100-105 Premium Bundle

100-105 Premium Bundle

Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Certification Exam

4.5 
(35805 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 100-105 Free Practice Questions

Q1. - (Topic 3) 

Which two statements describe the process identifier that is used in the command to configure OSPF on a router? (Choose two.) 

Router(config)# router ospf 1 

A. All OSPF routers in an area must have the same process ID. 

B. Only one process number can be used on the same router. 

C. Different process identifiers can be used to run multiple OSPF processes 

D. The process number can be any number from 1 to 65,535. 

E. Hello packets are sent to each neighbor to determine the processor identifier. 

Answer: C,D 

Explanation: 

Multiple OSPF processes can be configured on a router using multiple process ID’s. 

The valid process ID’s are shown below: Edge-B(config)#router ospf <1-65535> Process ID 

Q2. - (Topic 1) 

Refer to the exhibit. 

The exhibit is showing the topology and the MAC address table. Host A sends a data frame to host D. What will the switch do when it receives the frame from host A? 

A. The switch will add the source address and port to the MAC address table and forward the frame to host D. 

B. The switch will discard the frame and send an error message back to host A. 

C. The switch will flood the frame out of all ports except for port Fa0/3. 

D. The switch will add the destination address of the frame to the MAC address table and forward the frame to host D. 

Answer:

Explanation: 

When switch receives the data frame from the host not having the MAC address already on the MAC table, it will add the MAC address to source port on MAC address table and sends the data frame. 

Q3. - (Topic 3) 

Which command can you use to manually assign a static IPV6 address to a router interface? 

A. ipv6 address PREFIX_1::1/64 

B. ipv6 autoconfig 2001:db8:2222:7272::72/64 

C. ipv6 autoconfig 

D. ipv6 address 2001:db8:2222:7272::72/64 

Answer:

Explanation: 

An example of configuring IPv6 on an interface is shown below: Router(config)# interface fastethernet 0/1 Router(config-if)# ipv6 address 3000::2222:1/64 

Q4. - (Topic 5) 

What is the bandwidth on the WAN interface of Router 1? 

A. 16 Kbit/sec 

B. 32 Kbit/sec 

C. 64 Kbit/sec 

D. 128 Kbit/sec 

E. 512 Kbit/sec 

F. 1544 Kbit/sec 

Answer:

Explanation: 

Use the “show interface s0/0” to see the bandwidth set at 16 Kbit/sec. The show interface s0/0 command results will look something like this and the bandwidth will be represented by the "BW" on the fourth line as seen below where BW equals 1544 Kbits/sec. R2#show interface serial 0/0 Serial0/0 is up, line protocol is down Hardware is GT96K Serial Internet address is 10.1.1.5/30 MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 uses. 

Q5. - (Topic 4) 

How many addresses will be available for dynamic NAT translation when a router is configured with the following commands? 

Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 

255.255.255.224 

Router(config)#ip nat inside source list 9 pool TAME 

A. 7 

B. 8 

C. 9 

D. 10 

E. 24 

F. 32 

Answer:

Explanation: 

209.165.201.23 to 209.165.201.30 provides for 8 addresses. 

Q6. - (Topic 5) 

What is the purpose of the switchport command? 

Switch(config-if)# switchport port-security maximum 1 

Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8 

A. It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured. 

B. It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port that is being configured. 

C. It will act like an access list and the port will filter packets that have a source or destination MAC of 0018.DE8B.4BF8. 

D. The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8. 

Answer:

Explanation: 

The first command configurs the maximum number of secure MAC addresses on a port to one. The next command specifies that MAC addresses that are allowed with port security; in this case it is just the one single device MAC. If any other device connects on that port the port will be shut down by the port security feature. 

Q7. - (Topic 1) 

Which two statements describe the operation of the CSMA/CD access method? (Choose two.) 

A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. 

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. 

C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method. 

D. After a collision, the station that detected the collision has first priority to resend the lost data. 

E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. 

F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data. 

Answer: B,E 

Explanation: 

Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn’t stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out. 

Q8. - (Topic 5) 

Which of the following is true regarding the configuration of SwitchA? 

A. only 5 simultaneous remote connections are possible 

B. remote connections using ssh will require a username and password 

C. only connections from the local network will be possible 

D. console access to SwitchA requires a password 

Answer:

Q9. - (Topic 2) 

Refer to the exhibit. 

All devices attached to the network are shown. How many collision domains are present in this network? 

A. 2 

B. 3 

C. 6 

D. 9 

E. 15 

Answer:

Explanation: 

A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain. Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15. 

Q10. - (Topic 4) 

What is the best practice when assigning IP addresses in a small office of six hosts? 

A. Use a DHCP server that is located at the headquarters. 

B. Use a DHCP server that is located at the branch office. 

C. Assign the addresses by using the local CDP protocol. 

D. Assign the addresses statically on each node. 

Answer:

Explanation: 

Its best to use static addressing scheme where the number of systems is manageable rather than using a dynamic method such as DHCP as it is easy to operate and manage. 

Q11. - (Topic 3) 

Refer to the exhibit. 

Assume that all router interfaces are operational and correctly configured. In addition, assume that OSPF has been correctly configured on router R2. How will the default route configured on R1 affect the operation of R2? 

A. Any packet destined for a network that is not directly connected to router R2 will be dropped immediately. 

B. Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1. R1 will then send that packet back to R2 and a routing loop will occur. 

C. Any packet destined for a network that is not directly connected to router R1 will be dropped. 

D. The networks directly connected to router R2 will not be able to communicate with the 172.16.100.0, 172.16.100.128, and 172.16.100.64 subnetworks. 

E. Any packet destined for a network that is not directly connected to router R2 will be dropped immediately because of the lack of a gateway on R1. 

Answer:

Explanation: 

First, notice that the more-specific routes will always be favored over less-specific routes regardless of the administrative distance set for a protocol. In this case, because we use OSPF for three networks (172.16.100.0 0.0.0.3, 172.16.100.64 0.0.0.63, 172.16.100.128 0.0.0.31) so the packets destined for these networks will not be affected by the default route. The default route configured on R1 “ip route 0.0.0.0 0.0.0.0 serial0/0 will send any packet whose destination network is not referenced in the routing table of router R1 to R2, it doesn’t drop anything. These routes are declared in R1 and the question says that “OSPF has been correctly configured on router R2, so network directly connected to router R2 can communicate with those three subnetworks. As said above, the default route configured on R1 will send any packet destined for a network that is not referenced in its routing table to R2; R2 in turn sends it to R1 because it is the only way and a routing loop will occur. 

Q12. - (Topic 5) 

Refer to the exhibit. 

A network administrator has configured a Catalyst 2950 switch for remote management by pasting into the console the configuration commands that are shown in the exhibit. However, a Telnet session cannot be successfully established from a remote host. What should be done to fix this problem? 

A. Change the first line to interface fastethernet 0/1. 

B. Change the first line to interface vlan 0/1. 

C. Change the fifth line to ip default-gateway 192.168.17.241. 

D. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1. 

E. Change the sixth line to line con 0. 

Answer:

Explanation: 

The default gateway must reside on the same IP subnet as the device. Here, the subnet mask for the VLAN interface is /228. Only choice C will fix this issue, as then the default gateway is on the same subnet as the 2950. 

Q13. - (Topic 3) 

Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose two.) 

A. 10.6.8.35 

B. 133.6.5.4 

C. 192.168.5.9 

D. 127.0.0.1 

E. 190.6.5.4 

Answer: B,E 

Explanation: 

The IP addresses 133.6.5.4 and 190.6.5.4 are both valid Class B addresses when a default mask is in use. The Class B default mask is 255.255.0.0 and the range of valid addresses is 128.0.0.0-

191.255.255.255. 

The IP address 10.6.8.35 is a Class A address. The Class A default mask is 255.0.0.0 and 

the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 

127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. 

The IP address 192.168.5.9 is a Class C address. The Class C default mask is 

255.255.255.0 and the range of valid addresses is 192.0.0.0 - 223.255.255.255. 

The IP address 127.0.0.1 is a Class A address, but it comes from a reserved portion that 

cannot be assigned. 

The range 127.0.0.1 - 127.255.255.255 is used for diagnostics, and although any address 

in the range will work as a diagnostic address, 127.0.0.1 is known as the loopback address. 

If you can ping this address, or any address in the 127.0.0.1 - 127.255.255.255 range, then 

the NIC is working and TCP/IP is installed. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 

127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. 

Q14. - (Topic 3) 

Which command enables IPv6 forwarding on a Cisco router? 

A. ipv6 host 

B. ipv6 unicast-routing 

C. ipv6 local 

D. ipv6 neighbor 

Answer:

Explanation: 

Enabling IPv6 on Cisco IOS Software Technology http://www.ciscopress.com/articles/article.asp?p=31948&seqNum=4 The first step of enabling IPv6 on a Cisco router is the activation of IPv6 traffic forwarding to forward unicast IPv6 packets between network interfaces. By default, IPv6 traffic forwarding is disabled on Cisco routers. The ipv6 unicast-routing command is used to enable the forwarding of IPv6 packets between interfaces on the router. The syntax for this command is as follows: Router(config)#ipv6 unicast-routing The ipv6 unicast-routing command is enabled on a global basis. 

Q15. - (Topic 1) 

Which OSI layer header contains the address of a destination host that is on another network? 

A. application 

B. session 

C. transport 

D. network 

E. data link 

F. physical 

Answer:

Explanation: 

Only network address contains this information. To transmit the packets the sender uses network address and datalink address. But the layer 2 address represents just the address of the next hop device on the way to the sender. It is changed on each hop. Network address remains the same. 

START 100-105 EXAM