aiotestking uk

100-105 Exam Questions - Online Test


100-105 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 5) 

Refer to the exhibit. 

A person is trying to send a file from a host on Network A of the JAX Company to a server 

on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. 

Which command, issued from router RTA, would be the most useful for troubleshooting this problem? 

A. show flash: 

B. show history 

C. show version 

D. show interfaces 

E. show controllers serial 

Answer:

Explanation: 

The most useful thing to check on RTA would be the show interfaces command to see if the interface toward the WAN link is up. The most likely scenario is that the local LAN interface is up, but the other interface toward the XYZ company is down. 

Q2. - (Topic 5) 

If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN? 

A. half-duplex operation 

B. broadcast storms 

C. network segmentation 

D. multicasting 

Answer:

Explanation: 

A broadcast storm can consume sufficient network resources so as to render the network unable to transport normal traffic. 

Topic 6, Simulation 

Q3. - (Topic 5) 

Refer to the exhibit. 

For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA. 

Which command or series of commands will accomplish these objectives? 

A. RTA(config)#no cdp run 

B. RTA(config)#no cdp enable 

C. RTA(config)#interface s0/0 RTA(config-if)#no cdp run 

D. RTA(config)#interface s0/0 RTA(config-if)#no cdp enable 

Answer:

Explanation: 

http://www.cisco.com/en/US/tech/tk962/technologies_tech_note09186a00801aa000.shtml# topicenab 

When CDP is enabled globally using the cdp run command, it is enabled by default on all supported interfaces (except for Frame Relay multipoint subinterfaces) to send and receive CDP information. You can disable CDP on an interface that supports CDP with the no cdp enable command. 

Router#show cdp neighbors 

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r – Repeater 

Router# On this router, CDP is enabled on Serial 1 and Ethernet 0 interfaces. Disable CDP on the Serial 1 interface and verify if the neighbor device is discovered on the serial 1 interface, as this output shows: Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface s1 Router(config-if)#no cdp enable Router(config-if)# Z Router#4w5D. %SYS-5-CONFIG_I: Configured from console by console 

Q4. - (Topic 3) 

Which command is used to display the collection of OSPF link states? 

A. show ip ospf link-state 

B. show ip ospf lsa database 

C. show ip ospf neighbors 

D. show ip ospf database 

Answer:

Explanation: 

The “show ip ospf database” command displays the link states. Here is an example: 

Here is the lsa database on R2. 

R2#show ip ospf database 

OSPF Router with ID (2.2.2.2) (Process ID 1) 

Router Link States (Area 0) 

Link ID ADV Router Age Seq# Checksum Link count 

2.2.2.2 2.2.2.2 793 0x80000003 0x004F85 2 

10.4.4.4 10.4.4.4 776 0x80000004 0x005643 1 

111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA 2 

133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0) Link ID ADV Router Age Seq# Checksum10.1.1.1 111.111.111.111 794 0x80000001 0x001E8B 

10.2.2.3 133.133.133.133 812 0x80000001 0x004BA9 

10.4.4.1 111.111.111.111 755 0x80000001 0x007F16 

10.4.4.3 133.133.133.133 775 0x80000001 0x00C31F 

Q5. - (Topic 7) 

Which method does a connected trunk port use to tag VLAN traffic? 

A. IEEE 802 1w 

B. IEEE 802 1D 

C. IEEE 802 1Q 

D. IEEE 802 1p 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html 

Q6. - (Topic 4) 

The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two.) 

A. SNMP 

B. HTTP 

C. Telnet 

D. RMON 

E. SSH 

Answer: C,E 

Explanation: 

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, and is used to connect to Cisco and other networking devices using SSH or Telnet. 

Topic 5, Infrastructure Maintenance 

Q7. - (Topic 1) 

Which protocol uses a connection-oriented service to deliver files between end systems? 

A. TFTP 

B. DNS 

C. FTP 

D. SNMP 

E. RIP 

Answer:

Explanation: 

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established--the caller must know the person's telephone number and the phone must be answered--before the message can be delivered. TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release. Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp. 

Q8. - (Topic 3) 

What is the subnet address for the IP address 172.19.20.23/28? 

A. 172.19.20.0 

B. 172.19.20.15 

C. 172.19.20.16 

D. 172.19.20.20 

E. 172.19.20.32 

Answer:

Explanation: 

From the /28 we can get the following: 

Increment: 16 (/28 = 11111111.11111111.11111111.11110000) 

Network address: 172.19.20.16 (because 16 < 23) 

Broadcast address: 172.16.20.31 (because 31 = 16 + 16 – 1) 

Q9. - (Topic 7) 

Which statement about routing protocols is true? 

A. Link-state routing protocols choose a path by the number of hops to the destination. 

B. OSPF is a link-state routing protocol. 

C. Distance-vector routing protocols use the Shortest Path First algorithm. 

D. IS-IS is a distance-vector routing protocol. 

Answer:

Explanation: Link State Routing Protocols 

Link state protocols are also called shortest-path-first protocols. Link state routing protocols have a complete picture of the network topology. Hence they know more about the whole network than any distance vector protocol. Three separate tables are created on each link state routing enabled router. One table is used to hold details about directly connected neighbors, one is used to hold the topology of the entire internetwork and the last one is used to hold the actual routing table. Link state protocols send information about directly connected links to all the routers in the network. Examples of Link state routing protocols include OSPF - Open Shortest Path First and IS-IS - Intermediate System to Intermediate System. There are also routing protocols that are considered to be hybrid in the sense that they use aspects of both distance vector and link state protocols. EIGRP - Enhanced Interior Gateway Routing Protocol is one of those hybrid routing protocols. 

Q10. - (Topic 3) 

A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? 

Router(config)# router ospf 1 

Router(config-router)# network 10.0.0.0 255.0.0.0 area 0 

A. The process id is configured improperly. 

B. The OSPF area is configured improperly. 

C. The network wildcard mask is configured improperly. 

D. The network number is configured improperly. 

E. The AS is configured improperly. 

F. The network subnet mask is configured improperly. 

Answer:

Explanation: 

When configuring OSPF, the mask used for the network statement is a wildcard mask similar to an access list. In this specific example, the correct syntax would have been “network 10.0.0.0 0.0.0.255 area 0.”