100-105 Premium Bundle

100-105 Premium Bundle

Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Certification Exam

4.5 
(18195 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 16, 2024Last update

Cisco 100-105 Free Practice Questions

Q1. - (Topic 5) 

Refer to the exhibit. 

A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem? 

A. A remote physical layer problem exists. 

B. The host NIC is not functioning. 

C. TCP/IP has not been correctly installed on the host. 

D. A local physical layer problem exists. 

Answer:

Explanation: 

Here we see that the host is able to ping its own loopback IP address of 127.0.0.1 and it’s own IP address of 10.0.0.35, so we know that the NIC is functioning and that the host’s TCP/IP stack is OK. However, it is not able to ping the IP address of its local default gateway, so we know that there is a local cabling problem between the switch and the router. 

Q2. - (Topic 5) 

An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. 

What must be done to accomplish this? 

A. Enable port security and use the keyword sticky. 

B. Set the switchport mode to trunk and save the running configuration. 

C. Use the switchport protected command to have the MAC addresses added to the configuration. 

D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration. 

Answer:

Explanation: 

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide 

/port_sec.pdf 

One can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts, hence enabling security as desired. 

Q3. - (Topic 2) 

Refer to the exhibit. 

All devices attached to the network are shown. How many collision domains are present in this network? 

A. 2 

B. 3 

C. 6 

D. 9 

E. 15 

Answer:

Explanation: 

A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain. Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15. 

Q4. - (Topic 2) 

Refer to the exhibit. 

The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. 

What two operations will the switch perform when it receives this frame? (Choose two.) 

A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table. 

B. The MAC address of 0000.00dd.dddd will be added to the MAC address table. 

C. The frame will be forwarded out of port fa0/3 only. 

D. The frame will be forwarded out of fa0/1, fa0/2, and fa0/3. 

E. The frame will be forwarded out of all the active ports. 

Answer: A,D 

Explanation: 

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table 

Q5. - (Topic 5) 

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? 

A. decrease the window size 

B. use a different source port for the session 

C. decrease the sequence number 

D. obtain a new IP address from the DHCP server 

E. start a new session using UDP 

Answer: A Explanation: 

The Window bit in the header determines the number of segments that can be sent at a time. This is done to avoid overwhelming the destination. At the start of the session the window in small but it increases over time. The destination host can also decrease the window to slow down the flow. Hence the window is called the sliding window. When the source has sent the number of segments allowed by the window, it cannot send any further segments till an acknowledgement is received from the destination. On networks with high error rates or issues, decreasing the window size can result in more reliable transmission, as the receiver will need to acknowledge fewer segments. With a large window size, the sender will need to resend all the frames if a single one is not received by the receiver. 

Q6. - (Topic 2) 

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)? 

A. 4, 48 

B. 48, 4 

C. 48, 1 

D. 1, 48 

E. 4, 1 

Answer:

Explanation: 

A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain. 

Topic 3, Routing Fundamentals 

Q7. - (Topic 1) 

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) 

A. layer 3 support 

B. port security 

C. redundant components 

D. VLANs 

E. PoE 

Answer: B,D 

Explanation: 

Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). 

Switch features in the Access layer: 

...... 

Port security 

VLANs 

Fast Ethernet/Gigabit Ethernet 

Power over Ethernet (PoE) 

Link aggregation 

Quality of Service (QoS) 

References: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml 

Topic 2, LAN Switching Technologies 

Q8. - (Topic 3) 

What is the purpose of assigning an IP address to a switch? 

A. provides local hosts with a default gateway address 

B. allows remote management of the switch 

C. allows the switch to respond to ARP requests between two hosts 

D. ensures that hosts on the same LAN can communicate with each other 

Answer:

Explanation: 

A switch is a layer 2 device and doesn’t use network layer for packet forwarding. The IP 

address may be used only for administrative purposes such as Telnet access or for network management purposes. 

Q9. - (Topic 7) 

Which NAT type is used to translate a single inside address to a single outside address? 

A. dynamic NAT 

B. NAT overload 

C. PAT 

D. static NAT 

Answer:

Explanation: 

Network address translation (NAT) is the process of modifying IP address information in 

IP packet headers while in transit across a traffic routing device. 

There are two different types of NAT: . NAT . PAT 

Q10. - (Topic 5) 

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) 

A. Allow unrestricted access to the console or VTY ports. 

B. Use a firewall to restrict access from the outside to the network devices. 

C. Always use Telnet to access the device command line because its data is automatically encrypted. 

D. Use SSH or another encrypted and authenticated transport to access device configurations. 

E. Prevent the loss of passwords by disabling password encryption. 

Answer: B,D 

Explanation: 

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH. 

Q11. - (Topic 3) 

OSPF routing uses the concept of areas. What are the characteristics of OSPF areas? (Choose Three.) 

A. Each OSPF area requires a loopback interface to be configured. 

B. Areas may be assigned any number from 0 to 65535. 

C. Area 0 is called the backbone area. 

D. Hierarchical OSPF networks do not require multiple areas. 

E. Multiple OSPF areas must connect to area 0. 

F. Single area OSPF networks must be configured in area 1. 

Answer: B,C,E 

Explanation: 

Definition of OSPF areas: An OSPF network may be structured, or subdivided, into routing areas to simplify administration and optimize traffic and resource utilization. Areas are identified by 32-bit numbers, expressed either simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address notation. 

See discussion following Cisco Learning discussion. 

https://learningnetwork.cisco.com/message/90832 

Q12. - (Topic 1) 

Which of the following are types of flow control? (Choose three.) 

A. buffering 

B. cut-through 

C. windowing 

D. congestion avoidance 

E. load balancing 

Answer: A,C,D 

Explanation: 

During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion". 

Buffering The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering". Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup. This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increases it to say 5 for example. Windowing is used only by TCP since UDP doesn't use or allow flow control. 

Reference: http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php 

Q13. - (Topic 4) 

A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. 

router#show interfaces 

Serial0/1/0 is up, line protocol is down 

At which OSI layer should the administrator begin troubleshooting? 

A. physical 

B. data link 

C. network 

D. transport 

Answer:

Explanation: 

https://learningnetwork.cisco.com/thread/12389 

I think the indication here is "Serial 0 is up, line protocol is down". What causes this indication? Correct me if I am wrong. When you have this indication, a cable unplugged is not a correct answer. If you check the output of your "show interface serial 0" command again, you should notice it as "Serial 0 is down, line protocol is down. Under the "show ip int brief" you should see status = down and protocol = down as opposed to up, down. Because you disconnected the cable, layer 1 will go down, which is indicated by the serial 0 down status. The line protocol status is for layer 2. So, a cable unplugged is not a correct answer to "Serial 0 is up, line protocol is down". Up/down means that the physical layer is OK, but there is a problem with the data link link (line protocol). 

Q14. - (Topic 1) 

Refer to the exhibit. 

If the hubs in the graphic were replaced by switches, what would be virtually eliminated? 

A. broadcast domains 

B. repeater domains 

C. Ethernet collisions 

D. signal amplification 

E. Ethernet broadcasts 

Answer:

Explanation: 

Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links. 

Q15. CORRECT TEXT - (Topic 6) 

This topology contains 3 routers and 1 switch. Complete the topology. 

Drag the appropriate device icons to the labeled Device Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address 

(Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology. 

Use information gathered from the Main router to complete the configuration of any additional routers. 

No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration. 

Configure each additional router with the following: 

Configure the interfaces with the correct IP address and enable the interfaces. 

Set the password to allow console access to consolepw 

Set the password to allow telnet access to telnetpw 

Set the password to allow privilege mode access to privpw 

Not E: Because routes are not being added to the configurations, you will not be able to ping through the internetwork. 

All devices have cable autosensing capabilities disabled. 

All hosts are PC’s 

Answer: Specify appropriate devices and drag them on the "Device" boxes For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers Place them on appropriate locations as following: (Host D and host E will be automatically added after placing two routers. Click on them to access neighboring routers) Specify appropriate connections between these devices: 

+

 The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable 

+

 The router on the right is connected with the Main router through Serial interfaces: use a 

serial cable 

+

 The router on the right and the Switch: use a straight-through cable 

+

 The router on the left and the computer: use a crossover cable (To remember which type of cable you should use, follow these tips: 

-

To connect two serial interfaces of 2 routers we use serial cable 

-

To specify when we use crossover cable or straight-through cable, we should remember: Group 1: Router, Host, Server Group 2: Hub, Switch One device in group 1 + One device in group 2: use straight-through cable Two devices in the same group: use crossover cable For example, we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server... and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host.) Assign appropriate IP addresses for interfaces: From Main router, use show running-config command. 

 (Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just used for demonstration) 

From the output we learned that the ip address of Fa0/0 interface of the Main router is 

192.168.152.177/28. This address belongs to a subnetwork which has: 

Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000) 

Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177) 

Broadcast address: 192.168.152.191 (because 191 = 176 + 16 - 1) 

And we can pick up an ip address from the list that belongs to this subnetwork: 

192.168.152.190 and assign it to the Fa0/0 interface the router on the left Use the same method for interface Serial0/0 with an ip address of 192.168.152.161 Increment: 16 Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161) Broadcast address: 192.168.152.175 (because 176 = 160 + 16 - 1) -> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right Interface Fa0/1 of the router on the left IP (of the computer on the left) : 192.168.152.129/28 Increment: 16 Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129) Broadcast address: 192.168.152.143 (because 143 = 128 + 16 - 1) -> we choose 192.168.152.142 from the list Interface Fa0/0 of the router on the right IP (of the computer on the left) : 192.168.152.225/28 Increment: 16 Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225) Broadcast address: 192.168.152.239 (because 239 = 224 + 16 - 1) -> we choose 192.168.152.238 from the list Let's have a look at the picture below to summarize Configure two routers on the left and right with these commands: Router1 = router on the left Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces: Router1>enable Router1#configure terminal Router1(config)#interface fa0/0 Router1(config-if)#ip address 192.168.152.190 255.255.255.240 Router1(config-if)#no shutdown Router1(config-if)#interface fa0/1 Router1(config-if)#ip address 192.168.152.142 255.255.255.240 Router1(config-if)#no shutdown Set passwords (configure on two routers) 

+

 Console password: Router1(config-if)#exit Router1(config)#line console 0 

Router1(config-line)#password consolepw Router1(config-line)#login Router1(config-line)#exit 

+

 Telnet password: Router1(config)#line vty 0 4 Router1(config-line)#password telnetpw Router1(config-line)#login Router1(config-line)#exit 

+

 Privilege mode password: Router1(config)#enable password privpw Save the configuration: Router1(config)#exit Router1#copy running-config startup-config Configure IP addresses of Router2 (router on the right) Router2>enable Router2#configure terminal Router2(config)#interface fa0/0 Router2(config-if)#ip address 192.168.152.238 255.255.255.240 Router2(config-if)#no shutdown Router2(config-if)#interface serial0/0 Router2(config-if)#ip address 192.168.152.174 255.255.255.240 Router2(config-if)#no shutdown Then set the console, telnet and privilege mode passwords for Router2 as we did for Router1, remember to save the configuration when you finished. 

START 100-105 EXAM