aiotestking uk

100-105 Exam Questions - Online Test


100-105 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 2) 

Refer to the exhibit. 

What two things can the technician determine by successfully pinging from this computer to the IP address 172.16.236.1? (Choose two) 

A. The network card on the computer is functioning correctly. 

B. The default static route on the gateway router is correctly configured. 

C. The correct default gateway IP address is configured on the computer. 

D. The device with the IP address 172.16.236.1 is reachable over the network. 

E. The default gateway at 172.16.236.1 is able to forward packets to the internet. 

Answer: A,D 

Explanation: 

The source and destination addresses are on the same network therefore, a default gateway is not necessary for communication between these two addresses. 

Q2. - (Topic 3) 

Refer to the output of the corporate router routing table shown in the graphic. 

The corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. 

What will the router do with this packet? 

A. It will encapsulate the packet as Frame Relay and forward it out interface Serial 0/0.117. 

B. It will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0. 

C. It will forward the packet out interface Serial 0/1 and send an ICMP Echo Reply message out interface serial 0/0.102. 

D. It will change the IP packet to an ARP frame and forward it out FastEthernet 0/0. 

Answer:

Explanation: 

Since the destination network is not in the routing table, and no default gateway has been configured, the router will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0. It knows to send it out Fa 0/0 because the routing table for the source IP address of 192.168.214.20 shows it was learned from the Fa 0/0 interface. 

Q3. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 

Q4. - (Topic 1) 

Which network device functions only at Layer 1 of the OSI model? A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer:

Explanation: 

Most hubs are amplifying the electrical signal; therefore, they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices. 

Q5. - (Topic 1) 

How does a switch differ from a hub? 

A. A switch does not induce any latency into the frame transfer time. 

B. A switch tracks MAC addresses of directly-connected devices. 

C. A switch operates at a lower, more efficient layer of the OSI model. 

D. A switch decreases the number of broadcast domains. 

E. A switch decreases the number of collision domains. 

Answer:

Explanation: 

Some of the features and functions of a switch include: 

A switch is essentially a fast, multi-port bridge, which can contain dozens of ports. 

Rather than creating two collision domains, each port creates its own collision domain. 

In a network of twenty nodes, twenty collision domains exist if each node is plugged into its 

own switch port. 

If an uplink port is included, one switch creates twenty-one single-node collision domains. 

A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table, 

holding all of the necessary MAC information for each port. 

For a detailed description of how switches operate, and their key differences to hubs, see 

the reference link below. 

Reference: http://www.cisco.com/warp/public/473/lan-switch-cisco.shtml 

Q6. - (Topic 4) 

In the configuration of NAT, what does the keyword overload signify? 

A. When bandwidth is insufficient, some hosts will not be allowed to access network translation. 

B. The pool of IP addresses has been exhausted. 

C. Multiple internal hosts will use one IP address to access external network resources. 

D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool. 

Answer:

Explanation: 

The keyword overload.used in the ip nat inside source list 1 pool ovrld overload example command allows NAT to translate multiple inside devices to the single address in the pool. The types of NAT include: Static address translation (static NAT)—Allows one-to-one mapping between local and global addresses. Dynamic address translation (dynamic NAT)—Maps unregistered IP addresses to registered IP addresses from a pool of registered IP addresses. Overloading—Maps multiple unregistered IP addresses to a single registered IP address (many to one) using different ports. This method is also known as Port Address Translation (PAT). By using overloading, thousands of users can be connected to the Internet by using only one real global IP address. 

Q7. - (Topic 3) 

Refer to the exhibit. 

Which two statements are true about the loopback address that is configured on RouterB? (Choose two.) 

A. It ensures that data will be forwarded by RouterB. 

B. It provides stability for the OSPF process on RouterB. 

C. It specifies that the router ID for RouterB should be 10.0.0.1. 

D. It decreases the metric for routes that are advertised from RouterB. 

E. It indicates that RouterB should be elected the DR for the LAN. 

Answer: B,C 

Explanation: 

A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) -The router-ID is chosen in the order below: 

+

 The highest IP address assigned to a loopback (logical) interface. 

+

 If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. -> The loopback interface will be chosen as the router ID of RouterB -

Q8. - (Topic 3) 

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address? 

A. 192.168.1.8/29 

B. 192.168.1.32/27 

C. 192.168.1.40/29 

D. 192.168.1.16/28 

E. 192.168.1.48/29 

Answer:

Explanation: 

248 mask uses 5 bits (1111 1000) 

42 IP in binary is (0010 1010) 

The base subnet therefore is the lowest binary value that can be written without changing 

the output of an AND operation of the subnet mask and IP... 

1111 1000 AND 

0010 1010 equals 

0010 1000 - which is .40 

/24 is standard class C mask. 

Adding the 5 bits from the .248 mask gives /29 

Q9. - (Topic 2) 

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MAC address. What will the switch do with the frame? 

A. drop the frame 

B. forward it out of all ports except the one that received it 

C. forward it out of all ports 

D. store it until it learns the correct port 

Answer:

Explanation: 

Understanding this concept is prime for understanding that when switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. 

Q10. - (Topic 2) 

Refer to the exhibit. 

The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at 

the switch. 

What two operations will the switch perform when it receives this frame? (Choose two.) 

A. The switch will not forward a frame with this destination MAC address. 

B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table. 

C. The MAC address of ffff.ffff.ffff will be added to the MAC address table. 

D. The frame will be forwarded out of all the active switch ports except for port fa0/0. 

E. The frame will be forwarded out of fa0/0 and fa0/1 only. 

F. The frame will be forwarded out of all the ports on the switch. 

Answer: B,D 

Explanation: 

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.