[2017 New] Lead2pass 100-105 Dumps PDF Free Download (161-180)

2017 June Cisco Official New Released 100-105 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

The Cisco 100-105 PDF, 100-105 VCE and 100-105 exam questions and answers at Lead2pass are written and prepared by Cisco affiliated trainers and lecturers with decades of experience in the IT field. This ensures that you are equipped with the latest and most current information to give you a better chance of passing the Cisco 100-105 exam.

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/100-105.html

QUESTION 161
Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)

 

A.    It ensures that data will be forwarded by RouterB.
B.    It provides stability for the OSPF process on RouterB.
C.    It specifies that the router ID for RouterB should be 10.0.0.1.
D.    It decreases the metric for routes that are advertised from RouterB.
E.    It indicates that RouterB should be elected the DR for the LAN.

Answer: BC
Explanation:
A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) – The router-ID is chosen in the order below:
+ The highest IP address assigned to a loopback (logical) interface. + If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.
-> The loopback interface will be chosen as the router ID of RouterB –

QUESTION 162
Which characteristics are representative of a link-state routing protocol? (Choose three.)

A.    provides common view of entire topology
B.    exchanges routing tables with neighbors
C.    calculates shortest path
D.    utilizes event-triggered updates
E.    utilizes frequent periodic updates

Answer: ACD
Explanation:
Each of routers running link-state routing protocol learns paths to all the destinations in its “area” so we can say although it is a bit unclear.
Link-state routing protocols generate routing updates only (not the whole routing table) when a change occurs in the network topology so
Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -> . Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state routing protocol utilizes event-triggered updates (only sends update when a change occurs) ->

QUESTION 163
Refer to the exhibit. The network is converged.After link-state advertisements are received from Router_A, what information will Router_E contain in its routing table for the subnets 208.149.23.64 and 208.149.23.96?

 

A.    208.149.23.64[110/13] via 190.173.23.10, 00:00:07, FastEthemet0/0 208.149.23.96[110/13] via
190.173.23.10, 00:00:16, FastEthemet0/0
B.    208.149.23.64[110/1] via 190.172.23.10, 00:00:07, Serial1/0 208.149.23.96[110/3] via 190.173.23.10,
00:00:16, FastEthemet0/0
C.    208.149.23.64[110/13] via 190.173.23.10, 00:00:07, Serial1/0 208.149.23.96[110/13] via 190.173.23.10,
00:00:16, Serial1/0 208.149.23.96[110/13] via 190.173.23.10, 00:00:16, FastEthemet0/0
D.    208.149.23.64[110/3] via 190.172.23.10, 00:00:07, Serial1/0 208.149.23.96[110/3] via 190.173.23.10,
00:00:16, Serial1/0

Answer: A
Explanation:
Router_E learns two subnets subnets 208.149.23.64 and 208.149.23.96 via Router_A through FastEthernet interface. The interface cost is calculated with the formula 108 / Bandwidth. For FastEthernet it is 108 / 100 Mbps = 108 / 100,000,000 = 1.
Therefore the cost is 12 (learned from Router_A) + 1 = 13 for both subnets ->
The cost through T1 link is much higher than through T3 link (T1 cost = 108 / 1.544 Mbps = 64; T3 cost = 108 / 45 Mbps = 2) so surely OSPF will choose the path through T3 link -> Router_E will choose the path from Router_A through FastEthernet0/0, not Serial1/0.
In fact, we can quickly eliminate answers B, C and D because they contain at least one subnet learned from Serial1/0 -> they are surely incorrect.

QUESTION 164
What information can be used by a router running a link-state protocol to build and maintain its topological database? (Choose two.)

A.    hello packets
B.    SAP messages sent by other routers
C.    LSAs from other routers
D.    beacons received on point-to-point links
E.    routing tables received from other link-state routers
F.    TTL packets from designated routers

Answer: AC

QUESTION 165
Lab Simulation – CLI Configuration

  
Attention:
In practical examinations, please note the following, the actual information will prevail.
1. Name of the router is xxx
2. Enable. secret password is xxx
3. Password In access user EXEC mode using the console is xxx
4. The password to allow telnet access to the router is xxx
5. IP information

Answer:

Router>enable
Router#config terminal
Router(config)#hostname Gotha
Gotha(config)#enable secret mi222ke
Gotha(config)#line console 0
Gotha(config-line)#password G8tors1
Gotha(config-line)#exit
Gotha(config)#line vty 0 4
Gotha(config-line)#password dun63lap
Gotha(config-line)#login
Gotha(config-line)#exit
Gotha(config)#interface fa0/0
Gotha(config-if)#no shutdown
Gotha(config-if)#ip address 209.165.201.4 255.255.255.224
Gotha(config)#interface s0/0/0
Gotha(config-if)#ip address 192.0.2.190 255.255.255.240
Gotha(config-if)#no shutdown
Gotha(config-if)#exit
Gotha(config)#router rip
Gotha(config-router)#version 2
Gotha(config-router)#network 209.165.201.0
Gotha(config-router)#network 192.0.2.176
Gotha(config-router)#end
Gotha#copy run start

QUESTION 166
Lab Simulation – OSPF

 

Answer:
The question mentioned Boston router was not configured correctly or incomplete so we should check this router first. Click on PC-B to access the command line interface (CLI) of Boston router.

Boston>enable (type cisco as its password here)
Boston#show running-config
 
First, remember that the current OSPF Process ID is 2 because we will need it for later configuration. Next notice that in the second “network” command the network and wildcard mask are 192.168.155.0 and 0.0.0.3 which is equivalent to 192.168.155.0 255.255.255.252 in term of subnet mask. Therefore this subnetwork’s range is from 192.168.155.0 to 192.168.155.3 but the ip address of s0/0 interface of Boston router is192.168.155.5 which don’t belong to this range -> this is the reason why OSPF did not recognize s0 interface of Boston router as a part of area 0. So we need to find a subnetwork that s0 interface belongs to.
IP address of S0 interface: 192.168.155.5/30
Subnet mask: /30 = 1111 1111.1111 1111.1111 1111.1111 1100
Increment: 4
Network address (which IP address of s0 interface belongs to):
192.168.155.4 (because 4 * 1 = 4 < 5)
Therefore we must use this network instead of 192.168.155.0 network

Boston#configure terminal
Boston(config)#router ospf 2
Boston(config-router)#no network 192.168.155.0 0.0.0.3 area 0
Boston(config-router)#network 192.168.155.4 0.0.0.3 area 0
Boston(config-router)#end
Boston#copy running-config startup-config

Finally, you should issue a ping command from Boston router to Lancaster router to make sure it works well.

Boston#ping 192.168.43.1

QUESTION 167
This topology contains 3 routers and 1 switch. Complete the topology.

Drag the appropriate device icons to the labeled Device
Drag the appropriate connections to the locations labeled Connections.
Drag the appropriate IP addresses to the locations labeled IP address

(Hint: use the given host addresses and Main router information)
To remove a device or connection, drag it away from the topology.
Use information gathered from the Main router to complete the configuration of any
additional routers. No passwords are required to access the Main router. The config
terminal command has been disabled for the HQ router. The router does not require
any configuration.
Configure each additional router with the following:

Configure the interfaces with the correct IP address and enable the interfaces.
Set the password to allow console access to consolepw
Set the password to allow telnet access to telnetpw
Set the password to allow privilege mode access to privpw

Note: Because routes are not being added to the configurations, you will not be able
to ping through the internetwork.
All devices have cable autosensing capabilities disabled.
All hosts are PC’s
 

Answer:

 

Explanation:
(1) Configure two routers on the left and right with these commands:

Router1 = router on the left

(2) Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces:

Router1>enable
Router1#configure terminal
Router1(config)#interface fa0/0
Router1(config-if)#ip address 192.168.152.190 255.255.255.240
Router1(config-if)#no shutdown

Router1(config-if)#interface fa0/1
Router1(config-if)#ip address 192.168.152.142 255.255.255.240
Router1(config-if)#no shutdown

(3) Set passwords (configure on two routers)

+ Console password:

Router1(config-if)#exit
Router1(config)#line console 0
Router1(config-line)#password consolepw
Router1(config-line)#login
Router1(config-line)#exit

+ Telnet password:

Router1(config)#line vty 0 4
Router1(config-line)#password telnetpw
Router1(config-line)#login
Router1(config-line)#exit

+ Privilege mode password:

Router1(config)#enable password privpw

Save the configuration:

Router1(config)#exit
Router1#copy running-config startup-config

(4) Configure IP addresses of Router2 (router on the right)

Router2>enable
Router2#configure terminal
Router2(config)#interface fa0/0
Router2(config-if)#ip address 192.168.152.238 255.255.255.240
Router2(config-if)#no shutdown

Router2(config-if)#interface serial0/0
Router2(config-if)#ip address 192.168.152.174 255.255.255.240
Router2(config-if)#no shutdown

QUESTION 168
To what type of port would a cable with a DB-60 connector attach?

A.    Serial port
B.    Console port
C.    Ethernet port
D.    Fibre optic port

Answer: A

QUESTION 169
A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.)

 

A.    A crossover cable should be used in place of the straight-through cable.
B.    A rollover cable should be used in place of the straight-through cable.
C.    The subnet masks should be set to 255.255.255.192
D.    A default gateway needs to be set on each host.
E.    The hosts must be reconfigured to use private IP addresses for direct connections of this type.
F.    The subnet masks should be set to 255.255.255.0

Answer: AF

QUESTION 170
Refer to the exhibit. What kind of cable should be used to make each connection that is identified by the numbers shown?

 

A.    1 – Ethernet Crossover cable
2 – Ethernet straight-through cable
3 – Fiber Optic cable
4 – Rollover cable
B.    1 – Ethernet straight-through cable
2 – Ethernet straight-through cable
3 – Serial cable
4 – Rollover cable
C.    1 – Ethernet rollover cable
2 – Ethernet crossover cable
3 – Serial cable
4 – Null-modem cable
D.    1 – Ethernet straight-through cable
2 – Ethernet Crossover cable
3 – Serial cable
4 – Rollover cable
E.    1 – Ethernet straight-through cable
2 – Ethernet Crossover cable
3 – Serial cable
4 – Ethernet Straight-through cable

Answer: B

QUESTION 171
Which of the following are types of flow control? (Choose three.)

A.    buffering
B.    cut-through
C.    windowing
D.    congestion avoidance
E.    load balancing

Answer: ACD
Explanation:
http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php
During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called “Congestion”.
Buffering
The Technie is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called “Buffering”.
Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup.
This is done so that the sending device doesn’t overflow the receiving device’s buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increase it to say 5 for example. Windowing is used only by TCP since UDP doesn’t use or allow flow control.

QUESTION 172
How many simultaneous Telnet sessions does a Cisco router support by default?

A.    1
B.    2
C.    3
D.    4
E.    5
F.    6

Answer: E

QUESTION 173
What is the purpose of flow control?

A.    To ensure data is retransmitted if an acknowledgement is not received.
B.    To reassemble segments in the correct order at the destination device.
C.    To provide a means for the receiver to govern the amount of data sent by the sender.
D.    To regulate the size of each segment.

Answer: C
Explanation:
http://whatis.techtarget.com/definition/flow-control Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. For serial data transmission locally or in a network, the Xon/Xoff protocol can be used. For modem connections, either Xon/Xoff or CTS/RTS (Clear to Send/Ready to Send) commands can be used to control data flow. In a network, flow control can also be applied by refusing additional device connections until the flow of traffic has subsided.

QUESTION 174
Refer to the exhibit. How many collision domains are shown?

 

A.    one
B.    two
C.    three
D.    four
E.    six
F.    twelve

Answer: B
Explanation:
Hubs create single collision and broadcast domains.

QUESTION 175
Which IP address is a private address?

A.    12.0.0.1
B.    168.172.19.39
C.    172.20.14.36
D.    172.33.194.30
E.    192.169.42.34

Answer: C
Explanation:

 

QUESTION 176
Which statement is true?

A.    An IPv6 address is 64 bits long and is represented as hexadecimal characters.
B.    An IPv6 address is 32 bits long and is represented as decimal digits.
C.    An IPv6 address is 128 bits long and is represented as decimal digits.
D.    An IPv6 address is 128 bits long and is represented as hexadecimal characters.

Answer: D
Explanation:
http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf
One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6.
128-bit-long addresses
Represented in hexadecimal format:
Uses CIDR principles: prefix/prefix length
x:x:x:x:x:x:x:x, where x is a 16-bit hex field
The last 64 bits are used for the interface ID

QUESTION 177
If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?

A.    1024
B.    2046
C.    4094
D.    4096
E.    8190

Answer: C
Explanation:
Each octet represents eight bits. The bits, in turn, represent (from left to right): 128, 64, 32 , 16 , 8, 4, 2, 1
Add them up and you get 255. Add one for the all zeros option, and the total is 256. Now take away one of these for the network address (all zeros) and another for the broadcast address (all ones). Each octet represents 254 possible hosts. Or 254 possible networks. Unless you have subnet zero set on your network gear, in which case you could conceivably have 255.
The CIDR addressing format (/20) tells us that 20 bits are used for the network portion, so the maximum number of networks are 2^20 minus one if you have subnet zero enabled, or minus 2 if not.
You asked about the number of hosts. That will be 32 minus the number of network bits, minus two. So calculate it as (2^(32-20))-2, or (2^12)-2 = 4094

QUESTION 178
Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? (Choose three.)

A.    An IPv6 address is divided into eight 16-bit groups.
B.    A double colon (::) can only be used once in a single IPv6 address.
C.    IPv6 addresses are 196 bits in length.
D.    Leading zeros cannot be omitted in an IPv6 address.
E.    Groups with a value of 0 can be represented with a single 0 in IPv6 address.

Answer: ABE
Explanation:
IPv6 addresses are divided into eight 16-bit groups, a double colon (::) can only be used once in an IPv6 address, and groups with a value of 0 can be represented with a single 0 in an IPv6 address.
The following statements are also true regarding IPv6 address:
IPv6 addresses are 128 bits in length.
Eight 16-bit groups are divided by a colon (:).
Multiple groups of 16-bit 0s can be represented with double colon (::).
Double colons (::) represent only 0s.
Leading zeros can be omitted in an IPv6 address.
The option stating that IPv6 addresses are 196 bits in length is incorrect. IPv6 addresses are 128 bits in length.
The option stating that leading zeros cannot be omitted in an IPv6 address is incorrect.
Leading zeros can be omitted in an IPv6 address.

QUESTION 179
Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose two.)

A.    10.6.8.35
B.    133.6.5.4
C.    192.168.5.9
D.    127.0.0.1
E.    190.6.5.4

Answer: BE
Explanation:
The IP addresses 133.6.5.4 and 190.6.5.4 are both valid Class B addresses when a default mask is in use.
The Class B default mask is 255.255.0.0 and the range of valid addresses is 128.0.0.0- 191.255.255.255.
The IP address 10.6.8.35 is a Class A address. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 – 127.255.255.255, with the exception of the range 127.0.0.1 – 127.255.255.255, which is reserved and cannot be assigned. The IP address 192.168.5.9 is a Class C address. The Class C default mask is 255.255.255.0 and the range of valid addresses is 192.0.0.0 – 223.255.255.255. The IP address 127.0.0.1 is a Class A address, but it comes from a reserved portion that cannot be assigned.
The range 127.0.0.1 – 127.255.255.255 is used for diagnostics, and although any address in the range will work as a diagnostic address, 127.0.0.1 is known as the loopback address. If you can ping this address, or any address in the 127.0.0.1 – 127.255.255.255 range, then the NIC is working and TCP/IP is installed. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 – 127.255.255.255, with the exception of the range 127.0.0.1 – 127.255.255.255, which is reserved and cannot be assigned.

 

QUESTION 180
How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?

Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224
Router(config)#ip nat inside source list 9 pool TAME

A.    7
B.    8
C.    9
D.    10
E.    24
F.    32

Answer: B
Explanation:
209.165.201.23 to 209.165.201.30 provides for 8 addresses.

Lead2pass guarantees your 100-105 exam success with our exam resources. Our 100-105 braindumps are the latest and developed by experienced IT certification professionals working in today’s prospering companies and data centers. All our 100-105 braindumps include 100-105 real exam questions which guarantee your 100% success of 100-105 exam in your first try.

100-105 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDSjRoR0JJWVA2ZDQ

2017 Cisco 100-105 exam dumps (All 321 Q&As) from Lead2pass:

http://www.lead2pass.com/100-105.html [100% Exam Pass Guaranteed]

You may also like