It is more faster and easier to pass the Cisco ccent ccna icnd1 100 105 official cert guide exam by using Validated Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) questuins and answers. Immediate access to the Most up-to-date icnd 100 105 Exam and find the same core area 105 100 questions with professionally verified answers, then PASS your exam with a high score now.
Q11. - (Topic 3)
On a live network, which commands will verify the operational status of router interfaces? (Choose two.)
A. Router# show interfaces
B. Router# show ip protocols
C. Router# debug interface
D. Router# show ip interface brief
E. Router# show start
Answer: A,D
Explanation:
Only two commands “show interfaces” and “show ip interface brief” reveal the status of router interfaces (up/up, for example).
Q12. - (Topic 1)
Refer to the exhibit.
Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: B
Explanation:
The Source and Destination IP address is not going to change. Host 1 IP address will stay
as being the source IP and the Host 2 IP address will stay the destination IP address.
Those two are not going to change.
For the MAC address it is going to change each time it goes from one hope to another.
(Except switches... they don't change anything)
Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of
Router 1.
Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address.
Q13. - (Topic 4)
In the configuration of NAT, what does the keyword overload signify?
A. When bandwidth is insufficient, some hosts will not be allowed to access network translation.
B. The pool of IP addresses has been exhausted.
C. Multiple internal hosts will use one IP address to access external network resources.
D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.
Answer: C
Explanation:
The keyword overload.used in the ip nat inside source list 1 pool ovrld overload example command allows NAT to translate multiple inside devices to the single address in the pool. The types of NAT include: Static address translation (static NAT)—Allows one-to-one mapping between local and global addresses. Dynamic address translation (dynamic NAT)—Maps unregistered IP addresses to registered IP addresses from a pool of registered IP addresses. Overloading—Maps multiple unregistered IP addresses to a single registered IP address (many to one) using different ports. This method is also known as Port Address Translation (PAT). By using overloading, thousands of users can be connected to the Internet by using only one real global IP address.
Q14. - (Topic 3)
Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?
A. 192.168.1.8/29
B. 192.168.1.32/27
C. 192.168.1.40/29
D. 192.168.1.16/28
E. 192.168.1.48/29
Answer: C
Explanation:
248 mask uses 5 bits (1111 1000)
42 IP in binary is (0010 1010)
The base subnet therefore is the lowest binary value that can be written without changing
the output of an AND operation of the subnet mask and IP...
1111 1000 AND
0010 1010 equals
0010 1000 - which is .40
/24 is standard class C mask.
Adding the 5 bits from the .248 mask gives /29
Q15. - (Topic 1)
How does TCP differ from UDP? (Choose two.)
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.
Answer: B,D
Explanation:
Because TCP is a connection-oriented protocol responsible for ensuring the transfer of a datagram from the source to destination machine (end-to-end communications), TCP must receive communications messages from the destination machine to acknowledge receipt of the datagram. The term virtual circuit is usually used to refer to the handshaking that goes on between the two end machines, most of which are simple acknowledgment messages (either confirmation of receipt or a failure code) and datagram sequence numbers. Rather than impose a state within the network to support the connection, TCP uses synchronized state between the two endpoints. This synchronized state is set up as part of an initial connection process, so TCP can be regarded as a connection-oriented protocol. Much of the protocol design is intended to ensure that each local state transition is communicated to, and acknowledged by, the remote party.
Reference: http://en.wikibooks.org/wiki/Communication_Networks/TCP_and_UDP_Protocols
Q16. - (Topic 3)
Refer to the exhibit.
Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?
A. router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2
B. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1
C. router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2
D. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
Answer: D
Explanation:
The default AD for a static route is 1. To change this, configure a different value to be used as the AD at the very end of the “ip route” statement.
Q17. - (Topic 5)
What is the effect of using the service password-encryption command?
A. Only the enable password will be encrypted.
B. Only the enable secret password will be encrypted.
C. Only passwords configured after the command has been entered will be encrypted.
D. It will encrypt the secret password and remove the enable secret password from the
configuration.
E. It will encrypt all current and future passwords.
Answer: E
Explanation:
Encryption further adds a level of security to the system as anyone having access to the database of passwords cannot reverse the process of encryption to know the actual passwords which isn’t the case if the passwords are stored simply.
Q18. - (Topic 4)
When configuring NAT, the Internet interface is considered to be what?
A. local
B. inside
C. global
D. outside
Answer: D
Explanation:
The first step to deploy NAT is to define NAT inside and outside interfaces. You may find it easiest to define your internal network as inside, and the external network as outside. However, the terms internal and external are subject to arbitration as well. This figure shows an example of this.
2a.gif
Reference: http://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/13772-12.html#topic2
Q19. - (Topic 7)
Which device allows users to connect to the network using a single or double radio?
A. access point
B. switch
C. wireless controller
D. firewall
Answer: A
Q20. - (Topic 1)
Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?
A. HTTP
B. IP
C. TCP
D. Telnet
E. UDP
Answer: E
Explanation:
UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams. A source host that needs reliable communication must use either TCP or a program that provides its own sequencing and acknowledgment services.