Lead4pass latest Cisco ICND1 100-105 dumps pdf practice files and dumps vce youtube free demo. High quality Cisco ICND1 100-105 dumps exam questions and answers free try. https://www.leads4pass.com/100-105.html dumps pdf training resources. Get the best Cisco ICND1 100-105 dumps pdf training materials and study guides, pass Cisco 100-105 exam test easily.
Latest Cisco 100-105 dumps pdf questions and answers free download: https://drive.google.com/open?id=0B_7qiYkH83VReEJYRlhNVjdGeVU
Latest Cisco 300-160 dumps pdf questions and answers free download: https://drive.google.com/open?id=0B_7qiYkH83VRaThBc3h5VDkxZEE
Vendor: Cisco
Certifications: ICND1
Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Exam Code: 100-105
Total Questions: 332 Q&As
QUESTION 1
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
A. Allow unrestricted access to the console or VTY ports.
B. Use a firewall to restrict access from the outside to the network devices.
C. Always use Telnet to access the device command line because its data is automatically encrypted.
D. Use SSH or another encrypted and authenticated transport to access device configurations.
E. Prevent the loss of passwords by disabling password encryption.
Correct Answer: BD
QUESTION 2
Some routers have been configured with default routes. What are some of the advantages of using default routes? (Choose two)
A. They establish routes that will never go down.
B. They keep routing tables small.
C. They require a great deal of CPU power.
D. They allow connectivity to remote networks that are not in the routing table
E. They direct traffic from the internet into corporate networks.
Correct Answer: BD
QUESTION 3
Some routers have been configured with default routes. 100-105 dumps What are some of the advantages of using default routes? (Choose two)
A. They establish routes that will never go down.
B. They keep routing tables small.
C. They require a great deal of CPU power.
D. They allow connectivity to remote networks that are not in the routing table
E. They direct traffic from the internet into corporate networks.
Correct Answer: BD
QUESTION 4
Why would a network administrator configure port security on a switch?
A. to prevent unauthorized Telnet access to a switch port
B. to prevent unauthorized hosts from accessing the LAN
C. to limit the number of Layer 2 broadcasts on a particular switch port
D. block unauthorized access to the switch management interfaces
Correct Answer: B
QUESTION 5
Which statements are true regarding ICMP packets? (Choose two.)
A. They acknowledge receipt of TCP segments.
B. They guarantee datagram delivery.
C. TRACERT uses ICMP packets.
D. They are encapsulated within IP datagrams.
E. They are encapsulated within UDP datagrams.
Correct Answer: CD
QUESTION 6
OSPF is configured using default classful addressing. With all routers and interfaces operational, how many networks will be in the routing table of R1 that are indicated to be learned by OSPF?
A. 2
B. 3
C. 4
D. 5
E. 6
F. 7
Correct Answer: C
QUESTION 7
Which statements describe the routing protocol OSPF? 100-105 dumps (Choose three.)
A. It supports VLSM.
B. It is used to route between autonomous systems.
C. It confines network instability to one area of the network.
D. It increases routing overhead on the network.
E. It allows extensive control of routing updates.
F. It is simpler to configure than RIP v2.
Correct Answer: ACE
QUESTION 8
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?
A. half-duplex operation
B. broadcast storms
C. network segmentation
D. multicasting
Correct Answer: B
QUESTION 9
Which of the following statements are TRUE regarding Cisco access lists? (Choose two.)
A. In an inbound access list, packets are filtered as they enter an interface.
B. In an inbound access list, packets are filtered before they exit an interface.
C. Extended access lists are used to filter protocol-specific packets.
D. You must specify a deny statement at the end of each access list to filter unwanted traffic.
E. When a line is added to an existing access list, it is inserted at the beginning of the access list.
Correct Answer: AC
QUESTION 10
Which router command will configure an interface with the IP address 10.10.80.1/19?
A. router(config-if)# ip address 10.10.80.1/19
B. router(config-if)# ip address 10.10.80.1 255.255.0.0
C. router(config-if)# ip address 10.10.80.1 255.255.255.0
D. router(config-if)# ip address 10.10.80.1 255.255.224.0
E. router(config-if)# ip address 10.10.80.1 255.255.240.0
F. router(config-if)# ip address 10.10.80.1 255.255.255.240
Correct Answer: D
QUESTION 11
What is the purpose of assigning an IP address to a switch?
A. provides local hosts with a default gateway address
B. allows remote management of the switch
C. allows the switch to respond to ARP requests between two hosts
D. ensures that hosts on the same LAN can communicate with each other
Correct Answer: B
QUESTION 12
Which two statements describe the operation of the CSMA/CD access method? 100-105 dumps (Choose two.)
A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
Correct Answer: BE
Read more: https://www.leads4pass.com/100-105.html dumps exam questions and answers free update.
Watch the video to learn more: https://youtu.be/trVHfqmuVvg