What tells you about ccent 100 105

Cause all that matters here is passing the Cisco cisco 100 105 exam. Cause all that you need is a high score of ccent 100 105 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam. The only one thing you need to do is downloading Exambible cisco 100 105 pdf exam study guides now. We will not let you down with our money-back guarantee.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 100-105 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 100-105 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/100-105-exam-dumps.html

Q131. - (Topic 3) 

Which statement is true? 

A. An IPv6 address is 64 bits long and is represented as hexadecimal characters. 

B. An IPv6 address is 32 bits long and is represented as decimal digits. 

C. An IPv6 address is 128 bits long and is represented as decimal digits. 

D. An IPv6 address is 128 bits long and is represented as hexadecimal characters. 

Answer:

Explanation: 

http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf 

One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID 


Q132. - (Topic 3) 

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address? 

A. 192.168.1.8/29 

B. 192.168.1.32/27 

C. 192.168.1.40/29 

D. 192.168.1.16/28 

E. 192.168.1.48/29 

Answer:

Explanation: 

248 mask uses 5 bits (1111 1000) 

42 IP in binary is (0010 1010) 

The base subnet therefore is the lowest binary value that can be written without changing 

the output of an AND operation of the subnet mask and IP... 

1111 1000 AND 

0010 1010 equals 

0010 1000 - which is .40 

/24 is standard class C mask. 

Adding the 5 bits from the .248 mask gives /29 


Q133. - (Topic 1) 

Refer to the exhibit. 

If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B? 

A. 10.168.10.99 

B. 10.168.11.88 

C. A1:A1:A1:A1:A1:A1 

D. B2:B2:B2:B2:B2:B2 

E. C3:C3:C3:C3:C3:C3 

F. D4:D4:D4:D4:D4:D4 

Answer:

Explanation: 

When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the existing router’s interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the destination router’s interface address. 


Q134. - (Topic 1) 

How does TCP differ from UDP? (Choose two.) 

A. TCP provides best effort delivery. 

B. TCP provides synchronized communication. 

C. TCP segments are essentially datagrams. 

D. TCP provides sequence numbering of packets. 

E. TCP uses broadcast delivery. 

Answer: B,D 

Explanation: 

Because TCP is a connection-oriented protocol responsible for ensuring the transfer of a datagram from the source to destination machine (end-to-end communications), TCP must receive communications messages from the destination machine to acknowledge receipt of the datagram. The term virtual circuit is usually used to refer to the handshaking that goes on between the two end machines, most of which are simple acknowledgment messages (either confirmation of receipt or a failure code) and datagram sequence numbers. Rather than impose a state within the network to support the connection, TCP uses synchronized state between the two endpoints. This synchronized state is set up as part of an initial connection process, so TCP can be regarded as a connection-oriented protocol. Much of the protocol design is intended to ensure that each local state transition is communicated to, and acknowledged by, the remote party. 

Reference: http://en.wikibooks.org/wiki/Communication_Networks/TCP_and_UDP_Protocols 


Q135. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 


Q136. - (Topic 3) 

OSPF routing uses the concept of areas. What are the characteristics of OSPF areas? (Choose Three.) 

A. Each OSPF area requires a loopback interface to be configured. 

B. Areas may be assigned any number from 0 to 65535. 

C. Area 0 is called the backbone area. 

D. Hierarchical OSPF networks do not require multiple areas. 

E. Multiple OSPF areas must connect to area 0. 

F. Single area OSPF networks must be configured in area 1. 

Answer: B,C,E 

Explanation: 

Definition of OSPF areas: An OSPF network may be structured, or subdivided, into routing areas to simplify administration and optimize traffic and resource utilization. Areas are identified by 32-bit numbers, expressed either simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address notation. 

See discussion following Cisco Learning discussion. 

https://learningnetwork.cisco.com/message/90832 


Q137. - (Topic 5) 

Refer to the exhibit. 

A person is trying to send a file from a host on Network A of the JAX Company to a server 

on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. 

Which command, issued from router RTA, would be the most useful for troubleshooting this problem? 

A. show flash: 

B. show history 

C. show version 

D. show interfaces 

E. show controllers serial 

Answer:

Explanation: 

The most useful thing to check on RTA would be the show interfaces command to see if the interface toward the WAN link is up. The most likely scenario is that the local LAN interface is up, but the other interface toward the XYZ company is down. 


Q138. - (Topic 4) 

What does the "Inside Global" address represent in the configuration of NAT? 

A. the summarized address for all of the internal subnetted addresses 

B. the MAC address of the router used by inside hosts to connect to the Internet 

C. a globally unique, private IP address assigned to a host on the inside network 

D. a registered address that represents an inside host to an outside network 

Answer:

Explanation: 

NAT: Local and Global Definitions http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837. shtml Cisco defines these terms as: Inside local address—The IP address assigned to a host on the inside network. This is the address configured as a parameter of the computer OS or received via dynamic address allocation protocols such as DHCP. The address is likely not a legitimate IP address assigned by the Network Information Center (NIC) or service provider. Inside global address—A legitimate IP address assigned by the NIC or service provider that represents one or more inside local IP addresses to the outside world. Outside local address—The IP address of an outside host as it appears to the inside network. Not necessarily a legitimate address, it is allocated from an address space routable on the inside. Outside global address—The IP address assigned to a host on the outside network by the host owner. The address is allocated from a globally routable address or network space. These definitions still leave a lot to be interpreted. For this example, this document redefines these terms by first defining local address and global address. Keep in mind that the terms inside and outside are NAT definitions. Interfaces on a NAT router are defined as inside or outside with the NAT configuration commands, ip nat inside destination and ip nat outside source . Networks to which these interfaces connect can then be thought of as inside networks or outside networks, respectively. Local address—A local address is any address that appears on the inside portion of the network. Global address—A global address is any address that appears on the outside portion of the network. 


Q139. - (Topic 1) 

Which statements accurately describe CDP? (Choose three.) 

A. CDP is an IEEE standard protocol. 

B. CDP is a Cisco proprietary protocol. 

C. CDP is a datalink layer protocol. 

D. CDP is a network layer protocol. 

E. CDP can discover directly connected neighboring Cisco devices. 

F. CDP can discover Cisco devices that are not directly connected. 

Answer: B,C,E 

Explanation: 

CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices containing useful info for troubleshooting and documenting the network. 


Q140. - (Topic 7) 

Which statement about unicast frame forwarding on a switch is true? 

A. The TCAM table stores destination MAC addresses 

B. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on. 

C. The CAM table is used to determine whether traffic is permitted or denied on a switch 

D. The source address is used to determine the switch port to which a frame is forwarded 

Answer: