Actualtests 105 100 Questions are updated and all cisco 100 105 answers are verified by experts. Once you have completely prepared with our ccent 100 105 exam prep kits you will be ready for the real icnd1 100 105 pdf exam without a problem. We have Update Cisco icnd1 100 105 pdf dumps study guide. PASSED icnd1 100 105 First attempt! Here What I Did.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q91. - (Topic 5)
An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration.
What must be done to accomplish this?
A. Enable port security and use the keyword sticky.
B. Set the switchport mode to trunk and save the running configuration.
C. Use the switchport protected command to have the MAC addresses added to the configuration.
D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration.
One can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts, hence enabling security as desired.
Q92. - (Topic 2)
What is the purpose of flow control?
A. To ensure data is retransmitted if an acknowledgement is not received.
B. To reassemble segments in the correct order at the destination device.
C. To provide a means for the receiver to govern the amount of data sent by the sender.
D. To regulate the size of each segment.
Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. For serial data transmission locally or in a network, the Xon/Xoff protocol can be used. For modem connections, either Xon/Xoff or CTS/RTS (Clear to Send/Ready to Send) commands can be used to control data flow. In a network, flow control can also be applied by refusing additional device connections until the flow of traffic has subsided.
Q93. - (Topic 1)
Refer to the exhibit.
As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three.)
Switches use the destination MAC address information for forwarding traffic, while routers use the destination IP address information. Local Area Networks employ Layer 2 Switches and Bridges to forward and filter network traffic. Switches and Bridges operate at the Data Link Layer of the Open System Interconnect Model (OSI). Since Switches and Bridges operate at the Layer 2 they operate more intelligently than hubs, which work at Layer 1 (Physical Layer) of the OSI. Because the switches and bridges are able to listen to the traffic on the wire to examine the source and destination MAC address. Being able to listen to the traffic also allows the switches and bridges to compile a MAC address table to better filter and forward network traffic. To accomplish the above functions switches and bridges carry out the following tasks: MAC address learning by a switch or a bridge is accomplished by the same method. The switch or bridge listens to each device connected to each of its ports and scan the incoming frame for the source MAC address. This creates a MAC address to port map that is cataloged in the switches/bridge MAC database. Another name for the MAC address table is content addressable memory or CAM table. When a switch or bridge is listening to the network traffic, it receives each frame and compares it to the MAC address table. By checking the MAC table the switch/ bridge are able o determine which port the frame came in on. If the frame is on the MAC table the frame is filtered or transmitted on only that port. If the switch determines that the frame is not on the MAC table, the frame is forwarded out to all ports except the incoming port.
Q94. - (Topic 1)
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)
A. layer 3 support
B. port security
C. redundant components
Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP).
Switch features in the Access layer:
Fast Ethernet/Gigabit Ethernet
Power over Ethernet (PoE)
Quality of Service (QoS)
References: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml
Topic 2, LAN Switching Technologies
Q95. - (Topic 5)
Refer to the exhibit.
A person is trying to send a file from a host on Network A of the JAX Company to a server
on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A.
Which command, issued from router RTA, would be the most useful for troubleshooting this problem?
A. show flash:
B. show history
C. show version
D. show interfaces
E. show controllers serial
The most useful thing to check on RTA would be the show interfaces command to see if the interface toward the WAN link is up. The most likely scenario is that the local LAN interface is up, but the other interface toward the XYZ company is down.
Q96. - (Topic 3)
Refer to the exhibit.
Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)
A. It ensures that data will be forwarded by RouterB.
B. It provides stability for the OSPF process on RouterB.
C. It specifies that the router ID for RouterB should be 10.0.0.1.
D. It decreases the metric for routes that are advertised from RouterB.
E. It indicates that RouterB should be elected the DR for the LAN.
A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) -The router-ID is chosen in the order below:
The highest IP address assigned to a loopback (logical) interface.
If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. -> The loopback interface will be chosen as the router ID of RouterB -
Q97. - (Topic 3)
Refer to the exhibit.
The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network?
Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts.
Q98. - (Topic 3)
Which two of these functions do routers perform on packets? (Choose two.)
A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets
B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops
C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets
D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations
E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops
F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations
This is the basic function of the router to receive incoming packets and then forward them to their required destination. This is done by reading layer 3 headers of inbound packets and update the info to layer 2 for further hopping.
Q99. - (Topic 3)
What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multi-access network?
On broadcast multiacess and point-to-point links, the default is 10 seconds. On NBMA, the default is 30 seconds.
Q100. - (Topic 5)
Refer to the exhibit.
An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem?
A. The serial interface is configured for half duplex.
B. The serial interface does not have a cable attached.
C. The serial interface has the wrong type of cable attached.
D. The serial interface is configured for the wrong frame size.
E. The serial interface has a full buffer.
Since the output is not forthcoming it shows that the type of cable attached is wrong,
though the cable is connected since it shows the cable type.
According to the figure DTE cable should connect to R1 on interface but while examining
using show controllers serial 0/0 command it showing that a DCE is connected so the
wrong type of cable is being used.