It is impossible to pass Cisco icnd1 100 105 exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed Cisco 105 100 practice questions. You will get a surprising result by our Replace Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) practice guides.

Q1. - (Topic 5) 

Refer to the exhibit. 

The network administrator made the entries that are shown and then saved the configuration. From a console connection, what password or password sequence is required for the administrator to access privileged mode on Router1? 

A. cisco 

B. sanfran 

C. sanjose 

D. either cisco or sanfran 

E. either cisco or sanjose 

F. sanjose and sanfran 

Answer:

Explanation: 

The enable secret password takes precedence over the enable password, so sanfran will be used. 


Q2. - (Topic 3) 

Refer to the exhibit. 

The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 

255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA? 

A. 192.168.1.31 

B. 192.168.1.64 

C. 192.168.1.127 

D. 192.168.1.190 

E. 192.168.1.192 

Answer:

Explanation: 

Subnet mask 255.255.255.224 with CIDR of /27 which results in 32 hosts per. 

192.168.1.31 is the broadcast address for sunbet '0' 

192.168.1.64 is the network address for subnet '2' 

192.168.1.127 is the broadcast address for subnet '3' 

192.168.1.192 is the network address for subnet '6' 


Q3. - (Topic 3) 

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the default and the router IDs are shown with each router. 

Which routers are likely to have been elected as DR? (Choose two.) 

A. Corp-1 

B. Corp-2 

C. Corp-3 

D. Corp-4 

E. Branch-1 

F. Branch-2 

Answer: D,F 

Explanation: 

There are 2 segments on the topology above which are separated by Corp-3 router. Each 

segment will have a DR so we have 2 DRs. 

To select which router will become DR they will compare their router-IDs. The router with 

highest (best) router-ID will become DR. The router-ID is chosen in the order below: 

+

 The highest IP address assigned to a loopback (logical) interface. 

+

 If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. 

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s physical interfaces. Router Corp-4 (10.1.40.40) 

& Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become DRs. 


Q4. - (Topic 3) 

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? 

A. 1 

B. 2 

C. 4 

D. 8 

E. 252 

F. 254 

Answer:

Explanation: 

/30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 which means 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet. 


Q5. - (Topic 5) 

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) 

A. Allow unrestricted access to the console or VTY ports. 

B. Use a firewall to restrict access from the outside to the network devices. 

C. Always use Telnet to access the device command line because its data is automatically encrypted. 

D. Use SSH or another encrypted and authenticated transport to access device configurations. 

E. Prevent the loss of passwords by disabling password encryption. 

Answer: B,D 

Explanation: 

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH. 


Q6. - (Topic 1) 

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) 

A. layer 3 support 

B. port security 

C. redundant components 

D. VLANs 

E. PoE 

Answer: B,D 

Explanation: 

Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). 

Switch features in the Access layer: 

...... 

Port security 

VLANs 

Fast Ethernet/Gigabit Ethernet 

Power over Ethernet (PoE) 

Link aggregation 

Quality of Service (QoS) 

References: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml 

Topic 2, LAN Switching Technologies 


Q7. - (Topic 3) 

Which two of these statements are true of IPv6 address representation? (Choose two.) 

A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast. 

B. A single interface may be assigned multiple IPv6 addresses of any type. 

C. Every IPv6 interface contains at least one loopback address. 

D. The first 64 bits represent the dynamically created interface ID. 

E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory. 

Answer: B,C 

Explanation: 

A single interface may be assigned multiple addresses of any type (unicast, anycast, 

multicast). 

Every IPv6-enabled interface must contain at least one loopback and one link-local 

address. 

Optionally, every interface can have multiple unique local and global addresses. 

IPv6 host addresses can be assigned in multiple ways: 

Static configuration 

Stateless autoconfiguration 

DHCPv6 

When IPv6 is used over Ethernet networks, the Ethernet MAC address can be used to 

generate the 64-bit interface ID for the host. This is called the EUI-64 address. 

Since MAC addresses use 48 bits, additional bits must be inserted to fill the 64 bits 

required. 

Reference: 

http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 

8026003d.pdf 


Q8. - (Topic 7) 

Which component of the routing table ranks routing protocols according to their preferences? 

A. administrative distance 

B. next hop 

C. metric 

D. routing protocol code 

Answer:

Explanation: 

Administrative distance - This is the measure of trustworthiness of the source of the 

route. If a router learns about a destination from more than one routing protocol, 

administrative distance is compared and the preference is given to the routes with lower 

administrative distance. In other words, it is the believability of the source of the route. 


Q9. - (Topic 5) 

Select three options which are security issues with the current configuration of SwitchA. (Choose three.) 

A. Privilege mode is protected with an unencrypted password 

B. Inappropriate wording in banner message 

C. Virtual terminal lines are protected only by a password requirement 

D. Both the username and password are weak 

E. Telnet connections can be used to remotely manage the switch 

F. Cisco user will be granted privilege level 15 by default 

Answer: A,B,D 


Q10. - (Topic 1) 

How does TCP differ from UDP? (Choose two.) 

A. TCP provides best effort delivery. 

B. TCP provides synchronized communication. 

C. TCP segments are essentially datagrams. 

D. TCP provides sequence numbering of packets. 

E. TCP uses broadcast delivery. 

Answer: B,D 

Explanation: 

Because TCP is a connection-oriented protocol responsible for ensuring the transfer of a datagram from the source to destination machine (end-to-end communications), TCP must receive communications messages from the destination machine to acknowledge receipt of the datagram. The term virtual circuit is usually used to refer to the handshaking that goes on between the two end machines, most of which are simple acknowledgment messages (either confirmation of receipt or a failure code) and datagram sequence numbers. Rather than impose a state within the network to support the connection, TCP uses synchronized state between the two endpoints. This synchronized state is set up as part of an initial connection process, so TCP can be regarded as a connection-oriented protocol. Much of the protocol design is intended to ensure that each local state transition is communicated to, and acknowledged by, the remote party. 

Reference: http://en.wikibooks.org/wiki/Communication_Networks/TCP_and_UDP_Protocols