getcertified4sure.com

Today Big Q: ccna 100 105?




Act now and download your Cisco ccna 100 105 test today! Do not waste time for the worthless Cisco ccent 100 105 tutorials. Download Updated Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam with real questions and answers and begin to learn Cisco ccent ccna icnd1 100 105 pdf with a classic professional.

Q81. - (Topic 3) 

If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? 

A. 1024 

B. 2046 

C. 4094 

D. 4096 

E. 8190 

Answer:

Explanation: 

Each octet represents eight bits. The bits, in turn, represent (from left to right): 128, 64, 32 , 16 , 8, 4, 2, 1 Add them up and you get 255. Add one for the all zeros option, and the total is 256. Now, take away one of these for the network address (all zeros) and another for the broadcast address (all ones). Each octet represents 254 possible hosts. Or 254 possible networks. Unless you have subnet zero set on your network gear, in which case you could conceivably have 255. The CIDR addressing format (/20) tells us that 20 bits are used for the network portion, so the maximum number of networks are 2^20 minus one if you have subnet zero enabled, or minus 2 if not. You asked about the number of hosts. That will be 32 minus the number of network bits, minus two. So calculate it as (2^(32-20))-2, or (2^12)-2 = 4094 


Q82. - (Topic 3) 

An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration? 

A. Router# show startup-config 

B. Router# show current-config 

C. Router# show running-config 

D. Router# show memory 

E. Router# show flash 

F. Router# show processes 

Answer:

Explanation: 

This command followed by the appropriate parameter will show the running config hence the admin will be able to see what changes have been made, and then they can be saved. 


Q83. - (Topic 3) 

Which address are OSPF hello packets addressed to on point-to-point networks? 

A. 224.0.0.5 

B. 172.16.0.1 

C. 192.168.0.5 

D. 223.0.0.1 

E. 254.255.255.255 

Answer:

Explanation: 

Why does the show ip ospf neighbor Command Reveal Neighbors in the Init State? http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f11.shtml OSPF hello packets have a destination address of 224.0.0.5 (the all ospf routers multicast 

address). 


Q84. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 


Q85. - (Topic 3) 

Scenario 

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links. 

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices. 

An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office. What is causing the problem? 

A. There is an area ID mismatch. 

B. There is a PPP authentication issue; a password mismatch. 

C. There is an OSPF hello and dead interval mismatch. 

D. There is a missing network command in the OSPF process on R5. 

Answer:

Explanation: 

The “show ip ospf interface command on R3 and R5 shows that the hello and dead intervals do not match. They are 50 and 200 on R3 and 10 and 40 on R5. 

Topic 4, Infrastructure Services 


Q86. - (Topic 3) 

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link. 

The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem? 

A. The OSPF area is not configured properly. 

B. The priority on R1 should be set higher. 

C. The cost on R1 should be set higher. 

D. The hello and dead timers are not configured properly. 

E. A backup designated router needs to be added to the network. 

F. The OSPF process ID numbers must match. 

Answer:

Explanation: 

In OSPF, the hello and dead intervals must match and here we can see the hello interval is set to 5 on R1 and 10 on R2. The dead interval is also set to 20 on R1 but it is 40 on R2. 


Q87. - (Topic 3) 

Which characteristics are representative of a link-state routing protocol? (Choose three.) 

A. provides common view of entire topology 

B. exchanges routing tables with neighbors C. calculates shortest path 

D. utilizes event-triggered updates 

E. utilizes frequent periodic updates 

Answer: A,C,D 

Explanation: 

Each of routers running link-state routing protocol learns paths to all the destinations in its 

“area” so we can say although it is a bit unclear. 

Link-state routing protocols generate routing updates only (not the whole routing table) 

when a change occurs in the network topology so 

Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -> . 

Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state 

routing protocol utilizes event-triggered updates (only sends update when a change occurs) 

-> 


Q88. - (Topic 3) 

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two) 

A. It is locally significant. 

B. It is globally significant. 

C. It is needed to identify a unique instance of an OSPF database. 

D. It is an optional parameter required only if multiple OSPF processes are running on the router. 

E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information. 

Answer: A,C 

Explanation: 

https://learningnetwork.cisco.com/thread/6248 They are locally significant only, and have no bearing on the structure of any OSPF packet or LSA update. So you can have a separate process-id on every single router in your network if you so desire. 


Q89. - (Topic 2) 

Refer to the exhibit. 

The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. 

What two operations will the switch perform when it receives this frame? (Choose two.) 

A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table. 

B. The MAC address of 0000.00dd.dddd will be added to the MAC address table. 

C. The frame will be forwarded out of port fa0/3 only. 

D. The frame will be forwarded out of fa0/1, fa0/2, and fa0/3. 

E. The frame will be forwarded out of all the active ports. 

Answer: A,D 

Explanation: 

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table 


Q90. - (Topic 5) 

Which two of the following are true regarding the configuration of RouterA? (Choose two.) 

A. At least 5 simultaneous remote connections are possible 

B. Only telnet protocol connections to RouterA are supported C. Remote connections to RouterA using telnet will succeed 

D. Console line connections will nevertime out due to inactivity 

E. Since DHCP is not used on Fa0/1 there is not a need to use the NAT protocol 

Answer: A,C