Pass4sure 100 105 icnd1 v3 0 Questions are updated and all 100 105 icnd1 v3 0 answers are verified by experts. Once you have completely prepared with our 105 100 exam prep kits you will be ready for the real cisco 100 105 pdf exam without a problem. We have Avant-garde Cisco 100 105 icnd1 dumps study guide. PASSED 100 105 icnd1 v3 0 First attempt! Here What I Did.
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 100-105 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q111. – (Topic 3)
What are two benefits of using a single OSPF area network design? (Choose two.)
A. It is less CPU intensive for routers in the single area.
B. It reduces the types of LSAs that are generated.
C. It removes the need for virtual links.
D. It increases LSA response times.
E. It reduces the number of required OSPF neighbor adjacencies.
OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement). The link types are as follows:
. LSA Type 1: Router LSA
LSA Type 2: Network LSA
LSA Type 3: Summary LSA
LSA Type 4: Summary ASBR LSA
LSA Type 5: Autonomous system external LSA
LSA Type 6: Multicast OSPF LSA
LSA Type 7: Not-so-stubby area LSA
LSA Type 8: External attribute LSA for BGP
If all routers are in the same area, then many of these LSA types (Summary ASBR LSA, external LSA, etc) will not be used and will not be generated by any router.
All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non-backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. Virtual links are not ideal and should really only be used for temporary network solutions or migrations. However, if all locations are in a single OSPF area this is not needed.
Q112. – (Topic 7)
Which feature allows a device to use a switch port that is configured for half-duplex to access the network?
C. port security
D. split horizon
Ethernet began as a local area network technology that provided a half-duplex shared channel for stations connected to coaxial cable segments linked with signal repeaters. In this appendix, we take a detailed look at the half-duplex shared-channel mode of operation, and at the CSMA/CD mechanism that makes it work. In the original half-duplex mode, the CSMA/CD protocol allows a set of stations to compete for access to a shared Ethernet channel in a fair and equitable manner. The protocolâs rules determine the behavior of Ethernet stations, including when they are allowed to transmit a frame onto a shared Ethernet channel, and what to do when a collision occurs. Today, virtually all devices are connected to Ethernet switch ports over full-duplex media, such as twisted-pair cables. On this type of connection, assuming that both devices can support the full-duplex mode of operation and that Auto-Negotiation (AN) is enabled, the AN protocol will automatically select the highest-performance mode of operation supported by the devices at each end of the link. That will result in full-duplex mode for the vast majority of Ethernet connections with modern interfaces that support full duplex and AN.
Q113. – (Topic 5)
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
A. decrease the window size
B. use a different source port for the session
C. decrease the sequence number
D. obtain a new IP address from the DHCP server
E. start a new session using UDP
Answer: A Explanation:
The Window bit in the header determines the number of segments that can be sent at a time. This is done to avoid overwhelming the destination. At the start of the session the window in small but it increases over time. The destination host can also decrease the window to slow down the flow. Hence the window is called the sliding window. When the source has sent the number of segments allowed by the window, it cannot send any further segments till an acknowledgement is received from the destination. On networks with high error rates or issues, decreasing the window size can result in more reliable transmission, as the receiver will need to acknowledge fewer segments. With a large window size, the sender will need to resend all the frames if a single one is not received by the receiver.
Q114. – (Topic 4)
Refer to the exhibit.
A company wants to use NAT in the network shown. Which commands will apply the NAT configuration to the proper interfaces? (Choose two.)
A. R1(config)# interface serial0/1 R1(config-if)# ip nat inside
B. R1(config)# interface serial0/1 R1(config-if)# ip nat outside
C. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside
D. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat outside
E. R1(config)# interface serial0/1 R1(config-if)# ip nat outside source pool 126.96.36.199 255.255.255.252
F. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside source 10.10.0.0 255.255.255.0
For NAT, you need to define which interfaces are inside and which are outside. The outside interface is the one that connects to the external network, and the one that will be used for translating addresses. The inside interface is for the internal network, and defines the network IP addresses that will get translated to the one specified in the outside network.
Q115. – (Topic 3)
Which statement is true?
A. An IPv6 address is 64 bits long and is represented as hexadecimal characters.
B. An IPv6 address is 32 bits long and is represented as decimal digits.
C. An IPv6 address is 128 bits long and is represented as decimal digits.
D. An IPv6 address is 128 bits long and is represented as hexadecimal characters.
One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID
Q116. – (Topic 3)
Refer to the exhibit.
PC1 pings PC2. What three things will CORE router do with the data that is received from PC1? (Choose three.)
A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router.
B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router.
C. CORE router will replace the destination IP address of the packets with the IP address of PC2.
D. CORE router will replace the MAC address of PC2 in the destination MAC address of the frames.
E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets.
F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address.
The router will forward the frames out the interface toward the destination â B is correct. Since the router will has the end station already in itâs MAC table as see by the âshow arpâ command, it will replace the destination MAC address to that of PC2 â D is correct. The router will then replace the source IP address to 172.16.40.1 â E is correct.
Q117. – (Topic 7)
Which method does a connected trunk port use to tag VLAN traffic?
A. IEEE 802 1w
B. IEEE 802 1D
C. IEEE 802 1Q
D. IEEE 802 1p
Q118. – (Topic 7)
Which route source code represents the routing protocol with a default administrative distance of 90 in the routing table?
SStatic EEGP DEIGRP RRIP OOSPF
Default Administrative distance of EIGRP protocol is 90 then answer is C
Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports:
Route Source Default Distance Values
Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown* 255
Q119. CORRECT TEXT – (Topic 6)
Router#config terminal Router(config)#hostname Apopka 2) Enable-secret password (cisco10): Apopka(config)#enable secret cisco10 3) Set the console password to RouterPass: Apopka(config)#line console 0 Apopka(config-line)#password RouterPass Apopka(config-line)#login Apopka(config-line)#exit 4) Set the Telnet password to scan90: Apopka(config)#line vty 0 4 Apopka(config-line)#password scan90 Apopka(config-line)#login Apopka(config-line)#exit 5) Configure Ethernet interface (on the right) of router Apopka: The subnet mask of the Ethernet network 188.8.131.52 is 27. From this subnet mask, we can find out the increment by converting it into binary form, that is /27 = 1111 1111.1111 1111.1111 1111.1110 0000. Pay more attention to the last bit 1 because it tells us the increment, using the formula: Increment = 2place of the last bit 1 (starts counting from 0,from right to left), in this case increment = 25 = 32. Therefore: Increment: 32 Network address: 184.108.40.206 Broadcast address: 220.127.116.11 (because 18.104.22.168 is the second subnetwork, so the previous IP – 22.214.171.124 – is the broadcast address of the first subnet). -> The second assignable host address of this subnetwork is 126.96.36.199/27 Assign the second assignable host address to Fa0/0 interface of Apopka router: Apopka(config)#interface Fa0/0 Apopka(config-if)#ip address 188.8.131.52 255.255.255.224 Apopka(config-if)#no shutdown Apopka(config-if)#exit 6) Configure Serial interface (on the left) of router Apopka: Using the same method to find out the increment of the Serial network: Serial network 192.0.2.128/28: Increment: 16 (/28 = 1111 1111.1111 1111.1111 1111.1111 0000) Network address: 192.0.2.128 (because 8 * 16 = 128 so 192.0.2.128 is also the network address of this subnet) Broadcast address: 192.0.2.143 -> The last assignable host address in this subnet is 192.0.2.142/28. Assign the last assignable host address to S0/0/0 interface of Apopka router: Apopka(config)#interface S0/0/0 (or use interface S0/0 if not successful) Apopka(config-if)#ip address 192.0.2.142 255.255.255.240 Apopka(config-if)#no shutdown Apopka(config-if)#exit 7) Configure RIP v2 routing protocol: Apopka(config)#router rip Apopka(config-router)#version 2 Apopka(config-router)#network 184.108.40.206 Apopka(config-router)#network 192.0.2.128 Apopka(config-router)#end Save the configuration: Apopka#copy running-config startup-config Finally, you should use the ping command to verify all are working properly!
Topic 7, Mix Questions
Q120. – (Topic 5)
Refer to the exhibit.
For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA.
Which command or series of commands will accomplish these objectives?
A. RTA(config)#no cdp run
B. RTA(config)#no cdp enable
C. RTA(config)#interface s0/0 RTA(config-if)#no cdp run
D. RTA(config)#interface s0/0 RTA(config-if)#no cdp enable
When CDP is enabled globally using the cdp run command, it is enabled by default on all supported interfaces (except for Frame Relay multipoint subinterfaces) to send and receive CDP information. You can disable CDP on an interface that supports CDP with the no cdp enable command.
Router#show cdp neighbors
Capability Codes: R – Router, T – Trans Bridge, B – Source Route Bridge S – Switch, H – Host, I – IGMP, r â Repeater
Router# On this router, CDP is enabled on Serial 1 and Ethernet 0 interfaces. Disable CDP on the Serial 1 interface and verify if the neighbor device is discovered on the serial 1 interface, as this output shows: Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface s1 Router(config-if)#no cdp enable Router(config-if)# Z Router#4w5D. %SYS-5-CONFIG_I: Configured from console by console