Act now and download your Cisco ccna 100 105 pdf test today! Do not waste time for the worthless Cisco ccent ccna icnd1 100 105 official cert guide tutorials. Download Renewal Cisco ICND1 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam with real questions and answers and begin to learn Cisco ccent 100 105 with a classic professional.

P.S. Validated 100-105 interactive bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=1wKeQp_fzylh6B_iOxIFNYB8egVM39bjO


New Cisco 100-105 Exam Dumps Collection (Question 10 - Question 19)

New Questions 10

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.)

A. router#show version

B. router#show ip interface

C. router#show protocols

D. router#show controllers

E. router#show running-config

Answer: B,C

Explanation:

The outputs of u201cshow protocolsu201d and u201cshow ip interfaceu201d are shown below:

Global values:Internet Protocol routing is enabledSerial0/0 is up, line protocol is downInternet address is 10.1.1.1/30Serial0/1 is up, line protocol is downInternet address is 209.65.200.225/30Serial0/2 is up, line protocol is downSerial0/3 is up, line protocol is downNVI0 is up, line protocol is upInterface is unnumbered. Using address of NVI0 (0.0.0.0)Loopback0 is up, line protocol is upInternet address is 10.1.10.1/32Loopback1 is up, line protocol is upInternet address is 10.1.2.1/27Loopback6 is up, line protocol is up

Serial0/0 is up, line protocol is downInternet address is 10.1.1.1/30Broadcast address is 255.255.255.255Address determined by non-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is disabledMulticast reserved groups joined: 224.0.0.5Outgoing access list is not setInbound access list is not setProxy ARP is enabledLocal Proxy ARP is disabledSecurity level is defaultSplit horizon is disabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is enabledIP fast switching on the same interface is enabledIP Flow switching is disabledIP CEF switching is disabledIP Feature Fast switching turbo vectorIP multicast fast switching is enabledIP multicast distributed fast switching is disabledIP route- cache flags are FastRouter Discovery is disabledIP output packet accounting is disabledIP access violation accounting is disabledTCP/IP header compression is disabledRTP/IP header compression is disabledPolicy routing is disabledNetwork address translation is enabled, interface in domain insideBGP Policy Mapping is disabledWCCP Redirect outbound is disabledWCCP Redirect inbound is disabledWCCP Redirect exclude is disabled


New Questions 11

Refer to the exhibit.

The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.

What two operations will the switch perform when it receives this frame? (Choose two.)

A. The switch will not forward a frame with this destination MAC address.

B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.

C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.

D. The frame will be forwarded out of all the active switch ports except for port fa0/0.

E. The frame will be forwarded out of fa0/0 and fa0/1 only.

F. The frame will be forwarded out of all the ports on the switch.

Answer: B,D

Explanation:

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.


New Questions 12

Which IP address is a private address?

A. 12.0.0.1

B. 168.172.19.39

C. 172.20.14.36

D. 172.33.194.30

E. 192.169.42.34

Answer: C


New Questions 13

What is the network address for the host with IP address 192.168.23.61/28?

A. 192.168.23.0

B. 192.168.23.32

C. 192.168.23.48

D. 192.168.23.56

E. 192.168.23.60

Answer: C

Explanation:

Convert bit-length prefix to quad-dotted decimal representation, then from it find the number of bits used for subnetting you can find previously calculated number of subnets by separating subnets each having value of last bit used for subnet masking Find that your IP address is in which subnet, that subnet's first address is network address and last address is broadcast address.

Based on above steps the answer is option C


New Questions 14

Which statements describe the routing protocol OSPF? (Choose three.)

A. It supports VLSM.

B. It is used to route between autonomous systems.

C. It confines network instability to one area of the network.

D. It increases routing overhead on the network.

E. It allows extensive control of routing updates.

F. It is simpler to configure than RIP v2.

Answer: A,C,E

Explanation:

Routing overhead is the amount of information needed to describe the changes in a dynamic network topology.

All routers in an OSPF area have identical copies of the topology database and the topology database of one area is hidden from the rest of the areas to reduce routing overhead because fewer routing updates are sent and smaller routing trees are computed and maintained (allow extensive control of routing updates and confine network instability to one area of the network).


New Questions 15

What is the purpose of the switchport command?

Switch(config-if)# switchport port-security maximum 1

Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8

A. It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured.

B. It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port that is being configured.

C. It will act like an access list and the port will filter packets that have a source or destination MAC of 0018.DE8B.4BF8.

D. The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8.

Answer: A

Explanation:

The first command configurs the maximum number of secure MAC addresses on a port to one. The next command specifies that MAC addresses that are allowed with port security; in this case it is just the one single device MAC. If any other device connects on that port the port will be shut down by the port security feature.


New Questions 16

Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?

A. Physical

B. Data-link

C. Transport

D. Network

Answer: C


New Questions 17

A switch receives a frame on one of its ports. There is no entry in the MAC address table

for the destination MAC address. What will the switch do with the frame?

A. drop the frame

B. forward it out of all ports except the one that received it

C. forward it out of all ports

D. store it until it learns the correct port

Answer: B

Explanation:

Understanding this concept is prime for understanding that when switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.


New Questions 18

Refer to the exhibit.

A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 on Switch1 is disconnected. What would be an effect of this cable being disconnected?

A. Host B would not be able to access the server in VLAN9 until the cable is reconnected.

B. Communication between VLAN3 and the other VLANs would be disabled.

C. The transfer of files from Host B to the server in VLAN9 would be significantly slower.

D. For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.

Answer: D

Explanation:

Because Switch1 has multiple redundant links in this network, traffic would not work for less than a minute, and then it would get rerouted along the longer path to the host. The 1 minute outage would be the length of time it takes STP to converge.


New Questions 19

What information can be used by a router running a link-state protocol to build and maintain its topological database? (Choose two.)

A. hello packets

B. SAP messages sent by other routers

C. LSAs from other routers

D. beacons received on point-to-point links

E. routing tables received from other link-state routers

F. TTL packets from designated routers

Answer: A,C

Explanation: Reference 1:

http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4

Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are:

Open Shortest Path First (OSPF) for IP

The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V

Novell's NetWare Link Services Protocol (NLSP)

Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all:

1. Each router establishes a relationshipu2014an adjacencyu2014with each of its neighbors.

2. Each router sends link state advertisements (LSAs), some

3. Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical.

4. The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table.

OSPF Tutorial


100% Renewal Cisco 100-105 Questions & Answers shared by Certifytools, Get HERE: https://www.certifytools.com/100-105-exam.html (New 347 Q&As)