getcertified4sure.com

Tactics to ccent ccna icnd1 100 105




Exam Code: ccent ccna icnd1 100 105 pdf (Practice Exam Latest Test Questions VCE PDF)
Exam Name: ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass ccent ccna icnd1 100 105 pdf Exam.

P.S. Exact 100-105 study guides are available on Google Drive, GET MORE: https://drive.google.com/open?id=1WlO4jKMcUw7Pc24ub33sbsWsp9zlyfH9


New Cisco 100-105 Exam Dumps Collection (Question 3 - Question 12)

New Questions 3

What is the purpose of the switchport command?

Switch(config-if)# switchport port-security maximum 1

Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8

A. It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured.

B. It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port that is being configured.

C. It will act like an access list and the port will filter packets that have a source or destination MAC of 0018.DE8B.4BF8.

D. The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8.

Answer: A

Explanation:

The first command configurs the maximum number of secure MAC addresses on a port to one. The next command specifies that MAC addresses that are allowed with port security; in this case it is just the one single device MAC. If any other device connects on that port the port will be shut down by the port security feature.



New Questions 4

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)

A. Allow unrestricted access to the console or VTY ports.

B. Use a firewall to restrict access from the outside to the network devices.

C. Always use Telnet to access the device command line because its data is automatically encrypted.

D. Use SSH or another encrypted and authenticated transport to access device configurations.

E. Prevent the loss of passwords by disabling password encryption.

Answer: B,D

Explanation:

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH.



New Questions 5

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?

A. the OSPF route

B. the EIGRP route

C. the RIPv2 route

D. all three routes

E. the OSPF and RIPv2 routes

Answer: B

Explanation:

When one route is advertised by more than one routing protocol, the router will choose to use the routing protocol which has lowest Administrative Distance. The Administrative

Distances of popular routing protocols are listed below:



New Questions 6

Refer to the exhibit.

Which default gateway address should be assigned to HostA?

A. 192.168.1.1

B. 192.168.1.65

C. 192.168.1.66

D. 192.168.1.129

E. 10.1.1.1

F. 10.1.1.2

Answer: B

Explanation:

The default gateway will be the IP address of the router that it connects to, not the switch.



New Questions 7

What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address?

A. Drops the frame

B. Sends out a Layer 3 broadcast message

C. Sends a message to the router requesting the address

D. Sends out an ARP request with the destination IP address

Answer: D

Explanation:

In this case, it will send out an ARP request for MAC address of the destination IP (assuming it doesn't already have it in its table) and then address it to the destination's MAC address.



New Questions 8

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?

A. decrease the window size

B. use a different source port for the session

C. decrease the sequence number

D. obtain a new IP address from the DHCP server

E. start a new session using UDP

Answer: A

Explanation:

The Window bit in the header determines the number of segments that can be sent at a time. This is done to avoid overwhelming the destination. At the start of the session the window in small but it increases over time. The destination host can also decrease the window to slow down the flow. Hence the window is called the sliding window. When the source has sent the number of segments allowed by the window, it cannot send any further segments till an acknowledgement is received from the destination. On networks with high error rates or issues, decreasing the window size can result in more reliable transmission, as the receiver will need to acknowledge fewer segments. With a large window size, the sender will need to resend all the frames if a single one is not received by the receiver.



New Questions 9

The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements.

Which three items will adequately fulfill the request? (Choose three).

A. One IP subnet with a mask of 255.255.254.0

B. Two IP subnets with a mask of 255.255.255.0

C. Seven 48-port hubs

D. Seven 48-port switches

E. One router interface

F. Seven router interfaces

Answer: A,D,E

Explanation:

To support 300 workstations in a single broadcast domain, we need to use a subnet mask which supports 512 hosts = 29-> /23 or 255.255.254.0 in decimal form -> A is correct.

If we use 48-port switches we need 300/48 = 6.25 -> seven 48-port switches are enough because we also need trunking between them -> D is correct.

We only need one router interface and it is connected with one of seven switches -> E is correct.



New Questions 10

What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router?

A. 2

B. 8

C. 16

D. unlimited

Answer: B

Explanation:

Maximum-paths (OSPF)

To control the maximum number of parallel routes that Open Shortest Path First (OSPF) can support, use the maximum-paths command.

Syntax Description

maximum

Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16 routes.

Command Default

8 paths



New Questions 11

Refer to the exhibit.

Which two statements are correct? (Choose two.)

A. This is a default route.

B. Adding the subnet mask is optional for the ip route command.

C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA.

D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address.

E. The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network can reach network 10.0.0.0.

Answer: A,C

Explanation:

This is obviously the default route which is set between the routers and since it is entered in such a manner that it ensures connectivity between the stub network and any host lying beyond RouterA.



New Questions 12

Which two of these functions do routers perform on packets? (Choose two.)

A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets

B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops

C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets

D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations

E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops

F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations

Answer: B,C

Explanation:

This is the basic function of the router to receive incoming packets and then forward them to their required destination. This is done by reading layer 3 headers of inbound packets and update the info to layer 2 for further hopping.



Recommend!! Get the Exact 100-105 dumps in VCE and PDF From Dumpscollection, Welcome to download: http://www.dumpscollection.net/dumps/100-105/ (New 347 Q&As Version)