It is impossible to pass Cisco 100-105 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Cisco 100-105 practice questions. You will get a surprising result by our Replace Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) practice guides.

2021 Sep 100-105 answers

Q121. - (Topic 3) 

Refer to the exhibit. 

The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? 

A. 255.255.255.192 

B. 255.255.255.224 

C. 255.255.255.240 

D. 255.255.255.248 

E. 255.255.255.252 

Answer: A 

Explanation: 

Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts. 


Q122. - (Topic 7) 

Which statement about a router on a stick is true? 

A. Its date plane router traffic for a single VI AN over two or more switches. 

B. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs on the same subnet. 

C. It requires the native VLAN to be disabled. 

D. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs. 

Answer: D 

Explanation: 

https://www.freeccnaworkbook.com/workbooks/ccna/configuring-inter-vlan-routing-router-on-a-stick 


Q123. - (Topic 5) 

What is the effect of using the service password-encryption command? 

A. Only the enable password will be encrypted. 

B. Only the enable secret password will be encrypted. 

C. Only passwords configured after the command has been entered will be encrypted. 

D. It will encrypt the secret password and remove the enable secret password from the 

configuration. 

E. It will encrypt all current and future passwords. 

Answer: E 

Explanation: 

Encryption further adds a level of security to the system as anyone having access to the database of passwords cannot reverse the process of encryption to know the actual passwords which isn’t the case if the passwords are stored simply. 


Q124. - (Topic 3) 

What is the network address for the host with IP address 192.168.23.61/28? 

A. 192.168.23.0 

B. 192.168.23.32 

C. 192.168.23.48 

D. 192.168.23.56 

E. 192.168.23.60 

Answer: C 

Explanation: 

Convert bit-length prefix to quad-dotted decimal representation, then from it find the number of bits used for subnetting you can find previously calculated number of subnets by separating subnets each having value of last bit used for subnet masking Find that your IP address is in which subnet, that subnet's first address is network address and last address is broadcast address. Based on above steps the answer is option C 


Q125. - (Topic 1) 

A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.) 

A. A crossover cable should be used in place of the straight-through cable. 

B. A rollover cable should be used in place of the straight-through cable. 

C. The subnet masks should be set to 255.255.255.192 

D. A default gateway needs to be set on each host. 

E. The hosts must be reconfigured to use private IP addresses for direct connections of this type. 

F. The subnet masks should be set to 255.255.255.0 

Answer: A,F 

Explanation: 

If you need to connect two computers but you don't have access to a network and can't set up an ad hoc network, you can use an Ethernet crossover cable to create a direct cable connection. Generally speaking, a crossover cable is constructed by reversing (or crossing over) the order of the wires inside so that it can connect two computers directly. A crossover cable looks almost exactly like a regular Ethernet cable (a straight-through cable), so make sure you have a crossover cable before following these steps. 

Both devices need to be on the same subnet, and since one PC is using 192.1.1.20 and the other is using 192.1.1.201, the subnet mask should be changed to 255.255.255.0. 


100-105  free download

Far out 100-105 exam:

Q126. - (Topic 7) 

Which network topology allows all traffic to flow through a central hub? 

A. bus 

B. star 

C. mesh 

D. ring 

Answer: B 


Q127. - (Topic 5) 

The network administrator has found the following problem. 

The remote networks 172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the Central router's serial 0/0 interface. No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what is the most likely cause of the problem? 

A. no gateway of last resort on Central 

B. Central router's not receiving 172.16.20.0 update 

C. incorrect static route for 172.16.20.0 

D. 172.16.20.0 not located in Central's routing table 

Answer: C 

Explanation: 

If we use 172.16.20.0 to route to 172.16.150.15, then the packet will route back. To clear this error we have to use.#no ip route 172.16.20.0 255.255.255.0 172.16.150.15

.command in configuration mode. 


Q128. CORRECT TEXT - (Topic 6) 

This topology contains 3 routers and 1 switch. Complete the topology. 

Drag the appropriate device icons to the labeled Device Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address 

(Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology. 

Use information gathered from the Main router to complete the configuration of any additional routers. 

No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration. 

Configure each additional router with the following: 

Configure the interfaces with the correct IP address and enable the interfaces. 

Set the password to allow console access to consolepw 

Set the password to allow telnet access to telnetpw 

Set the password to allow privilege mode access to privpw 

Not E: Because routes are not being added to the configurations, you will not be able to ping through the internetwork. 

All devices have cable autosensing capabilities disabled. 

All hosts are PC’s 

Answer: Specify appropriate devices and drag them on the "Device" boxes For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers Place them on appropriate locations as following: (Host D and host E will be automatically added after placing two routers. Click on them to access neighboring routers) Specify appropriate connections between these devices: 

+

 The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable 

+

 The router on the right is connected with the Main router through Serial interfaces: use a 

serial cable 

+

 The router on the right and the Switch: use a straight-through cable 

+

 The router on the left and the computer: use a crossover cable (To remember which type of cable you should use, follow these tips: 

-

To connect two serial interfaces of 2 routers we use serial cable 

-

To specify when we use crossover cable or straight-through cable, we should remember: Group 1: Router, Host, Server Group 2: Hub, Switch One device in group 1 + One device in group 2: use straight-through cable Two devices in the same group: use crossover cable For example, we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server... and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host.) Assign appropriate IP addresses for interfaces: From Main router, use show running-config command. 

 (Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just used for demonstration) 

From the output we learned that the ip address of Fa0/0 interface of the Main router is 

192.168.152.177/28. This address belongs to a subnetwork which has: 

Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000) 

Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177) 

Broadcast address: 192.168.152.191 (because 191 = 176 + 16 - 1) 

And we can pick up an ip address from the list that belongs to this subnetwork: 

192.168.152.190 and assign it to the Fa0/0 interface the router on the left Use the same method for interface Serial0/0 with an ip address of 192.168.152.161 Increment: 16 Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161) Broadcast address: 192.168.152.175 (because 176 = 160 + 16 - 1) -> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right Interface Fa0/1 of the router on the left IP (of the computer on the left) : 192.168.152.129/28 Increment: 16 Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129) Broadcast address: 192.168.152.143 (because 143 = 128 + 16 - 1) -> we choose 192.168.152.142 from the list Interface Fa0/0 of the router on the right IP (of the computer on the left) : 192.168.152.225/28 Increment: 16 Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225) Broadcast address: 192.168.152.239 (because 239 = 224 + 16 - 1) -> we choose 192.168.152.238 from the list Let's have a look at the picture below to summarize Configure two routers on the left and right with these commands: Router1 = router on the left Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces: Router1>enable Router1#configure terminal Router1(config)#interface fa0/0 Router1(config-if)#ip address 192.168.152.190 255.255.255.240 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/1 Router1(config-if)#ip address 192.168.152.142 255.255.255.240 Router1(config-if)#no shutdown Set passwords (configure on two routers) 

+

 Console password: Router1(config-if)#exit Router1(config)#line console 0 

Router1(config-line)#password consolepw Router1(config-line)#login Router1(config-line)#exit 

+

 Telnet password: Router1(config)#line vty 0 4 Router1(config-line)#password telnetpw Router1(config-line)#login Router1(config-line)#exit 

+

 Privilege mode password: Router1(config)#enable password privpw Save the configuration: Router1(config)#exit Router1#copy running-config startup-config Configure IP addresses of Router2 (router on the right) Router2>enable Router2#configure terminal Router2(config)#interface fa0/0 Router2(config-if)#ip address 192.168.152.238 255.255.255.240 Router2(config-if)#no shutdown Router2(config-if)#interface serial0/0 Router2(config-if)#ip address 192.168.152.174 255.255.255.240 Router2(config-if)#no shutdown Then set the console, telnet and privilege mode passwords for Router2 as we did for Router1, remember to save the configuration when you finished. 


Q129. - (Topic 5) 

Refer to the exhibit. 

Serial 0/0 does not respond to a ping request from a host on the FastEthernet 0/0 LAN. How can this problem be corrected? 

A. Enable the Serial 0/0 interface. 

B. Correct the IP address for Serial 0/0. 

C. Correct the IP address for FastEthernet 0/0 

D. Change the encapsulation type on Serial 0/0 

E. Enable autoconfiguration on the Serial 0/0 interface 

Answer: A 

Explanation: 

Serial 0/0 interface is administratively down therefore, you will have to run the "no shutdown" command to enable the interface for data. 


Q130. - (Topic 3) 

Which characteristics are representative of a link-state routing protocol? (Choose three.) 

A. provides common view of entire topology 

B. exchanges routing tables with neighbors C. calculates shortest path 

D. utilizes event-triggered updates 

E. utilizes frequent periodic updates 

Answer: A,C,D 

Explanation: 

Each of routers running link-state routing protocol learns paths to all the destinations in its 

“area” so we can say although it is a bit unclear. 

Link-state routing protocols generate routing updates only (not the whole routing table) 

when a change occurs in the network topology so 

Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -> . 

Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state 

routing protocol utilizes event-triggered updates (only sends update when a change occurs) 

->