Tips to Pass 100-105 Exam (21 to 30)

It is impossible to pass Cisco 100-105 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Cisco 100-105 practice questions. You will get a surprising result by our Latest Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) practice guides.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/100-105-exam-dumps.html

2021 Mar 100-105 test questions

Q21. - (Topic 3) 

Which command can you use to manually assign a static IPV6 address to a router interface? 

A. ipv6 address PREFIX_1::1/64 

B. ipv6 autoconfig 2001:db8:2222:7272::72/64 

C. ipv6 autoconfig 

D. ipv6 address 2001:db8:2222:7272::72/64 

Answer:

Explanation: 

An example of configuring IPv6 on an interface is shown below: Router(config)# interface fastethernet 0/1 Router(config-if)# ipv6 address 3000::2222:1/64 


Q22. - (Topic 1) 

Refer to the exhibit. 

The output is from a router in a large enterprise. From the output, determine the role of the router. 

A. A Core router. 

B. The HQ Internet gateway router. 

C. The WAN router at the central site. 

D. Remote stub router at a remote site. 

Answer:

Explanation: 

Since the routing table shows only a single default route using the single interface serial 0/0, we know that this is most likely a remote stub site with a single connection to the rest of the network. All the other answer options would mean that this router would have more connections, and would contain more routes. 


Q23. - (Topic 2) 

Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.) 

A. a bridge 

B. a router 

C. a hub 

D. a Layer 3 switch 

E. an access point 

Answer: B,D 

Explanation: 

Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms. 


Q24. - (Topic 5) 

From which of the following attacks can Message Authentication Code (MAC) shield your network? 

A. DoS 

B. DDoS 

C. spoofing 

D. SYN floods 

Answer:

Explanation: 

Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks. MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes. A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack. A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks. In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies. 


Q25. - (Topic 3) 

Scenario 

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links. 

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices. 

R1 does not form an OSPF neighbor adjacency with R2. Which option would fix the issue? 

A. R1 ethernetO/1 is shutdown. Configure no shutdown command. 

B. R1 ethernetO/1 configured with a non-default OSPF hello interval of 25: configure no ip ospf hello-interval 25 

C. R2 ethernetO/1 and R3 ethernetO/O are configured with a non-default OSPF hello interval of 25; configure no ip ospf hello-interval 25 

D. Enable OSPF for R1 ethernetO/1; configure ip ospf 1 area 0 command under ethernetO/1 

Answer:

Explanation: 

Looking at the configuration of R1, we see that R1 is configured with a hello interval of 25 on interface Ethernet 0/1 while R2 is left with the default of 10 (not configured). 


Refresh 100-105 exams:

Q26. - (Topic 3) 

After the network has converged, what type of messaging, if any, occurs between R3 and R4? 

A. No messages are exchanged 

B. Hellos are sent every 10 seconds. 

C. The full database from each router is sent every 30 seconds. 

D. The routing table from each router is sent every 60 seconds. 

Answer:

Explanation: 

HELLO messages are used to maintain adjacent neighbors so even when the network is converged, hellos are still exchanged. On broadcast and point-to-point links, the default is 10 seconds, on NBMA the default is 30 seconds. Although OSPF is a link-state protocol the full database from each router is sent every 30 minutes (not seconds) therefore, C and D are not correct. 


Q27. - (Topic 2) 

How many simultaneous Telnet sessions does a Cisco router support by default? 

A. 1 

B. 2 

C. 3 

D. 4 

E. 5 

F. 6 

Answer:

Explanation: 

By default, Cisco routers support virtual terminal interfaces 0-4 (5 total) which are used for telnet sessions. 


Q28. - (Topic 1) 

Which two characteristics apply to Layer 2 switches? (Choose two.) 

A. Increases the number of collision domains 

B. Decreases the number of collision domains 

C. Implements VLAN 

D. Decreases the number of broadcast domains 

E. Uses the IP address to make decisions for forwarding data packets 

Answer: A,C 

Explanation: 

Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch port is in its own separate collision domain, thus eliminating collisions on the segment. 


Q29. - (Topic 7) 

Which NAT type is used to translate a single inside address to a single outside address? 

A. dynamic NAT 

B. NAT overload 

C. PAT 

D. static NAT 

Answer:

Explanation: 

Network address translation (NAT) is the process of modifying IP address information in 

IP packet headers while in transit across a traffic routing device. 

There are two different types of NAT: . NAT . PAT 


Q30. - (Topic 5) 

Refer to the exhibit. 

A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. 

A ping from Host1 to Host 2 fails, but the technician is able to ping the S0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem? 

A. The serial cable on R1 needs to be replaced. 

B. The interfaces on R2 are not configured properly 

C. R1 has no route to the 192.168.1.128 network. 

D. The IP addressing scheme has overlapping subnetworks. 

E. The ip subnet-zero command must be configured on both routers. 

Answer:

Explanation: 

Without a static route pointing to the host 2 network the router R1 is unaware of the path to take to reach that network and reply traffic cannot be sent.