Proper study guides for Update Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) certified begins with Cisco 100 105 icnd1 preparation products which designed to deliver the Practical 105 100 questions by making you pass the ccna 100 105 test at your first time. Try the free 100 105 icnd1 pdf demo right now.


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/100-105-exam-dumps.html

Q121. - (Topic 7) 

Which route source code represents the routing protocol with a default administrative distance of 90 in the routing table? 

A. S 

B. E 

C. D 

D. R 

E. O 

Answer:

Explanation: 

SStatic EEGP DEIGRP RRIP OOSPF 

Default Administrative distance of EIGRP protocol is 90 then answer is C 

Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports: 

Route Source Default Distance Values 

Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown* 255 


Q122. - (Topic 3) 

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the default and the router IDs are shown with each router. 

Which routers are likely to have been elected as DR? (Choose two.) 

A. Corp-1 

B. Corp-2 

C. Corp-3 

D. Corp-4 

E. Branch-1 

F. Branch-2 

Answer: D,F 

Explanation: 

There are 2 segments on the topology above which are separated by Corp-3 router. Each 

segment will have a DR so we have 2 DRs. 

To select which router will become DR they will compare their router-IDs. The router with 

highest (best) router-ID will become DR. The router-ID is chosen in the order below: 

+

 The highest IP address assigned to a loopback (logical) interface. 

+

 If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. 

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s physical interfaces. Router Corp-4 (10.1.40.40) 

& Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become DRs. 


Q123. - (Topic 1) 

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor? 

A. RTP 

B. TCP 

C. CDP 

D. UDP 

Answer:

Explanation: 

The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch. Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting the network. CDP messages are generated every 60 seconds as multicast messages on each of its active interfaces. The information shared in a CDP packet about a Cisco device includes the following: Name of the device configured with the hostname command IOS software version Hardware capabilities, such as routing, switching, and/or bridging Hardware platform, such as 2600, 2950, or 1900 The layer-3 address(es) of the device The interface the CDP update was generated on 

Reference: http://computernetworkingnotes.com/cisco-devices-administration-and-configuration/cisco-discoveryprotocol.html 


Q124. - (Topic 3) 

Refer to the exhibit. 

Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance? 

A. router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2 

B. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1 

C. router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2 

D. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5 

Answer:

Explanation: 

The default AD for a static route is 1. To change this, configure a different value to be used as the AD at the very end of the “ip route” statement. 


Q125. - (Topic 1) 

Which protocol uses a connection-oriented service to deliver files between end systems? 

A. TFTP 

B. DNS 

C. FTP 

D. SNMP 

E. RIP 

Answer:

Explanation: 

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established--the caller must know the person's telephone number and the phone must be answered--before the message can be delivered. TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release. Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp. 


Q126. - (Topic 5) 

If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN? 

A. half-duplex operation 

B. broadcast storms 

C. network segmentation 

D. multicasting 

Answer:

Explanation: 

A broadcast storm can consume sufficient network resources so as to render the network unable to transport normal traffic. 

Topic 6, Simulation 


Q127. - (Topic 7) 

Which network topology allows all traffic to flow through a central hub? 

A. bus 

B. star 

C. mesh 

D. ring 

Answer:


Q128. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 


Q129. - (Topic 3) 

Refer to the exhibit. 

The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2? 

A. Configure the router with the cdp enable command. 

B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces. 

C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces. 

D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces. 

Answer:

Explanation: 

If the no shut down commands are not entered, then CDP can exchange information between the two routers. By default, all Cisco device interfaces and ports are shut down and need to be manually enabled. 


Q130. - (Topic 1) 

Refer to the exhibit. 

SwitchA receives the frame with the addressing shown. According to the command output also shown in the exhibit, how will SwitchA handle this frame? 

A. It will drop the frame. 

B. It will forward the frame out port Fa0/6 only. 

C. It will flood the frame out all ports. 

D. It will flood the frame out all ports except Fa0/3. 

Answer: B Explanation: 

Switches keep the learned MAC addresses in a table, so that when a frame comes in with a destination MAC address that the switch has already learned, it will forward it to that port only. If a frame comes in with a destination MAC that is not already in the MAC address table, then the frame will be flooded to all ports except for the one that it came in on. In this case, Switch A already knows that 00b0.d0da.cb56 resides on port fa0/6, so it will forward the from out that port.