★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/100-105-dumps.html


Act now and download your Cisco 100-105 test today! Do not waste time for the worthless Cisco 100-105 tutorials. Download Replace Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam with real questions and answers and begin to learn Cisco 100-105 with a classic professional.

2021 Apr 100-105 question

Q1. - (Topic 5) 

Refer to the exhibit. 

An administrator replaced the 10/100 Mb NIC in a desktop PC with a 1 Gb NIC and now the PC will not connect to the network. The administrator began troubleshooting on the switch. Using the switch output shown, what is the cause of the problem? 

A. Speed is set to 100Mb/s. 

B. Input flow control is off. 

C. Encapsulation is set to ARPA. 

D. The port is administratively down. 

E. The counters have never been cleared. 

Answer:

Explanation: 

For PC to switch connectivity, the speed settings must match. In this case, the 1 Gb NIC will not be able to communicate with a 100Mb fast Ethernet interface, unless the 1Gb NIC can be configured to connect at 100Mb. 


Q2. - (Topic 1) 

Which statements are true regarding ICMP packets? (Choose two.) 

A. They acknowledge receipt of TCP segments. 

B. They guarantee datagram delivery. 

C. TRACERT uses ICMP packets. 

D. They are encapsulated within IP datagrams. 

E. They are encapsulated within UDP datagrams. 

Answer: C,D 

Explanation: 

Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity, which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools, which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol). ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet’s Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination 


Q3. - (Topic 2) 

Refer to the exhibit. 

The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at 

the switch. 

What two operations will the switch perform when it receives this frame? (Choose two.) 

A. The switch will not forward a frame with this destination MAC address. 

B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table. 

C. The MAC address of ffff.ffff.ffff will be added to the MAC address table. 

D. The frame will be forwarded out of all the active switch ports except for port fa0/0. 

E. The frame will be forwarded out of fa0/0 and fa0/1 only. 

F. The frame will be forwarded out of all the ports on the switch. 

Answer: B,D 

Explanation: 

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. 


Q4. CORRECT TEXT - (Topic 6) 

This topology contains 3 routers and 1 switch. Complete the topology. 

Drag the appropriate device icons to the labeled Device Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address 

(Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology. 

Use information gathered from the Main router to complete the configuration of any additional routers. 

No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration. 

Configure each additional router with the following: 

Configure the interfaces with the correct IP address and enable the interfaces. 

Set the password to allow console access to consolepw 

Set the password to allow telnet access to telnetpw 

Set the password to allow privilege mode access to privpw 

Not E: Because routes are not being added to the configurations, you will not be able to ping through the internetwork. 

All devices have cable autosensing capabilities disabled. 

All hosts are PC’s 

Answer: Specify appropriate devices and drag them on the "Device" boxes For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers Place them on appropriate locations as following: (Host D and host E will be automatically added after placing two routers. Click on them to access neighboring routers) Specify appropriate connections between these devices: 

+

 The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable 

+

 The router on the right is connected with the Main router through Serial interfaces: use a 

serial cable 

+

 The router on the right and the Switch: use a straight-through cable 

+

 The router on the left and the computer: use a crossover cable (To remember which type of cable you should use, follow these tips: 

-

To connect two serial interfaces of 2 routers we use serial cable 

-

To specify when we use crossover cable or straight-through cable, we should remember: Group 1: Router, Host, Server Group 2: Hub, Switch One device in group 1 + One device in group 2: use straight-through cable Two devices in the same group: use crossover cable For example, we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server... and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host.) Assign appropriate IP addresses for interfaces: From Main router, use show running-config command. 

 (Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just used for demonstration) 

From the output we learned that the ip address of Fa0/0 interface of the Main router is 

192.168.152.177/28. This address belongs to a subnetwork which has: 

Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000) 

Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177) 

Broadcast address: 192.168.152.191 (because 191 = 176 + 16 - 1) 

And we can pick up an ip address from the list that belongs to this subnetwork: 

192.168.152.190 and assign it to the Fa0/0 interface the router on the left Use the same method for interface Serial0/0 with an ip address of 192.168.152.161 Increment: 16 Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161) Broadcast address: 192.168.152.175 (because 176 = 160 + 16 - 1) -> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right Interface Fa0/1 of the router on the left IP (of the computer on the left) : 192.168.152.129/28 Increment: 16 Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129) Broadcast address: 192.168.152.143 (because 143 = 128 + 16 - 1) -> we choose 192.168.152.142 from the list Interface Fa0/0 of the router on the right IP (of the computer on the left) : 192.168.152.225/28 Increment: 16 Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225) Broadcast address: 192.168.152.239 (because 239 = 224 + 16 - 1) -> we choose 192.168.152.238 from the list Let's have a look at the picture below to summarize Configure two routers on the left and right with these commands: Router1 = router on the left Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces: Router1>enable Router1#configure terminal Router1(config)#interface fa0/0 Router1(config-if)#ip address 192.168.152.190 255.255.255.240 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/1 Router1(config-if)#ip address 192.168.152.142 255.255.255.240 Router1(config-if)#no shutdown Set passwords (configure on two routers) 

+

 Console password: Router1(config-if)#exit Router1(config)#line console 0 

Router1(config-line)#password consolepw Router1(config-line)#login Router1(config-line)#exit 

+

 Telnet password: Router1(config)#line vty 0 4 Router1(config-line)#password telnetpw Router1(config-line)#login Router1(config-line)#exit 

+

 Privilege mode password: Router1(config)#enable password privpw Save the configuration: Router1(config)#exit Router1#copy running-config startup-config Configure IP addresses of Router2 (router on the right) Router2>enable Router2#configure terminal Router2(config)#interface fa0/0 Router2(config-if)#ip address 192.168.152.238 255.255.255.240 Router2(config-if)#no shutdown Router2(config-if)#interface serial0/0 Router2(config-if)#ip address 192.168.152.174 255.255.255.240 Router2(config-if)#no shutdown Then set the console, telnet and privilege mode passwords for Router2 as we did for Router1, remember to save the configuration when you finished. 


Q5. - (Topic 4) 

What is the best practice when assigning IP addresses in a small office of six hosts? 

A. Use a DHCP server that is located at the headquarters. 

B. Use a DHCP server that is located at the branch office. 

C. Assign the addresses by using the local CDP protocol. 

D. Assign the addresses statically on each node. 

Answer:

Explanation: 

Its best to use static addressing scheme where the number of systems is manageable rather than using a dynamic method such as DHCP as it is easy to operate and manage. 


Most up-to-date 100-105 practice:

Q6. - (Topic 5) 

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) 

A. Allow unrestricted access to the console or VTY ports. 

B. Use a firewall to restrict access from the outside to the network devices. 

C. Always use Telnet to access the device command line because its data is automatically encrypted. 

D. Use SSH or another encrypted and authenticated transport to access device configurations. 

E. Prevent the loss of passwords by disabling password encryption. 

Answer: B,D 

Explanation: 

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH. 


Q7. - (Topic 5) 

Refer to the exhibit. 

The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation? 

A. Verify that the DNS server address is correct in the DHCP pool. 

B. Ping the default gateway to populate the ARP cache. 

C. Use the tracert command on the DHCP client to first determine where the problem is located. 

D. Clear all DHCP leases on the router to prevent address conflicts. 

E. Issue the ipconfig command with the /release and /renew options in a command window. 

Answer:

Explanation: 

A PC will retain its DHCP assigned IP address until the lease time expires, which often times is 24 hours or more. When changes are made to the DHCP server, the client should issue the ipconfig/release and then ipconfig/renew commands to obtain a new IP address lease. 


Q8. - (Topic 7) 

Which NTP command configures the local device as an NTP reference clock source? 

A. ntp peer 

B. ntp broadcast 

C. ntp master 

D. ntp server 

Answer:


Q9. - (Topic 7) 

Which device allows users to connect to the network using a single or double radio? 

A. access point 

B. switch 

C. wireless controller 

D. firewall 

Answer:


Q10. - (Topic 7) 

Which statement about native VLAN traffic is true? 

A. Cisco Discovery Protocol traffic travels on the native VLAN by default 

B. Traffic on the native VLAN is tagged with 1 by default 

C. Control plane traffic is blocked on the native VLAN. 

D. The native VLAN is typically disabled for security reasons 

Answer: