2014 Latest Cisco 200-120 Dump Free Download(121-130)!

What command is used to verify the DLCI destination address in a Frame Relay static configuration?

A.    show frame-relay pvc
B.    show frame-relay lmi
C.    show frame-relay map
D.    show frame relay end-to-end

Answer: C
Sample “show frame-relay map” output:
R1#sh frame mapSerial0/0 (up): ip dlci 401(0x191,0x6410), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip dlci 403(0x193,0x6430), dynamic,broadcast,, status defined, activeSerial0/0 (up): ip dlci 401(0x191,0x6410), static,CISCO, status defined, active

What is the purpose of Inverse ARP?

A.    to map a known IP address to a MAC address
B.    to map a known DLCI to a MAC address
C.    to map a known MAC address to an IP address
D.    to map a known DLCI to an IP address
E.    to map a known IP address to a SPID
F.    to map a known SPID to a MAC address

Answer: D
Dynamic address mapping relies on the Frame Relay Inverse Address Resolution Protocol (Inverse ARP), defined by RFC 1293, to resolve a next hop network protocol (IP) address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its Frame Relay PVC to discover the protocol address of the remote device connected to the Frame Relay network. The responses to the Inverse ARP requests are used to populate an address-to-DLCI mapping table on the Frame Relay router or access server. The router builds and maintains this address-to- DLCI mapping table, which contains all resolved Inverse ARP requests, including both dynamic and static mapping entries.

How does using the service password-encryption command on a router provide additional security?

A.    by encrypting all passwords passing through the router
B.    by encrypting passwords in the plain text configuration file
C.    by requiring entry of encrypted passwords for access to the device
D.    by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E.    by automatically suggesting encrypted passwords for use in configuring the router

Answer: B
By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file

Refer to the exhibit. Switch port FastEthernet 0/24 on ALSwitch1 will be used to create an IEEE 802.1Q-compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached?


A.    VLANs have not been created yet.
B.    An IP address must be configured for the port.
C.    The port is currently configured for access mode.
D.    The correct encapsulation type has not been configured.
E.    The no shutdown command has not been entered for the port.

Answer: C
According to the output shown the switchport (layer 2 Switching) is enabled and the port is in access mode. To make a trunk link the port should configured as a trunk port, not an access port, by using the following command: (Config-if)#switchport mode trunk

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?

A.    the OSPF route
B.    the EIGRP route
C.    the RIPv2 route
D.    all three routes
E.    the OSPF and RIPv2 routes

Answer: B
When one route is advertised by more than one routing protocol, the router will choose to use the routing protocol which has lowest Administrative Distance. The Administrative Distances of popular routing protocols are listed below:


A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?

A.    service password-encryption
access-list 1 permit
line vty 0 4
password cisco
access-class 1
B.    enable password secret
line vty 0
password cisco
C.    service password-encryption
line vty 1
password cisco
D.    service password-encryption
line vty 0 4
password cisco

Answer: C
Only one VTY connection is allowed which is exactly what’s requested.
Incorrect answer: command.
line vty0 4
would enable all 5 vty connections.

What is the effect of using the service password-encryption command?

A.    Only the enable password will be encrypted.
B.    Only the enable secret password will be encrypted.
C.    Only passwords configured after the command has been entered will be encrypted.
D.    It will encrypt the secret password and remove the enable secret password from the configuration.
E.    It will encrypt all current and future passwords.

Answer: E
Enable vty, console, AUX passwords are configured on the Cisco device. Use the show run command to show most passwords in clear text. If the service password-encryption is used, all the passwords are encrypted. As a result, the security of device access is improved.

Refer to the exhibit. What is the effect of the configuration that is shown?


A.    It configures SSH globally for all logins.
B.    It tells the router or switch to try to establish an SSh connection first and if that fails to use Telnet.
C.    It configures the virtual terminal lines with the password 030752180500.
D.    It configures a Cisco network device to use the SSH protocol on incoming communications via the
virtual terminal ports.
E.    It allows seven failed login attempts before the VTY lines are temporarily shutdown.

Answer: D
Secure Shell (SSH) is a protocol which provides a secure remote access connection to network devices. Communication between the client and server is encrypted in both SSH version 1 and SSH version 2. If you want to prevent non-SSH connections, add the “transport input ssh” command under the lines to limit the router to SSH connections only. Straight (non-SSH) Telnets are refused.
Reference: www.cisco.com/warp/public/707/ssh.shtml

Refer to the exhibit. What is the reason that the interface status is “administratively down, line protocol down”?


A.    There is no encapsulation type configured.
B.    There is a mismatch in encapsulation types.
C.    The interface is not receiving any keepalives.
D.    The interface has been configured with the shutdown command.
E.    The interface needs to be configured as a DTE device.
F.    The wrong type of cable is connected to the interface.

Answer: D
Interface can be enabled or disabled with shutdown/no shutdown command. If you interface is down, it will display administratively down status. You can bring up an interface having administratively down interface using no shutdown command.

Refer to the exhibit. When running OSPF, what would cause router A not to form an adjacency with router B?


A.    The loopback addresses are on different subnets.
B.    The values of the dead timers on the routers are different.
C.    Route summarization is enabled on both routers.
D.    The process identifier on router A is different than the process identifier on router B.

Answer: B
To form an adjacency (become neighbor), router A & B must have the same Hello interval, Dead interval and AREA number.s

If you want to pass the Cisco 200-120 Exam sucessfully, recommend to read latestCisco 200-120 Dum full version.