Download Cisco.PracticeDumps.100-105.2018-05-25.1e.345q.vcex

Download Dump

File Info

Exam Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Number 100-105
File Name Cisco.PracticeDumps.100-105.2018-05-25.1e.345q.vcex
Size 30.09 Mb
Posted May 25, 2018
Downloaded 53



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%

 
 



Demo Questions

Question 1

Refer to the exhibit. 
 

 
 
Which command is simplest to configure routing between the regional office network 10.89.0.0/20 and the corporate network?

  • A: router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1
  • B: router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2
  • C: router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1
  • D: router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2

Correct Answer: A

The fourth command makes it possible for all hosts beyond R2 and all hosts beyond R1 to interact with each other, hence it is the simplest technique.




Question 2

What is one requirement for interfaces to run IPv6?

  • A: An IPv6 address must be configured on the interface.
  • B: An IPv4 address must be configured.
  • C: Stateless autoconfiguration must be enabled after enabling IPv6 on the interface
  • D: IPv6 must be enabled with the ipv6 enable command in global configuration mode.

Correct Answer: A

To use IPv6 on your router, you must, at a minimum, enable the protocol and assign IPv6 addresses to your interfaces.




Question 3

Refer to the exhibit. 
 

 
 
The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. 
What two operations will the switch perform when it receives this frame? (Choose two.)

  • A: The switch will not forward a frame with this destination MAC address.
  • B: The frame will be forwarded out of all the ports on the switch.
  • C: The MAC address of ffff.ffff.ffff will be added to the MAC address table.
  • D: The frame will be forwarded out of all the active switch ports except for port fa0/0.
  • E: The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.
  • F: The frame will be forwarded out of fa0/0 and fa0/1 only.

Correct Answer: DE

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then the source MAC is added to the MAC address table and frame would have been flooded out all ports except for the port that it came from.




Question 4

Which network topology allows all traffic to flow through a central hub?

  • A: bus
  • B: star
  • C: mesh
  • D: ring

Correct Answer: B

Star topology is the arrangement of the computers in such a way that all the terminals or work stations are connected to the main central hub. The terminals are referred to as the clients and the main central hub is referred to as the switch. It is the easiest way of arranging a network topology with one central main computer connected to several other functioning terminals. All the network traffic passes through the central device and all the data transmission occurs through the main switch as well as all the hub acts as the signal repeater. One advantage of such an arrangement is the simplicity and the ease with which you can add additional nodes. The disadvantage is that if an error occurs in the central hub the whole network shuts down. 
 
  
  
Reference: http://www.certiology.com/computing/computer-networking/network-topology.html




Question 5

Which two statements are true regarding ICMP packets? (Choose two.)

  • A: They are encapsulated within IP datagrams.
  • B: They guarantee datagram delivery.
  • C: TRACERT uses ICMP packets.
  • D: They acknowledge receipt of TCP segments.
  • E: They are encapsulated within UDP datagrams.

Correct Answer: AC

Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol). 
ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet's Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. 
In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination.




Question 6

Which method does a connected trunk port use to tag VLAN traffic?

  • A: IEEE 802.1w
  • B: IEEE 802.1D
  • C: IEEE 802.1Q
  • D: IEEE 802.1p

Correct Answer: C

IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network. When a frame enters the VLAN-aware portion of the network (a trunk link, for example), a VLAN ID tag is added to represent the VLAN membership of that frame. The picture below shows how VLAN tag is added and removed while going through the network. 
http://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html




Question 7

On which type of device is every port in the same collision domain?

  • A: a router
  • B: a Layer 2 switch
  • C: switch
  • D: a hub
  • E: a Layer 3 switch

Correct Answer: D

The definition of a collision domain is a set of LAN devices whose frames could collide with one another. This happens with hubs, bridges, repeaters and wireless access points as only one device can send and receive. If more than one device tries sending or receiving, the information is lost and irrecoverable it will need to be resent. This can slow down network performance along with making it a security threat.




Question 8

Which option is the default switch port port-security violation mode?

  • A: shutdown
  • B: protect
  • C: shutdown vlan
  • D: restrict

Correct Answer: A

Shutdown - This mode is the default violation mode; when in this mode, the switch will automatically force the switchport into an error disabled (err-disable) state when a violation occurs. While in this state, the switchport forwards no traffic. The switchport can be brought out of this error disabled state by issuing the errdisable recovery cause CLI command or by disabling and reenabling the switchport. 
Shutdown VLAN - This mode mimics the behavior of the shutdown mode but limits the error disabled state the specific violating VLAN.




Question 9

Refer to the exhibit. 
  

 
 
An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. 
Based on the output shown, what could be the problem?

  • A: The serial interface is configured for the wrong frame size.
  • B: The serial interface does not have a cable attached.
  • C: The serial interface has the wrong type of cable attached.
  • D: The serial interface has a full buffer.
  • E: The serial interface is configured for half duplex.

Correct Answer: C

Since the output is not forthcoming it shows that the type of cable attached is wrong, though the cable is connected since it shows the cable type. According to the figure DTE cable should connect to R1 on interface but while examining using show controllers serial 0/0 command it showing that a DCE is connected so the wrong type of cable is being used.




Question 10

Which statement about native VLAN traffic is true?

  • A: Cisco Discovery Protocol traffic travels on the native VLAN by default.
  • B: Traffic on the native VLAN is tagged with 1 by default.
  • C: Control plane traffic is blocked on the native VLAN.
  • D: The native VLAN is typically disabled for security reasons.

Correct Answer: A

The native VLAN is the VLAN that is configured for packets that don’t have a tag. The default native VLAN on all Cisco Switches is VLAN 1. It is always enabled by default. These settings can all be changed: That is: you can designate a different VLAN as the native VLAN, disable VLAN 1, etc. Knowing that, we can eliminate D) as the correct answer because it is enabled by default. We can also eliminate B) because Native VLAN packets don’t get tags by default (you can change this). Finally, Control Plane traffic is never blocked on Native VLAN 1, and even if you change the Native VLAN, the control plane traffic still comes across VLAN 1.










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files