ICND Interconnecting Cisco Networking Devices Part 1 v1.0 (100-105)

Page:    1 / 48   
Total 714 questions

Refer to the exhibit.


A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three.)

  • A. Area 2 contains a Layer 2 device.
  • B. Network Device B is a hub.
  • C. Network Device A is a hub.
  • D. Network Device A is a switch.
  • E. Area 1 contains a Layer 2 device.
  • F. Network Device B is a switch.


Answer : BDE

Explanation:
Switches use a separate collision domain for each port, so device A must be a switch. Hubs, however, place all ports in the same collision domain so device B is a hub. Switches reside in layer 2 while hubs are layer 1 devices.

Which two things does a router do when it forwards a packet? (Choose two.)

  • A. determines the next hop on the path
  • B. switches the packet to the appropriate outgoing interfaces
  • C. computes the destination host address
  • D. forwards ARP requests
  • E. updates the destination IP address


Answer : AB

Explanation:
Without following these two processes namely switching the packet to appropriate interface and telling the packet where to go by providing it with a destination IP address, the purpose of the same would not be solved.

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

  • A. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
  • B. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
  • C. After a collision, the station that detected the collision has first priority to resend the lost data.
  • D. The use of hubs to enlarge the size of collision domain is one way to improve the operation of the CSMA/CD access method.
  • E. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
  • F. In a CSMA/CD collision domain, stations must wait until media is not in use before transmitting.


Answer : AF

Explanation:
Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn't stop there.
The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out.

Which set of conditions comprises a successful ping attempt between two connected routers configured with IP addresses on the same subnet?

  • A. The destination host receives an echo reply from the source host within one second and the source host receives an echo request from the destination host.
  • B. The destination host receives an echo request from the source host within one second.
  • C. The destination host receives an echo reply from the source host within one second and the source host receives an echo reply from the destination host within two seconds.
  • D. The destination host receives an echo request from the source host and the source host receives an echo request from the destination host within one second.
  • E. The destination host receives an echo request from the source host and the source host receives an echo reply from the destination host within two seconds. E


Answer : Explanation

Which NTP concept indicates the distance between a device and the reliable time source?

  • A. clock offset
  • B. stratum
  • C. reference
  • D. dispersion


Answer : B

Which statement is a Cisco best practice for switch port security?

  • A. Vacant switch ports must be shut down.
  • B. Empty ports must be enabled in VLAN 1.
  • C. VLAN 1 must be configured as the native VLAN.
  • D. Err-disabled ports must be configured to automatically re-enable.


Answer : A

Which statement about unique local IPv6 addresses is true?

  • A. Summarization is not supported.
  • B. They require all prefixes to be unique.
  • C. Their global IDs are assigned sequentially.
  • D. They are routable to the public Internet.


Answer : B

Which three statements accurately describe CDP? (Choose three.)

  • A. CDP can discover Cisco devices that are not directly connected.
  • B. CDP is a network layer protocol.
  • C. CDP can discover directly connected neighboring Cisco devices.
  • D. CDP is a datalink layer protocol.
  • E. CDP is a Cisco proprietary protocol.
  • F. CDP is an IEEE standard protocol.


Answer : CDE

Explanation:
CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices containing useful info for troubleshooting and documenting the network.

Which statement describes the effect of the overload keyword in the ip nat inside source list 90 interface ethernet 0/0 overload command?

  • A. Addresses that match access list inside are translated to the IP address of the Ethernet 0/0 interface.
  • B. Hosts that match access list inside are translated to an address in the Ethernet 0/0 network.
  • C. Hosts on the Ethernet 0/0 LAN are translated to the address pool in access list 90.
  • D. Addresses that match access list 90 are translated through PAT to the IP address of the Ethernet 0/0 interface.


Answer : D

Refer to the exhibit.


The two routers have had their startup configurations cleared and have been restarted. At a minimum, which option below must the administrator do to enable
CDP to exchange information between R1 and R2?

  • A. Configure the router with the cdp enable command.
  • B. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces.
  • C. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces.
  • D. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces.


Answer : D

Explanation:
If the no shutdown commands are not entered, then CDP cannot exchange information between the two routers.

On a live network, which two commands will verify the operational status of router interfaces? (Choose two.)

  • A. Router# show ip interface brief
  • B. Router# debug interface
  • C. Router# show ip protocols
  • D. Router# show interfaces
  • E. Router# show start


Answer : AD

Explanation:
Both these commands will show the current status of the interfaces, either in show or debug mode both will display the information.

Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.)

  • A. a Layer 3 switch
  • B. a hub
  • C. a bridge
  • D. an access point
  • E. a router


Answer : AE

Explanation:
Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms.

Which technique can you use to route IPv6 traffic over an IPv4 infrastructure?

  • A. NAT
  • B. 6to4 tunneling
  • C. L2TPv3
  • D. dual-stack


Answer : B

Which NAT command can be applied to an interface?

  • A. ip nat inside
  • B. ip nat inside test access-list-number pool pool-name
  • C. ip nat inside source static 10.10.10.0 10.10.10.50
  • D. ip nat pool test 10.10.10.0 10.10.10.50 255.255.255.0 A


Answer : Explanation


















Examine the DHCP configuration between R2 and R3; R2 is configured as the DHCP server and R3 as the client. What is the reason R3 is not receiving the IP address via DHCP?

  • A. On R2, the network statement in the DHCP pool configuration is incorrectly configured.
  • B. On R3, DHCP is not enabled on the interface that is connected to R2.
  • C. On R2, the interface that is connected to R3 is in shutdown condition.
  • D. On R3, the interface that is connected to R2 is in shutdown condition.


Answer : B

Explanation:
First we should check which interface on R3 that is connected to R2 via the "show run" command.


From the description we learn interface E0/1 is connected to R2. Use the "show ip interface brief" command to verify the IP address of this interface.

Therefore, we can conclude this interface does not have any IP address and there is no configuration on this interface (except the "description Link to R2" line).
If R3 wants to receive an IP address from R2 via DHCP, interface E0/1 should be configured with the command "ip address dhcp" so the answer "DHCP is not enabled on this interface" is correct.

Page:    1 / 48   
Total 714 questions