Our pass rate is high to 98.9% and the similarity percentage between our ccna 100 105 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco 100 105 icnd1 v3 0 exam in just one try? I am currently studying for the Cisco ccna 100 105 exam. Latest Cisco icnd1 100 105 Test exam practice questions and answers, Try Cisco ccent ccna icnd1 100 105 Brain Dumps First.


2026 New 100-105 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/100-105/

Q1. - (Topic 3) 

What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router? 

A. 2 

B. 8 

C. 16 

D. unlimited 

Answer:

Explanation: 

Maximum-paths (OSPF) 

To control the maximum number of parallel routes that Open Shortest Path First (OSPF) 

can support, use the maximum-paths command. 

Syntax Description 

maximum 

Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16 routes. 

Command Default 

8 paths 

Q2. - (Topic 5) 

Refer to the exhibit. 

A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem? 

A. The NY router has an incorrect subnet mask. 

B. The TFTP server has an incorrect IP address. 

C. The TFTP server has an incorrect subnet mask. 

D. The network administrator computer has an incorrect IP address. 

Answer:

Explanation: 

The TFTP server is using a mask of 255.255.255.240 (/28) while the router is configured with a /29. Because of this, the Atlanta router does not see the TFTP server as being in the same subnet. 

Q3. - (Topic 1) 

Which two statements describe the operation of the CSMA/CD access method? (Choose two.) 

A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. 

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. 

C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method. 

D. After a collision, the station that detected the collision has first priority to resend the lost data. 

E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. 

F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data. 

Answer: B,E 

Explanation: 

Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn’t stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out. 

Q4. - (Topic 3) 

Which parameter or parameters are used to calculate OSPF cost in Cisco routers? 

A. Bandwidth 

B. Bandwidth and Delay 

C. Bandwidth, Delay, and MTU 

D. Bandwidth, MTU, Reliability, Delay, and Load 

Answer:

Explanation: 

The well-known formula to calculate OSPF cost is Cost = 108/ Bandwidth 

Q5. - (Topic 3) 

Refer to the exhibit. 

Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this router? 

A. 10.1.1.2 

B. 10.154.154.1 

C. 172.16.5.1 

D. 192.168.5.3 

Answer:

Explanation: 

The highest IP address of all loopback interfaces will be chosen -> Loopback 0 will be chosen as the router ID. 

Q6. - (Topic 3) 

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? 

A. 1 

B. 2 

C. 4 

D. 8 

E. 252 

F. 254 

Answer:

Explanation: 

/30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 which means 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet. 

Q7. - (Topic 3) 

Refer to the exhibit. 

If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed? 

A. Router1> 

B. Router1# 

C. Router2> 

D. Router2# 

Answer:

Explanation: 

After resuming the telnet session by using the Enter key after it has been suspended, it will resume back to the telnet session so it will be back to the router2> prompt. 

Q8. - (Topic 4) 

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) 

A. In an inbound access list, packets are filtered as they enter an interface. 

B. In an inbound access list, packets are filtered before they exit an interface. 

C. Extended access lists are used to filter protocol-specific packets. 

D. You must specify a deny statement at the end of each access list to filter unwanted traffic. 

E. When a line is added to an existing access list, it is inserted at the beginning of the access list. 

Answer: A,C 

Explanation: 

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect. 

Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic. 

access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any 

Q9. - (Topic 3) 

An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. 

Which of the following should be entered into the IP properties box for the sales server? 

A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9 

B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1 

C. IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25 

D. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17 

E. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.25 

Answer:

Explanation: 

With network 192.168.20.24/29 we have: 

Increment: 8 (/29 = 255.255.255.248 = 11111000 for the last octet) 

Network address: 192.168.20.24 (because 24 = 8 * 3) 

Broadcast address: 192.168.20.31 (because 31 = 24 + 8 – 1) 

Therefore the first usable IP address is 192.168.20.25 (assigned to the router) and the last usable IP address is 192.168.20.30 (assigned to the sales server). The IP address of the router is also the default gateway of the sales server. 

Q10. - (Topic 7) 

Which destination IP address can a host use to send one message to multiple devices across different subnets? 

A. 172.20.1.0 

B. 127.0.0.1 

C. 192.168.0.119 

D. 239.255.0.1 

Answer:

Explanation: Multicast is a networking protocol where one host can send a message to a special multicast IP address and one or more network devices can listen for and receive 

those messages. Multicast works by taking advantage of the existing IPv4 networking infrastructure, and it does so in something of a weird fashion. As you read, keep in mind that things are a little confusing because multicast was "shoe-horned" in to an existing technology. For the rest of this article, let's use the multicast IP address of 239.255.0.1. We'll not worry about port numbers yet, but make a mental note that they are used in multicast. We'll discuss that later.