getcertified4sure.com

Amazing cisco 100 105 secrets




Examcollection ccent 100 105 Questions are updated and all 100 105 icnd1 v3 0 answers are verified by experts. Once you have completely prepared with our ccent ccna icnd1 100 105 official cert guide exam prep kits you will be ready for the real 100 105 icnd1 exam without a problem. We have Far out Cisco icnd1 100 105 pdf dumps study guide. PASSED ccna 100 105 pdf First attempt! Here What I Did.

Q131. - (Topic 3) 

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.) 

A. Global addresses start with 2000::/3. 

B. Link-local addresses start with FE00:/12. 

C. Link-local addresses start with FF00::/10. 

D. There is only one loopback address and it is ::1. 

E. If a global address is assigned to an interface, then that is the only allowable address for the interface. 

Answer: A,D 


Q132. - (Topic 3) 

A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? 

Router(config)# router ospf 1 

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0 

A. The process id is configured improperly. 

B. The OSPF area is configured improperly. 

C. The network wildcard mask is configured improperly. 

D. The network number is configured improperly. 

E. The AS is configured improperly. 

F. The network subnet mask is configured improperly. 

Answer:

Explanation: 

When configuring OSPF, the mask used for the network statement is a wildcard mask similar to an access list. In this specific example, the correct syntax would have been “network 10.0.0.0 0.0.0.255 area 0.” 


Q133. - (Topic 7) 

Which component of a routing table entry represents the subnet mask? 

A. routing protocol code 

B. prefix 

C. metric 

D. network mask 

Answer:

Explanation: 

IP Routing Table Entry TypesAn entry in the IP routing table contains the following information in the order presented: Network ID. The network ID or destination corresponding to the route. The network ID can be class-based, subnet, or supernet network ID, or an IP address for a host route. Network Mask. The mask that is used to match a destination IP address to the network ID. Next Hop. The IP address of the next hop. Interface. An indication of which network interface is used to forward the IP packet. Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID. Routing table entries can be used to store the following types of routes: Directly Attached Network IDs. Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network. Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network. Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per-IP address basis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255. Default Route. The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 

0.0.0.0. 


Q134. - (Topic 1) 

A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server? 

A. HTTP 

B. DNS 

C. DHCP 

D. RARP 

E. ARP 

Answer:

Explanation: 

The RARP protocol is used to translate hardware interface addresses to protocol addresses. The RARP message format is very similar to the ARP format. When the booting computer sends the broadcast ARP request, it places its own hardware address in both the sending and receiving fields in the encapsulated ARP data packet. The RARP server will fill in the correct sending and receiving IP addresses in its response to the message. This way the booting computer will know its IP address when it gets the message from the RARP server 


Q135. - (Topic 1) 

Refer to the exhibit. 

SwitchA receives the frame with the addressing shown. According to the command output also shown in the exhibit, how will SwitchA handle this frame? 

A. It will drop the frame. 

B. It will forward the frame out port Fa0/6 only. 

C. It will flood the frame out all ports. 

D. It will flood the frame out all ports except Fa0/3. 

Answer: B Explanation: 

Switches keep the learned MAC addresses in a table, so that when a frame comes in with a destination MAC address that the switch has already learned, it will forward it to that port only. If a frame comes in with a destination MAC that is not already in the MAC address table, then the frame will be flooded to all ports except for the one that it came in on. In this case, Switch A already knows that 00b0.d0da.cb56 resides on port fa0/6, so it will forward the from out that port. 


Q136. - (Topic 1) 

Which statements are true regarding ICMP packets? (Choose two.) 

A. They acknowledge receipt of TCP segments. 

B. They guarantee datagram delivery. 

C. TRACERT uses ICMP packets. 

D. They are encapsulated within IP datagrams. 

E. They are encapsulated within UDP datagrams. 

Answer: C,D 

Explanation: 

Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity, which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools, which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol). ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet’s Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination 


Q137. - (Topic 1) 

Which layer of the TCP/IP stack combines the OSI model physical and data link layers? 

A. Internet layer 

B. transport layer 

C. application layer 

D. network access layer 

Answer:

Explanation: 

The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD's goal was to bring international standards which could not be met by the OSI model. Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather than the OSI. Below is a side by side comparison of the TCP/IP and OSI models. 


Q138. - (Topic 7) 

Under which circumstance should a network administrator implement one-way NAT? 

A. when the network must route UDP traffic 

B. when traffic that originates outside the network must be routed to internal hosts 

C. when traffic that originates inside the network must be routed to internal hosts 

D. when the network has few public IP addresses and many private IP addresses require outside access 

Answer:

Explanation: NAT operation is typically transparent to both the internal and external hosts. Typically the internal host is aware of the true IP address and TCP or UDP port of the external host. Typically the NAT device may function as the default gateway for the internal host. However the external host is only aware of the public IP address for the NAT device and the particular port being used to communicate on behalf of a specific internal host. 

NAT and TCP/UDP 

"Pure NAT", operating on IP alone, may or may not correctly parse protocols that are totally concerned with IP information, such as ICMP, depending on whether the payload is interpreted by a host on the "inside" or "outside" of translation. As soon as the protocol stack is traversed, even with such basic protocols as TCP and UDP, the protocols will break unless NAT takes action beyond the network layer. IP packets have a checksum in each packet header, which provides error detection only for the header. IP datagrams may become fragmented and it is necessary for a NAT to reassemble these fragments to allow correct recalculation of higher-level checksums and correct tracking of which packets belong to which connection. The major transport layer protocols, TCP and UDP, have a checksum that covers all the data they carry, as well as the TCP/UDP header, plus a "pseudo-header" that contains the source and destination IP addresses of the packet carrying the TCP/UDP header. For an originating NAT to pass TCP or UDP successfully, it must recompute the TCP/UDP header checksum based on the translated IP addresses, not the original ones, and put that checksum into the TCP/UDP header of the first packet of the fragmented set of packets. The receiving NAT must recompute the IP checksum on every packet it passes to the destination host, and also recognize and recompute the TCP/UDP header using the retranslated addresses and pseudo-header. This is not a completely solved problem. One solution is for the receiving NAT to reassemble the entire segment and then recompute a checksum calculated across all packets. The originating host may perform Maximum transmission unit (MTU) path discovery to determine the packet size that can be transmitted without fragmentation, and then set the don't fragment (DF) bit in the appropriate packet header field. Of course, this is only a one-way solution, because the responding host can send packets of any size, which may be fragmented before reaching the NAT. 


Q139. - (Topic 5) 

Refer to the exhibit. 

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 

192.168.1.1 through 192.168.5.255 

192.168.100.1 through 192.168.100.255 

What are three problems with this design? (Choose three.) 

A. The AREA 1 IP address space is inadequate for the number of users. 

B. The AREA 3 IP address space is inadequate for the number of users. 

C. AREA 2 could use a mask of /25 to conserve IP address space. 

D. The network address space that is provided requires a single network-wide mask. 

E. The router-to-router connection is wasting address space. 

F. The broadcast domain in AREA 1 is too large for IP to function. 

Answer: A,C,E 

Explanation: 

The given IP addresses of areas 1 and 3 along with network masks of /24 cannot accommodate 500 users so are inadequate, while the area 2 is having over capacity so its network mask can be reduced to /25 to accommodate the only 60 users it has. 


Q140. - (Topic 7) 

What is the default lease time for a DHCP binding? 

A. 24 hours 

B. 12 hours 

C. 48 hours 

D. 36 hours 

Answer:

Explanation: By default, each IP address assigned by a DHCP Server comes with a one-day lease, which is the amount of time that the address is valid. To change the lease value for an IP address, use the following command in DHCP pool configuration mode: