Examcollection offers free demo for icnd 100 105 exam. "Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)", also known as 100 105 icnd1 exam, is a Cisco Certification. This set of posts, Passing the Cisco ccna 100 105 pdf exam, will help you answer those questions. The 105 100 Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco 100 105 icnd1 v3 0 exams and revised by experts!
Q31. - (Topic 3)
The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements.
Which three items will adequately fulfill the request? (Choose three).
A. One IP subnet with a mask of 255.255.254.0
B. Two IP subnets with a mask of 255.255.255.0
C. Seven 48-port hubs
D. Seven 48-port switches
E. One router interface
F. Seven router interfaces
To support 300 workstations in a single broadcast domain, we need to use a subnet mask
which supports 512 hosts = 29-> /23 or 255.255.254.0 in decimal form -> A is correct.
If we use 48-port switches we need 300/48 = 6.25 -> seven 48-port switches are enough
because we also need trunking between them -> D is correct.
We only need one router interface and it is connected with one of seven switches -> E is
Q32. - (Topic 2)
Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.)
A. a bridge
B. a router
C. a hub
D. a Layer 3 switch
E. an access point
Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms.
Q33. - (Topic 5)
What is the subnet broadcast address of the LAN connected to Router1?
The IP address assigned to FA0/1 is 192.168.8.9/29, making 192.168.8.15 the broadcast address.
Q34. - (Topic 1)
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?
The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch. Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting the network. CDP messages are generated every 60 seconds as multicast messages on each of its active interfaces. The information shared in a CDP packet about a Cisco device includes the following: Name of the device configured with the hostname command IOS software version Hardware capabilities, such as routing, switching, and/or bridging Hardware platform, such as 2600, 2950, or 1900 The layer-3 address(es) of the device The interface the CDP update was generated on
Q35. - (Topic 5)
Refer to the exhibit.
The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.)
A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.
B. Ensure that cables A and B are straight-through cables.
C. Ensure cable A is plugged into a trunk port.
D. Ensure the switch has power.
E. Reboot all of the devices.
F. Reseat all cables.
The ports on the switch are not up indicating it is a layer 1 (physical) problem so we should check cable type, power and how they are plugged in.
Q36. - (Topic 7)
Which method does a connected trunk port use to tag VLAN traffic?
A. IEEE 802 1w
B. IEEE 802 1D
C. IEEE 802 1Q
D. IEEE 802 1p
Q37. - (Topic 7)
Which value is indicated by the next hop in a routing table?
A. preference of the route source
B. IP address of the remote router for forwarding the packets
C. how the route was learned
D. exit interface IP address for forwarding the packets
The routing table contains network/next hop associations. These associations tell a router that a particular destination can be optimally reached by sending the packet to a specific router that represents the "next hop" on the way to the final destination. The next hop association can also be the outgoing or exit interface to the final destination.
Q38. - (Topic 7)
Which device allows users to connect to the network using a single or double radio?
A. access point
C. wireless controller
Q39. - (Topic 5)
Refer to the exhibit.
A network administrator has configured a Catalyst 2950 switch for remote management by pasting into the console the configuration commands that are shown in the exhibit. However, a Telnet session cannot be successfully established from a remote host. What should be done to fix this problem?
A. Change the first line to interface fastethernet 0/1.
B. Change the first line to interface vlan 0/1.
C. Change the fifth line to ip default-gateway 192.168.17.241.
D. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1.
E. Change the sixth line to line con 0.
The default gateway must reside on the same IP subnet as the device. Here, the subnet mask for the VLAN interface is /228. Only choice C will fix this issue, as then the default gateway is on the same subnet as the 2950.
Q40. - (Topic 5)
What should be part of a comprehensive network security plan?
A. Allow users to develop their own approach to network security.
B. Physically secure network equipment from potential access by unauthorized individuals.
C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E. Minimize network overhead by deactivating automatic antivirus client updates.
From Cisco CCENT Exam Essentials study guide by Todd Lammle:
Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals.
List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations.
CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition
by Todd Lammle
Published by Sybex, 2013