Your success in Cisco cisco 100 105 is our sole target and we develop all our ccent 100 105 braindumps in a way that facilitates the attainment of this target. Not only is our icnd 100 105 study material the best you can find, it is also the most detailed and the most updated. ccent ccna icnd1 100 105 official cert guide Practice Exams for Cisco CCENT 100 105 icnd1 pdf are written to the highest standards of technical accuracy.

Q81. - (Topic 5) 

If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN? 

A. half-duplex operation 

B. broadcast storms 

C. network segmentation 

D. multicasting 

Answer:

Explanation: 

A broadcast storm can consume sufficient network resources so as to render the network unable to transport normal traffic. 

Topic 6, Simulation 


Q82. - (Topic 5) 

The following commands are entered on the router: 

Burbank(config)# enable secret fortress 

Burbank(config)# line con 0 

Burbank(config-line)# login 

Burbank(config-line)# password n0way1n 

Burbank(config-line)# exit 

Burbank(config)# service password-encryption 

What is the purpose of the last command entered? 

A. to require the user to enter an encrypted password during the login process 

B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files 

C. to encrypt the enable secret password 

D. to provide login encryption services between hosts attached to the router 

Answer:

Explanation: 

Certain types of passwords, such as Line passwords, by default appear in clear text in the configuration file. You can use the service password-encryption command to make them more secure. Once this command is entered, each password configured is automatically encrypted and thus rendered illegible inside the configuration file (much as the Enable/Enable Secret passwords are). Securing Line passwords is doubly important in networks on which TFTP servers are used, because TFTP backup entails routinely moving config files across networks—and config files, of course, contain Line passwords. 


Q83. - (Topic 1) 

How does TCP differ from UDP? (Choose two.) 

A. TCP provides best effort delivery. 

B. TCP provides synchronized communication. 

C. TCP segments are essentially datagrams. 

D. TCP provides sequence numbering of packets. 

E. TCP uses broadcast delivery. 

Answer: B,D 

Explanation: 

Because TCP is a connection-oriented protocol responsible for ensuring the transfer of a datagram from the source to destination machine (end-to-end communications), TCP must receive communications messages from the destination machine to acknowledge receipt of the datagram. The term virtual circuit is usually used to refer to the handshaking that goes on between the two end machines, most of which are simple acknowledgment messages (either confirmation of receipt or a failure code) and datagram sequence numbers. Rather than impose a state within the network to support the connection, TCP uses synchronized state between the two endpoints. This synchronized state is set up as part of an initial connection process, so TCP can be regarded as a connection-oriented protocol. Much of the protocol design is intended to ensure that each local state transition is communicated to, and acknowledged by, the remote party. 

Reference: http://en.wikibooks.org/wiki/Communication_Networks/TCP_and_UDP_Protocols 


Q84. - (Topic 5) 

Refer to the exhibit. 

A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design? 

A. This design will function as intended. 

B. Spanning-tree will need to be used. 

C. The router will not accept the addressing scheme. 

D. The connection between switches should be a trunk. 

E. The router interfaces must be encapsulated with the 802.1Q protocol. 

Answer:

Explanation: 

The proposed addressing scheme is on the same network. Cisco routers will not allow you to assign two different interfaces to be on the same IP subnet. 


Q85. - (Topic 5) 

Which two of the following are true regarding the configuration of RouterA? (Choose two.) 

A. At least 5 simultaneous remote connections are possible 

B. Only telnet protocol connections to RouterA are supported C. Remote connections to RouterA using telnet will succeed 

D. Console line connections will nevertime out due to inactivity 

E. Since DHCP is not used on Fa0/1 there is not a need to use the NAT protocol 

Answer: A,C 


Q86. - (Topic 7) 

By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled? 

A. 8 

B. 2 

C. 1 

D. 0 

Answer:


Q87. - (Topic 4) 

In the configuration of NAT, what does the keyword overload signify? 

A. When bandwidth is insufficient, some hosts will not be allowed to access network translation. 

B. The pool of IP addresses has been exhausted. 

C. Multiple internal hosts will use one IP address to access external network resources. 

D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool. 

Answer:

Explanation: 

The keyword overload.used in the ip nat inside source list 1 pool ovrld overload example command allows NAT to translate multiple inside devices to the single address in the pool. The types of NAT include: Static address translation (static NAT)—Allows one-to-one mapping between local and global addresses. Dynamic address translation (dynamic NAT)—Maps unregistered IP addresses to registered IP addresses from a pool of registered IP addresses. Overloading—Maps multiple unregistered IP addresses to a single registered IP address (many to one) using different ports. This method is also known as Port Address Translation (PAT). By using overloading, thousands of users can be connected to the Internet by using only one real global IP address. 


Q88. - (Topic 3) 

Refer to the exhibit. 

Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance? 

A. router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2 

B. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1 

C. router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2 

D. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5 

Answer:

Explanation: 

The default AD for a static route is 1. To change this, configure a different value to be used as the AD at the very end of the “ip route” statement. 


Q89. - (Topic 1) 

Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments? 

A. Physical 

B. Data-link 

C. Transport 

D. Network 

Answer:


Q90. - (Topic 1) 

Refer to the exhibit. 

What kind of cable should be used to make each connection that is identified by the numbers shown? 

A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable 

B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable 

C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable 

D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable 

E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable 

Answer:

Explanation: 

When connecting a PC to a switch, a standard Ethernet straight through cable should be used. This same cable should also be used for switch to router connections. Generally 

speaking, crossover cables are only needed when connecting two like devices (PC-PC, 

switch-switch, router-router, etc). 

Routers connect to frame relay and other WAN networks using serial cables. 

Rollover cables are special cables used for connecting to the console ports of Cisco 

devices.