Cause all that matters here is passing the Cisco ccna 100 105 exam. Cause all that you need is a high score of cisco 100 105 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam. The only one thing you need to do is downloading Exambible icnd 100 105 exam study guides now. We will not let you down with our money-back guarantee.

Q61. - (Topic 1) 

Which two statements describe the operation of the CSMA/CD access method? (Choose two.) 

A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. 

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. 

C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method. 

D. After a collision, the station that detected the collision has first priority to resend the lost data. 

E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. 

F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data. 

Answer: B,E 

Explanation: 

Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn’t stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out. 


Q62. - (Topic 2) 

Refer to the exhibit. 

All devices attached to the network are shown. How many collision domains are present in this network? 

A. 2 

B. 3 

C. 6 

D. 9 

E. 15 

Answer:

Explanation: 

A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain. Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15. 


Q63. - (Topic 2) 

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)? 

A. 4, 48 

B. 48, 4 

C. 48, 1 

D. 1, 48 

E. 4, 1 

Answer:

Explanation: 

A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain. 

Topic 3, Routing Fundamentals 


Q64. - (Topic 1) 

Refer to the exhibit. 

What must be configured to establish a successful connection from Host A to switch SW-A through router RT-A? 

A. VLAN 1 on RT-A 

B. IP routing on SW-A 

C. default gateway on SW-A 

D. crossover cable connecting SW-A and RT-A 

Answer:

Explanation: 

In order for the switch to reach networks that are not local, such as networks attached to different interfaces of the router, it will need to set its default gateway to be the IP address of the attached router. 


Q65. - (Topic 3) 

How many bits are contained in each field of an IPv6 address? 

A. 24 

B. 4 

C. 8 

D. 16 

Answer:

Explanation: 

One of the key advantages IPv6 brings is the exponentially larger address space. The 

following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf 


Q66. - (Topic 3) 

Which command is used to display the collection of OSPF link states? 

A. show ip ospf link-state 

B. show ip ospf lsa database 

C. show ip ospf neighbors 

D. show ip ospf database 

Answer:

Explanation: 

The “show ip ospf database” command displays the link states. Here is an example: 

Here is the lsa database on R2. 

R2#show ip ospf database 

OSPF Router with ID (2.2.2.2) (Process ID 1) 

Router Link States (Area 0) 

Link ID ADV Router Age Seq# Checksum Link count 

2.2.2.2 2.2.2.2 793 0x80000003 0x004F85 2 

10.4.4.4 10.4.4.4 776 0x80000004 0x005643 1 

111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA 2 

133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0) Link ID ADV Router Age Seq# Checksum10.1.1.1 111.111.111.111 794 0x80000001 0x001E8B 

10.2.2.3 133.133.133.133 812 0x80000001 0x004BA9 

10.4.4.1 111.111.111.111 755 0x80000001 0x007F16 

10.4.4.3 133.133.133.133 775 0x80000001 0x00C31F 


Q67. - (Topic 3) 

Identify the four valid IPv6 addresses. (Choose four.) 

A. :: 

B. ::192:168:0:1 

C. 2000:: 

D. 2001:3452:4952:2837:: 

E. 2002:c0a8:101::42 

F. 2003:dead:beef:4dad:23:46:bb:101 

Answer: A,B,E,F 

Explanation: 

http://www.intermapper.com/ipv6validator http://www.ripe.net/lir-services/new-lir/ipv6_reference_card.pdf 


Q68. - (Topic 1) 

Refer to the exhibit. 

The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router? 

A. 10.1.0.1 

B. 10.1.0.5 

C. 10.1.0.6 

D. 10.1.0.14 

E. 10.1.1.16 

F. 10.1.2.8 

Answer:

Explanation: 

Although the source and destination MAC address will change as a packet traverses a network, the source and destination IP address will not unless network address translation (NAT) is being done, which is not the case here. 


Q69. - (Topic 3) 

Which statement about IPv6 is true? 

A. Addresses are not hierarchical and are assigned at random. 

B. Only one IPv6 address can exist on a given interface. 

C. There are 2.7 billion addresses available. 

D. Broadcasts have been eliminated and replaced with multicasts. 

Answer:

Explanation: 

IPv6 has three types of addresses, which can be categorized by type and scope: 

Unicast addresses. A packet is delivered to one interface. 

Multicast addresses. A packet is delivered to multiple interfaces. 

Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of 

routing distance). 

IPv6 does not use broadcast messages. 

Unicast and anycast addresses in IPv6 have the following scopes (for multicast addresses, 

the scope are built into the address structure): 

Link-local. The scope is the local link (nodes on the same subnet). 

Site-local. The scope is the organization (private site addressing). 

Global. The scope is global (IPv6 Internet addresses). 

In addition, IPv6 has special addresses such as the loopback address. The scope of a 

special address depends on the type of special address. 

Much of the IPv6 address space is unassigned. 

http://technet.microsoft.com/en-us/library/cc757359(v=ws.10).aspx 


Q70. - (Topic 1) 

Which protocol uses a connection-oriented service to deliver files between end systems? 

A. TFTP 

B. DNS 

C. FTP 

D. SNMP 

E. RIP 

Answer:

Explanation: 

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established--the caller must know the person's telephone number and the phone must be answered--before the message can be delivered. TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release. Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp.