Cause all that matters here is passing the Cisco icnd1 100 105 pdf exam. Cause all that you need is a high score of 100 105 exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) exam. The only one thing you need to do is downloading Testking ccent ccna icnd1 100 105 official cert guide exam study guides now. We will not let you down with our money-back guarantee.
2026 New 100-105 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/100-105/
Q1. - (Topic 4)
Refer to the exhibit.
A company wants to use NAT in the network shown. Which commands will apply the NAT configuration to the proper interfaces? (Choose two.)
A. R1(config)# interface serial0/1 R1(config-if)# ip nat inside
B. R1(config)# interface serial0/1 R1(config-if)# ip nat outside
C. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside
D. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat outside
E. R1(config)# interface serial0/1 R1(config-if)# ip nat outside source pool 200.2.2.18 255.255.255.252
F. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside source 10.10.0.0 255.255.255.0
Answer: B,C
Explanation:
For NAT, you need to define which interfaces are inside and which are outside. The outside interface is the one that connects to the external network, and the one that will be used for translating addresses. The inside interface is for the internal network, and defines the network IP addresses that will get translated to the one specified in the outside network.
Q2. - (Topic 5)
A company has placed a networked PC in a lobby so guests can have access to the corporate directory.
A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)
A. Enable port security.
B. Create the port as a trunk port.
C. Create the port as an access port.
D. Create the port as a protected port.
E. Set the port security aging time to 0.
F. Statically assign the MAC address to the address table.
G. Configure the switch to discover new MAC addresses after a set time of inactivity.
Answer: A,C,F
Explanation:
If port security is enabled and the port is only designated as access port, and finally static MAC address is assigned, it ensures that even if a physical connection is done by taking out the directory PC and inserting personal laptop or device, the connection cannot be made to the corporate network, hence ensuring safety.
Q3. - (Topic 5)
Why would a network administrator configure port security on a switch?
A. to prevent unauthorized Telnet access to a switch port
B. to prevent unauthorized hosts from accessing the LAN
C. to limit the number of Layer 2 broadcasts on a particular switch port
D. block unauthorized access to the switch management interfaces
Answer: B
Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.
Q4. - (Topic 1)
Refer to the exhibit.
If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?
A. 10.168.10.99
B. 10.168.11.88
C. A1:A1:A1:A1:A1:A1
D. B2:B2:B2:B2:B2:B2
E. C3:C3:C3:C3:C3:C3
F. D4:D4:D4:D4:D4:D4
Answer: E
Explanation:
When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the existing router’s interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the destination router’s interface address.
Q5. - (Topic 5)
The following commands are entered on the router:
Burbank(config)# enable secret fortress
Burbank(config)# line con 0
Burbank(config-line)# login
Burbank(config-line)# password n0way1n
Burbank(config-line)# exit
Burbank(config)# service password-encryption
What is the purpose of the last command entered?
A. to require the user to enter an encrypted password during the login process
B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files
C. to encrypt the enable secret password
D. to provide login encryption services between hosts attached to the router
Answer: B
Explanation:
Certain types of passwords, such as Line passwords, by default appear in clear text in the configuration file. You can use the service password-encryption command to make them more secure. Once this command is entered, each password configured is automatically encrypted and thus rendered illegible inside the configuration file (much as the Enable/Enable Secret passwords are). Securing Line passwords is doubly important in networks on which TFTP servers are used, because TFTP backup entails routinely moving config files across networks—and config files, of course, contain Line passwords.
Q6. - (Topic 3)
Refer to the exhibit.
Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)
A. It ensures that data will be forwarded by RouterB.
B. It provides stability for the OSPF process on RouterB.
C. It specifies that the router ID for RouterB should be 10.0.0.1.
D. It decreases the metric for routes that are advertised from RouterB.
E. It indicates that RouterB should be elected the DR for the LAN.
Answer: B,C
Explanation:
A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) -The router-ID is chosen in the order below:
+
The highest IP address assigned to a loopback (logical) interface.
+
If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. -> The loopback interface will be chosen as the router ID of RouterB -
Q7. - (Topic 5)
Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in the exhibit, but there is no data connectivity between them. The Atlanta router is known to have a correct configuration.
Given the partial configurations shown in the exhibit, what is the problem on the Brevard router that is causing the lack of connectivity?
A. A loopback is not set.
B. The IP address is incorrect.
C. The subnet mask is incorrect.
D. The serial line encapsulations are incompatible.
E. The maximum transmission unit (MTU) size is too large.
F. The bandwidth setting is incompatible with the connected interface.
Answer: B
Explanation:
The connection between two routers must have IP addresses that belong to the same subnet, but in this case Atlanta is using 192.168.10.1/24 and the other is in 192.168.11.1/24.
Q8. - (Topic 3)
Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.)
A. Router(config)# router ospf 0
B. Router(config)# router ospf 1
C. Router(config)# router ospf area 0
D. Router(config-router)# network 192.168.16.0 0.0.0.255 0
E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0
F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0
Answer: B,E
Explanation:
In the router ospf command, the ranges from 1 to 65535 so o is an invalid number -> but To configure OSPF, we need a wildcard in the “network” statement, not a subnet mask. We also need to assgin an area to this process.
Q9. - (Topic 5)
What should be part of a comprehensive network security plan?
A. Allow users to develop their own approach to network security.
B. Physically secure network equipment from potential access by unauthorized individuals.
C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E. Minimize network overhead by deactivating automatic antivirus client updates.
Answer: B
Explanation:
From Cisco CCENT Exam Essentials study guide by Todd Lammle:
Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals.
List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations.
Reference:
CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition
by Todd Lammle
Published by Sybex, 2013
Q10. - (Topic 1)
Refer to the exhibit.
A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three.)
A. Network Device A is a switch.
B. Network Device B is a switch.
C. Network Device A is a hub.
D. Network Device B is a hub.
E. Area 1 contains a Layer 2 device.
F. Area 2 contains a Layer 2 device.
Answer: A,D,E
Explanation:
Switches use a separate collision domain for each port, so device A must be a switch. Hubs, however, place all ports in the same collision domain so device B is a hub. Switches reside in layer 2 while hubs are layer 1 devices.