ALL >> Education >> View Article
100-105 Exam Questions & Answers
Total Articles: 86
You have configured the host computers on a campus LAN to receive their DHCP addresses form the local router to be able to browse their corporate site. Which statement about the network environment is true?
A. It supports a DNS server for use by DHCP clients.
B. Two host computers may be assigned the same IP address.
C. The DNS server must be configured manually on each host.
D. The domain name must be configured locally on each host computer.
Which Ethernet interface command is present when you boot a new Cisco router for the first time?
A. speed 100
C. ip address 192.168.1.1 255.255.255.0
D. duplex half
After you configure a default route to the Internet on a router, the route is missing from the routing table. Which option describes a possible reason for the problem?
A. The next-hop address is unreachable.
B. The default route was configured on a passive interface.
C. Dynamic routing is disabled.
D. Cisco Discovery Protocol is disabled on the interface used to reach the next hop.
Which table displays the MAC addresses that are learned on a switch?
In which two ways does TCP differ from UDP? (Choose two.)
A. TCP segments are essentially datagrams.
B. TCP uses broadcast delivery.
C. TCP provides sequence numbering of packets.
D. TCP provides synchronized communication.
E. TCP provides best effort delivery.
Refer to the exhibit.
A network has been planned as shown,Which three statements accurately describe the areas and devices in the network plan? (Choose three.)
A. Network Device A is a switch.
B. Network Device B is a switch.
C. Network Device A is a hub.
D. Network Device B is a hub.
E. Area 1 contains a Layer 2 device.
F. Area 2 contains a Layer 2 device.
Which set of conditions comprises a successful ping attempt between two connected routers configured with IP addresses on the same subnet?
A. The destination host receives an echo reply from the source host within one second and the source host receives an echo request from the destination host.
B. The destination host receives an echo request from the source host within one second.
C. The destination host receives an echo reply from the source host within one second and the source host receives an echo reply from the destination host within two seconds.
D. The destination host receives an echo request from the source host and the source host receives an echo request from the destination host within one second.
E. The destination host receives an echo request from the source host and the source host receives an echo reply from the destination host within two seconds.
Which NTP concept indicates the distance between a device and the reliable time source?
A. clock offset
Which statement is a Cisco best practice for switch port security?
A. Vacant switch ports must be shut down.
B. Empty ports must be enabled in VLAN 1.
C. VLAN 1 must be configured as the native VLAN.
D. Err-disabled ports must be configured to automatically re-enable.
Which statement describes the effect of the overload keyword in the ip nat inside source list 90 interface ethernet 0/0 overload command?
A. Addresses that match address list inside are translated to the IP address of the Ethernet 0/0 interface.
B. Hosts that match access inside are translated to an address m the Ethernet 0/0 network.
C. Hosts on the Ethernet 0/0 LAN are translated to the address pool in access list 90.
D. Addresses that match access list 90 are translated through PAT to the IP address of the Ethernet 0/0 interface
The command “ip nat inside source list 90 interface ethernet0/0 overload” means:
+ “ip nat”: use NAT
+ “inside”: NAT from inside to outside
+ “source list 90”: the source addresses can be found in access list 90
+ “Interface Ethernet 1”: NAT out of this interface
+ “overload”: use NAT overload (PAT)
Which technique can you use to route IPv6 traffic over an IPv4 infrastructure?
B. 6to4 tunneling
Which NAT command can be applied to an interface?
A. ip nat inside
B. ip nat inside test access-list-number pool pool-name
C.ip nat inside source static 10.10.10.0 10.10.10.50
D. ip nat pool test 10.10.10.0 10.10.10.50 255.255.255.0
Which subnet address is for the IP address 172.19.20.23/28?
4 mask 16 subnets
4 unmask 16 hosts for block size
184.108.40.206 to 220.127.116.11
18.104.22.168 to 22.214.171.124
14 more times for the full range of subnets
Which protocol verifies connectivity between two switches that are configured with IP addresses in the same network?
Which command displays the number of times that an individual router translated an inside address to an outside address?
A. show ip protocol 0
B. show ip nat translation
C. show counters
D. show ip route
E. show ip nat statistics
On which OSI layer doesa VLAN operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Which statement describes the effect of the copy run start command on a router in enable mode?
A. The running configuration of the router is saved to NVRAM and used during the boot process.
B. The router reboots and loads the last saved running configuration.
C. A copy of the running configuration of the router is sent by FTP to a designated server.
D. A new running configuration is loaded from flash memory to the router.
Refer to the exhibit. All devices attached to the network are shown. Which number of collision domains are present in this network?
Education Articles1. Data Science Is Increasing Extensively And It Is Everywhere
2. Why I Should Join Digital Marketing Training In Bhopal
Author: Sanjay Burman
3. How To Write Pertinent Assignments
Author: Jessica Gross
4. Digital Marketing Trend In 2018
Author: TOPS Technologies
5. Top 10 Digital Marketing Tools
Author: Learn Vern
6. Latest Cisco 200-125 Exam Dumps 2018
7. Simple Mule Esb Interview Questions |bytes Online Training
Author: Rahul Tandale
8. The Right Place To Get Your Get Your Engineering Degree
Author: ponting brown
9. Open Gateways To Your Dream Mba Programmes At Symbiosis With Snap!
Author: Mohan Patil
10. Optimising Keywords With Seo Training Institute In Mumbai
Author: Jayesh Jagtap
11. Empower Your Skills With Ethical Hacking Training Program
12. Learn Web Designing Courses In Chandigarh
Author: James Digosta
13. Different Courses And Programmes Of Learning Chinese Language.
Author: Michel Kern
14. How To Install Windows On A Mac With Boot Camp (boot Camp Software)
15. What Should You Do When Receive A Message “macro Is Disabled Due To Security Settings?”
Author: Multisoft Virtual Academy