The Secret of ccna 100 105

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/100-105-dumps.html


100-105 Product Description:
Exam Number/Code: 100-105 vce
Exam name: Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
n questions with full explanations
Certification: Cisco Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Cisco 100-105 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)

100-105 examcollection

It is more faster and easier to pass the Cisco ccent ccna icnd1 100 105 official cert guide exam by using Exact Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) questuins and answers. Immediate access to the Abreast of the times 105 100 Exam and find the same core area icnd 100 105 questions with professionally verified answers, then PASS your exam with a high score now.

Q101. - (Topic 5) 

Refer to the exhibit. 

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 

192.168.1.1 through 192.168.5.255 

192.168.100.1 through 192.168.100.255 

What are three problems with this design? (Choose three.) 

A. The AREA 1 IP address space is inadequate for the number of users. 

B. The AREA 3 IP address space is inadequate for the number of users. 

C. AREA 2 could use a mask of /25 to conserve IP address space. 

D. The network address space that is provided requires a single network-wide mask. 

E. The router-to-router connection is wasting address space. 

F. The broadcast domain in AREA 1 is too large for IP to function. 

Answer: A,C,E 

Explanation: 

The given IP addresses of areas 1 and 3 along with network masks of /24 cannot accommodate 500 users so are inadequate, while the area 2 is having over capacity so its network mask can be reduced to /25 to accommodate the only 60 users it has. 


Q102. - (Topic 3) 

Which two of these functions do routers perform on packets? (Choose two.) 

A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets 

B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops 

C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets 

D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations 

E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops 

F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations 

Answer: B,C 

Explanation: 

This is the basic function of the router to receive incoming packets and then forward them to their required destination. This is done by reading layer 3 headers of inbound packets and update the info to layer 2 for further hopping. 


Q103. - (Topic 5) 

Select two options which are security Issues which need to be modified before RouterA is used? (Choose two.) 

A. unencrypted weak password is configured to protect privilege mode 

B. inappropriate wording in banner message 

C. the virtual terminal lines have a weak password configured 

D. virtual terminal lines have a password, but it will not be used 

E. configuration supports un-secure web server access 

Answer: B,D 


Q104. - (Topic 5) 

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) 

A. Allow unrestricted access to the console or VTY ports. 

B. Use a firewall to restrict access from the outside to the network devices. 

C. Always use Telnet to access the device command line because its data is automatically encrypted. 

D. Use SSH or another encrypted and authenticated transport to access device configurations. 

E. Prevent the loss of passwords by disabling password encryption. 

Answer: B,D 

Explanation: 

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH. 


Q105. - (Topic 1) 

Refer to the exhibit. 

Host A is sending a packet to Host B for the first time. What destination MAC address will Host A use in the ARP request? 

A. 192.168.0.1 

B. 172.16.0.50 

C. 00-17-94-61-18-b0 

D. 00-19-d3-2d-c3-b2 

E. ff-ff-ff-ff-ff-ff 

F. 255.255.255.255 

Answer: E Explanation: 

For the initial communication, Host A will send a broadcast ARP (all F's) to determine the correct address to use to reach the destination. ARP sends an Ethernet frame called an ARP request to every host on the shared link-layer legmen. The Ethernet header includes the source host MAC address and a destination address of all Fs representing a broadcast frame. The ARP request contains the sender's MAC and IP address and the target (destination) IP address. The target's MAC address is set to all 0s. ARP Request 

Reference: 

http://www.technicalhowto.com/protocols/arp/arp.html 


Q106. - (Topic 3) 

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address? 

A. 192.168.1.8/29 

B. 192.168.1.32/27 

C. 192.168.1.40/29 

D. 192.168.1.16/28 

E. 192.168.1.48/29 

Answer:

Explanation: 

248 mask uses 5 bits (1111 1000) 

42 IP in binary is (0010 1010) 

The base subnet therefore is the lowest binary value that can be written without changing 

the output of an AND operation of the subnet mask and IP... 

1111 1000 AND 

0010 1010 equals 

0010 1000 - which is .40 

/24 is standard class C mask. 

Adding the 5 bits from the .248 mask gives /29 


Q107. - (Topic 3) 

Refer to the exhibit. 

The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? 

A. 255.255.255.192 

B. 255.255.255.224 

C. 255.255.255.240 

D. 255.255.255.248 

E. 255.255.255.252 

Answer:

Explanation: 

Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts. 


Q108. - (Topic 3) 

An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. 

Which of the following should be entered into the IP properties box for the sales server? 

A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9 

B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1 

C. IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25 

D. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17 

E. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.25 

Answer:

Explanation: 

With network 192.168.20.24/29 we have: 

Increment: 8 (/29 = 255.255.255.248 = 11111000 for the last octet) 

Network address: 192.168.20.24 (because 24 = 8 * 3) 

Broadcast address: 192.168.20.31 (because 31 = 24 + 8 – 1) 

Therefore the first usable IP address is 192.168.20.25 (assigned to the router) and the last usable IP address is 192.168.20.30 (assigned to the sales server). The IP address of the router is also the default gateway of the sales server. 


Q109. - (Topic 2) 

Refer to the exhibit. 

The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. 

What two operations will the switch perform when it receives this frame? (Choose two.) 

A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table. 

B. The MAC address of 0000.00dd.dddd will be added to the MAC address table. 

C. The frame will be forwarded out of port fa0/3 only. 

D. The frame will be forwarded out of fa0/1, fa0/2, and fa0/3. 

E. The frame will be forwarded out of all the active ports. 

Answer: A,D 

Explanation: 

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table 


Q110. DRAG DROP - (Topic 4) 

Various protocols are listed on the left. On the right are applications for the use of those protocols. Drag the protocol on the left to an associated function for that protocol on the right. (Not all options are used.) 

Answer: 



To know more about the Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0), click here.