Cause all that matters here is passing the Cisco 100-105 exam. Cause all that you need is a high score of 100-105 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam. The only one thing you need to do is downloading Pass4sure 100-105 exam study guides now. We will not let you down with our money-back guarantee.


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/100-105-exam-dumps.html

2017 Apr 100-105 test questions

Q101. - (Topic 4) 

What does the "Inside Global" address represent in the configuration of NAT? 

A. the summarized address for all of the internal subnetted addresses 

B. the MAC address of the router used by inside hosts to connect to the Internet 

C. a globally unique, private IP address assigned to a host on the inside network 

D. a registered address that represents an inside host to an outside network 

Answer:

Explanation: 

NAT: Local and Global Definitions http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837. shtml Cisco defines these terms as: Inside local address—The IP address assigned to a host on the inside network. This is the address configured as a parameter of the computer OS or received via dynamic address allocation protocols such as DHCP. The address is likely not a legitimate IP address assigned by the Network Information Center (NIC) or service provider. Inside global address—A legitimate IP address assigned by the NIC or service provider that represents one or more inside local IP addresses to the outside world. Outside local address—The IP address of an outside host as it appears to the inside network. Not necessarily a legitimate address, it is allocated from an address space routable on the inside. Outside global address—The IP address assigned to a host on the outside network by the host owner. The address is allocated from a globally routable address or network space. These definitions still leave a lot to be interpreted. For this example, this document redefines these terms by first defining local address and global address. Keep in mind that the terms inside and outside are NAT definitions. Interfaces on a NAT router are defined as inside or outside with the NAT configuration commands, ip nat inside destination and ip nat outside source . Networks to which these interfaces connect can then be thought of as inside networks or outside networks, respectively. Local address—A local address is any address that appears on the inside portion of the network. Global address—A global address is any address that appears on the outside portion of the network. 


Q102. DRAG DROP - (Topic 4) 

Various protocols are listed on the left. On the right are applications for the use of those protocols. Drag the protocol on the left to an associated function for that protocol on the right. (Not all options are used.) 

Answer: 


Q103. - (Topic 5) 

From which of the following attacks can Message Authentication Code (MAC) shield your network? 

A. DoS 

B. DDoS 

C. spoofing 

D. SYN floods 

Answer:

Explanation: 

Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks. MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes. A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack. A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks. In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies. 


Q104. - (Topic 5) 

Refer to the exhibit. 

Why was this message received? 

A. No VTY password has been set. 

B. No enable password has been set. 

C. No console password has been set. 

D. No enable secret password has been set. 

E. The login command has not been set on CON 0 

F. The login command has not been set on the VTY ports. 

Answer:

Explanation: 

Your CCNA certification exam is likely going to contain questions about Telnet, an application-level protocol that allows remote communication between two networking devices. With Telnet use being as common as it is, you had better know the details of how to configure it in order to pass your CCNA exam and to work in real-world networks. 

The basic concept is pretty simple - we want to configure R1, but we're at R2. If we telnet successfully to R1, we will be able to configure R1 if we've been given the proper permission levels. In this CCNA case study, R2 has an IP address of 172.12.123.2 and R1 an address of 172.12.123.1. Let's try to telnet from R2 to R1. 

R2#telnet 172.12.123.1 Trying 172.12.123.1 ... Open Password required, but none set [Connection to 172.12.123.1 closed by foreign host] 

This seems like a problem, but it's a problem we're happy to have. A Cisco router will not let any user telnet to it by default. That's a good thing, because we don't want just anyone connecting to our router! The "password required" message means that no password has been set on the VTY lines on R1. Let's do so now. 

R1(config)#line vty 0 4 

R1(config-line)#password baseball 

A password of "baseball" has been set on the VTY lines, so we shouldn't have any trouble using Telnet to get from R2 to R1. Let's try that now. 

R2#telnet 172.12.123.1 

Trying 172.12.123.1 ... Open 

User Access Verification 

Password: 

R1> 

We're in, and placed into user exec mode. 

Reference: 

http://www.mcmcse.com/cisco/guides/telnet_passwords_and_privilege_levels.shtml 


Q105. - (Topic 5) 

Refer to the exhibit. 

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 

192.168.1.1 through 192.168.5.255 

192.168.100.1 through 192.168.100.255 

What are three problems with this design? (Choose three.) 

A. The AREA 1 IP address space is inadequate for the number of users. 

B. The AREA 3 IP address space is inadequate for the number of users. 

C. AREA 2 could use a mask of /25 to conserve IP address space. 

D. The network address space that is provided requires a single network-wide mask. 

E. The router-to-router connection is wasting address space. 

F. The broadcast domain in AREA 1 is too large for IP to function. 

Answer: A,C,E 

Explanation: 

The given IP addresses of areas 1 and 3 along with network masks of /24 cannot accommodate 500 users so are inadequate, while the area 2 is having over capacity so its network mask can be reduced to /25 to accommodate the only 60 users it has. 


Renew 100-105 free exam:

Q106. - (Topic 1) 

How does a switch differ from a hub? 

A. A switch does not induce any latency into the frame transfer time. 

B. A switch tracks MAC addresses of directly-connected devices. 

C. A switch operates at a lower, more efficient layer of the OSI model. 

D. A switch decreases the number of broadcast domains. 

E. A switch decreases the number of collision domains. 

Answer:

Explanation: 

Some of the features and functions of a switch include: 

A switch is essentially a fast, multi-port bridge, which can contain dozens of ports. 

Rather than creating two collision domains, each port creates its own collision domain. 

In a network of twenty nodes, twenty collision domains exist if each node is plugged into its 

own switch port. 

If an uplink port is included, one switch creates twenty-one single-node collision domains. 

A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table, 

holding all of the necessary MAC information for each port. 

For a detailed description of how switches operate, and their key differences to hubs, see 

the reference link below. 

Reference: http://www.cisco.com/warp/public/473/lan-switch-cisco.shtml 


Q107. - (Topic 1) 

What must occur before a workstation can exchange HTTP packets with a web server? 

A. A UDP connection must be established between the workstation and its default gateway. 

B. A UDP connection must be established between the workstation and the web server. 

C. A TCP connection must be established between the workstation and its default gateway. 

D. A TCP connection must be established between the workstation and the web server. 

E. An ICMP connection must be established between the workstation and its default gateway. 

F. An ICMP connection must be established between the workstation and the web server. 

Answer:

Explanation: 

HTTP uses TCP port 80, and a TCP port 80 connection must be established for HTTP communication to occur. http://pentestlab.wordpress.com/2012/03/05/common-tcpip-ports/ 


Q108. - (Topic 3) 

Refer to the exhibit. 

The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 

255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA? 

A. 192.168.1.31 

B. 192.168.1.64 

C. 192.168.1.127 

D. 192.168.1.190 

E. 192.168.1.192 

Answer:

Explanation: 

Subnet mask 255.255.255.224 with CIDR of /27 which results in 32 hosts per. 

192.168.1.31 is the broadcast address for sunbet '0' 

192.168.1.64 is the network address for subnet '2' 

192.168.1.127 is the broadcast address for subnet '3' 

192.168.1.192 is the network address for subnet '6' 


Q109. - (Topic 3) 

A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? 

Router(config)# router ospf 1 

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0 

A. The process id is configured improperly. 

B. The OSPF area is configured improperly. 

C. The network wildcard mask is configured improperly. 

D. The network number is configured improperly. 

E. The AS is configured improperly. 

F. The network subnet mask is configured improperly. 

Answer:

Explanation: 

When configuring OSPF, the mask used for the network statement is a wildcard mask similar to an access list. In this specific example, the correct syntax would have been “network 10.0.0.0 0.0.0.255 area 0.” 


Q110. - (Topic 3) 

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.) 

A. 10.1.168.0 

B. 10.1.176.1 

C. 10.1.174.255 

D. 10.1.160.255 

E. 10.1.160.0 

F. 10.1.175.255 

Answer: A,C,D 

Explanation: 

All IP address in IP ranges between: 10.1.160.1 and 10.1.175.254 are valid as shown below Address: 10.1.160.0 00001010.00000001.1010 0000.00000000 Netmask: 255.255.240.0 = 20 11111111.11111111.1111 0000.00000000 Wildcard: 0.0.15.255 00000000.00000000.0000 1111.11111111 

Which implies that: Network: 10.1.160.0/20 00001010.00000001.1010 0000.00000000 HostMin: 10.1.160.1 00001010.00000001.1010 0000.00000001 HostMax: 10.1.175.254 00001010.00000001.1010 1111.11111110 Broadcast: 10.1.175.255 00001010.00000001.1010 1111.11111111