100-105 Guide

Getting Smart with: icnd 100 105

It is more faster and easier to pass the Cisco 100 105 exam exam by using High quality Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) questuins and answers. Immediate access to the Replace ccent 100 105 pdf Exam and find the same core area cisco 100 105 pdf questions with professionally verified answers, then PASS your exam with a high score now.

Q81. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 


Q82. - (Topic 3) 

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? 

A. 1 

B. 2 

C. 4 

D. 8 

E. 252 

F. 254 

Answer:

Explanation: 

/30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 which means 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet. 


Q83. - (Topic 1) 

Refer to the exhibit. 

What kind of cable should be used to make each connection that is identified by the numbers shown? 

A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable 

B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable 

C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable 

D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable 

E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable 

Answer:

Explanation: 

When connecting a PC to a switch, a standard Ethernet straight through cable should be used. This same cable should also be used for switch to router connections. Generally 

speaking, crossover cables are only needed when connecting two like devices (PC-PC, 

switch-switch, router-router, etc). 

Routers connect to frame relay and other WAN networks using serial cables. 

Rollover cables are special cables used for connecting to the console ports of Cisco 

devices. 


Q84. - (Topic 3) 

Refer to the exhibit. 

The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 

255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA? 

A. 192.168.1.31 

B. 192.168.1.64 

C. 192.168.1.127 

D. 192.168.1.190 

E. 192.168.1.192 

Answer:

Explanation: 

Subnet mask 255.255.255.224 with CIDR of /27 which results in 32 hosts per. 

192.168.1.31 is the broadcast address for sunbet '0' 

192.168.1.64 is the network address for subnet '2' 

192.168.1.127 is the broadcast address for subnet '3' 

192.168.1.192 is the network address for subnet '6' 


Q85. - (Topic 1) 

Refer to the exhibit. 

Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer:

Explanation: 

The Source and Destination IP address is not going to change. Host 1 IP address will stay 

as being the source IP and the Host 2 IP address will stay the destination IP address. 

Those two are not going to change. 

For the MAC address it is going to change each time it goes from one hope to another. 

(Except switches... they don't change anything) 

Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of 

Router 1. 

Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address. 


Q86. - (Topic 7) 

Which routing protocol has the smallest default administrative distance? 

A. IBGP 

B. OSPF 

C. IS-IS 

D. EIGRP 

E. RIP 

Answer:

Explanation: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/15986-admin-distance.html Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports: 

Route Source Default Distance Values 

Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown* 


Q87. - (Topic 3) 

Refer to the exhibit. 

The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2? 

A. Configure the router with the cdp enable command. 

B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces. 

C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces. 

D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces. 

Answer:

Explanation: 

If the no shut down commands are not entered, then CDP can exchange information between the two routers. By default, all Cisco device interfaces and ports are shut down and need to be manually enabled. 


Q88. - (Topic 5) 

The network administrator has found the following problem. 

The remote networks 172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the Central router's serial 0/0 interface. No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what is the most likely cause of the problem? 

A. no gateway of last resort on Central 

B. Central router's not receiving 172.16.20.0 update 

C. incorrect static route for 172.16.20.0 

D. 172.16.20.0 not located in Central's routing table 

Answer:

Explanation: 

If we use 172.16.20.0 to route to 172.16.150.15, then the packet will route back. To clear this error we have to use.#no ip route 172.16.20.0 255.255.255.0 172.16.150.15

.command in configuration mode. 


Q89. - (Topic 5) 

Refer to the exhibit. 

A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem? 

A. A remote physical layer problem exists. 

B. The host NIC is not functioning. 

C. TCP/IP has not been correctly installed on the host. 

D. A local physical layer problem exists. 

Answer:

Explanation: 

Here we see that the host is able to ping its own loopback IP address of 127.0.0.1 and it’s own IP address of 10.0.0.35, so we know that the NIC is functioning and that the host’s TCP/IP stack is OK. However, it is not able to ping the IP address of its local default gateway, so we know that there is a local cabling problem between the switch and the router. 


Q90. - (Topic 3) 

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the default and the router IDs are shown with each router. 

Which routers are likely to have been elected as DR? (Choose two.) 

A. Corp-1 

B. Corp-2 

C. Corp-3 

D. Corp-4 

E. Branch-1 

F. Branch-2 

Answer: D,F 

Explanation: 

There are 2 segments on the topology above which are separated by Corp-3 router. Each 

segment will have a DR so we have 2 DRs. 

To select which router will become DR they will compare their router-IDs. The router with 

highest (best) router-ID will become DR. The router-ID is chosen in the order below: 

+

 The highest IP address assigned to a loopback (logical) interface. 

+

 If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. 

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s physical interfaces. Router Corp-4 (10.1.40.40) 

& Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become DRs. 


To know more about the 100-105, click here.

Tagged as : Cisco 100-105 Dumps, Download 100-105 pdf, 100-105 VCE, 100-105 pass4sure, examcollection 100-105