aiotestking uk

100-105 Exam Questions - Online Test


100-105 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Real 100-105 testing software are available on Google Drive, GET MORE: https://drive.google.com/open?id=16T0cVE2WYz-0Y7Wh56_Fr0zWNJ4X7B2X


New Cisco 100-105 Exam Dumps Collection (Question 4 - Question 13)

Q4. Which statements are true regarding ICMP packets? (Choose two.)

A. They acknowledge receipt of TCP segments.

B. They guarantee datagram delivery.

C. TRACERT uses ICMP packets.

D. They are encapsulated within IP datagrams.

E. They are encapsulated within UDP datagrams.

Answer: C,D

Explanation:

Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity, which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools, which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol).

ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packetu2021s Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively.

In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination


Q5. From which of the following attacks can Message Authentication Code (MAC) shield your network?

A. DoS

B. DDoS

C. spoofing

D. SYN floods

Answer: C

Explanation:

Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks.

MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes.

A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack.

A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to

flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks.

In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies.


Q6. Refer to the exhibit.

The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.

What two operations will the switch perform when it receives this frame? (Choose two.)

A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table.

B. The MAC address of 0000.00dd.dddd will be added to the MAC address table.

C. The frame will be forwarded out of port fa0/3 only.

D. The frame will be forwarded out of fa0/1, fa0/2, and fa0/3.

E. The frame will be forwarded out of all the active ports.

Answer: A,D

Explanation:

If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table


Q7. A switch receives a frame on one of its ports. There is no entry in the MAC address table

for the destination MAC address. What will the switch do with the frame?

A. drop the frame

B. forward it out of all ports except the one that received it

C. forward it out of all ports

D. store it until it learns the correct port

Answer: B

Explanation:

Understanding this concept is prime for understanding that when switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.


Q8. A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?

A. the OSPF route

B. the EIGRP route

C. the RIPv2 route

D. all three routes

E. the OSPF and RIPv2 routes

Answer: B

Explanation:

When one route is advertised by more than one routing protocol, the router will choose to use the routing protocol which has lowest Administrative Distance. The Administrative

Distances of popular routing protocols are listed below:


Q9. The network administrator has found the following problem.

The remote networks 172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the Central router's serial 0/0 interface. No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what is the most likely cause of the problem?

A. no gateway of last resort on Central

B. Central router's not receiving 172.16.20.0 update

C. incorrect static route for 172.16.20.0

D. 172.16.20.0 not located in Central's routing table

Answer: C

Explanation:

If we use 172.16.20.0 to route to 172.16.150.15, then the packet will route back. To clear this error we have to use #no ip route 172.16.20.0 255.255.255.0 172.16.150.15

command in configuration mode.


Q10. Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.)

A. a bridge

B. a router

C. a hub

D. a Layer 3 switch

E. an access point

Answer: B,D

Explanation:

Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms.


Q11. Which two characteristics apply to Layer 2 switches? (Choose two.)

A. Increases the number of collision domains

B. Decreases the number of collision domains

C. Implements VLAN

D. Decreases the number of broadcast domains

E. Uses the IP address to make decisions for forwarding data packets

Answer: A,C

Explanation:

Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch port is in its own separate collision domain, thus eliminating collisions on the segment.


Q12. Refer to the exhibit.

The output is from a router in a large enterprise. From the output, determine the role of the router.

A. A Core router.

B. The HQ Internet gateway router.

C. The WAN router at the central site.

D. Remote stub router at a remote site.

Answer: D

Explanation:

Since the routing table shows only a single default route using the single interface serial 0/0, we know that this is most likely a remote stub site with a single connection to the rest of the network. All the other answer options would mean that this router would have more connections, and would contain more routes.


Q13. An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?

A. Router# show startup-config

B. Router# show current-config

C. Router# show running-config

D. Router# show memory

E. Router# show flash

F. Router# show processes

Answer: C

Explanation:

This command followed by the appropriate parameter will show the running config hence the admin will be able to see what changes have been made, and then they can be saved.


P.S. Easily pass 100-105 Exam with Surepassexam Real Dumps & pdf vce, Try Free: https://www.surepassexam.com/100-105-exam-dumps.html (347 New Questions)