100-105 Premium Bundle

100-105 Premium Bundle

Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Certification Exam

4.5 
(11595 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
March 28, 2024Last update

Cisco 100-105 Free Practice Questions

Q1. - (Topic 3) 

Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224? 

A. 192.168.2.63 

B. 192.168.2.62 

C. 192.168.2.61 

D. 192.168.2.60 

E. 192.168.2.32 

Answer:

Explanation: 

With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63 where 63 is broadcast so 62 is last valid host out of given choices. 

Q2. - (Topic 3) 

Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose two.) 

A. 10.6.8.35 

B. 133.6.5.4 

C. 192.168.5.9 

D. 127.0.0.1 

E. 190.6.5.4 

Answer: B,E 

Explanation: 

The IP addresses 133.6.5.4 and 190.6.5.4 are both valid Class B addresses when a default mask is in use. The Class B default mask is 255.255.0.0 and the range of valid addresses is 128.0.0.0-

191.255.255.255. 

The IP address 10.6.8.35 is a Class A address. The Class A default mask is 255.0.0.0 and 

the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 

127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. 

The IP address 192.168.5.9 is a Class C address. The Class C default mask is 

255.255.255.0 and the range of valid addresses is 192.0.0.0 - 223.255.255.255. 

The IP address 127.0.0.1 is a Class A address, but it comes from a reserved portion that 

cannot be assigned. 

The range 127.0.0.1 - 127.255.255.255 is used for diagnostics, and although any address 

in the range will work as a diagnostic address, 127.0.0.1 is known as the loopback address. 

If you can ping this address, or any address in the 127.0.0.1 - 127.255.255.255 range, then 

the NIC is working and TCP/IP is installed. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 

127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. 

Q3. - (Topic 1) 

Refer to the exhibit. 

The output is from a router in a large enterprise. From the output, determine the role of the router. 

A. A Core router. 

B. The HQ Internet gateway router. 

C. The WAN router at the central site. 

D. Remote stub router at a remote site. 

Answer:

Explanation: 

Since the routing table shows only a single default route using the single interface serial 0/0, we know that this is most likely a remote stub site with a single connection to the rest of the network. All the other answer options would mean that this router would have more connections, and would contain more routes. 

Q4. - (Topic 3) 

Refer to the exhibit. 

Which two statements are correct? (Choose two.) 

A. This is a default route. 

B. Adding the subnet mask is optional for the ip route command. 

C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA. 

D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address. 

E. The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network can reach network 10.0.0.0. 

Answer: A,C 

Explanation: 

This is obviously the default route which is set between the routers and since it is entered in such a manner that it ensures connectivity between the stub network and any host lying beyond RouterA. 

Q5. - (Topic 2) 

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)? 

A. 4, 48 

B. 48, 4 

C. 48, 1 

D. 1, 48 

E. 4, 1 

Answer:

Explanation: 

A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain. 

Topic 3, Routing Fundamentals 

Q6. - (Topic 1) 

What must occur before a workstation can exchange HTTP packets with a web server? 

A. A UDP connection must be established between the workstation and its default gateway. 

B. A UDP connection must be established between the workstation and the web server. 

C. A TCP connection must be established between the workstation and its default gateway. 

D. A TCP connection must be established between the workstation and the web server. 

E. An ICMP connection must be established between the workstation and its default gateway. 

F. An ICMP connection must be established between the workstation and the web server. 

Answer:

Explanation: 

HTTP uses TCP port 80, and a TCP port 80 connection must be established for HTTP communication to occur. http://pentestlab.wordpress.com/2012/03/05/common-tcpip-ports/ 

Q7. DRAG DROP - (Topic 4) 

Various protocols are listed on the left. On the right are applications for the use of those protocols. Drag the protocol on the left to an associated function for that protocol on the right. (Not all options are used.) 

Answer:  

Q8. - (Topic 3) 

Scenario 

Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links. 

You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices. 

An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office. What is causing the problem? 

A. There is an area ID mismatch. 

B. There is a PPP authentication issue; a password mismatch. 

C. There is an OSPF hello and dead interval mismatch. 

D. There is a missing network command in the OSPF process on R5. 

Answer:

Explanation: 

The “show ip ospf interface command on R3 and R5 shows that the hello and dead intervals do not match. They are 50 and 200 on R3 and 10 and 40 on R5. 

Topic 4, Infrastructure Services 

Q9. - (Topic 3) 

Refer to the exhibit. 

What is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network? 

A. router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2 

B. router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2 

C. router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1 

D. router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1 

Answer:

Explanation: 

The next hop of the static route should be 10.89.16.1, which is the IP address for router R1 in this example. Since this router is a stub router with only a single connection to the WAN, the simplest thing to do is to configure a single static default route back to the HQ network. 

Q10. - (Topic 3) 

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? 

A. 1 

B. 2 

C. 4 

D. 8 

E. 252 

F. 254 

Answer:

Explanation: 

/30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 which means 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet. 

Q11. - (Topic 3) 

Refer to the exhibit. 

Which two statements are true about the loopback address that is configured on RouterB? (Choose two.) 

A. It ensures that data will be forwarded by RouterB. 

B. It provides stability for the OSPF process on RouterB. 

C. It specifies that the router ID for RouterB should be 10.0.0.1. 

D. It decreases the metric for routes that are advertised from RouterB. 

E. It indicates that RouterB should be elected the DR for the LAN. 

Answer: B,C 

Explanation: 

A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) -The router-ID is chosen in the order below: 

+

 The highest IP address assigned to a loopback (logical) interface. 

+

 If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. -> The loopback interface will be chosen as the router ID of RouterB -

Q12. - (Topic 7) 

Which RFC was created to alleviate the depletion of IPv4 public addresses? 

A. RFC 4193 

B. RFC 1519 

C. RFC 1518 

D. RFC 1918 

Answer:

Q13. - (Topic 1) 

Which protocol uses a connection-oriented service to deliver files between end systems? 

A. TFTP 

B. DNS 

C. FTP 

D. SNMP 

E. RIP 

Answer:

Explanation: 

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established--the caller must know the person's telephone number and the phone must be answered--before the message can be delivered. TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release. Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp. 

Q14. - (Topic 1) 

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.) 

A. There are no collisions in full-duplex mode. 

B. A dedicated switch port is required for each full-duplex node. 

C. Ethernet hub ports are preconfigured for full-duplex mode. 

D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting. 

E. The host network card and the switch port must be capable of operating in full-duplex mode. 

Answer: A,B,E 

Explanation: 

Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet—typically 10BaseT—is only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps—at most. Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you don’t need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet. 

Q15. - (Topic 5) 

Refer to the exhibit. 

A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem? 

A. The NY router has an incorrect subnet mask. 

B. The TFTP server has an incorrect IP address. 

C. The TFTP server has an incorrect subnet mask. 

D. The network administrator computer has an incorrect IP address. 

Answer:

Explanation: 

The TFTP server is using a mask of 255.255.255.240 (/28) while the router is configured with a /29. Because of this, the Atlanta router does not see the TFTP server as being in the same subnet. 

START 100-105 EXAM