Where to find ccent 100 105


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/100-105-dumps.html


100-105 Product Description:
Exam Number/Code: 100-105 vce
Exam name: ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
n questions with full explanations
Certification: Cisco Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Cisco 100-105 ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)

100-105 examcollection

We provide real ccna 100 105 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco cisco 100 105 Exam quickly & easily. The 100 105 exam PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 105 100 dumps pdf and vce product and material, you can easily pass the ccent ccna icnd1 100 105 exam.

P.S. Realistic 100-105 questions are available on Google Drive, GET MORE: https://drive.google.com/open?id=1bsb-sFsEjKH4qxNCkR_EoI2fGRgBevmQ


New Cisco 100-105 Exam Dumps Collection (Question 11 - Question 20)

Question No: 11

When you power up a Cisco router; in what memory is the start-up configuration normally stored in?

A. RAM

B. ROM

C. FLASH

D. NVRAM

Answer: D


Question No: 12

Which statement describes the effect of the exec-timeout 30 command?

A. The router maintains a user session indefinitely after it is active for 30 seconds.

B. The router disconnects the user session if it is inactive for 30 minutes.

C. The router maintains a user session indefinitely after it is active for 30 minutes.

D. The router disconnects a user session if it is inactive for 30 seconds.

Answer: B


Question No: 13

CORRECT TEXTThis topology contains 3 routers and 1 switch. Complete the topology.

Drag the appropriate device icons to the labeled Device

Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address

(Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology.

Use information gathered from the Main router to complete the configuration of any additional routers.

No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration.

Configure each additional router with the following:

Configure the interfaces with the correct IP address and enable the interfaces. Set the password to allow console access to consolepw

Set the password to allow telnet access to telnetpw

Set the password to allow privilege mode access to privpw

Not E: Because routes are not being added to the configurations, you will not be able to ping through the internetwork.

All devices have cable autosensing capabilities disabled. All hosts are PCu2019s

Answer:

Specify appropriate devices and drag them on the "Device" boxes

For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch

The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers

Place them on appropriate locations as following:

(Host D and host E will be automatically added after placing two routers. Click on them to access neighboring routers)

Specify appropriate connections between these devices:

+ The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable

+ The router on the right is connected with the Main router through Serial interfaces: use a serial cable

+ The router on the right and the Switch: use a straight-through cable

+ The router on the left and the computer: use a crossover cable

(To remember which type of cable you should use, follow these tips:

- To connect two serial interfaces of 2 routers we use serial cable

- To specify when we use crossover cable or straight-through cable, we should remember:

Group 1: Router, Host, Server

Group 2: Hub, Switch

One device in group 1 + One device in group 2: use straight-through cable

Two devices in the same group: use crossover cable

For example, we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server... and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host.)

Assign appropriate IP addresses for interfaces:

From Main router, use show running-config command.

(Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just used for demonstration)

From the output we learned that the ip address of Fa0/0 interface of the Main router is 192.168.152.177/28. This address belongs to a subnetwork which has:

Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000)

Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177)

Broadcast address: 192.168.152.191 (because 191 = 176 + 16 - 1)

And we can pick up an ip address from the list that belongs to this subnetwork:

192.168.152.190 and assign it to the Fa0/0 interface the router on the left

Use the same method for interface Serial0/0 with an ip address of 192.168.152.161 Increment: 16

Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161)

Broadcast address: 192.168.152.175 (because 176 = 160 + 16 - 1)

-> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right Interface Fa0/1 of the router on the left

IP (of the computer on the left) : 192.168.152.129/28 Increment: 16

Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129)

Broadcast address: 192.168.152.143 (because 143 = 128 + 16 - 1)

-> we choose 192.168.152.142 from the list Interface Fa0/0 of the router on the right

IP (of the computer on the left) : 192.168.152.225/28 Increment: 16

Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225)

Broadcast address: 192.168.152.239 (because 239 = 224 + 16 - 1)

-> we choose 192.168.152.238 from the list

Let's have a look at the picture below to summarize

Configure two routers on the left and right with these commands: Router1 = router on the left

Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces: Router1>enable

Router1#configure terminal Router1(config)#interface fa0/0

Router1(config-if)#ip address 192.168.152.190 255.255.255.240 Router1(config-if)#no shutdown

Router1(config-if)#interface fa0/1

Router1(config-if)#ip address 192.168.152.142 255.255.255.240 Router1(config-if)#no shutdown

Set passwords (configure on two routers)

+ Console password: Router1(config-if)#exit Router1(config)#line console 0

Router1(config-line)#password consolepw Router1(config-line)#login

Router1(config-line)#exit

+ Telnet password: Router1(config)#line vty 0 4 Router1(config-line)#password telnetpw Router1(config-line)#login Router1(config-line)#exit

+ Privilege mode password: Router1(config)#enable password privpw Save the configuration: Router1(config)#exit

Router1#copy running-config startup-config

Configure IP addresses of Router2 (router on the right) Router2>enable

Router2#configure terminal Router2(config)#interface fa0/0

Router2(config-if)#ip address 192.168.152.238 255.255.255.240 Router2(config-if)#no shutdown

Router2(config-if)#interface serial0/0

Router2(config-if)#ip address 192.168.152.174 255.255.255.240 Router2(config-if)#no shutdown

Then set the console, telnet and privilege mode passwords for Router2 as we did for Router1, remember to save the configuration when you finished.

Topic 7, Mix Questions

204.Which statement about 6to4 tunneling is true?

A. One tunnel endpoint must be configured with IPv4 only

B. It establishes a point-to-point tunnel

C. Both tunnel endpoints must be configured with IPv4 only

D. Both tunnel endpoints must support IPv4 and IPv6


Question No: 14

Which feature allows a device to use a switch port that is configured for half-duplex to access the network?

A. CSMA/CD

B. IGMP

C. port security

D. split horizon

Answer: A

Explanation:

Ethernet began as a local area network technology that provided a half-duplex shared channel for stations connected to coaxial cable segments linked with signal repeaters. In this appendix, we take a detailed look at the half-duplex shared-channel mode of operation, and at the CSMA/CD mechanism that makes it work.

In the original half-duplex mode, the CSMA/CD protocol allows a set of stations to compete for access to a shared Ethernet channel in a fair and equitable manner. The protocolu2019s rules determine the behavior of Ethernet stations, including when they are allowed to transmit a frame onto a shared Ethernet channel, and what to do when a collision occurs. Today, virtually all devices are connected to Ethernet switch ports over full-duplex media, such as twisted-pair cables. On this type of connection, assuming that both devices can support the full-duplex mode of operation and that Auto-Negotiation (AN) is enabled, the AN protocol will automatically select the highest-performance mode of operation supported

by the devices at each end of the link. That will result in full-duplex mode for the vast majority of Ethernet connections with modern interfaces that support full duplex and AN.


Question No: 15

Which component of a routing table entry represents the subnet mask?

A. routing protocol code

B. prefix

C. metric

D. network mask

Answer: D

Explanation:

IP Routing Table Entry TypesAn entry in the IP routing table contains the following information in the order presented:

Network ID. The network ID or destination corresponding to the route. The network ID can be class-based, subnet, or supernet network ID, or an IP address for a host route. Network Mask. The mask that is used to match a destination IP address to the network ID. Next Hop. The IP address of the next hop.

Interface. An indication of which network interface is used to forward the IP packet. Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID.

Routing table entries can be used to store the following types of routes:

Directly Attached Network IDs. Routes for network IDs that are directly attached. For

directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network.

Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network.

Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per- IP address basis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255.

Default Route. The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 0.0.0.0.


Question No: 16

On which type of device is every port in the same collision domain?

A. a router

B. a Layer 2 switch

C. a hub

Answer: C

Explanation: Collision domainA collision domain is, as the name implies, a part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. The packets collide and both devices must send the packets again, which reduces network efficiency. Collisions are often in a hub environment, because each port on a hub is in the same collision domain. By contrast, each port on a bridge, a switch or a router is in a separate collision domain.


Question No: 17

In which circumstance is static routing most useful?

A. on a stub network

B. on a network with frequent routingchanges

C. on a network that experiences frequent link failures

D. on a large network that must share routes quickly between routers

Answer: A


Question No: 18

Which statement describes the effect of the overload keyword in the ip nat inside source list 90 interface ethernet 0/0 overload command?

A. Addresses that match address list inside are translated to the IP address of the Ethernet 0/0 interface.

B. Hosts that match access inside are translated to an address m the Ethernet 0/0 network.

C. Hosts on the Ethernet 0/0 LAN are translated to the address pool in access list 90.

D. Addresses that match access list 90 are translated through PAT to the IP address of the Ethernet 0/0 interface

Answer: D


Question No: 19

Which information is used to install the best route to a destination in IP routing table?

A. the tunnel ID

B. the prefix length

C. the interface number

D. the autonomous system

Answer: B


Question No: 20

Which statement about the inside interface configuration in a NAT deployment is true?

A. It is defined globally

B. It identifies the location of source addresses for outgoing packets to be translated using access or route maps.

C. It must be configured if static NAT is used

D. It identifies the public IP address that traffic will use to reach the internet.

Answer: B

Explanation:

This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about the benefits of configuring NAT for IP address conservation. NAT enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT operates on a device, usually connecting two networks, and translates the private (not globally unique) addresses in the internal network into legal addresses before packets are forwarded onto another network. NAT can be configured to advertise to the outside world only one address for the entire network. This ability provides additional security by effectively hiding the entire internal network behind that one address.

NAT is also used at the enterprise edge to allow internal users access to the Internet and to allow Internet access to internal devices such as mail servers.



To know more about the ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0), click here.

P.S. Easily pass 100-105 Exam with Certleader Realistic Dumps & pdf vce, Try Free: https://www.certleader.com/100-105-dumps.html (347 New Questions)