Our pass rate is high to 98.9% and the similarity percentage between our cisco 100 105 pdf study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco icnd 100 105 exam in just one try? I am currently studying for the Cisco ccna 100 105 exam. Latest Cisco ccent 100 105 pdf Test exam practice questions and answers, Try Cisco ccent ccna icnd1 100 105 pdf Brain Dumps First.


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/100-105-exam-dumps.html

Q61. - (Topic 4) 

What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT? 

A. The router uses the same IP address but a different TCP source port number for each connection. 

B. An IP address is assigned based on the priority of the computer requesting the connection. 

C. The router selects an address from a pool of one-to-one address mappings held in the lookup table. 

D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection. 

Answer:

Reference: 

http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_staticpat.html 

Static PAT translations allow a specific UDP or TCP port on a global address to be translated to a specific port on a local address. That is, both the address and the port numbers are translated. 

Static PAT is the same as static NAT, except that it enables you to specify the protocol (TCP or UDP) and port for the real and mapped addresses. Static PAT enables you to identify the same mapped address across many different static statements, provided that the port is different for each statement. You cannot use the same mapped address for multiple static NAT statements. 

Port Address Translation makes the PC connect to the Internet but using different TCP source port. 


Q62. - (Topic 3) 

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the default and the router IDs are shown with each router. 

Which routers are likely to have been elected as DR? (Choose two.) 

A. Corp-1 

B. Corp-2 

C. Corp-3 

D. Corp-4 

E. Branch-1 

F. Branch-2 

Answer: D,F 

Explanation: 

There are 2 segments on the topology above which are separated by Corp-3 router. Each 

segment will have a DR so we have 2 DRs. 

To select which router will become DR they will compare their router-IDs. The router with 

highest (best) router-ID will become DR. The router-ID is chosen in the order below: 

+

 The highest IP address assigned to a loopback (logical) interface. 

+

 If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. 

In this question, the IP addresses of loopback interfaces are not mentioned so we will consider IP addresses of all active router’s physical interfaces. Router Corp-4 (10.1.40.40) 

& Branch-2 (10.2.20.20) have highest “active” IP addresses so they will become DRs. 


Q63. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 


Q64. - (Topic 7) 

Which statement about native VLAN traffic is true? 

A. Cisco Discovery Protocol traffic travels on the native VLAN by default 

B. Traffic on the native VLAN is tagged with 1 by default 

C. Control plane traffic is blocked on the native VLAN. 

D. The native VLAN is typically disabled for security reasons 

Answer:


Q65. - (Topic 2) 

Refer to the exhibit. 

All devices attached to the network are shown. How many collision domains are present in this network? 

A. 2 

B. 3 

C. 6 

D. 9 

E. 15 

Answer:

Explanation: 

A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain. Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15. 


Q66. - (Topic 1) 

At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate? 

A. application 

B. transport 

C. network 

D. physical 

E. data link 

Answer:

Explanation: 

CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. CDP allows devices to share basic configuration information without even configuring any protocol specific information and is enabled by default on all interfaces. CDP is a Datalink Protocol occurring at Layer 2 of the OSI model. CDP is not routable and can only go over to directly connected devices. CDP is enabled, by default, on all Cisco devices. CDP updates are generated as multicasts every 60 seconds with a hold-down period of 180 seconds for a missing neighbor. The no cdp run command globally disables CDP, while the no cdp enable command disables CDP on an interface. Use show cdp neighbors to list out your directly connected Cisco neighboring devices. Adding the detail parameter will display the layer-3 addressing configured on the neighbor. 

Reference: http://computernetworkingnotes.com/cisco-devices-administration-and-configuration/cisco-discoveryprotocol.html 


Q67. - (Topic 7) 

Which dynamic routing protocol uses only the hop count to determine the best path to a destination? 

A. IGRP 

B. RIP 

C. EIGRP 

D. OSPF 

Answer:


Q68. - (Topic 3) 

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.) 

A. Router(config)# router ospf 0 

B. Router(config)# router ospf 1 

C. Router(config)# router ospf area 0 

D. Router(config-router)# network 192.168.16.0 0.0.0.255 0 

E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0 

F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0 

Answer: B,E 

Explanation: 

In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> but To configure OSPF, we need a wildcard in the “network” statement, not a subnet mask. We also need to assgin an area to this process. 


Q69. - (Topic 7) 

Which feature allows a device to use a switch port that is configured for half-duplex to access the network? 

A. CSMA/CD 

B. IGMP 

C. port security 

D. split horizon 

Answer:

Explanation: 

Ethernet began as a local area network technology that provided a half-duplex shared channel for stations connected to coaxial cable segments linked with signal repeaters. In this appendix, we take a detailed look at the half-duplex shared-channel mode of operation, and at the CSMA/CD mechanism that makes it work. In the original half-duplex mode, the CSMA/CD protocol allows a set of stations to compete for access to a shared Ethernet channel in a fair and equitable manner. The protocol’s rules determine the behavior of Ethernet stations, including when they are allowed to transmit a frame onto a shared Ethernet channel, and what to do when a collision occurs. Today, virtually all devices are connected to Ethernet switch ports over full-duplex media, such as twisted-pair cables. On this type of connection, assuming that both devices can support the full-duplex mode of operation and that Auto-Negotiation (AN) is enabled, the AN protocol will automatically select the highest-performance mode of operation supported by the devices at each end of the link. That will result in full-duplex mode for the vast majority of Ethernet connections with modern interfaces that support full duplex and AN. 


Q70. - (Topic 3) 

If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? 

A. 1024 

B. 2046 

C. 4094 

D. 4096 

E. 8190 

Answer:

Explanation: 

Each octet represents eight bits. The bits, in turn, represent (from left to right): 128, 64, 32 , 16 , 8, 4, 2, 1 Add them up and you get 255. Add one for the all zeros option, and the total is 256. Now, take away one of these for the network address (all zeros) and another for the broadcast address (all ones). Each octet represents 254 possible hosts. Or 254 possible networks. Unless you have subnet zero set on your network gear, in which case you could conceivably have 255. The CIDR addressing format (/20) tells us that 20 bits are used for the network portion, so the maximum number of networks are 2^20 minus one if you have subnet zero enabled, or minus 2 if not. You asked about the number of hosts. That will be 32 minus the number of network bits, minus two. So calculate it as (2^(32-20))-2, or (2^12)-2 = 4094