It is more faster and easier to pass the Cisco 105 100 exam by using Tested Cisco Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) questuins and answers. Immediate access to the Update 105 100 Exam and find the same core area ccent ccna icnd1 100 105 questions with professionally verified answers, then PASS your exam with a high score now.


2026 New 100-105 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/100-105/

Q1. - (Topic 7) 

Under which circumstance should a network administrator implement one-way NAT? 

A. when the network must route UDP traffic 

B. when traffic that originates outside the network must be routed to internal hosts 

C. when traffic that originates inside the network must be routed to internal hosts 

D. when the network has few public IP addresses and many private IP addresses require outside access 

Answer:

Explanation: NAT operation is typically transparent to both the internal and external hosts. Typically the internal host is aware of the true IP address and TCP or UDP port of the external host. Typically the NAT device may function as the default gateway for the internal host. However the external host is only aware of the public IP address for the NAT device and the particular port being used to communicate on behalf of a specific internal host. 

NAT and TCP/UDP 

"Pure NAT", operating on IP alone, may or may not correctly parse protocols that are totally concerned with IP information, such as ICMP, depending on whether the payload is interpreted by a host on the "inside" or "outside" of translation. As soon as the protocol stack is traversed, even with such basic protocols as TCP and UDP, the protocols will break unless NAT takes action beyond the network layer. IP packets have a checksum in each packet header, which provides error detection only for the header. IP datagrams may become fragmented and it is necessary for a NAT to reassemble these fragments to allow correct recalculation of higher-level checksums and correct tracking of which packets belong to which connection. The major transport layer protocols, TCP and UDP, have a checksum that covers all the data they carry, as well as the TCP/UDP header, plus a "pseudo-header" that contains the source and destination IP addresses of the packet carrying the TCP/UDP header. For an originating NAT to pass TCP or UDP successfully, it must recompute the TCP/UDP header checksum based on the translated IP addresses, not the original ones, and put that checksum into the TCP/UDP header of the first packet of the fragmented set of packets. The receiving NAT must recompute the IP checksum on every packet it passes to the destination host, and also recognize and recompute the TCP/UDP header using the retranslated addresses and pseudo-header. This is not a completely solved problem. One solution is for the receiving NAT to reassemble the entire segment and then recompute a checksum calculated across all packets. The originating host may perform Maximum transmission unit (MTU) path discovery to determine the packet size that can be transmitted without fragmentation, and then set the don't fragment (DF) bit in the appropriate packet header field. Of course, this is only a one-way solution, because the responding host can send packets of any size, which may be fragmented before reaching the NAT. 

Q2. - (Topic 7) 

Which technology supports the stateless assignment of IPv6 addresses? 

A. DNS 

B. DHCPv6 

C. DHCP 

D. autoconfiguration 

Answer:

Explanation: DHCPv6 Technology Overview IPv6 Internet Address Assignment Overview 

IPv6 has been developed with Internet Address assignment dynamics in mind. Being aware that IPv6 Internet addresses are 128 bits in length and written in hexadecimals makes automation of address-assignment an important aspect within network design. These attributes make it inconvenient for a user to manually assign IPv6 addresses, as the format is not naturally intuitive to the human eye. To facilitate address assignment with little or no human intervention, several methods and technologies have been developed to automate the process of address and configuration parameter assignment to IPv6 hosts. The various IPv6 address assignment methods are as follows: 

1. 

Manual Assignment An IPv6 address can be statically configured by a human operator. However, manual assignment is quite open to errors and operational overhead due to the 128 bit length and hexadecimal attributes of the addresses, although for router interfaces and static network elements and resources this can be an appropriate solution. 

2. 

Stateless Address Autoconfiguration (RFC2462) Stateless Address Autoconfiguration (SLAAC) is one of the most convenient methods to assign Internet addresses to IPv6 nodes. This method does not require any human intervention at all from an IPv6 user. If one wants to use IPv6 SLAAC on an IPv6 node, it is important that this IPv6 node is connected to a network with at least one IPv6 router connected. This router is configured by the network administrator and sends out Router Advertisement announcements onto the link. These announcements can allow the on-link connected IPv6 nodes to configure themselves with IPv6 address and routing parameters, as specified in RFC2462, without further human intervention. 

3. 

Stateful DHCPv6 The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) has been standardized by the IETF through RFC3315. DHCPv6 enables DHCP servers to pass configuration parameters, 

such as IPv6 network addresses, to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility. This protocol is a stateful counterpart to "IPv6 Stateless Address Autoconfiguration" (RFC 2462), and can be used separately, or in addition to the stateless autoconfiguration to obtain configuration parameters. 

4. 

DHCPv6-PD DHCPv6 Prefix Delegation (DHCPv6-PD) is an extension to DHCPv6, and is specified in RFC3633. Classical DHCPv6 is typically focused upon parameter assignment from a DHCPv6 server to an IPv6 host running a DHCPv6 protocol stack. A practical example would be the stateful address assignment of "2001:db8::1" from a DHCPv6 server to a DHCPv6 client. DHCPv6-PD however is aimed at assigning complete subnets and other network and interface parameters from a DHCPv6-PD server to a DHCPv6-PD client. This means that instead of a single address assignment, DHCPv6-PD will assign a set of IPv6 "subnets". An example could be the assignment of "2001:db8::/60" from a DHCPv6-PD server to a DHCPv6-PD client. This will allow the DHCPv6-PD client (often a CPE device) to segment the received address IPv6 address space, and assign it dynamically to its IPv6 enabled.interfaces. 

5.

 Stateless DHCPv6 Stateless DHCPv6 is a combination of "stateless Address Autoconfiguration" and "Dynamic Host Configuration Protocol for IPv6" and is specified by RFC3736. When using stateless-DHCPv6, a device will use Stateless Address Auto-Configuration (SLAAC) to assign one or more IPv6 addresses to an interface, while it utilizes DHCPv6 to receive "additional parameters" which may not be available through SLAAC. For example, additional parameters could include information such as DNS or NTP server addresses, and are provided in a stateless manner by DHCPv6. Using stateless DHCPv6 means that the DHCPv6 server does not need to keep track of any state of assigned IPv6 addresses, and there is no need for state refreshment as result. On network media supporting a large number of hosts associated to a single DHCPv6 server, this could mean a significant reduction in DHCPv6 messages due to the reduced need for address state refreshments. From Cisco IOS 12.4(15)T onwards the client can also receive timing information, in addition to the "additional parameters" through DHCPv6. This timing information provides an indication to a host when it should refresh its DHCPv6 configuration data. This behavior (RFC4242) is particularly useful in unstable environments where changes are likely to occur. 

Q3. - (Topic 3) 

What does administrative distance refer to? 

A. the cost of a link between two neighboring routers 

B. the advertised cost to reach a network 

C. the cost to reach a network that is administratively set 

D. a measure of the trustworthiness of a routing information source 

Answer:

Reference: http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094195.shtml 

Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. 

Administrative distance is the first criterion that a router uses to determine which routing protocol to use if two protocols provide route information for the same destination. Administrative distance is a measure of the trustworthiness of the source of the routing information. The smaller the administrative distance value, the more reliable the protocol. 

Q4. - (Topic 5) 

Refer to the exhibit. 

An administrator replaced the 10/100 Mb NIC in a desktop PC with a 1 Gb NIC and now the PC will not connect to the network. The administrator began troubleshooting on the switch. Using the switch output shown, what is the cause of the problem? 

A. Speed is set to 100Mb/s. 

B. Input flow control is off. 

C. Encapsulation is set to ARPA. 

D. The port is administratively down. 

E. The counters have never been cleared. 

Answer:

Explanation: 

For PC to switch connectivity, the speed settings must match. In this case, the 1 Gb NIC will not be able to communicate with a 100Mb fast Ethernet interface, unless the 1Gb NIC can be configured to connect at 100Mb. 

Q5. - (Topic 4) 

A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. 

router#show interfaces 

Serial0/1/0 is up, line protocol is down 

At which OSI layer should the administrator begin troubleshooting? 

A. physical 

B. data link 

C. network 

D. transport 

Answer:

Explanation: 

https://learningnetwork.cisco.com/thread/12389 

I think the indication here is "Serial 0 is up, line protocol is down". What causes this indication? Correct me if I am wrong. When you have this indication, a cable unplugged is not a correct answer. If you check the output of your "show interface serial 0" command again, you should notice it as "Serial 0 is down, line protocol is down. Under the "show ip int brief" you should see status = down and protocol = down as opposed to up, down. Because you disconnected the cable, layer 1 will go down, which is indicated by the serial 0 down status. The line protocol status is for layer 2. So, a cable unplugged is not a correct answer to "Serial 0 is up, line protocol is down". Up/down means that the physical layer is OK, but there is a problem with the data link link (line protocol). 

Q6. - (Topic 3) 

Refer to the exhibit. 

The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? 

A. 255.255.255.192 

B. 255.255.255.224 

C. 255.255.255.240 

D. 255.255.255.248 

E. 255.255.255.252 

Answer:

Explanation: 

Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts. 

Q7. - (Topic 3) 

Refer to the exhibit. 

PC1 pings PC2. What three things will CORE router do with the data that is received from PC1? (Choose three.) 

A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router. 

B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router. 

C. CORE router will replace the destination IP address of the packets with the IP address of PC2. 

D. CORE router will replace the MAC address of PC2 in the destination MAC address of the frames. 

E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets. 

F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address. 

Answer: B,D,F 

Explanation: 

The router will forward the frames out the interface toward the destination – B is correct. Since the router will has the end station already in it’s MAC table as see by the “show arp” command, it will replace the destination MAC address to that of PC2 – D is correct. The router will then replace the source IP address to 172.16.40.1 – E is correct. 

Q8. - (Topic 3) 

What OSPF command, when configured, will include all interfaces into area 0? 

A. network 0.0.0.0 255.255.255.255 area 0 

B. network 0.0.0.0 0.0.0.0 area 0 

C. network 255.255.255.255 0.0.0.0 area 0 

D. network all-interfaces area 0 

Answer:

Explanation: 

Example 3-1 displays OSPF with a process ID of 1 and places all interfaces configured with an IP address in area 0. The network command.network 0.0.0.0 255.255.255.255 area 0.dictates that you do not care (255.255.255.255) what the IP address is, but if an IP address is enabled on any interface, place it in area 0. 

Example 3-1.Configuring OSPF in a Single Area 

router ospf 1 network 0.0.0.0 255.255.255.255 area 0 

Reference: http://www.ciscopress.com/articles/article.asp?p=26919&seqNum=3 

Q9. DRAG DROP - (Topic 4) 

Move the protocol or service on the left to a situation on the right where it would be used. (Not all options are used.) 

Answer:  

Q10. - (Topic 5) 

How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1? 

A. Configure port Fa0/1 to accept connections only from the static IP address of the server. 

B. Configure the server MAC address as a static entry of port security. 

C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors. 

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address. 

Answer:

Explanation: 

When the MAC address is configured as static entry, no other address is allowed.