icnd 100 105 [Aug 2017]

Our pass rate is high to 98.9% and the similarity percentage between our ccna 100 105 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco ccna 100 105 exam in just one try? I am currently studying for the Cisco ccna 100 105 exam. Latest Cisco ccent 100 105 pdf Test exam practice questions and answers, Try Cisco ccent ccna icnd1 100 105 official cert guide Brain Dumps First.

2017 NEW RECOMMEND

Free VCE & PDF File for Cisco 100-105 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/100-105-dumps.html

Q41. – (Topic 3) 

Refer to the exhibit. 

Which two statements are correct? (Choose two.) 

A. This is a default route. 

B. Adding the subnet mask is optional for the ip route command. 

C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA. 

D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address. 

E. The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network can reach network 10.0.0.0. 

Answer: A,C 

Explanation: 

This is obviously the default route which is set between the routers and since it is entered in such a manner that it ensures connectivity between the stub network and any host lying beyond RouterA. 

Q42. – (Topic 1) 

Refer to the exhibit. 

Host A is sending a packet to Host B for the first time. What destination MAC address will Host A use in the ARP request? 

A. 192.168.0.1 

B. 172.16.0.50 

C. 00-17-94-61-18-b0 

D. 00-19-d3-2d-c3-b2 

E. ff-ff-ff-ff-ff-ff 

F. 255.255.255.255 

Answer: E Explanation: 

For the initial communication, Host A will send a broadcast ARP (all F's) to determine the correct address to use to reach the destination. ARP sends an Ethernet frame called an ARP request to every host on the shared link-layer legmen. The Ethernet header includes the source host MAC address and a destination address of all Fs representing a broadcast frame. The ARP request contains the sender's MAC and IP address and the target (destination) IP address. The target's MAC address is set to all 0s. ARP Request 

Reference: 

http://www.technicalhowto.com/protocols/arp/arp.html 

Q43. – (Topic 1) 

Which of the following are types of flow control? (Choose three.) 

A. buffering 

B. cut-through 

C. windowing 

D. congestion avoidance 

E. load balancing 

Answer: A,C,D 

Explanation: 

During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion". 

Buffering The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering". Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup. This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increases it to say 5 for example. Windowing is used only by TCP since UDP doesn't use or allow flow control. 

Reference: http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php 

Q44. – (Topic 3) 

Refer to the exhibit. 

If the router Cisco returns the given output and has not had its router ID set manually, what value will OSPF use as its router ID? 

A. 192.168.1.1 

B. 172.16.1.1 

C. 1.1.1.1 

D. 2.2.2.2 

Answer:

Explanation: 

If a router-id is not configured manually in the OSPF routing process the router will automatically configure a router-id determined from the highest IP address of a logical interface (loopback interface) or the highest IP address of an active interface. If more than one loopback interfaces are configured, the router will compare the IP addresses of each of the interfaces and choose the highest IP address from the loopbacks. 

Q45. – (Topic 1) 

A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.) 

A. A crossover cable should be used in place of the straight-through cable. 

B. A rollover cable should be used in place of the straight-through cable. 

C. The subnet masks should be set to 255.255.255.192 

D. A default gateway needs to be set on each host. 

E. The hosts must be reconfigured to use private IP addresses for direct connections of this type. 

F. The subnet masks should be set to 255.255.255.0 

Answer: A,F 

Explanation: 

If you need to connect two computers but you don't have access to a network and can't set up an ad hoc network, you can use an Ethernet crossover cable to create a direct cable connection. Generally speaking, a crossover cable is constructed by reversing (or crossing over) the order of the wires inside so that it can connect two computers directly. A crossover cable looks almost exactly like a regular Ethernet cable (a straight-through cable), so make sure you have a crossover cable before following these steps. 

Both devices need to be on the same subnet, and since one PC is using 192.1.1.20 and the other is using 192.1.1.201, the subnet mask should be changed to 255.255.255.0. 

Q46. – (Topic 3) 

Refer to the exhibit. 

A network associate has configured OSPF with the command: 

City(config-router)# network 192.168.12.64 0.0.0.63 area 0 

After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF. Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? (Choose three.) 

A. FastEthernet0 /0 

B. FastEthernet0 /1 

C. Serial0/0 

D. Serial0/1.102 

E. Serial0/1.103 

F. Serial0/1.104 

Answer: B,C,D 

Explanation: 

The “network 192.168.12.64 0.0.0.63 equals to network 192.168.12.64/26. This network has: 

+

 Increment: 64 (/26= 1111 1111.1111 1111.1111 1111.1100 0000) 

+

 Network address: 192.168.12.64 

+

 Broadcast address: 192.168.12.127 

Therefore all interface in the range of this network will join OSPF. 

Q47. – (Topic 7) 

Which RFC was created to alleviate the depletion of IPv4 public addresses? 

A. RFC 4193 

B. RFC 1519 

C. RFC 1518 

D. RFC 1918 

Answer:

Q48. – (Topic 3) 

Which option is a valid IPv6 address? 

A. 2001:0000:130F::099a::12a 

B. 2002:7654:A1AD:61:81AF:CCC1 

C. FEC0:ABCD:WXYZ:0067::2A4 

D. 2004:1:25A4:886F::1 

Answer:

Explanation: 

IPv6 Address Notation IPv6 addresses are denoted by eight groups of hexadecimal quartets separated by colons in between them. Following is an example of a valid IPv6 address: 2001:cdba:0000:0000:0000:0000:3257:9652 Any four-digit group of zeroes within an IPv6 address may be reduced to a single zero or altogether omitted. Therefore, the following IPv6 addresses are similar and equally valid: 2001:cdba:0000:0000:0000:0000:3257:9652 2001:cdba:0:0:0:0:3257:9652 2001:cdba::3257:9652 

Reference: http://www.ipv6.com/articles/general/IPv6-Addressing.htm 

Q49. – (Topic 5) 

Why would a network administrator configure port security on a switch? 

A. to prevent unauthorized Telnet access to a switch port 

B. to prevent unauthorized hosts from accessing the LAN 

C. to limit the number of Layer 2 broadcasts on a particular switch port 

D. block unauthorized access to the switch management interfaces 

Answer:

Explanation: 

You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. 

Q50. – (Topic 7) 

When enabled, which feature prevents routing protocols from sending hello messages on an interface'? 

A. virtual links 

B. passive-interface 

C. directed neighbors 

D. OSPF areas 

Answer:

Explanation: You can use the passive-interface command in order to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while it allows updates to be exchanged normally over other interfaces. With most routing protocols, the passive-interface command restricts outgoing advertisements only. But, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, which results in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates. This document also discusses the configuration required in order to allow the suppression of outgoing routing updates, while it also allows incoming routing updates to be learned normally from the neighbor. 

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.