Counting on outstanding technology, much better service for patrons. Testking provide Round the clock customer support for Cisco examinee and you can acquire what you would like realize at any time. Your fulfillment of our 100-105 will be our service objective, their shared improvement with customers will be our persistent quest inside a large number. Thus please do not hesitate to contact us when you have any queries of 100-105 test.
2021 Nov 100-105 test question
Q21. - (Topic 3)
The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements.
Which three items will adequately fulfill the request? (Choose three).
A. One IP subnet with a mask of 255.255.254.0
B. Two IP subnets with a mask of 255.255.255.0
C. Seven 48-port hubs
D. Seven 48-port switches
E. One router interface
F. Seven router interfaces
To support 300 workstations in a single broadcast domain, we need to use a subnet mask
which supports 512 hosts = 29-> /23 or 255.255.254.0 in decimal form -> A is correct.
If we use 48-port switches we need 300/48 = 6.25 -> seven 48-port switches are enough
because we also need trunking between them -> D is correct.
We only need one router interface and it is connected with one of seven switches -> E is
Q22. - (Topic 7)
On which type of device is every port in the same collision domain?
A. a router B. a Layer 2 switch
C. a hub
Explanation: Collision domainA collision domain is, as the name implies, a part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. The packets collide and both devices must send the packets again, which reduces network efficiency. Collisions are often in a hub environment, because each port on a hub is in the same collision domain. By contrast, each port on a bridge, a switch or a router is in a separate collision domain.
Q23. - (Topic 5)
Which of the following is true regarding the configuration of SwitchA?
A. only 5 simultaneous remote connections are possible
B. remote connections using ssh will require a username and password
C. only connections from the local network will be possible
D. console access to SwitchA requires a password
Q24. - (Topic 5)
Refer to the exhibit.
The network administrator is testing connectivity from the branch router to the newly installed application server. What is the most likely reason for the first ping having a success rate of only 60 percent?
A. The network is likely to be congested, with the result that packets are being intermittently dropped.
B. The branch router had to resolve the application server MAC address.
C. There is a short delay while NAT translates the server IP address.
D. A routing table lookup delayed forwarding on the first two ping packets.
E. The branch router LAN interface should be upgraded to FastEthernet.
Initially the MAC address had to be resolved, but once it is resolved and is in the ARP table of the router, pings go through immediately.
Q25. - (Topic 3)
What does administrative distance refer to?
A. the cost of a link between two neighboring routers
B. the advertised cost to reach a network
C. the cost to reach a network that is administratively set
D. a measure of the trustworthiness of a routing information source
Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value.
Administrative distance is the first criterion that a router uses to determine which routing protocol to use if two protocols provide route information for the same destination. Administrative distance is a measure of the trustworthiness of the source of the routing information. The smaller the administrative distance value, the more reliable the protocol.
Far out 100-105 free exam:
Q26. - (Topic 3)
Which two of these functions do routers perform on packets? (Choose two.)
A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets
B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops
C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets
D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations
E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops
F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations
This is the basic function of the router to receive incoming packets and then forward them to their required destination. This is done by reading layer 3 headers of inbound packets and update the info to layer 2 for further hopping.
Q27. - (Topic 1)
Refer to the exhibit.
SwitchA receives the frame with the addressing shown in the exhibit. According to the command output also shown in the exhibit, how will SwitchA handle this frame?
A. It will drop the frame.
B. It will forward the frame out port Fa0/6 only.
C. It will forward the frame out port Fa0/3 only.
D. It will flood the frame out all ports.
E. It will flood the frame out all ports except Fa0/3.
When frame receives the frame, it checks the source address on MAC table if MAC address found in MAC table it tries to forward if not in MAC table adds the Address on MAC table. After checking the source address, it checks the destination address on MAC table, if MAC address found on MAC table it forwards to proper ports otherwise floods on all ports except the source port.
Q28. - (Topic 1)
Which of the following are types of flow control? (Choose three.)
D. congestion avoidance
E. load balancing
During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion".
Buffering The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering". Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup. This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increases it to say 5 for example. Windowing is used only by TCP since UDP doesn't use or allow flow control.
Q29. - (Topic 1)
Refer to the exhibit.
The output is from a router in a large enterprise. From the output, determine the role of the router.
A. A Core router.
B. The HQ Internet gateway router.
C. The WAN router at the central site.
D. Remote stub router at a remote site.
Since the routing table shows only a single default route using the single interface serial 0/0, we know that this is most likely a remote stub site with a single connection to the rest of the network. All the other answer options would mean that this router would have more connections, and would contain more routes.
Q30. - (Topic 3)
OSPF routing uses the concept of areas. What are the characteristics of OSPF areas? (Choose Three.)
A. Each OSPF area requires a loopback interface to be configured.
B. Areas may be assigned any number from 0 to 65535.
C. Area 0 is called the backbone area.
D. Hierarchical OSPF networks do not require multiple areas.
E. Multiple OSPF areas must connect to area 0.
F. Single area OSPF networks must be configured in area 1.
Definition of OSPF areas: An OSPF network may be structured, or subdivided, into routing areas to simplify administration and optimize traffic and resource utilization. Areas are identified by 32-bit numbers, expressed either simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address notation.
See discussion following Cisco Learning discussion.