-key reduces the opportunity for network break-ins by network hackers.

      With lock-and-key, you can specify which users are permitted access to which source and destination hosts. These users must pass a user authentication process before they are permitted access to their designated hosts. Lock-and-key creates dynamic user access through a firewall, without compromising other configured security restrictions.
      When to Use Lock-and-Key

      Two examples of when you might use lock-and-key follow:

      •When you want a specific remote user (or group of remote users) to be able to access a host within your network, connecting from their remote hosts via the Internet. Lock-and-key authenticates the user, then permits limited access through your firewall router for the individual's host or subnet, for a finite period of time.

      •When you want a subset of hosts on a local network to access a host on a remote network protected by a firewall. With lock-and-key, you can enable access to the remote host only for the desired set of local user's hosts. Lock-and-key require the users to authenticate through a TACACS+ server, or other security server, before allowing their hosts to access the remote hosts.

    • khan from Pakistan 09 20 2013, 11:05 AM Report Spam

      Which two statements apply to dynamic access lists (choose two)

      A – thay offer simpler managment in large internetworks
      F – they are used to authenticate individual users
      A&F are correct
      D – you can set a time-based security policy.
      is not correct because dynamic acls do NOT support specifying specific times of the day or days of the week in which a user is allowed or not.
      Instead what they allow is specifying idle or absolute timeout values.
      I believe what is meant by option D is specifying specific times &/or days which is not correct for dynamic acls.

    • mano from Australia 09 20 2013, 5:40 AM Report Spam
      Select the valid IPv6 addresses. (Choose all apply)
      A – ::192:168:0:1
      B – 2002:c0a8:101::42
      C – 2003:dead:beef:4dad:23:46:bb:101
      D – ::
      E – 2000::
      F – 2001:3452:4952:2837::

      Which is the correct?

      second ques:
      Which of the following is a characteristic of full-dupley communication?
      A CSMA/CD
      B CSMA/CA
      C It is a point-to-point only
      D Hub communication is done via full duplex

    • waqas from United Kingdom 09 20 2013, 3:52 AM Report Spam
      could you please share your experience of i-e Labs,& karven dumps.
    • Bhushan from India 09 20 2013, 3:33 AM Report Spam
      Hi Kraven,

      passes CCNA with 933. It was very helpful to practise with your file befor exam.

      Thanks a lot.


    • Kraven from United States 09 20 2013, 2:08 AM Report Spam
      @Jay got a 1000 on his pass and gave the these answer for the questions below.
      ExamB Q58 = C discarding
      ExamA Q34 = B,D
      ExamA Q38 = A
      ExamA Q56 = C
      ExamA Q60 = B and E
      ExamC Q45 = A,E,F
      ExamE Q73 = A,D
    • waqas from United Kingdom 09 20 2013, 2:08 AM Report Spam
      can you please confirm answer of Q72-test A. you put the right answer as A but i think D is the right answer.
    • sandmaj from South Africa 09 20 2013, 12:49 AM Report Spam
      @ khan and all tha can help

      Exam G, Q5
      Which two statements apply to dynamic access lists (choose two)

      A – thay offer simpler managment in large internetworks
      D – you can set a time-based security policy.
      F – they are used to authenticate individual users

      ***** why is the answer A & F ***** is it not A & D *****

      Please see statement below


      A dynamic access list is an access list that allows temporary access after a user has authenticated with the router. For example, in the field, you might want a Cisco engineer from the TAC to help you troubleshoot your network by logging into the routers. A dynamic access list could be created giving Cisco complete privileges for a predetermined amount of time. After a configured time limit expires, the session is closed and traffic is again denied. This form of access list is also referred to as lock-and-key security.

    • Aamir from Canada 09 20 2013, 12:02 AM Report Spam
      can any one tell what are the simulations they are asking in the exam. I have exam on 25th any tips or points.
    • kizilcikagaci from Turkey 09 19 2013, 7:45 PM Report Spam
      @neo, now I got the point that you meant. Subnetting a Class C (/24) IP block into 8 subnet by shifting the existing mask 3 bits will be appropriate for he conditions pointed out in the question. The question in the dump could be clarified a bit more.

      You already have posted five comments. Please try to post another later.

    • Neo from Romania 09 19 2013, 7:38 PM Report Spam
      No, it's wrong what you've written.After the, is the network. You should read the whole topic.
    • SS from Serbia 09 19 2013, 7:32 PM Report Spam 1st subnetwork – 2nd subnetwork – 3rd subnetwork – 4rd subnetwork – 5rd subnetwork – 6rd subnetwork 255.2555.255.224 – 7th subnetwork ? – 8th subnetwork ?

      This is not right?

    • Neo from Romania 09 19 2013, 7:15 PM Report Spam
      I guess you missunderstood the question.
      You'll have to subnet the /24 network in 8 /27 LANS to get the requestet 5 to 26 ip hosts. 1st subnetwork – 2nd subnetwork – 3rd subnetwork
      ………………………………………….. 255.2555.255.224 – 5th subnetwork – 6th subnetwork.

      You're not wasting a thing.

    • kizilcikagaci from Turkey 09 19 2013, 5:31 PM Report Spam
      @neo, answer is, i.e /27. To get a subnet containing 26 hosts, we must use minimum 5 host bits. This will allow 30 hosts in each subnet. If we used /28, we would get maximum 14 hosts in each subnet. Your choice, /24 prefix, allows 254 hosts in each subnet and wastes many IPs for the topology mentioned in the question.
    • diallo guinnée from Senegal 09 19 2013, 4:28 PM Report Spam
      Alhamdoullillah, Passed today CCNA with 828/825
      Thainks for all
      I want say some thing that it is better to do examen en english than franch
    • Neo from Romania 09 19 2013, 4:21 PM Report Spam
      Exam G Q14 – which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs with each LAN containing 5 to 26 hosts?

      Your answer is
      I say it's

      My explanation: So we need 8 LANs with max. 26 hosts. To get 26 hosts in the same subnet you need a /27 subnet. 8 LAN on /27 means an /24.

    • Aamir from Canada 09 19 2013, 4:18 PM Report Spam
      can any one tell what are the simulations they are asking in the exam. I have exam on 25th any tips or points.
    • rashmi from India 09 19 2013, 4:04 PM Report Spam
      shiv 3 option point to point is correct.
    • shiv from United States 09 19 2013, 3:40 PM Report Spam
      what of the following is the characteristics of full-duplex communication.
      1.Its a CSMA/CD network
      2.Its a CSMA/CA network
      3.Point to Point
      4.HUb communication

      according to the dumps its Hub communication. Hub operates in half-duplex

      what is the correct answer

    • dlci from Germany 09 19 2013, 1:36 PM Report Spam
      typo 4.Lowest "send port ID".

      4.Lowest "sender port ID"

      and regarding point 3 & 4 remember both are of the sender which it sends through the BPDU and not the local ones.

    • dlci from Germany 09 19 2013, 1:29 PM Report Spam

      Remember ports of root bridge are ALWAYS designated. (*)

      If a root bridge is directly connected to another switch using 2 links (this statement implies that root bridge has been elected already), then one of the ports of the other switch will remain in forwarding state according following to the criteria:

      1.Lowest "path cost to root bridge". If tied then:

      2.Lowest "sender bridge ID". If tied then:

      3.Lowest "sender port priority". If tied then:

      4.Lowest "send port ID".

      Port(s) not satisfying the criteria will be blocked.

      (There is only exception to this rule in a very rare and highly unlikely scenario which discussed neither at CCNA level nor at CCNP level at probably not at CCIE level too. The exception to this rule is when a physical loop is created between two ports of a root bridge (like taking cross over cable and plugging both ends of it in the same bridge, or connecting both ports to a hub. In this case one port will be blocked according to the tiebreaking rules and under the show spanning-tree command the port type will be "Shr" meaning shared instead of P2p. Again this is a rarity)

    • kizilcikagaci from Turkey 09 19 2013, 1:20 PM Report Spam
      @kraven, PVST+ is different from Rapid-PVST. Information you found about Exam B Q58 is related with PVST+. But in the question, RPVST is asked. While RPVST (PVRST) is based on RSTP, PVST+ is based on STP.


    • kizilcikagaci from Turkey 09 19 2013, 1:18 PM Report Spam
      @kraven, PVST+ is different from Rapid-PVST. Information you found is related with PVST+. While RPVST (PVRST) is based on STP, PVST+ is based on STP.
    • John A from United Kingdom 09 19 2013, 1:14 PM Report Spam
      Thanks for the latest dumps Kraven.

      Is it possible to make a list with all the corrections that you have done?


    • v from United States 09 19 2013, 12:44 PM Report Spam
      I posted a comment yesterday for the previous version of the dump so reposting it here again.

      Exam 2, Q25 About STP.
      The answer "D. Switch is not the root bridge because not all of interfaces roles are designated" looks incorrect to me. If all ports are designated the switch is the root bridge but not vice versa. Just imagine a root bridge connected to another switch with 2 ports. One of them will be designated while another will be blocked. I guess the correct answer is "B. Per VLAN STP".

    • dlci from Norway 09 19 2013, 12:40 PM Report Spam
      @kraven both have the same effect.

      Actual command is show interfaces. show interface is just a short form of it like sh int.

      R1#show interface?

      In both cases

      R1#show interfaces serial
      % Incomplete command.

      R1#show interface serial
      % Incomplete command.

      So option D is incomplete command. If this question comes up in exam I'll go for show frame-relay map.

    • Kraven from United States 09 19 2013, 12:15 PM Report Spam
      @Khan I did not look at the question before sending last message. The text for answer D is show interface serial and not show interfaces serial. So the command is valid.
    • Kraven from United States 09 19 2013, 12:11 PM Report Spam
      @Khan Looks to me like you are right. Show interface is not the same as "show interfaces" which makes the answer incorrect.
    • khan from Pakistan 09 19 2013, 11:57 AM Report Spam

      Thank you for your response.

      Just to clear things up further. I didn't get this part

      "The show interface command gives you what you need with the least amount of commands to enter"

      as both commands are single lined and can run from user exec and prv exec mode. Actually show frame-relay map is more convenient as it shows encapsulations of all pvcs using a single command (also tells the encap of each pvc if there are multiple on an interface) and with show interfaces you have to go through each interface to get the information, also it doesn't show the encapsulation of the pvcs.

      as a side note if we go all literal with option D this is what happens. lol

      R1#show interfaces serial
      % Incomplete command.

    • Kraven from United States 09 19 2013, 11:42 AM Report Spam
      @kizilcikagaci This is what I also found about ExamB Q58. Can someone else confirm or give more about this question.

      PVST+ is based on IEEE802.1D Spanning Tree Protocol (STP). But PVST+ has
      only 3 port states (discarding, learning and forwarding) while STP has 5 port states (blocking,
      listening, learning, forwarding and disabled). So discarding is a new port state in PVST+.

    • Kraven from United States 09 19 2013, 11:40 AM Report Spam
      @Khan I spoke to a friend which teaches CCNA and he told me Cisco always wants you to take the easiest path to get the information you need. The show interface c


Site Search:

Site Search:

Terms of Service

Proudly powered by www.iexamcollection.com