we provide Tested Cisco icnd 100 105 braindumps which are the best for clearing icnd 100 105 test, and to get certified by Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0). The cisco 100 105 Questions & Answers covers all the knowledge points of the real 100 105 exam exam. Crack your Cisco 100 105 icnd1 Exam with latest dumps, guaranteed!

Q81. - (Topic 2) 

How many simultaneous Telnet sessions does a Cisco router support by default? 

A. 1 

B. 2 

C. 3 

D. 4 

E. 5 

F. 6 

Answer:

Explanation: 

By default, Cisco routers support virtual terminal interfaces 0-4 (5 total) which are used for telnet sessions. 


Q82. - (Topic 7) 

Refer to the exhibit. 

Which statement describes the effect of this configuration? 

A. The VLAN 10 VTP configuration is displayed. 

B. VLAN 10 spanning-tree output is displayed. 

C. The VLAN 10 configuration is saved when the router exits VLAN configuration mode. 

D. VLAN 10 is added to the VLAN database. 

Answer:


Q83. - (Topic 5) 

From which of the following attacks can Message Authentication Code (MAC) shield your network? 

A. DoS 

B. DDoS 

C. spoofing 

D. SYN floods 

Answer:

Explanation: 

Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks. MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes. A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack. A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks. In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies. 


Q84. - (Topic 7) 

Which statement about routing protocols is true? 

A. Link-state routing protocols choose a path by the number of hops to the destination. 

B. OSPF is a link-state routing protocol. 

C. Distance-vector routing protocols use the Shortest Path First algorithm. 

D. IS-IS is a distance-vector routing protocol. 

Answer:

Explanation: Link State Routing Protocols 

Link state protocols are also called shortest-path-first protocols. Link state routing protocols have a complete picture of the network topology. Hence they know more about the whole network than any distance vector protocol. Three separate tables are created on each link state routing enabled router. One table is used to hold details about directly connected neighbors, one is used to hold the topology of the entire internetwork and the last one is used to hold the actual routing table. Link state protocols send information about directly connected links to all the routers in the network. Examples of Link state routing protocols include OSPF - Open Shortest Path First and IS-IS - Intermediate System to Intermediate System. There are also routing protocols that are considered to be hybrid in the sense that they use aspects of both distance vector and link state protocols. EIGRP - Enhanced Interior Gateway Routing Protocol is one of those hybrid routing protocols. 


Q85. - (Topic 5) 

Refer to the exhibit. 

A person is trying to send a file from a host on Network A of the JAX Company to a server 

on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. 

Which command, issued from router RTA, would be the most useful for troubleshooting this problem? 

A. show flash: 

B. show history 

C. show version 

D. show interfaces 

E. show controllers serial 

Answer:

Explanation: 

The most useful thing to check on RTA would be the show interfaces command to see if the interface toward the WAN link is up. The most likely scenario is that the local LAN interface is up, but the other interface toward the XYZ company is down. 


Q86. - (Topic 4) 

The ip helper-address command does what? 

A. assigns an IP address to a host 

B. resolves an IP address from a DNS server 

C. relays a DHCP request across networks 

D. resolves an IP address overlapping issue 

Answer:

Explanation: 

http://cisconet.com/tcpip/dhcp/107-how-to-use-ip-helper-address-to-connect-remote-dhcp-

server.html 

When the DHCP client sends the DHCP request packet, it doesn’t have an IP address. So it uses the all-zeroes address, 0.0.0.0, as the IP source address. And it doesn’t know how to reach the DHCP server, so it uses a general broadcast address, 255.255.255.255, for the destination. So the router must replace the source address with its own IP address, for the interface that received the request. And it replaces the destination address with the address specified in the ip helper-address command. The client device’s MAC address is included in the payload of the original DHCP request packet, so the router doesn’t need to do anything to ensure that the server receives this information. The router then relays the DHCP request to the DHCP server. 


Q87. - (Topic 3) 

What is the subnet address for the IP address 172.19.20.23/28? 

A. 172.19.20.0 

B. 172.19.20.15 

C. 172.19.20.16 

D. 172.19.20.20 

E. 172.19.20.32 

Answer:

Explanation: 

From the /28 we can get the following: 

Increment: 16 (/28 = 11111111.11111111.11111111.11110000) 

Network address: 172.19.20.16 (because 16 < 23) 

Broadcast address: 172.16.20.31 (because 31 = 16 + 16 – 1) 


Q88. - (Topic 5) 

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? 

A. decrease the window size 

B. use a different source port for the session 

C. decrease the sequence number 

D. obtain a new IP address from the DHCP server 

E. start a new session using UDP 

Answer: A Explanation: 

The Window bit in the header determines the number of segments that can be sent at a time. This is done to avoid overwhelming the destination. At the start of the session the window in small but it increases over time. The destination host can also decrease the window to slow down the flow. Hence the window is called the sliding window. When the source has sent the number of segments allowed by the window, it cannot send any further segments till an acknowledgement is received from the destination. On networks with high error rates or issues, decreasing the window size can result in more reliable transmission, as the receiver will need to acknowledge fewer segments. With a large window size, the sender will need to resend all the frames if a single one is not received by the receiver. 


Q89. - (Topic 7) 

Under which circumstance should a network administrator implement one-way NAT? 

A. when the network must route UDP traffic 

B. when traffic that originates outside the network must be routed to internal hosts 

C. when traffic that originates inside the network must be routed to internal hosts 

D. when the network has few public IP addresses and many private IP addresses require outside access 

Answer:

Explanation: NAT operation is typically transparent to both the internal and external hosts. Typically the internal host is aware of the true IP address and TCP or UDP port of the external host. Typically the NAT device may function as the default gateway for the internal host. However the external host is only aware of the public IP address for the NAT device and the particular port being used to communicate on behalf of a specific internal host. 

NAT and TCP/UDP 

"Pure NAT", operating on IP alone, may or may not correctly parse protocols that are totally concerned with IP information, such as ICMP, depending on whether the payload is interpreted by a host on the "inside" or "outside" of translation. As soon as the protocol stack is traversed, even with such basic protocols as TCP and UDP, the protocols will break unless NAT takes action beyond the network layer. IP packets have a checksum in each packet header, which provides error detection only for the header. IP datagrams may become fragmented and it is necessary for a NAT to reassemble these fragments to allow correct recalculation of higher-level checksums and correct tracking of which packets belong to which connection. The major transport layer protocols, TCP and UDP, have a checksum that covers all the data they carry, as well as the TCP/UDP header, plus a "pseudo-header" that contains the source and destination IP addresses of the packet carrying the TCP/UDP header. For an originating NAT to pass TCP or UDP successfully, it must recompute the TCP/UDP header checksum based on the translated IP addresses, not the original ones, and put that checksum into the TCP/UDP header of the first packet of the fragmented set of packets. The receiving NAT must recompute the IP checksum on every packet it passes to the destination host, and also recognize and recompute the TCP/UDP header using the retranslated addresses and pseudo-header. This is not a completely solved problem. One solution is for the receiving NAT to reassemble the entire segment and then recompute a checksum calculated across all packets. The originating host may perform Maximum transmission unit (MTU) path discovery to determine the packet size that can be transmitted without fragmentation, and then set the don't fragment (DF) bit in the appropriate packet header field. Of course, this is only a one-way solution, because the responding host can send packets of any size, which may be fragmented before reaching the NAT. 


Q90. - (Topic 4) 

What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT? 

A. The router uses the same IP address but a different TCP source port number for each connection. 

B. An IP address is assigned based on the priority of the computer requesting the connection. 

C. The router selects an address from a pool of one-to-one address mappings held in the lookup table. 

D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection. 

Answer:

Reference: 

http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_staticpat.html 

Static PAT translations allow a specific UDP or TCP port on a global address to be translated to a specific port on a local address. That is, both the address and the port numbers are translated. 

Static PAT is the same as static NAT, except that it enables you to specify the protocol (TCP or UDP) and port for the real and mapped addresses. Static PAT enables you to identify the same mapped address across many different static statements, provided that the port is different for each statement. You cannot use the same mapped address for multiple static NAT statements. 

Port Address Translation makes the PC connect to the Internet but using different TCP source port.