Download Cisco.PracticeTest.100-105.2017-01-06.1e.114q.vcex

Download Dump

File Info

Exam Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Number 100-105
File Name Cisco.PracticeTest.100-105.2017-01-06.1e.114q.vcex
Size 3.96 Mb
Posted January 06, 2017
Downloaded 47



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%

 
 



Demo Questions

Question 1

Which of the following loop avoidance mechanisms drives the requirement to create subinterfaces for each point-to-point connection in a partially meshed frame relay network?

  • A: split horizon
  • B: poison reverse
  • C: maximum hop count
  • D: feasible successor

Correct Answer: A

Split horizon is the loop avoidance mechanism that drives the requirement to create sub interfaces for each point-to-point connection in a partially meshed frame relay network. Frame relay is a non-broadcast multi-access (NBMA) network and obeys the rules of split horizon. This mechanism prohibits a routing protocol from sending updates out the same physical interface on which it was received. When the same physical interface is used to host multiple frame relay connections, this will prevent an update arriving from remote network A on the physical interface from being sent out the same interface to remote network B. 
By creating a subinterface for each frame relay connection and assigning IP addresses to the subinterfaces rather than the physical interface, and by placing the subinterfaces into different subnets, split horizon will not see the "virtual" interfaces as the same interface and will allow these routing updates to be sent back out the same physical interface on which they arrived. It is important to map each subnet (or subinterface) to a remoteData Link Connection Identifier (DLCI) so that traffic to a remote network can be sent out the correct subinterface. 
To summarize this discussion:
- Subinterfaces solve the NBMA split horizon issues. 
- There should be one IP subnet mapped to each DLCI 
Poison reverse is not the mechanism driving the requirement to create subinterfaces for each point-to-point connection in a partially meshed frame relay network. 
This mechanism requires a router to send an unreachable metric to the interface on which a network was discovered when it is learned from another interface that the network is no longer available. 
Maximum hop count is not the mechanism driving the requirement to create sub interfaces for each point-to-point connection in a partially meshed frame relay network. Each routing protocol has a maximum hop count, which is the maximum number of hops allowed to a remote network before the network is considered "unreachable". 
Feasible successor is not the mechanism driving the requirement to create sub interfaces for each point-to-point connection in a partially meshed frame relay network. This is a concept unique to EIGRP that represents a secondary route to a network that is considered the "best" route of possible backup routes. 
Objective:
LAN Switching Fundamentals 
Sub-Objective:
Configure and verify Layer 2 protocols 
References:
https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html#splithorizon




Question 2

You are a network administrator, and you are configuring an access list to permit Hypertext Transfer Protocol (HTTP) traffic based on the source and destination IP address of the devices. 
What access list (ACL), protocol, and port number will you configure to permit HTTP traffic? (Choose three.) 

  • A: 23
  • B: 80
  • C: TCP
  • D: UDP
  • E: Standard
  • F: Extended

Correct Answer: BCF

An extendedACL can filter network traffic on the basis of source and destination IP address, the transport layer protocol (such as TCP or UDP), and the port number. HTTP, or general Web traffic, uses TCP at the Transport layer and port 80. More port numbers commonly used in ACLs include:
HTTPS 443 
FTP 20, 21 
Telnet 23 
DNS 53 
SMTP 25 
Standard ACLs can filter only on the source IP address inside a packet, whereas an extended ACL can filter on the source and destination IP addresses in the packet, the IP protocol, and protocol information such as the destination port number. An extended ACL therefore allows you to filter more precisely. For example, you can filter a specific Telnet session from one of your users' PCs to a remote Telnet server. Standard ACLs do not support this form of granularity. With a standard ACL, you can either permit or deny all traffic from a specific source device. 
Port 23 is incorrect because this port is used by Telnet. Therefore, port 23 does not need to be configured to permit HTTP traffic. 
UDP is incorrect because HTTP uses TCP. 
Standard ACLs cannot filter traffic based on the destination IP addresses. Therefore, this option is incorrect. 
Objective:
Infrastructure Services 
Sub-Objective:
Configure, verify, and troubleshoot IPv4 standard numbered and named access list for routed interfaces 
References:
https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html
https://www.cisco.com/c/en/us/td/docs/ios/sec_data_plane/configuration/guide/12_4/sec_data_plane_12_4_book/sec_access_list_ov.html




Question 3

The following shows the partial output of the show cdp neighbors command:
DevicID Local Intrfce Holdtme Capability Platform Port ID 
lab-7206 Eth 0 157 R 7206VXR Fas 0/0/0 
lab-as5300-1 Eth 0 163 R AS5300 Fas 0 
lab-as5300-2 Eth 0 159 R AS5300 Eth 0 
lab-as5300-3 Eth 0 122 R AS5300 Eth 0 
lab-as5300-4 Eth 0 132 R AS5300 Fas 0/0 
lab-3621 Eth 0 140 R S 3631-telcoFas 0/0 
008024 2758E0 Eth 0 132 T CAT3000 1/2 
lab-400-1 Eth 0 130 r FH400 Fas 0/0 

What does "r" represent in this output?

  • A: Router
  • B: Route bridge
  • C: Hub
  • D: Repeater

Correct Answer: D

The "r" in the output of the show cdp neighbors command is a capability code that represents a repeater. The capability codes from the output of the show cdp neighbors command along with their descriptions are:
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater 
The show cdp neighbors command is used to view details about neighboring devices discovered by Cisco Discovery Protocol (CDP). The following code is the full output of the command:
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater 
DevicID Local Intrfce Holdtme Capability Platform Port ID 
lab-7206 Eth 0 157 R 7206VXR Fas 0/0/0 
lab-as5300-1 Eth 0 163 R AS5300 Fas 0 
lab-as5300-2 Eth 0 159 R AS5300 Eth 0 
lab-as5300-3 Eth 0 122 R AS5300 Eth 0 
lab-as5300-4 Eth 0 132 R AS5300 Fas 0/0 
lab-3621 Eth 0 140 R S 3631-telcoFas0/0 
008024 2758E0 Eth 0 132 T CAT3000 1/2 
lab-400-1 Eth 0 130 r FH400 Fas 0/0 
The fields in the output are as follows:
Device ID: The ID, Media Access Control (MAC) address or the serial number of the neighboring device.
Local Interfce: The protocol which the connectivity media uses.
Holdtime: The time duration for which the CDP advertisement will be held back by the current device from a transmitting router before it gets discarded.
Capability: The type of device discovered by the CDP. It can have the following values:
R Router 
T Transparent bridge 
B Source-routing bridge 
S Switch 
H Host 
I IGMP device 
r Repeater 
Platform: The product number of the device.
Port ID: The protocol and port number of the device.
The "r" in the output does not represent a router. A router would be represented by a capital "R." 
The "r" in the output does not represent a route bridge. A source route bridge would be represented by a capital "B." 
The "r" in the output does not represent a hub. The show cdp neighbors command does not include a capability code for this device. 
Objective:
LAN Switching Fundamentals 
Sub-Objective:
Configure and verify Layer 2 protocols 
References:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mcl/allreleasemcl/all-book.html#wp1074517




Question 4

Click and drag the following protocols, applications, and file formats on the left, to their corresponding Open Systems Interconnection (OSI) layers.  

Correct Answer: Exam simulator is required

The application layer is responsible for interacting directly with the application. It provides application services such as e-mail and File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and telnet. Some of its associated protocols include:
FTP: Used to transfer data between hosts through the Internet or a network.
SMTP: SMTP is a Transmission Control Protocol (TCP)/Internet Protocol (IP) protocol which is used to send and receive e-mail messages.
Telnet: Used to allow remote logins.
The session layer is used to create, manage, and terminate sessions between communicating nodes. Some of the protocols and applications associated with this layer include:
Service requests: Service requests and service responses which take place between different applications are handled by the session layer.
Session Control Protocol (SCP): Allows a host to have multiple conversations with another host using the same TCP connection.
The Presentation layer in the OSI model enables coding and conversion functions for application layer data. The formatting and encryption of data is done at this layer, as the Presentation layer converts data into a format which is acceptable by the application layer. Some of the file types associated with this layer include:
Graphics Interchange Format (GIF) 
Joint Photographic Experts Group(JPEG) 
Tagged Image File Format (TIFF) 
Other layers in the OSI model include:
Transport: Responsible for error free and sequential delivery of data. This layer is used to manage data transmission between devices, a process known as flow control. The Transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). 
Physical: Consists of hardware for sending and receiving data on a carrier. The protocols which work at the Physical layer include Fast Ethernet, RS232,and Asynchronous Transfer Mode (ATM). 
Network: Used to define the network address or the Internet Protocol (IP) address which is then used by the routers to forward make forwarding decisions.
Data Link: Ensures reliable transmission of data across a network on the basis of Layer 2 addresses such as MAC addresses (Ethernet) or DLCIs (Frame Relay).
Objective:
Network Fundamentals 
Sub-Objective:
Compare and contrast TCP and UDP protocols 
References:
http://docwiki.cisco.com/wiki/Internetworking_Basics#OSI_Model_and_Communication_Between_Systems




Question 5

What statements are NOT true regarding the network shown below? 
 

  

  • A: If Fa0/1.4 goes down WKS4 will not be able to contact the FTP server
  • B: Collisions can occur between WKS4 and WKS5
  • C: STP is running
  • D: SW1 is the root bridge
  • E: WKS 5 and WKS 3 are in the same network

Correct Answer: E

WKS 5 and WKS 3 are NOT in the same network. WKS 5 is in VLAN 4 and WKS 3 is in VLAN 2. VLANs are configured as different subnets serviced by sub interfaces on the router. Each of the sub interfaces is a different subnet or different network. 
It is true that if Fa0/1.4 goes down, WKS4 will not be able to contact the FTP server. WKS3 and the FTP server are in different VLANs, which means that if either of the subinterfaces on the router servicing VLAN 3 or VLAN 4 go down, they not be able to connect, since all inter-VLAN communication goes through the router using those subinterfaces. Since Fa0/1.4 services VLAN 4, where WKS4 is located if Fa0/1.4 goes down WKS4 will not be able to contact the FTP server. 
It is true that collisions can occur between WKS4 and WKS5 since they are in the same VLAN and connected to a hub. If they were connected to a switch, collisions would NOT be possible. 
It is true that STP is running. It runs on the switches by default. 
It is true that SW1 is the root bridge.Since the Fa0/1 port on SW3 is in a blocking state and STP rules call for forwarding on all ports that lead to the root bridge, then SW2 cannot be the root bridge. Since all ports must be forwarding on the root bridge, that rules out SW3 as the root bridge, which mean SW1 must be the root bridge. 
Objective:
Routing Fundamentals 
Sub-Objective:
Configure, verify, and troubleshoot inter-VLAN routing 
References:
http://docwiki.cisco.com/wiki/Internetwork_Design_Guide_--_LAN_Switching#LAN_Switching




Question 6

In the diagram below, when a packet sent from the PC at 10.0.1.3 to the PC at 10.1.1.3 leaves the Fa0/1 interface of R1, what will be the source and destination IP and MAC addresses? 

  

  • A: source IP 10.1.1.2 destination IP 10.1.1.3Source MAC ad.ad.ad.ad.ad.ad destination MAC ab.ab.ab.ab.ab.ab
  • B: source IP 10.1.1.1 destination IP 10.1.1.3Source MAC ad.dd.dd.dd.dd.dd.dd destination MACab.ab.ab.ab.ab.ab
  • C: source IP 10.0.1.3 destination IP 10.1.1.3Source MAC ad.ad.ad.ad.ad.ad destination MAC ae.ae.ae.ae.ae.ae
  • D: source IP 10.0.6.3 destination IP 10.1.1.3Source MAC ad.ad.ad.ad.ad.ad destination MAC ae.ae.ae.ae.ae.ae

Correct Answer: C

The source IP address will be 10.0.1.3 and the destination IP address will be 10.1.1.3. The source MAC address will be ad.ad.ad.ad.ad.ad and the destination MAC address will be ae.ae.ae.ae.ae.ae. 
The source and destination IP addresses never change as the packet is routed across the network. The MAC address will change each time a router sends the packet to the next router or to the ultimate destination. The switches do not change either set of addresses in the header; they just switch the frame to the correct switch port according to the MAC address table. Therefore, when the packet leaves R1, the source MAC address will be that of R1 and the destination MAC address will be that of the Fa0/0 interface of R2. The IP addresses will be those of the two workstations, 10.0.1.3 and 10.1.1.3. 
When the workstation at 10.0.1.3 starts the process, it will first determine that the destination address is in another subnet and will send to its default gateway (10.0.1.2). It will perform an ARP broadcast for the MAC address that goes with 10.0.1.2, and R1 will respond with its MAC address, bb.bb.bb.bb.bb.bb. 
After R2 determines the next-hop address to send to 10.0.1.3 by parsing the routing table, it will send the packet to R1 at 10.0.6.2. When R2 receives the packet, R2 will determine that the network 10.0.1.0/24 is directly connected and will perform an ARP broadcast for the MAC address that goes with 10.0.1.3. The workstation at 10.0.1.3 will respond with its MAC address, ab.ab.ab.ab.ab.ab. 
Objective:
Routing Fundamentals 
Sub-Objective:
Describe the routing concepts 
References:
http://docwiki.cisco.com/wiki/Routing_Basics




Question 7

Which of the following IPV6 commands is used to define a static host name-to-address mapping in the host name cache?

  • A: ipv6 host
  • B: ipv6 unicast routing
  • C: ipv6 neighbor
  • D: ipv6 local

Correct Answer: A

The ipv6 host command is used to define a static host name-to-address mapping in the host name cache, and is executed in global configuration mode. 
The ipv6 unicast-routing command is used to enable IPv6 forwarding on a router. 
There is no ipv6 local command. There is an ipv6 local pool command that can be used to define a prefix pool when using DHCPv6. 
The ipv6 neighbor command is used to configure a static entry in the IPv6 neighbor discovery cache, which will enhance the neighbor discovery process that occurs with IPv6. 
Objective:
Infrastructure Services 
Sub-Objective:
Troubleshoot client connectivity issues involving DNS 
References:
https://www.cisco.com/c/en/us/td/docs/ios/ipv6/command/reference/ipv6_book/ipv6_06.html#wp2170954




Question 8

Which of the following commands would allow you to determine the bandwidth of an interface?

  • A: show interfaces
  • B: show interfaces accounting
  • C: show cdp
  • D: show cdp neighbors

Correct Answer: A

The show interfaces command shows information about each interface including a section on the bandwidth of the connection. If you wanted to locate this information in the output, it would be in the third down line as follows:
MTU 1500 bytes, BW 10000 Kbit, DLY 100000 usec, rely 255/255,load 1/255 
Where BW = bandwidth 
The show interfaces accounting command focuses on the relative amounts of traffic going through each interface, but does not indicate the bandwidth. 
The show cdp command shows information about the Cisco Discovery protocol, a Layer 2 protocol used by Cisco devices to advertise their existence and capabilities to other Cisco devices ion the network. 
The show cdp neighbors command shows information about each discovered neighbor, but does not display the bandwidth of an interface. 
Objective:
LAN Switching Fundamentals 
Sub-Objective:
Troubleshoot interface and cable issues (collisions, errors, duplex, speed) 
References:
https://www.cisco.com/c/en/us/td/docs/ios/redirect/eol.html




Question 9

You are configuring all your devices for IPv6. Which of the following is the only device that requires the ipv6 unicast-routing command?

  • A: Layer 2 switch
  • B: Router
  • C: Adaptive security appliance
  • D: Wireless AP

Correct Answer: B

Only the router requires the ipv6 unicast-routing command. The command ipv6 unicast-routing enables the routing of IPv6 packets on a router. It is not required when you are simply configuring interfaces on devices that participate in IPv6. 
A Layer 2 switch can have an IPv6 address applied to its management interface and to any VLAN interfaces. However, because the switch does no routing, it does not require the ipv6 unicast-routing command. 
An adaptive security appliance (ASA) can also have IPv6 addresses applied to its interfaces and can route both IPv6 and IPv4 traffic. However, it does not require the ipv6 unicast-routing command. 
A wireless access point differs from a wireless router in that it operates as a switch or hub and does no routing. Therefore, it does not require this command. 
Objective:
Network Fundamentals 
Sub-Objective:
Configure, verify, and troubleshoot IPv6 addressing 
References:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-2s/ipv6-15-2s-book.html
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/command/ipv6-cr-book/ipv6-i5.html#wp2095571844




Question 10

The following exhibit displays the MAC address table of a switch in your network, along with the location of each device connected to the switch:
 

  
  
Which of the following frames will be flooded to all ports after it is received by the switch?

  • A: source MAC: 12-34-56-78-9A-BD, destination MAC: 12-34-56-78-9A-BF
  • B: source MAC: 12-34-56-78-9A-BF, destination MAC:12-34-56-78-9A-BD
  • C: source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BC
  • D: source MAC: 12-34-56-78-9A-BC, destination MAC: 12-34-56-78-9A-BF

Correct Answer: C

The frame with a source MAC of 12-34-56-78-9A-BF and a destination MAC of12-34-56-78-9A-BC would be sent to all ports because the destination MAC address is not already in the MAC address table. 
The frame with a source MAC of 12-34-56-78-9A-BD and a destination MAC of 12-34-56-78-9A-BF would not be sent to all ports because the destination MAC address is in the MAC address table. 
The frame with a source MAC of 12-34-56-78-9A-BF and a destination MAC of 12-34-56-78-9A-BD would not be sent to all ports because the destination MAC address is in the MAC address table. 
The framewith a source MAC of 12-34-56-78-9A-BC and a destination MAC of 12-34-56-78-9A-BF would not be sent to all ports because the destination MAC address is in the MAC address table. 
Objective:
LAN Switching Fundamentals 
Sub-Objective:
Interpret Ethernet frame format 
References:
http://www.ciscopress.com/articles/article.asp?p=2339639&seqNum=2
https://www.globalknowledge.com.eg/about-us/Knowledge-Center/Article/How-do-Switches-Work/










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files