getcertified4sure.com

Foolproof ccent ccna icnd1 100 105 official cert guide tips




Proper study guides for Latest Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) certified begins with Cisco ccna 100 105 pdf preparation products which designed to deliver the Actual cisco 100 105 pdf questions by making you pass the 100 105 icnd1 v3 0 test at your first time. Try the free icnd 100 105 demo right now.

Q1. - (Topic 5) 

Refer to the exhibit. 

For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA. 

Which command or series of commands will accomplish these objectives? 

A. RTA(config)#no cdp run 

B. RTA(config)#no cdp enable 

C. RTA(config)#interface s0/0 RTA(config-if)#no cdp run 

D. RTA(config)#interface s0/0 RTA(config-if)#no cdp enable 

Answer:

Explanation: 

http://www.cisco.com/en/US/tech/tk962/technologies_tech_note09186a00801aa000.shtml# topicenab 

When CDP is enabled globally using the cdp run command, it is enabled by default on all supported interfaces (except for Frame Relay multipoint subinterfaces) to send and receive CDP information. You can disable CDP on an interface that supports CDP with the no cdp enable command. 

Router#show cdp neighbors 

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r – Repeater 

Router# On this router, CDP is enabled on Serial 1 and Ethernet 0 interfaces. Disable CDP on the Serial 1 interface and verify if the neighbor device is discovered on the serial 1 interface, as this output shows: Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface s1 Router(config-if)#no cdp enable Router(config-if)# Z Router#4w5D. %SYS-5-CONFIG_I: Configured from console by console 


Q2. - (Topic 1) 

At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate? 

A. application 

B. transport 

C. network 

D. physical 

E. data link 

Answer:

Explanation: 

CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. CDP allows devices to share basic configuration information without even configuring any protocol specific information and is enabled by default on all interfaces. CDP is a Datalink Protocol occurring at Layer 2 of the OSI model. CDP is not routable and can only go over to directly connected devices. CDP is enabled, by default, on all Cisco devices. CDP updates are generated as multicasts every 60 seconds with a hold-down period of 180 seconds for a missing neighbor. The no cdp run command globally disables CDP, while the no cdp enable command disables CDP on an interface. Use show cdp neighbors to list out your directly connected Cisco neighboring devices. Adding the detail parameter will display the layer-3 addressing configured on the neighbor. 

Reference: http://computernetworkingnotes.com/cisco-devices-administration-and-configuration/cisco-discoveryprotocol.html 


Q3. - (Topic 3) 

Refer to the exhibit. 

The network is converged.After link-state advertisements are received from Router_A, what information will Router_E contain in its routing table for the subnets 208.149.23.64 and 208.149.23.96? 

A. 208.149.23.64[110/13] via 190.173.23.10, 00:00:07, FastEthemet0/0 208.149.23.96[110/13] via 190.173.23.10, 00:00:16, FastEthemet0/0 

B. 208.149.23.64[110/1] via 190.172.23.10, 00:00:07, Serial1/0 208.149.23.96[110/3] via 190.173.23.10, 00:00:16, FastEthemet0/0 

C. 208.149.23.64[110/13] via 190.173.23.10, 00:00:07, Serial1/0 208.149.23.96[110/13] via 190.173.23.10, 00:00:16, Serial1/0 208.149.23.96[110/13] via 190.173.23.10, 00:00:16, FastEthemet0/0 

D. 208.149.23.64[110/3] via 190.172.23.10, 00:00:07, Serial1/0 208.149.23.96[110/3] via 190.173.23.10, 00:00:16, Serial1/0 

Answer:

Explanation: 

Router_E learns two subnets subnets 208.149.23.64 and 208.149.23.96 via Router_A 

through FastEthernet interface. The interface cost is calculated with the formula 108 / 

Bandwidth. For FastEthernet it is 108 / 100 Mbps = 108 / 100,000,000 = 1. Therefore the 

cost is 12 (learned from Router_A) + 1 = 13 for both subnets -> 

The cost through T1 link is much higher than through T3 link (T1 cost = 108 / 1.544 Mbps = 

64; T3 cost = 108 / 45 Mbps = 2) so surely OSPF will choose the path through T3 link -> 

Router_E will choose the path from Router_A through FastEthernet0/0, not Serial1/0. 

In fact, we can quickly eliminate answers B, C and D because they contain at least one 

subnet learned from Serial1/0 -> they are surely incorrect. 


Q4. - (Topic 5) 

From which of the following attacks can Message Authentication Code (MAC) shield your network? 

A. DoS 

B. DDoS 

C. spoofing 

D. SYN floods 

Answer:

Explanation: 

Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks. MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes. A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack. A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks. In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies. 


Q5. - (Topic 3) 

What does administrative distance refer to? 

A. the cost of a link between two neighboring routers 

B. the advertised cost to reach a network 

C. the cost to reach a network that is administratively set 

D. a measure of the trustworthiness of a routing information source 

Answer:

Reference: http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094195.shtml 

Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. 

Administrative distance is the first criterion that a router uses to determine which routing protocol to use if two protocols provide route information for the same destination. Administrative distance is a measure of the trustworthiness of the source of the routing information. The smaller the administrative distance value, the more reliable the protocol. 


Q6. - (Topic 1) 

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) 

A. layer 3 support 

B. port security 

C. redundant components 

D. VLANs 

E. PoE 

Answer: B,D 

Explanation: 

Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). 

Switch features in the Access layer: 

...... 

Port security 

VLANs 

Fast Ethernet/Gigabit Ethernet 

Power over Ethernet (PoE) 

Link aggregation 

Quality of Service (QoS) 

References: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml 

Topic 2, LAN Switching Technologies 


Q7. - (Topic 1) 

Refer to the exhibit. 

What must be configured to establish a successful connection from Host A to switch SW-A through router RT-A? 

A. VLAN 1 on RT-A 

B. IP routing on SW-A 

C. default gateway on SW-A 

D. crossover cable connecting SW-A and RT-A 

Answer:

Explanation: 

In order for the switch to reach networks that are not local, such as networks attached to different interfaces of the router, it will need to set its default gateway to be the IP address of the attached router. 


Q8. DRAG DROP - (Topic 4) 

Drag the definition on the left to the correct term on the right. Not all definitions on the left will be used. 

Answer: 


Q9. - (Topic 3) 

Which IP address is a private address? 

A. 12.0.0.1 

B. 168.172.19.39 

C. 172.20.14.36 

D. 172.33.194.30 

E. 192.169.42.34 

Answer:


Q10. - (Topic 3) 

Refer to the exhibit. 

Which default gateway address should be assigned to HostA? 

A. 192.168.1.1 

B. 192.168.1.65 

C. 192.168.1.66 

D. 192.168.1.129 

E. 10.1.1.1 

F. 10.1.1.2 

Answer:

Explanation: 

The default gateway will be the IP address of the router that it connects to, not the switch.