★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/100-105-dumps.html


Cisco Cisco test is amongst the most demanding exams. Even so, it is the particular dream involving all ambitious IT job hunters. Passing the Cisco 100-105 true exam is by no means an effortless task. Should you be a busy worker, youve got no more spare time for you to prepare for the 100-105 exam. Now Testking will allow you to get certified with the quickest and most up-to-date Cisco 100-105 exam braindumps. We tend to be sure you are going to successfully get the Cisco certification as long as an individual prepare that by utilizing the particular Testkings Cisco practice question step simply by step. Our Cisco 100-105 simulated questions and answers tend to be compiled using high good quality and beneath the supervision involving our knowledgeable and qualified workers.

2021 Apr 100-105 actual test

Q41. - (Topic 3) 

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.) 

A. Global addresses start with 2000::/3. 

B. Link-local addresses start with FE00:/12. 

C. Link-local addresses start with FF00::/10. 

D. There is only one loopback address and it is ::1. 

E. If a global address is assigned to an interface, then that is the only allowable address for the interface. 

Answer: A,D 


Q42. - (Topic 3) 

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.) 

A. router#show version 

B. router#show ip interface 

C. router#show protocols 

D. router#show controllers 

E. router#show running-config 

Answer: B,C 

Explanation: 

The outputs of “show protocols” and “show ip interface” are shown below: 

Global values:Internet Protocol routing is enabledSerial0/0 is up, line protocol is downInternet address is 10.1.1.1/30Serial0/1 is up, line protocol is downInternet address is 209.65.200.225/30Serial0/2 is up, line protocol is downSerial0/3 is up, line protocol is downNVI0 is up, line protocol is upInterface is unnumbered. Using address of NVI0 (0.0.0.0)Loopback0 is up, line protocol is upInternet address is 10.1.10.1/32Loopback1 is up, line protocol is upInternet address is 10.1.2.1/27Loopback6 is up, line protocol is up 

Serial0/0 is up, line protocol is downInternet address is 10.1.1.1/30Broadcast address is 255.255.255.255Address determined by non-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is disabledMulticast reserved groups joined: 224.0.0.5Outgoing access list is not setInbound access list is not setProxy ARP is enabledLocal Proxy ARP is disabledSecurity level is defaultSplit horizon is disabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is enabledIP fast switching on the same interface is enabledIP Flow switching is disabledIP CEF switching is disabledIP Feature Fast switching turbo vectorIP multicast fast switching is enabledIP multicast distributed fast switching is disabledIP route-cache flags are FastRouter Discovery is disabledIP output packet accounting is disabledIP access violation accounting is disabledTCP/IP header compression is disabledRTP/IP header compression is disabledPolicy routing is disabledNetwork address translation is enabled, interface in domain insideBGP Policy Mapping is disabledWCCP Redirect outbound is disabledWCCP Redirect inbound is disabledWCCP Redirect exclude is disabled 


Q43. - (Topic 5) 

What should be part of a comprehensive network security plan? 

A. Allow users to develop their own approach to network security. 

B. Physically secure network equipment from potential access by unauthorized individuals. 

C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. 

D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. 

E. Minimize network overhead by deactivating automatic antivirus client updates. 

Answer:

Explanation: 

From Cisco CCENT Exam Essentials study guide by Todd Lammle: 

Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals. 

List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations. 

Reference: 

CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition 

by Todd Lammle 

Published by Sybex, 2013 


Q44. - (Topic 3) 

Which two statements describe the IP address 10.16.3.65/23? (Choose two.) 

A. The subnet address is 10.16.3.0 255.255.254.0. 

B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. 

C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0 

D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. 

E. The network is not subnetted. 

Answer: B,D 

Explanation: 

The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254 


Q45. - (Topic 7) 

Which component of a routing table entry represents the subnet mask? 

A. routing protocol code 

B. prefix 

C. metric 

D. network mask 

Answer:

Explanation: 

IP Routing Table Entry TypesAn entry in the IP routing table contains the following information in the order presented: Network ID. The network ID or destination corresponding to the route. The network ID can be class-based, subnet, or supernet network ID, or an IP address for a host route. Network Mask. The mask that is used to match a destination IP address to the network ID. Next Hop. The IP address of the next hop. Interface. An indication of which network interface is used to forward the IP packet. Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID. Routing table entries can be used to store the following types of routes: Directly Attached Network IDs. Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network. Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network. Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per-IP address basis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255. Default Route. The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 

0.0.0.0. 


Up to the minute 100-105 torrent:

Q46. - (Topic 3) 

Refer to the exhibit. 

If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed? 

A. Router1> 

B. Router1# 

C. Router2> 

D. Router2# 

Answer:

Explanation: 

After resuming the telnet session by using the Enter key after it has been suspended, it will resume back to the telnet session so it will be back to the router2> prompt. 


Q47. - (Topic 3) 

What is the subnet address of 172.16.159.159/22? 

A. 172.16.0.0 

B. 172.16.128.0 

C. 172.16.156.0 

D. 172.16.159.0 

E. 172.16.159.128 

F. 172.16.192.0 

Answer:

Explanation: 

Converting to binary format it comes to 11111111.11111111.11111100.00000000 or 

255.255.252.0 Starting with 172.16.0.0 and having increment of 4 we get. 


Q48. - (Topic 1) 

Refer to the exhibit. 

A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation? 

A. a router with two Ethernet interfaces 

B. a switch with two Ethernet interfaces 

C. a router with one Ethernet and one serial interface 

D. a switch with one Ethernet and one serial interface 

E. a router with one Ethernet and one modem interface 

Answer:

Explanation: 

Only a router can terminate a leased line attachment access circuit, and only a router can connect two different IP networks. Here, we will need a router with two interfaces, one serial connection for the line attachment and one Ethernet interface to connect to the switch on the LAN. 


Q49. - (Topic 3) 

Refer to the exhibit. 

PC1 pings PC2. What three things will CORE router do with the data that is received from PC1? (Choose three.) 

A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router. 

B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router. 

C. CORE router will replace the destination IP address of the packets with the IP address of PC2. 

D. CORE router will replace the MAC address of PC2 in the destination MAC address of the frames. 

E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets. 

F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address. 

Answer: B,D,F 

Explanation: 

The router will forward the frames out the interface toward the destination – B is correct. Since the router will has the end station already in it’s MAC table as see by the “show arp” command, it will replace the destination MAC address to that of PC2 – D is correct. The router will then replace the source IP address to 172.16.40.1 – E is correct. 


Q50. - (Topic 2) 

What is the purpose of flow control? 

A. To ensure data is retransmitted if an acknowledgement is not received. 

B. To reassemble segments in the correct order at the destination device. 

C. To provide a means for the receiver to govern the amount of data sent by the sender. 

D. To regulate the size of each segment. 

Answer:

Explanation: 

Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. For serial data transmission locally or in a network, the Xon/Xoff protocol can be used. For modem connections, either Xon/Xoff or CTS/RTS (Clear to Send/Ready to Send) commands can be used to control data flow. In a network, flow control can also be applied by refusing additional device connections until the flow of traffic has subsided. 

Reference: http://whatis.techtarget.com/definition/flow-control