♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/100-105-exam/

Proper study guides for Avant-garde Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) certified begins with Cisco 100-105 preparation products which designed to deliver the Accurate 100-105 questions by making you pass the 100-105 test at your first time. Try the free 100-105 demo right now.

2017 Apr 100-105 latest exam

Q91. - (Topic 5) 

Refer to the exhibit. 

A user cannot reach any web sites on the Internet, but others in the department are not 

having a problem. 

What is the most likely cause of the problem? 

A. IP routing is not enabled. 

B. The default gateway is not in the same subnet. 

C. A DNS server address is not reachable by the PC. 

D. A DHCP server address is not reachable by the PC. 

E. NAT has not been configured on the router that connects to the Internet. 

Answer:

Explanation: 

Answer C is only answer that makes sense. IP routing does not need to be enabled on PC’s, this is a router function. We can see from the output that the PC and default gateway are on the same subnet. DHCP has not been enabled on this PC so it has been configured with a static address so reaching the DHCP server is not the issue. Finally, NAT must be configured correctly or the other users in the department would also be having issues. 


Q92. - (Topic 1) 

Which of the following are types of flow control? (Choose three.) 

A. buffering 

B. cut-through 

C. windowing 

D. congestion avoidance 

E. load balancing 

Answer: A,C,D 

Explanation: 

During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion". 

Buffering The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering". Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup. This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increases it to say 5 for example. Windowing is used only by TCP since UDP doesn't use or allow flow control. 

Reference: http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php 


Q93. - (Topic 1) 

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) 

A. layer 3 support 

B. port security 

C. redundant components 

D. VLANs 

E. PoE 

Answer: B,D 

Explanation: 

Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). 

Switch features in the Access layer: 

...... 

Port security 

VLANs 

Fast Ethernet/Gigabit Ethernet 

Power over Ethernet (PoE) 

Link aggregation 

Quality of Service (QoS) 

References: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml 

Topic 2, LAN Switching Technologies 


Q94. - (Topic 7) 

Which destination IP address can a host use to send one message to multiple devices across different subnets? 

A. 172.20.1.0 

B. 127.0.0.1 

C. 192.168.0.119 

D. 239.255.0.1 

Answer:

Explanation: Multicast is a networking protocol where one host can send a message to a special multicast IP address and one or more network devices can listen for and receive 

those messages. Multicast works by taking advantage of the existing IPv4 networking infrastructure, and it does so in something of a weird fashion. As you read, keep in mind that things are a little confusing because multicast was "shoe-horned" in to an existing technology. For the rest of this article, let's use the multicast IP address of 239.255.0.1. We'll not worry about port numbers yet, but make a mental note that they are used in multicast. We'll discuss that later. 


Q95. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 


Up to the immediate present 100-105 free draindumps:

Q96. CORRECT TEXT - (Topic 6) 

Answer: Router>enable 

Router#config terminal Router(config)#hostname Apopka 2) Enable-secret password (cisco10): Apopka(config)#enable secret cisco10 3) Set the console password to RouterPass: Apopka(config)#line console 0 Apopka(config-line)#password RouterPass Apopka(config-line)#login Apopka(config-line)#exit 4) Set the Telnet password to scan90: Apopka(config)#line vty 0 4 Apopka(config-line)#password scan90 Apopka(config-line)#login Apopka(config-line)#exit 5) Configure Ethernet interface (on the right) of router Apopka: The subnet mask of the Ethernet network 209.165.201.0 is 27. From this subnet mask, we can find out the increment by converting it into binary form, that is /27 = 1111 1111.1111 1111.1111 1111.1110 0000. Pay more attention to the last bit 1 because it tells us the increment, using the formula: Increment = 2place of the last bit 1 (starts counting from 0,from right to left), in this case increment = 25 = 32. Therefore: Increment: 32 Network address: 209.165.201.0 Broadcast address: 209.165.201.31 (because 209.165.201.32 is the second subnetwork, so the previous IP - 209.165.201.31 - is the broadcast address of the first subnet). -> The second assignable host address of this subnetwork is 209.165.201.2/27 Assign the second assignable host address to Fa0/0 interface of Apopka router: Apopka(config)#interface Fa0/0 Apopka(config-if)#ip address 209.165.201.2 255.255.255.224 Apopka(config-if)#no shutdown Apopka(config-if)#exit 6) Configure Serial interface (on the left) of router Apopka: Using the same method to find out the increment of the Serial network: Serial network 192.0.2.128/28: Increment: 16 (/28 = 1111 1111.1111 1111.1111 1111.1111 0000) Network address: 192.0.2.128 (because 8 * 16 = 128 so 192.0.2.128 is also the network address of this subnet) Broadcast address: 192.0.2.143 -> The last assignable host address in this subnet is 192.0.2.142/28. Assign the last assignable host address to S0/0/0 interface of Apopka router: Apopka(config)#interface S0/0/0 (or use interface S0/0 if not successful) Apopka(config-if)#ip address 192.0.2.142 255.255.255.240 Apopka(config-if)#no shutdown Apopka(config-if)#exit 7) Configure RIP v2 routing protocol: Apopka(config)#router rip Apopka(config-router)#version 2 Apopka(config-router)#network 209.165.201.0 Apopka(config-router)#network 192.0.2.128 Apopka(config-router)#end Save the configuration: Apopka#copy running-config startup-config Finally, you should use the ping command to verify all are working properly! 

Topic 7, Mix Questions 


Q97. - (Topic 5) 

The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer:

Explanation: 

Do a “show ip int brief” and you will see that Fa0/1 has an IP address assigned, but it is shut down. 


Q98. - (Topic 3) 

Refer to the exhibit. 

The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? 

A. 255.255.255.192 

B. 255.255.255.224 

C. 255.255.255.240 

D. 255.255.255.248 

E. 255.255.255.252 

Answer:

Explanation: 

Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts. 


Q99. - (Topic 5) 

What should be part of a comprehensive network security plan? 

A. Allow users to develop their own approach to network security. 

B. Physically secure network equipment from potential access by unauthorized individuals. 

C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. 

D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. 

E. Minimize network overhead by deactivating automatic antivirus client updates. 

Answer:

Explanation: 

From Cisco CCENT Exam Essentials study guide by Todd Lammle: 

Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals. 

List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations. 

Reference: 

CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition 

by Todd Lammle 

Published by Sybex, 2013 


Q100. - (Topic 3) 

Which address are OSPF hello packets addressed to on point-to-point networks? 

A. 224.0.0.5 

B. 172.16.0.1 

C. 192.168.0.5 

D. 223.0.0.1 

E. 254.255.255.255 

Answer:

Explanation: 

Why does the show ip ospf neighbor Command Reveal Neighbors in the Init State? http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f11.shtml OSPF hello packets have a destination address of 224.0.0.5 (the all ospf routers multicast 

address).