100-105 Premium Bundle

100-105 Premium Bundle

Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Certification Exam

4.5 
(36975 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 100-105 Free Practice Questions

Q1. - (Topic 3) 

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.) 

A. 10.1.168.0 

B. 10.1.176.1 

C. 10.1.174.255 

D. 10.1.160.255 

E. 10.1.160.0 

F. 10.1.175.255 

Answer: A,C,D 

Explanation: 

All IP address in IP ranges between: 10.1.160.1 and 10.1.175.254 are valid as shown below Address: 10.1.160.0 00001010.00000001.1010 0000.00000000 Netmask: 255.255.240.0 = 20 11111111.11111111.1111 0000.00000000 Wildcard: 0.0.15.255 00000000.00000000.0000 1111.11111111 

Which implies that: Network: 10.1.160.0/20 00001010.00000001.1010 0000.00000000 HostMin: 10.1.160.1 00001010.00000001.1010 0000.00000001 HostMax: 10.1.175.254 00001010.00000001.1010 1111.11111110 Broadcast: 10.1.175.255 00001010.00000001.1010 1111.11111111 

Q2. - (Topic 7) 

Which component of a routing table entry represents the subnet mask? 

A. routing protocol code 

B. prefix 

C. metric 

D. network mask 

Answer:

Explanation: 

IP Routing Table Entry TypesAn entry in the IP routing table contains the following information in the order presented: Network ID. The network ID or destination corresponding to the route. The network ID can be class-based, subnet, or supernet network ID, or an IP address for a host route. Network Mask. The mask that is used to match a destination IP address to the network ID. Next Hop. The IP address of the next hop. Interface. An indication of which network interface is used to forward the IP packet. Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID. Routing table entries can be used to store the following types of routes: Directly Attached Network IDs. Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network. Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network. Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per-IP address basis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255. Default Route. The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 

0.0.0.0. 

Q3. - (Topic 7) 

Which routing protocol has the smallest default administrative distance? 

A. IBGP 

B. OSPF 

C. IS-IS 

D. EIGRP 

E. RIP 

Answer:

Explanation: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/15986-admin-distance.html Default Distance Value TableThis table lists the administrative distance default values of the protocols that Cisco supports: 

Route Source Default Distance Values 

Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (BGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 External EIGRP 170 Internal BGP 200 Unknown* 

Q4. - (Topic 5) 

Select three options which are security issues with the current configuration of SwitchA. (Choose three.) 

A. Privilege mode is protected with an unencrypted password 

B. Inappropriate wording in banner message 

C. Virtual terminal lines are protected only by a password requirement 

D. Both the username and password are weak 

E. Telnet connections can be used to remotely manage the switch 

F. Cisco user will be granted privilege level 15 by default 

Answer: A,B,D 

Q5. - (Topic 2) 

Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.) 

A. a bridge 

B. a router 

C. a hub 

D. a Layer 3 switch 

E. an access point 

Answer: B,D 

Explanation: 

Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms. 

Q6. - (Topic 3) 

Which router command will configure an interface with the IP address 10.10.80.1/19? 

A. router(config-if)# ip address 10.10.80.1/19 

B. router(config-if)# ip address 10.10.80.1 255.255.0.0 

C. router(config-if)# ip address 10.10.80.1 255.255.255.0 

D. router(config-if)# ip address 10.10.80.1 255.255.224.0 

E. router(config-if)# ip address 10.10.80.1 255.255.240.0 

F. router(config-if)# ip address 10.10.80.1 255.255.255.240 

Answer:

Explanation: 

255.255.224 equal /19 in CIDR format hence the answer 

Q7. - (Topic 7) 

Which entity assigns IPv6 addresses to end users? 

A. ICANN 

B. APNIC 

C. RIR 

D. ISPs 

Answer:

Q8. - (Topic 3) 

Refer to the exhibit. 

The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2? 

A. Configure the router with the cdp enable command. 

B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces. 

C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces. 

D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces. 

Answer:

Explanation: 

If the no shut down commands are not entered, then CDP can exchange information between the two routers. By default, all Cisco device interfaces and ports are shut down and need to be manually enabled. 

Q9. - (Topic 5) 

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) 

A. Allow unrestricted access to the console or VTY ports. 

B. Use a firewall to restrict access from the outside to the network devices. 

C. Always use Telnet to access the device command line because its data is automatically encrypted. 

D. Use SSH or another encrypted and authenticated transport to access device configurations. 

E. Prevent the loss of passwords by disabling password encryption. 

Answer: B,D 

Explanation: 

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH. 

Q10. - (Topic 7) 

Which statement about routing protocols is true? 

A. Link-state routing protocols choose a path by the number of hops to the destination. 

B. OSPF is a link-state routing protocol. 

C. Distance-vector routing protocols use the Shortest Path First algorithm. 

D. IS-IS is a distance-vector routing protocol. 

Answer:

Explanation: Link State Routing Protocols 

Link state protocols are also called shortest-path-first protocols. Link state routing protocols have a complete picture of the network topology. Hence they know more about the whole network than any distance vector protocol. Three separate tables are created on each link state routing enabled router. One table is used to hold details about directly connected neighbors, one is used to hold the topology of the entire internetwork and the last one is used to hold the actual routing table. Link state protocols send information about directly connected links to all the routers in the network. Examples of Link state routing protocols include OSPF - Open Shortest Path First and IS-IS - Intermediate System to Intermediate System. There are also routing protocols that are considered to be hybrid in the sense that they use aspects of both distance vector and link state protocols. EIGRP - Enhanced Interior Gateway Routing Protocol is one of those hybrid routing protocols. 

Q11. - (Topic 3) 

Refer to the exhibit. 

If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed? 

A. Router1> 

B. Router1# 

C. Router2> 

D. Router2# 

Answer:

Explanation: 

After resuming the telnet session by using the Enter key after it has been suspended, it will resume back to the telnet session so it will be back to the router2> prompt. 

Q12. - (Topic 1) 

Refer to the exhibit. 

The output is from a router in a large enterprise. From the output, determine the role of the router. 

A. A Core router. 

B. The HQ Internet gateway router. 

C. The WAN router at the central site. 

D. Remote stub router at a remote site. 

Answer:

Explanation: 

Since the routing table shows only a single default route using the single interface serial 0/0, we know that this is most likely a remote stub site with a single connection to the rest of the network. All the other answer options would mean that this router would have more connections, and would contain more routes. 

Q13. - (Topic 3) 

What are two benefits of using a single OSPF area network design? (Choose two.) 

A. It is less CPU intensive for routers in the single area. 

B. It reduces the types of LSAs that are generated. 

C. It removes the need for virtual links. 

D. It increases LSA response times. 

E. It reduces the number of required OSPF neighbor adjacencies. 

Answer: B,C 

Explanation: 

OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement). The link types are as follows: 

. LSA Type 1: Router LSA 

....... 

LSA Type 2: Network LSA 

LSA Type 3: Summary LSA 

LSA Type 4: Summary ASBR LSA 

LSA Type 5: Autonomous system external LSA 

LSA Type 6: Multicast OSPF LSA 

LSA Type 7: Not-so-stubby area LSA 

LSA Type 8: External attribute LSA for BGP 

If all routers are in the same area, then many of these LSA types (Summary ASBR LSA, external LSA, etc) will not be used and will not be generated by any router. 

All areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, you can use a virtual link to connect to the backbone through a non-backbone area. You can also use virtual links to connect two parts of a partitioned backbone through a non-backbone area. The area through which you configure the virtual link, known as a transit area, must have full routing information. The transit area cannot be a stub area. Virtual links are not ideal and should really only be used for temporary network solutions or migrations. However, if all locations are in a single OSPF area this is not needed. 

Q14. - (Topic 3) 

Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme? (Choose three) 

A. static mapping of IPv4 address to IPv6 addresses 

B. configuring IPv4 tunnels between IPv6 islands 

C. use DHCPv6 to map IPv4 addresses to IPv6 addresses 

D. use proxying and translation (NAT-PT) to translate IPv6 packets into IPv4 packets 

E. configure IPv6 directly 

F. enable dual-stack routing 

Answer: B,D,F 

Explanation: 

Connecting IPv6 islands with tunnels An IPv6 island is a network made of IPv6 links directly connected by IPv6 routers. In the early days of IPv6 deployment, there are many IPv6 islands. IPv6 in IPv4 tunnels are used to connect those islands together. In each island, one (or more) dual stack routers are designated to encapsulate and decapsulate IPv6 packets within IPv4 packets. Different mechanisms have been developed to manage tunnels: automatic tunnels3, configured tunnels3, tunnel brokers3, 6over43, 6to43,... Reference 2: http://www.petri.co.il/ipv6-transition.htm Network Address Translation - Protocol Translation (NAT-PT) The NAT-PT method enables the ability to either statically or dynamically configure a translation of a IPv4 network address into an IPv6 network address and vice versa. For those familiar with more typically NAT implementations, the operation is very similar but includes a protocol translation function. NAT-PT also ties in an Application Layer Gateway (ALG) functionality that converts Domain Name System (DNS) mappings between protocols. 

Dual Stack The simplest approach when transitioning to IPv6 is to run IPv6 on all of the devices that are currently running IPv4. If this is something that is possible within the organizational network, it is very easy to implement. However, for many organizations, IPv6 is not supported on all of the IPv4 devices; in these situations other methods must be considered. 

Reference: http://www.opus1.com/ipv6/howdoitransitiontoipv6.html 

Q15. - (Topic 1) 

Which layer of the TCP/IP stack combines the OSI model physical and data link layers? 

A. Internet layer 

B. transport layer 

C. application layer 

D. network access layer 

Answer:

Explanation: 

The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD's goal was to bring international standards which could not be met by the OSI model. Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather than the OSI. Below is a side by side comparison of the TCP/IP and OSI models. 

START 100-105 EXAM