Download Cisco.PracticeDumps.100-105.2018-04-19.1e.280q.vcex

Download Dump

File Info

Exam Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Number 100-105
File Name Cisco.PracticeDumps.100-105.2018-04-19.1e.280q.vcex
Size 28.65 Mb
Posted April 19, 2018
Downloaded 28



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%

 
 



Demo Questions

Question 1

Why would a network administrator configure port security on a switch?

  • A: to limit the number of Layer 2 broadcasts on a particular switch port
  • B: to prevent unauthorized Telnet access to a switch port
  • C: to prevent unauthorized hosts from accessing the LAN
  • D: block unauthorized access to the switch management interfaces

Correct Answer: C

You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.




Question 2

Refer to the exhibit. 
 

  

A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three.)

  • A: Area 2 contains a Layer 2 device.
  • B: Network Device B is a hub.
  • C: Network Device A is a hub.
  • D: Network Device A is a switch.
  • E: Area 1 contains a Layer 2 device.
  • F: Network Device B is a switch.

Correct Answer: BDE

Switches use a separate collision domain for each port, so device A must be a switch. Hubs, however, place all ports in the same collision domain so device B is a hub. Switches reside in layer 2 while hubs are layer 1 devices.




Question 3

Which two things does a router do when it forwards a packet? (Choose two.)

  • A: determines the next hop on the path
  • B: switches the packet to the appropriate outgoing interfaces
  • C: computes the destination host address
  • D: forwards ARP requests
  • E: updates the destination IP address

Correct Answer: AB

Without following these two processes namely switching the packet to appropriate interface and telling the packet where to go by providing it with a destination IP address, the purpose of the same would not be solved.




Question 4

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

  • A: After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
  • B: In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
  • C: After a collision, the station that detected the collision has first priority to resend the lost data.
  • D: The use of hubs to enlarge the size of collision domain is one way to improve the operation of the CSMA/CD access method.
  • E: After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
  • F: In a CSMA/CD collision domain, stations must wait until media is not in use before transmitting.

Correct Answer: AF

Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn't stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out.




Question 5

Which set of conditions comprises a successful ping attempt between two connected routers configured with IP addresses on the same subnet?

  • A: The destination host receives an echo reply from the source host within one second and the source host receives an echo request from the destination host.
  • B: The destination host receives an echo request from the source host within one second.
  • C: The destination host receives an echo reply from the source host within one second and the source host receives an echo reply from the destination host within two seconds.
  • D: The destination host receives an echo request from the source host and the source host receives an echo request from the destination host within one second.
  • E: The destination host receives an echo request from the source host and the source host receives an echo reply from the destination host within two seconds.

Correct Answer: E




Question 6

Which NTP concept indicates the distance between a device and the reliable time source?

  • A: clock offset
  • B: stratum
  • C: reference
  • D: dispersion

Correct Answer: B




Question 7

Which statement is a Cisco best practice for switch port security?

  • A: Vacant switch ports must be shut down.
  • B: Empty ports must be enabled in VLAN 1.
  • C: VLAN 1 must be configured as the native VLAN.
  • D: Err-disabled ports must be configured to automatically re-enable.

Correct Answer: A




Question 8

Which statement about unique local IPv6 addresses is true?

  • A: Summarization is not supported.
  • B: They require all prefixes to be unique.
  • C: Their global IDs are assigned sequentially.
  • D: They are routable to the public Internet.

Correct Answer: B




Question 9

Which three statements accurately describe CDP? (Choose three.)

  • A: CDP can discover Cisco devices that are not directly connected.
  • B: CDP is a network layer protocol.
  • C: CDP can discover directly connected neighboring Cisco devices.
  • D: CDP is a datalink layer protocol.
  • E: CDP is a Cisco proprietary protocol.
  • F: CDP is an IEEE standard protocol.

Correct Answer: CDE

CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices containing useful info for troubleshooting and documenting the network.




Question 10

Which statement describes the effect of the overload keyword in the ip nat inside source list 90 interface ethernet 0/0 overload command?

  • A: Addresses that match access list inside are translated to the IP address of the Ethernet 0/0 interface.
  • B: Hosts that match access list inside are translated to an address in the Ethernet 0/0 network.
  • C: Hosts on the Ethernet 0/0 LAN are translated to the address pool in access list 90.
  • D: Addresses that match access list 90 are translated through PAT to the IP address of the Ethernet 0/0 interface.

Correct Answer: D










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files