Exam Code: ccna 100 105 pdf (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass ccent ccna icnd1 100 105 pdf Exam.


2026 New 100-105 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/100-105/

Q1. DRAG DROP - (Topic 4) 

Move the protocol or service on the left to a situation on the right where it would be used. (Not all options are used.) 

Answer:  

Q2. - (Topic 5) 

Refer to the exhibit. 

An administrator replaced the 10/100 Mb NIC in a desktop PC with a 1 Gb NIC and now the PC will not connect to the network. The administrator began troubleshooting on the switch. Using the switch output shown, what is the cause of the problem? 

A. Speed is set to 100Mb/s. 

B. Input flow control is off. 

C. Encapsulation is set to ARPA. 

D. The port is administratively down. 

E. The counters have never been cleared. 

Answer:

Explanation: 

For PC to switch connectivity, the speed settings must match. In this case, the 1 Gb NIC will not be able to communicate with a 100Mb fast Ethernet interface, unless the 1Gb NIC can be configured to connect at 100Mb. 

Q3. - (Topic 3) 

Refer to the exhibit. 

Why are two OSPF designated routers identified on Core-Router? 

A. Core-Router is connected to more than one multi-access network. 

B. The router at 208.149.23.130 is a secondary DR in case the primary fails. 

C. Two router IDs have the same OSPF priority and are therefore tied for DR election 

D. The DR election is still underway and there are two contenders for the role. 

Answer:

Explanation: 

OSPF elects one DR per multi-access network. In the exhibit there are two DR so there must have more than one multi-access network. 

Q4. - (Topic 7) 

Which component of a routing table entry represents the subnet mask? 

A. routing protocol code 

B. prefix 

C. metric 

D. network mask 

Answer:

Explanation: 

IP Routing Table Entry TypesAn entry in the IP routing table contains the following information in the order presented: Network ID. The network ID or destination corresponding to the route. The network ID can be class-based, subnet, or supernet network ID, or an IP address for a host route. Network Mask. The mask that is used to match a destination IP address to the network ID. Next Hop. The IP address of the next hop. Interface. An indication of which network interface is used to forward the IP packet. Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID. Routing table entries can be used to store the following types of routes: Directly Attached Network IDs. Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network. Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network. Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per-IP address basis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255. Default Route. The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 

0.0.0.0. 

Q5. - (Topic 5) 

What is the effect of using the service password-encryption command? 

A. Only the enable password will be encrypted. 

B. Only the enable secret password will be encrypted. 

C. Only passwords configured after the command has been entered will be encrypted. 

D. It will encrypt the secret password and remove the enable secret password from the 

configuration. 

E. It will encrypt all current and future passwords. 

Answer:

Explanation: 

Encryption further adds a level of security to the system as anyone having access to the database of passwords cannot reverse the process of encryption to know the actual passwords which isn’t the case if the passwords are stored simply. 

Q6. - (Topic 1) 

Refer to the exhibit. 

Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer:

Explanation: 

The Source and Destination IP address is not going to change. Host 1 IP address will stay 

as being the source IP and the Host 2 IP address will stay the destination IP address. 

Those two are not going to change. 

For the MAC address it is going to change each time it goes from one hope to another. 

(Except switches... they don't change anything) 

Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of 

Router 1. 

Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address. 

Q7. - (Topic 1) 

Refer to the exhibit. 

If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B? 

A. 10.168.10.99 

B. 10.168.11.88 

C. A1:A1:A1:A1:A1:A1 

D. B2:B2:B2:B2:B2:B2 

E. C3:C3:C3:C3:C3:C3 

F. D4:D4:D4:D4:D4:D4 

Answer:

Explanation: 

When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the existing router’s interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the destination router’s interface address. 

Q8. - (Topic 7) 

Which dynamic routing protocol uses only the hop count to determine the best path to a destination? 

A. IGRP 

B. RIP 

C. EIGRP 

D. OSPF 

Answer:

Q9. - (Topic 5) 

What should be part of a comprehensive network security plan? 

A. Allow users to develop their own approach to network security. 

B. Physically secure network equipment from potential access by unauthorized individuals. 

C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. 

D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. 

E. Minimize network overhead by deactivating automatic antivirus client updates. 

Answer:

Explanation: 

From Cisco CCENT Exam Essentials study guide by Todd Lammle: 

Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals. 

List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations. 

Reference: 

CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition 

by Todd Lammle 

Published by Sybex, 2013 

Q10. - (Topic 3) 

Which three statements are correct about RIP version 2? (Choose three) 

A. It uses broadcast for its routing updates. 

B. It supports authentication. 

C. It is a classless routing protocol. 

D. It has a lower default administrative distance then RIP version 1. 

E. It has the same maximum hop count as RIP version 1. 

F. It does not send the subnet mask any updates. 

Answer: B,C,E 

Explanation: 

A and E are correct according to the theory of RIP. 

RIP version 1 updates are broadcasts, and RIP version 2 updates are multicast to 

224.0.0.9 -> B is not correct. 

RIP v1 is a classful routing protocol but RIP v2 is a classless routing protocol -> C is 

correct. 

RIPv1 and RIPv2 have the same default administrative distance of 120 -> D is not correct. 

RIPv2 is a classless routing protocol so it does send the subnet mask in updates -> F is not 

correct.