♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q41. - (Topic 5)
Refer to the exhibit.
A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem?
A. The NY router has an incorrect subnet mask.
B. The TFTP server has an incorrect IP address.
C. The TFTP server has an incorrect subnet mask.
D. The network administrator computer has an incorrect IP address.
The TFTP server is using a mask of 255.255.255.240 (/28) while the router is configured with a /29. Because of this, the Atlanta router does not see the TFTP server as being in the same subnet.
Q42. - (Topic 3)
Which statement is true?
A. An IPv6 address is 64 bits long and is represented as hexadecimal characters.
B. An IPv6 address is 32 bits long and is represented as decimal digits.
C. An IPv6 address is 128 bits long and is represented as decimal digits.
D. An IPv6 address is 128 bits long and is represented as hexadecimal characters.
One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID
Q43. - (Topic 7)
Which dynamic routing protocol uses only the hop count to determine the best path to a destination?
Q44. - (Topic 5)
Why would a network administrator configure port security on a switch?
A. to prevent unauthorized Telnet access to a switch port
B. to prevent unauthorized hosts from accessing the LAN
C. to limit the number of Layer 2 broadcasts on a particular switch port
D. block unauthorized access to the switch management interfaces
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.
Q45. - (Topic 1)
How does a switch differ from a hub?
A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.
Some of the features and functions of a switch include:
A switch is essentially a fast, multi-port bridge, which can contain dozens of ports.
Rather than creating two collision domains, each port creates its own collision domain.
In a network of twenty nodes, twenty collision domains exist if each node is plugged into its
own switch port.
If an uplink port is included, one switch creates twenty-one single-node collision domains.
A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table,
holding all of the necessary MAC information for each port.
For a detailed description of how switches operate, and their key differences to hubs, see
the reference link below.
Q46. - (Topic 1)
Refer to the exhibit.
Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
The Source and Destination IP address is not going to change. Host 1 IP address will stay
as being the source IP and the Host 2 IP address will stay the destination IP address.
Those two are not going to change.
For the MAC address it is going to change each time it goes from one hope to another.
(Except switches... they don't change anything)
Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of
Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address.
Q47. - (Topic 5)
Refer to the exhibit.
A user cannot reach any web sites on the Internet, but others in the department are not
having a problem.
What is the most likely cause of the problem?
A. IP routing is not enabled.
B. The default gateway is not in the same subnet.
C. A DNS server address is not reachable by the PC.
D. A DHCP server address is not reachable by the PC.
E. NAT has not been configured on the router that connects to the Internet.
Answer C is only answer that makes sense. IP routing does not need to be enabled on PC’s, this is a router function. We can see from the output that the PC and default gateway are on the same subnet. DHCP has not been enabled on this PC so it has been configured with a static address so reaching the DHCP server is not the issue. Finally, NAT must be configured correctly or the other users in the department would also be having issues.
Q48. - (Topic 3)
What command sequence will configure a router to run OSPF and add network 10.1.1.0 /24 to area 0?
A. router ospf area 0 network 10.1.1.0 255.255.255.0 area 0
B. router ospf network 10.1.1.0 0.0.0.255
C. router ospf 1 network 10.1.1.0 0.0.0.255 area 0
D. router ospf area 0 network 10.1.1.0 0.0.0.255 area 0
E. router ospf network 10.1.1.0 255.255.255.0 area 0 F. router ospf 1 network 10.1.1.0 0.0.0.255
Enabling OSPFSUMMARY STEPS
router ospf process-id
network ip-address wildcard-mask area area-id
Command or Action Purpose Step.1 enable
Device> enable Enables privileged EXEC mode. . Enter your password if prompted.
Step.2 configure terminal
Device# configure terminal Enters global configuration mode.
Step.3 router ospf process-id
Device(config)# router ospf 109
Enables OSPF routing and enters router configuration mode.
Step.4 network ip-address wildcard-mask area area-id
Device(config-router)# network 192.168.129.16 0.0.0.3 area 0
Defines an interface on which OSPF runs and defines the area ID for that interface.
Exits router configuration mode and returns to privileged EXEC mode.
Q49. - (Topic 3)
Refer to the exhibit.
The network is converged.After link-state advertisements are received from Router_A, what information will Router_E contain in its routing table for the subnets 220.127.116.11 and 18.104.22.168?
A. 22.214.171.124[110/13] via 126.96.36.199, 00:00:07, FastEthemet0/0 188.8.131.52[110/13] via 184.108.40.206, 00:00:16, FastEthemet0/0
B. 220.127.116.11[110/1] via 18.104.22.168, 00:00:07, Serial1/0 22.214.171.124[110/3] via 126.96.36.199, 00:00:16, FastEthemet0/0
C. 188.8.131.52[110/13] via 184.108.40.206, 00:00:07, Serial1/0 220.127.116.11[110/13] via 18.104.22.168, 00:00:16, Serial1/0 22.214.171.124[110/13] via 126.96.36.199, 00:00:16, FastEthemet0/0
D. 188.8.131.52[110/3] via 184.108.40.206, 00:00:07, Serial1/0 220.127.116.11[110/3] via 18.104.22.168, 00:00:16, Serial1/0
Router_E learns two subnets subnets 22.214.171.124 and 126.96.36.199 via Router_A
through FastEthernet interface. The interface cost is calculated with the formula 108 /
Bandwidth. For FastEthernet it is 108 / 100 Mbps = 108 / 100,000,000 = 1. Therefore the
cost is 12 (learned from Router_A) + 1 = 13 for both subnets ->
The cost through T1 link is much higher than through T3 link (T1 cost = 108 / 1.544 Mbps =
64; T3 cost = 108 / 45 Mbps = 2) so surely OSPF will choose the path through T3 link ->
Router_E will choose the path from Router_A through FastEthernet0/0, not Serial1/0.
In fact, we can quickly eliminate answers B, C and D because they contain at least one
subnet learned from Serial1/0 -> they are surely incorrect.
Q50. - (Topic 3)
Which command can you use to manually assign a static IPV6 address to a router interface?
A. ipv6 address PREFIX_1::1/64
B. ipv6 autoconfig 2001:db8:2222:7272::72/64
C. ipv6 autoconfig
D. ipv6 address 2001:db8:2222:7272::72/64
An example of configuring IPv6 on an interface is shown below: Router(config)# interface fastethernet 0/1 Router(config-if)# ipv6 address 3000::2222:1/64