getcertified4sure.com

Secrets to icnd1 100 105




Want to know Certleader cisco 100 105 pdf Exam practice test features? Want to lear more about Cisco ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) certification experience? Study Refined Cisco cisco 100 105 answers to Updated ccent ccna icnd1 100 105 pdf questions at Certleader. Gat a success with an absolute guarantee to pass Cisco ccent 100 105 pdf (ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)) test on your first attempt.

P.S. Refined 100-105 braindumps are available on Google Drive, GET MORE: https://drive.google.com/open?id=16T0cVE2WYz-0Y7Wh56_Fr0zWNJ4X7B2X


New Cisco 100-105 Exam Dumps Collection (Question 4 - Question 13)

New Questions 4

On a live network, which commands will verify the operational status of router interfaces? (Choose two.)

A. Router# show interfaces

B. Router# show ip protocols

C. Router# debug interface

D. Router# show ip interface brief

E. Router# show start

Answer: A,D

Explanation:

Only two commands u201cshow interfacesu201d and u201cshow ip interface briefu201d reveal the status of router interfaces (up/up, for example).



New Questions 5

A company has placed a networked PC in a lobby so guests can have access to the corporate directory.

A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)

A. Enable port security.

B. Create the port as a trunk port.

C. Create the port as an access port.

D. Create the port as a protected port.

E. Set the port security aging time to 0.

F. Statically assign the MAC address to the address table.

G. Configure the switch to discover new MAC addresses after a set time of inactivity.

Answer: A,C,F

Explanation:

If port security is enabled and the port is only designated as access port, and finally static MAC address is assigned, it ensures that even if a physical connection is done by taking out the directory PC and inserting personal laptop or device, the connection cannot be made to the corporate network, hence ensuring safety.



New Questions 6

Refer to the exhibit.

The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.

What two operations will the switch perform when it receives this frame? (Choose two.)

A. The switch will not forward a frame with this destination MAC address.

B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.

C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.

D. The frame will be forwarded out of all the active switch ports except for port fa0/0.

E. The frame will be forwarded out of fa0/0 and fa0/1 only.

F. The frame will be forwarded out of all the ports on the switch.

Answer: B,D

Explanation:

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.



New Questions 7

Refer to the output of the corporate router routing table shown in the graphic.

The corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3.

What will the router do with this packet?

A. It will encapsulate the packet as Frame Relay and forward it out interface Serial 0/0.117.

B. It will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0.

C. It will forward the packet out interface Serial 0/1 and send an ICMP Echo Reply message out interface serial 0/0.102.

D. It will change the IP packet to an ARP frame and forward it out FastEthernet 0/0.

Answer: B

Explanation:

Since the destination network is not in the routing table, and no default gateway has been configured, the router will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0. It knows to send it out Fa 0/0 because the routing table for the source IP address of 192.168.214.20 shows it was learned from the Fa 0/0 interface.



New Questions 8


Select three options which are security issues with the current configuration of SwitchA. (Choose three.)

A. Privilege mode is protected with an unencrypted password

B. Inappropriate wording in banner message

C. Virtual terminal lines are protected only by a password requirement

D. Both the username and password are weak

E. Telnet connections can be used to remotely manage the switch

F. Cisco user will be granted privilege level 15 by default

Answer: A,B,D



New Questions 9

Refer to the exhibit.

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space.

192.168.1.1 through 192.168.5.255

192.168.100.1 through 192.168.100.255

What are three problems with this design? (Choose three.)

A. The AREA 1 IP address space is inadequate for the number of users.

B. The AREA 3 IP address space is inadequate for the number of users.

C. AREA 2 could use a mask of /25 to conserve IP address space.

D. The network address space that is provided requires a single network-wide mask.

E. The router-to-router connection is wasting address space.

F. The broadcast domain in AREA 1 is too large for IP to function.

Answer: A,C,E

Explanation:

The given IP addresses of areas 1 and 3 along with network masks of /24 cannot accommodate 500 users so are inadequate, while the area 2 is having over capacity so its network mask can be reduced to /25 to accommodate the only 60 users it has.



New Questions 10

Which of the following are types of flow control? (Choose three.)

A. buffering

B. cut-through

C. windowing

D. congestion avoidance

E. load balancing

Answer: A,C,D

Explanation:

During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion". Buffering

The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering".

Windowing Whereas Windowing is used for flow control by the Transport layer.

Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup.

This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received.

Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increases it to say 5 for example.

Windowing is used only by TCP since UDP doesn't use or allow flow control. Reference: http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php



New Questions 11

Refer to the exhibit.

A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations.

A ping from Host1 to Host 2 fails, but the technician is able to ping the S0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem?

A. The serial cable on R1 needs to be replaced.

B. The interfaces on R2 are not configured properly

C. R1 has no route to the 192.168.1.128 network.

D. The IP addressing scheme has overlapping subnetworks.

E. The ip subnet-zero command must be configured on both routers.

Answer: C

Explanation:

Without a static route pointing to the host 2 network the router R1 is unaware of the path to take to reach that network and reply traffic cannot be sent.



New Questions 12


Including the address on the Routed Ethernet interface, how many hosts can have IP addresses on the LAN to which Routed is connected?

A. 6

B. 30

C. 62

D. 126

Answer: A

Explanation:

This is a /29 address, so there are 6 usable IPu2021s on this subnet.



New Questions 13

Refer to the exhibit.

Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?

A. router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2

B. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1

C. router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2

D. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5

Answer: D

Explanation:

The default AD for a static route is 1. To change this, configure a different value to be used as the AD at the very end of the u201cip routeu201d statement.



P.S. Easily pass 100-105 Exam with Examcollection Refined Dumps & pdf vce, Try Free: http://www.examcollectionuk.com/100-105-vce-download.html (347 New Questions)