Proper study guides for Rebirth Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) certified begins with Cisco cisco 100 105 pdf preparation products which designed to deliver the 100% Guarantee icnd 100 105 questions by making you pass the ccent ccna icnd1 100 105 test at your first time. Try the free 100 105 icnd1 pdf demo right now.

Q101. - (Topic 7) 

Which MTU size can cause a baby giant error? 

A. 1500 

B. 9216 

C. 1600 

D. 1518 

Answer:

Explanation: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/29805-175.html 


Q102. - (Topic 7) 

What is the default lease time for a DHCP binding? 

A. 24 hours 

B. 12 hours 

C. 48 hours 

D. 36 hours 

Answer:

Explanation: By default, each IP address assigned by a DHCP Server comes with a one-day lease, which is the amount of time that the address is valid. To change the lease value for an IP address, use the following command in DHCP pool configuration mode: 


Q103. - (Topic 3) 

What is the purpose of assigning an IP address to a switch? 

A. provides local hosts with a default gateway address 

B. allows remote management of the switch 

C. allows the switch to respond to ARP requests between two hosts 

D. ensures that hosts on the same LAN can communicate with each other 

Answer:

Explanation: 

A switch is a layer 2 device and doesn’t use network layer for packet forwarding. The IP 

address may be used only for administrative purposes such as Telnet access or for network management purposes. 


Q104. - (Topic 3) 

Which parameter or parameters are used to calculate OSPF cost in Cisco routers? 

A. Bandwidth 

B. Bandwidth and Delay 

C. Bandwidth, Delay, and MTU 

D. Bandwidth, MTU, Reliability, Delay, and Load 

Answer:

Explanation: 

The well-known formula to calculate OSPF cost is Cost = 108/ Bandwidth 


Q105. - (Topic 1) 

Refer to the exhibit. 

The exhibit is showing the topology and the MAC address table. Host A sends a data frame to host D. What will the switch do when it receives the frame from host A? 

A. The switch will add the source address and port to the MAC address table and forward the frame to host D. 

B. The switch will discard the frame and send an error message back to host A. 

C. The switch will flood the frame out of all ports except for port Fa0/3. 

D. The switch will add the destination address of the frame to the MAC address table and forward the frame to host D. 

Answer:

Explanation: 

When switch receives the data frame from the host not having the MAC address already on the MAC table, it will add the MAC address to source port on MAC address table and sends the data frame. 


Q106. - (Topic 3) 

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command? 

A. The interface with IP address 192.168.10.2 is on this router. 

B. The command sets a gateway of last resort for the router. 

C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2. 

D. The command creates a static route for all IP traffic with the source address 

192.168.100.160. 

Answer:

Explanation: 

With 160 it's actually network address of /27 so any address within the range of .160-.191 network will be sent to 192.168.10.2 


Q107. - (Topic 1) 

Which protocol uses a connection-oriented service to deliver files between end systems? 

A. TFTP 

B. DNS 

C. FTP 

D. SNMP 

E. RIP 

Answer:

Explanation: 

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established--the caller must know the person's telephone number and the phone must be answered--before the message can be delivered. TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release. Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp. 


Q108. - (Topic 5) 

An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. 

What must be done to accomplish this? 

A. Enable port security and use the keyword sticky. 

B. Set the switchport mode to trunk and save the running configuration. 

C. Use the switchport protected command to have the MAC addresses added to the configuration. 

D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration. 

Answer:

Explanation: 

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide 

/port_sec.pdf 

One can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts, hence enabling security as desired. 


Q109. - (Topic 1) 

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.) 

A. There are no collisions in full-duplex mode. 

B. A dedicated switch port is required for each full-duplex node. 

C. Ethernet hub ports are preconfigured for full-duplex mode. 

D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting. 

E. The host network card and the switch port must be capable of operating in full-duplex mode. 

Answer: A,B,E 

Explanation: 

Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet—typically 10BaseT—is only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps—at most. Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you don’t need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet. 


Q110. - (Topic 5) 

Refer to the exhibit. 

Why was this message received? 

A. No VTY password has been set. 

B. No enable password has been set. 

C. No console password has been set. 

D. No enable secret password has been set. 

E. The login command has not been set on CON 0 

F. The login command has not been set on the VTY ports. 

Answer:

Explanation: 

Your CCNA certification exam is likely going to contain questions about Telnet, an application-level protocol that allows remote communication between two networking devices. With Telnet use being as common as it is, you had better know the details of how to configure it in order to pass your CCNA exam and to work in real-world networks. 

The basic concept is pretty simple - we want to configure R1, but we're at R2. If we telnet successfully to R1, we will be able to configure R1 if we've been given the proper permission levels. In this CCNA case study, R2 has an IP address of 172.12.123.2 and R1 an address of 172.12.123.1. Let's try to telnet from R2 to R1. 

R2#telnet 172.12.123.1 Trying 172.12.123.1 ... Open Password required, but none set [Connection to 172.12.123.1 closed by foreign host] 

This seems like a problem, but it's a problem we're happy to have. A Cisco router will not let any user telnet to it by default. That's a good thing, because we don't want just anyone connecting to our router! The "password required" message means that no password has been set on the VTY lines on R1. Let's do so now. 

R1(config)#line vty 0 4 

R1(config-line)#password baseball 

A password of "baseball" has been set on the VTY lines, so we shouldn't have any trouble using Telnet to get from R2 to R1. Let's try that now. 

R2#telnet 172.12.123.1 

Trying 172.12.123.1 ... Open 

User Access Verification 

Password: 

R1> 

We're in, and placed into user exec mode. 

Reference: 

http://www.mcmcse.com/cisco/guides/telnet_passwords_and_privilege_levels.shtml