aiotestking uk

100-105 Exam Questions - Online Test


100-105 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 3) 

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.) 

A. Router(config)# router ospf 0 

B. Router(config)# router ospf 1 

C. Router(config)# router ospf area 0 

D. Router(config-router)# network 192.168.16.0 0.0.0.255 0 

E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0 

F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0 

Answer: B,E 

Explanation: 

In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> but To configure OSPF, we need a wildcard in the “network” statement, not a subnet mask. We also need to assgin an area to this process. 

Q2. - (Topic 3) 

Which statement is true? 

A. An IPv6 address is 64 bits long and is represented as hexadecimal characters. 

B. An IPv6 address is 32 bits long and is represented as decimal digits. 

C. An IPv6 address is 128 bits long and is represented as decimal digits. 

D. An IPv6 address is 128 bits long and is represented as hexadecimal characters. 

Answer:

Explanation: 

http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf 

One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID 

Q3. - (Topic 3) 

What is the purpose of assigning an IP address to a switch? 

A. provides local hosts with a default gateway address 

B. allows remote management of the switch 

C. allows the switch to respond to ARP requests between two hosts 

D. ensures that hosts on the same LAN can communicate with each other 

Answer:

Explanation: 

A switch is a layer 2 device and doesn’t use network layer for packet forwarding. The IP 

address may be used only for administrative purposes such as Telnet access or for network management purposes. 

Q4. - (Topic 3) 

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command? 

A. The interface with IP address 192.168.10.2 is on this router. 

B. The command sets a gateway of last resort for the router. 

C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2. 

D. The command creates a static route for all IP traffic with the source address 

192.168.100.160. 

Answer:

Explanation: 

With 160 it's actually network address of /27 so any address within the range of .160-.191 network will be sent to 192.168.10.2 

Q5. - (Topic 3) 

The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements. 

Which three items will adequately fulfill the request? (Choose three). 

A. One IP subnet with a mask of 255.255.254.0 

B. Two IP subnets with a mask of 255.255.255.0 

C. Seven 48-port hubs 

D. Seven 48-port switches 

E. One router interface 

F. Seven router interfaces 

Answer: A,D,E 

Explanation: 

To support 300 workstations in a single broadcast domain, we need to use a subnet mask 

which supports 512 hosts = 29-> /23 or 255.255.254.0 in decimal form -> A is correct. 

If we use 48-port switches we need 300/48 = 6.25 -> seven 48-port switches are enough 

because we also need trunking between them -> D is correct. 

We only need one router interface and it is connected with one of seven switches -> E is 

correct. 

Q6. - (Topic 3) 

An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. 

Which of the following should be entered into the IP properties box for the sales server? 

A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9 

B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1 

C. IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25 

D. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17 

E. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.25 

Answer:

Explanation: 

With network 192.168.20.24/29 we have: 

Increment: 8 (/29 = 255.255.255.248 = 11111000 for the last octet) 

Network address: 192.168.20.24 (because 24 = 8 * 3) 

Broadcast address: 192.168.20.31 (because 31 = 24 + 8 – 1) 

Therefore the first usable IP address is 192.168.20.25 (assigned to the router) and the last usable IP address is 192.168.20.30 (assigned to the sales server). The IP address of the router is also the default gateway of the sales server. 

Q7. - (Topic 5) 

Refer to the exhibit. 

Serial 0/0 does not respond to a ping request from a host on the FastEthernet 0/0 LAN. How can this problem be corrected? 

A. Enable the Serial 0/0 interface. 

B. Correct the IP address for Serial 0/0. 

C. Correct the IP address for FastEthernet 0/0 

D. Change the encapsulation type on Serial 0/0 

E. Enable autoconfiguration on the Serial 0/0 interface 

Answer:

Explanation: 

Serial 0/0 interface is administratively down therefore, you will have to run the "no shutdown" command to enable the interface for data. 

Q8. - (Topic 3) 

Refer to the exhibit. 

Which two statements are correct? (Choose two.) 

A. This is a default route. 

B. Adding the subnet mask is optional for the ip route command. 

C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA. 

D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address. 

E. The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network can reach network 10.0.0.0. 

Answer: A,C 

Explanation: 

This is obviously the default route which is set between the routers and since it is entered in such a manner that it ensures connectivity between the stub network and any host lying beyond RouterA. 

Q9. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 

Q10. - (Topic 5) 

Refer to the exhibit. 

A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem? 

A. The NY router has an incorrect subnet mask. 

B. The TFTP server has an incorrect IP address. 

C. The TFTP server has an incorrect subnet mask. 

D. The network administrator computer has an incorrect IP address. 

Answer:

Explanation: 

The TFTP server is using a mask of 255.255.255.240 (/28) while the router is configured with a /29. Because of this, the Atlanta router does not see the TFTP server as being in the same subnet.