A Review Of Download 100-105 Q&A

Dont wait regarding too lengthy. You can start off right right now and buy our Cisco 100-105 items for the access to the no cost downloadable Cisco 100-105 braindumps. We have the top Cisco certification practice questions resource for the 100-105 exam. Many of us ensure that by making use of Exambible Cisco Cisco exam questions and answers you will be fully prepared to acquire through your own Cisco 100-105 exam. Or you will get full money back.


The article at Testaimer.com going over http://www.testaimer.com/100-105-test is very comprehensive.

2017 Mar 100-105 brain dumps

Q51. - (Topic 7) 

When enabled, which feature prevents routing protocols from sending hello messages on an interface'? 

A. virtual links 

B. passive-interface 

C. directed neighbors 

D. OSPF areas 

Answer:

Explanation: You can use the passive-interface command in order to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while it allows updates to be exchanged normally over other interfaces. With most routing protocols, the passive-interface command restricts outgoing advertisements only. But, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, which results in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates. This document also discusses the configuration required in order to allow the suppression of outgoing routing updates, while it also allows incoming routing updates to be learned normally from the neighbor. 


Q52. - (Topic 3) 

The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements. 

Which three items will adequately fulfill the request? (Choose three). 

A. One IP subnet with a mask of 255.255.254.0 

B. Two IP subnets with a mask of 255.255.255.0 

C. Seven 48-port hubs 

D. Seven 48-port switches 

E. One router interface 

F. Seven router interfaces 

Answer: A,D,E 

Explanation: 

To support 300 workstations in a single broadcast domain, we need to use a subnet mask 

which supports 512 hosts = 29-> /23 or 255.255.254.0 in decimal form -> A is correct. 

If we use 48-port switches we need 300/48 = 6.25 -> seven 48-port switches are enough 

because we also need trunking between them -> D is correct. 

We only need one router interface and it is connected with one of seven switches -> E is 

correct. 


Q53. - (Topic 5) 

What is the effect of using the service password-encryption command? 

A. Only the enable password will be encrypted. 

B. Only the enable secret password will be encrypted. 

C. Only passwords configured after the command has been entered will be encrypted. 

D. It will encrypt the secret password and remove the enable secret password from the 

configuration. 

E. It will encrypt all current and future passwords. 

Answer:

Explanation: 

Encryption further adds a level of security to the system as anyone having access to the database of passwords cannot reverse the process of encryption to know the actual passwords which isn’t the case if the passwords are stored simply. 


Q54. - (Topic 1) 

Refer to the exhibit. 

What kind of cable should be used to make each connection that is identified by the numbers shown? 

A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable 

B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable 

C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable 

D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable 

E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable 

Answer:

Explanation: 

When connecting a PC to a switch, a standard Ethernet straight through cable should be used. This same cable should also be used for switch to router connections. Generally 

speaking, crossover cables are only needed when connecting two like devices (PC-PC, 

switch-switch, router-router, etc). 

Routers connect to frame relay and other WAN networks using serial cables. 

Rollover cables are special cables used for connecting to the console ports of Cisco 

devices. 


Q55. - (Topic 3) 

Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? (Choose three.) 

A. An IPv6 address is divided into eight 16-bit groups. 

B. A double colon (::) can only be used once in a single IPv6 address. 

C. IPv6 addresses are 196 bits in length. 

D. Leading zeros cannot be omitted in an IPv6 address. 

E. Groups with a value of 0 can be represented with a single 0 in IPv6 address. 

Answer: A,B,E 

Explanation: 

IPv6 addresses are divided into eight 16-bit groups, a double colon (::) can only be used 

once in an IPv6 address, and groups with a value of 0 can be represented with a single 0 in 

an IPv6 address. 

The following statements are also true regarding IPv6 address: 

IPv6 addresses are 128 bits in length. 

Eight 16-bit groups are divided by a colon (:). 

Multiple groups of 16-bit 0s can be represented with double colon (::). 

Double colons (::) represent only 0s. 

Leading zeros can be omitted in an IPv6 address. 

The option stating that IPv6 addresses are 196 bits in length is incorrect. IPv6 addresses 

are 128 bits in length. 

The option stating that leading zeros cannot be omitted in an IPv6 address is incorrect. 

Leading zeros can be omitted in an IPv6 address. 


Improved 100-105 exam cost:

Q56. - (Topic 3) 

Which two of these functions do routers perform on packets? (Choose two.) 

A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets 

B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops 

C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets 

D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations 

E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops 

F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations 

Answer: B,C 

Explanation: 

This is the basic function of the router to receive incoming packets and then forward them to their required destination. This is done by reading layer 3 headers of inbound packets and update the info to layer 2 for further hopping. 


Q57. - (Topic 3) 

Which command can you use to manually assign a static IPV6 address to a router interface? 

A. ipv6 address PREFIX_1::1/64 

B. ipv6 autoconfig 2001:db8:2222:7272::72/64 

C. ipv6 autoconfig 

D. ipv6 address 2001:db8:2222:7272::72/64 

Answer:

Explanation: 

An example of configuring IPv6 on an interface is shown below: Router(config)# interface fastethernet 0/1 Router(config-if)# ipv6 address 3000::2222:1/64 


Q58. - (Topic 3) 

Which two statements describe the IP address 10.16.3.65/23? (Choose two.) 

A. The subnet address is 10.16.3.0 255.255.254.0. 

B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. 

C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0 

D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. 

E. The network is not subnetted. 

Answer: B,D 

Explanation: 

The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254 


Q59. - (Topic 3) 

ROUTER# show ip route 

192.168.12.0/24 is variably subnetted, 9 subnets, 3 masks C 192.168.12.64 /28 is directly connected, Loopback1 C 192.168.12.32 /28 is directly connected, Ethernet0 C 192.168.12.48 /28 is directly connected, Loopback0 O 192.168.12.236 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0 C 192.168.12.232 /30 is directly connected, Serial0 O 192.168.12.245 /30 [110/782] via 192.168.12.233, 00:35:36, Serial0 O 192.168.12.240 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0 O 192.168.12.253 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0 O 192.168.12.249 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0 O 192.168.12.240/30 [110/128] via 192.168.12.233, 00:35:36, Serial 0 

To what does the 128 refer to in the router output above? 

A. OSPF cost 

B. OSPF priority 

C. OSPF hop count 

D. OSPF ID number 

E. OSPF administrative distance 

Answer:

Explanation: 

The first parameter is the Administrative Distance of OSPF (110) while the second parameter is the cost of OSPF. 


Q60. - (Topic 5) 

What should be part of a comprehensive network security plan? 

A. Allow users to develop their own approach to network security. 

B. Physically secure network equipment from potential access by unauthorized individuals. 

C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. 

D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. 

E. Minimize network overhead by deactivating automatic antivirus client updates. 

Answer:

Explanation: 

From Cisco CCENT Exam Essentials study guide by Todd Lammle: 

Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals. 

List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations. 

Reference: 

CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition 

by Todd Lammle 

Published by Sybex, 2013