Testking delivers many other forms of any Cisco Transcenders. Cisco 100-105 audit questions take care of test absolutely plus these tools give you element thinking and also justification with the Cisco Qualifications questions. By means of the following pleasant means you could have far better an opportunity to find out more on That technology. These Cisco checkups involve a number of approaches and knowing to move all of them. The Cisco 100-105 fabric provde the correct and also to the information for the greatest knowing. Various subject areas will be reviewed within a very simple model, outlined together with appropriate illustrations as well as the images shows the subject properly. The Cisco 100-105 certification coaching as well as 100-105 provides you with the right information to your convinced results around audit. This all stuff provides you with a full insurance policy coverage with the audit. You could receive the indicate more than 75 during the 100-105 certification audit.

2021 Mar 100-105 download

Q111. - (Topic 5) 

Why would a network administrator configure port security on a switch? 

A. to prevent unauthorized Telnet access to a switch port 

B. to prevent unauthorized hosts from accessing the LAN 

C. to limit the number of Layer 2 broadcasts on a particular switch port 

D. block unauthorized access to the switch management interfaces 

Answer:

Explanation: 

You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. 


Q112. - (Topic 3) 

Refer to the graphic. 

R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two.) 

A. All of the routers need to be configured for backbone Area 1. 

B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3. 

C. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being established. 

D. The hello and dead interval timers are not set to the same values on R1 and R3. 

E. EIGRP is also configured on these routers with a lower administrative distance. 

F. R1 and R3 are configured in different areas. 

Answer: D,F 

Explanation: 

This question is to examine the conditions for OSPF to create neighborhood. 

So as to make the two routers become neighbors, each router must be matched with the 

following items: 

1.

 The area ID and its types; 

2.

 Hello and failure time interval timer; 

3.

 OSPF Password (Optional); 


Q113. - (Topic 3) 

Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose two.) 

A. 10.6.8.35 

B. 133.6.5.4 

C. 192.168.5.9 

D. 127.0.0.1 

E. 190.6.5.4 

Answer: B,E 

Explanation: 

The IP addresses 133.6.5.4 and 190.6.5.4 are both valid Class B addresses when a default mask is in use. The Class B default mask is 255.255.0.0 and the range of valid addresses is 128.0.0.0-

191.255.255.255. 

The IP address 10.6.8.35 is a Class A address. The Class A default mask is 255.0.0.0 and 

the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 

127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. 

The IP address 192.168.5.9 is a Class C address. The Class C default mask is 

255.255.255.0 and the range of valid addresses is 192.0.0.0 - 223.255.255.255. 

The IP address 127.0.0.1 is a Class A address, but it comes from a reserved portion that 

cannot be assigned. 

The range 127.0.0.1 - 127.255.255.255 is used for diagnostics, and although any address 

in the range will work as a diagnostic address, 127.0.0.1 is known as the loopback address. 

If you can ping this address, or any address in the 127.0.0.1 - 127.255.255.255 range, then 

the NIC is working and TCP/IP is installed. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 

127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. 


Q114. - (Topic 4) 

In the configuration of NAT, what does the keyword overload signify? 

A. When bandwidth is insufficient, some hosts will not be allowed to access network translation. 

B. The pool of IP addresses has been exhausted. 

C. Multiple internal hosts will use one IP address to access external network resources. 

D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool. 

Answer:

Explanation: 

The keyword overload.used in the ip nat inside source list 1 pool ovrld overload example command allows NAT to translate multiple inside devices to the single address in the pool. The types of NAT include: Static address translation (static NAT)—Allows one-to-one mapping between local and global addresses. Dynamic address translation (dynamic NAT)—Maps unregistered IP addresses to registered IP addresses from a pool of registered IP addresses. Overloading—Maps multiple unregistered IP addresses to a single registered IP address (many to one) using different ports. This method is also known as Port Address Translation (PAT). By using overloading, thousands of users can be connected to the Internet by using only one real global IP address. 


Q115. - (Topic 7) 

Which function enables an administrator to route multiple VLANs on a router? 

A. IEEE 802 1X 

B. HSRP 

C. port channel 

D. router on a stick 

Answer:


Avant-garde 100-105 question:

Q116. - (Topic 4) 

The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two.) 

A. SNMP 

B. HTTP 

C. Telnet 

D. RMON 

E. SSH 

Answer: C,E 

Explanation: 

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, and is used to connect to Cisco and other networking devices using SSH or Telnet. 

Topic 5, Infrastructure Maintenance 


Q117. - (Topic 2) 

Refer to the exhibit. 

The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. 

What two operations will the switch perform when it receives this frame? (Choose two.) 

A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table. 

B. The MAC address of 0000.00dd.dddd will be added to the MAC address table. 

C. The frame will be forwarded out of port fa0/3 only. 

D. The frame will be forwarded out of fa0/1, fa0/2, and fa0/3. 

E. The frame will be forwarded out of all the active ports. 

Answer: A,D 

Explanation: 

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table 


Q118. - (Topic 5) 

Refer to the exhibit. 

A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design? 

A. This design will function as intended. 

B. Spanning-tree will need to be used. 

C. The router will not accept the addressing scheme. 

D. The connection between switches should be a trunk. 

E. The router interfaces must be encapsulated with the 802.1Q protocol. 

Answer:

Explanation: 

The proposed addressing scheme is on the same network. Cisco routers will not allow you to assign two different interfaces to be on the same IP subnet. 


Q119. - (Topic 5) 

Refer to the exhibit. 

A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem? 

A. A remote physical layer problem exists. 

B. The host NIC is not functioning. 

C. TCP/IP has not been correctly installed on the host. 

D. A local physical layer problem exists. 

Answer:

Explanation: 

Here we see that the host is able to ping its own loopback IP address of 127.0.0.1 and it’s own IP address of 10.0.0.35, so we know that the NIC is functioning and that the host’s TCP/IP stack is OK. However, it is not able to ping the IP address of its local default gateway, so we know that there is a local cabling problem between the switch and the router. 


Q120. - (Topic 5) 

Refer to the exhibit. 

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 

192.168.1.1 through 192.168.5.255 

192.168.100.1 through 192.168.100.255 

What are three problems with this design? (Choose three.) 

A. The AREA 1 IP address space is inadequate for the number of users. 

B. The AREA 3 IP address space is inadequate for the number of users. 

C. AREA 2 could use a mask of /25 to conserve IP address space. 

D. The network address space that is provided requires a single network-wide mask. 

E. The router-to-router connection is wasting address space. 

F. The broadcast domain in AREA 1 is too large for IP to function. 

Answer: A,C,E 

Explanation: 

The given IP addresses of areas 1 and 3 along with network masks of /24 cannot accommodate 500 users so are inadequate, while the area 2 is having over capacity so its network mask can be reduced to /25 to accommodate the only 60 users it has.