Downloadable of ccent ccna icnd1 100 105 rapidshare materials and class for Cisco certification for customers, Real Success Guaranteed with Updated ccna 100 105 pdf dumps vce Materials. 100% PASS Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam Today!
Q21. - (Topic 5)
How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Configure the server MAC address as a static entry of port security.
C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
When the MAC address is configured as static entry, no other address is allowed.
Q22. - (Topic 5)
Refer to the exhibit.
A person is trying to send a file from a host on Network A of the JAX Company to a server
on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A.
Which command, issued from router RTA, would be the most useful for troubleshooting this problem?
A. show flash:
B. show history
C. show version
D. show interfaces
E. show controllers serial
The most useful thing to check on RTA would be the show interfaces command to see if the interface toward the WAN link is up. The most likely scenario is that the local LAN interface is up, but the other interface toward the XYZ company is down.
Q23. - (Topic 1)
Which statements are true regarding ICMP packets? (Choose two.)
A. They acknowledge receipt of TCP segments.
B. They guarantee datagram delivery.
C. TRACERT uses ICMP packets.
D. They are encapsulated within IP datagrams.
E. They are encapsulated within UDP datagrams.
Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity, which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools, which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol). ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet’s Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination
Q24. - (Topic 3)
An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?
A. Router# show startup-config
B. Router# show current-config
C. Router# show running-config
D. Router# show memory
E. Router# show flash
F. Router# show processes
This command followed by the appropriate parameter will show the running config hence the admin will be able to see what changes have been made, and then they can be saved.
Q25. - (Topic 7)
Which route source code represents the routing protocol with a default administrative distance of 90 in the routing table?
SStatic EEGP DEIGRP RRIP OOSPF
Default Administrative distance of EIGRP protocol is 90 then answer is C
Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports:
Route Source Default Distance Values
Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown* 255
Q26. - (Topic 3)
Refer to the exhibit.
The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2?
A. Configure the router with the cdp enable command.
B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces.
C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces.
D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces.
If the no shut down commands are not entered, then CDP can exchange information between the two routers. By default, all Cisco device interfaces and ports are shut down and need to be manually enabled.
Q27. - (Topic 5)
Select three options which are security issues with the current configuration of SwitchA. (Choose three.)
A. Privilege mode is protected with an unencrypted password
B. Inappropriate wording in banner message
C. Virtual terminal lines are protected only by a password requirement
D. Both the username and password are weak
E. Telnet connections can be used to remotely manage the switch
F. Cisco user will be granted privilege level 15 by default
Q28. - (Topic 7)
Which statement about unicast frame forwarding on a switch is true?
A. The TCAM table stores destination MAC addresses
B. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on.
C. The CAM table is used to determine whether traffic is permitted or denied on a switch
D. The source address is used to determine the switch port to which a frame is forwarded
Q29. - (Topic 1)
Refer to the exhibit.
Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
The Source and Destination IP address is not going to change. Host 1 IP address will stay
as being the source IP and the Host 2 IP address will stay the destination IP address.
Those two are not going to change.
For the MAC address it is going to change each time it goes from one hope to another.
(Except switches... they don't change anything)
Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of
Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address.
Q30. CORRECT TEXT - (Topic 6)
There are three locations in a school district of a large city: ROUTER -M, ROUTER -W and ROUTER -U. The network connection between two of these locations has already functioned. Configure the ROUTER -M router IP addresses on the E0 and S0 interfaces so that the E0 receives the first usable subnet while the S0 receives the second usable subnet from the network 192.168.160.0/28. Both interfaces would receive the last available ip address on the proper subnet.
NotE. The OSPF process must be configured to allow interfaces in specific subnets to participate in the routing process.
Answer: ROUTER-M> enable PassworD. Cisco ROUTER-M# config t ROUTER-M(config)# interface e0 ROUTER-M(config-if)# ip address 192.168.160.14 255.255.255.240
ROUTER-M(config-if)# no shutdown ROUTER -M(config-if)# exit ROUTER -M(config)# interface s0 ROUTER-M(config-if)# ip address 192.168.160.30 255.255.255.240 ROUTER-M(config-if)# no shutdown ROUTER-M(config-if)# end ROUTER-M# copy run start