Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
Question No: 21 – (Topic 1)
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?
Answer: C Explanation:
The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch.
Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting the network.
CDP messages are generated every 60 seconds as multicast messages on each of its active interfaces.
The information shared in a CDP packet about a Cisco device includes the following: Name of the device configured with the hostname command
IOS software version
Hardware capabilities, such as routing, switching, and/or bridging Hardware platform, such as 2600, 2950, or 1900
The layer-3 address(es) of the device
The interface the CDP update was generated on
Reference: http://computernetworkingnotes.com/cisco-devices-administration-and- configuration/cisco-discoveryprotocol.html
Question No: 22 – (Topic 1)
Refer to the exhibit.
The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router?
Answer: E Explanation:
Although the source and destination MAC address will change as a packet traverses a network, the source and destination IP address will not unless network address translation (NAT) is being done, which is not the case here.
Question No: 23 – (Topic 1)
Which statements accurately describe CDP? (Choose three.)
CDP is an IEEE standard protocol.
CDP is a Cisco proprietary protocol.
CDP is a datalink layer protocol.
CDP is a network layer protocol.
CDP can discover directly connected neighboring Cisco devices.
CDP can discover Cisco devices that are not directly connected.
Answer: B,C,E Explanation:
CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices containing useful info for troubleshooting and documenting the network.
Question No: 24 – (Topic 1)
Refer to the exhibit.
Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?
Answer: B Explanation:
The Source and Destination IP address is not going to change. Host 1 IP address will stay as being the source IP and the Host 2 IP address will stay the destination IP address.
Those two are not going to change.
For the MAC address it is going to change each time it goes from one hope to another. (Except switches… they don#39;t change anything)
Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of Router 1.
Router 1 is going to strip that info off and then will make the source MAC address of Router1#39;s exiting interface, and making Router2#39;s interface as the destination MAC address.
Then the same will happen… Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2#39;s MAC address.
Question No: 25 – (Topic 1)
Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?
Question No: 26 – (Topic 1)
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)
layer 3 support
Answer: B,D Explanation: Access layer
The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access
to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP).
Switch features in the Access layer:
->Fast Ethernet/Gigabit Ethernet
->Power over Ethernet (PoE)
->Quality of Service (QoS)
Question No: 27 – (Topic 1)
Which statements are true regarding ICMP packets? (Choose two.)
They acknowledge receipt of TCP segments.
They guarantee datagram delivery.
TRACERT uses ICMP packets.
They are encapsulated within IP datagrams.
They are encapsulated within UDP datagrams.
Answer: C,D Explanation:
Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity, which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools, which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol).
ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special quot;signaturequot; known as the packet’s Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively.
In the ping service, after receiving the ICMP quot;echo requestquot; packet from the source location, the destination
Question No: 28 DRAG DROP – (Topic 1)
On the left are various network protocols. On the right are the layers of the TCP/IP model. Assuming a reliable connection is required, move the protocols on the left to the TCP/IP layers on the right to show the proper encapsulation for an email message sent by a host on a LAN. (Not all options are used.)
Question No: 29 – (Topic 1)
At which layer of the OSI model does the protocol that provides the information that is
displayed by the show cdp neighbors command operate?
Answer: E Explanation:
CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco- manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols.
CDP allows devices to share basic configuration information without even configuring any protocol specific information and is enabled by default on all interfaces.
CDP is a Datalink Protocol occurring at Layer 2 of the OSI model.
CDP is not routable and can only go over to directly connected devices.
CDP is enabled, by default, on all Cisco devices. CDP updates are generated as multicasts every 60 seconds with a hold-down period of 180 seconds for a missing neighbor. The no cdp run command globally disables CDP, while the no cdp enable command disables CDP on an interface. Use show cdp neighbors to list out your directly connected Cisco neighboring devices. Adding the detail parameter will display the layer-3 addressing configured on the neighbor.
Question No: 30 – (Topic 1)
A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.)
A crossover cable should be used in place of the straight-through cable.
A rollover cable should be used in place of the straight-through cable.
The subnet masks should be set to 255.255.255.192
A default gateway needs to be set on each host.
The hosts must be reconfigured to use private IP addresses for direct connections of this type.
The subnet masks should be set to 255.255.255.0
Answer: A,F Explanation:
If you need to connect two computers but you don#39;t have access to a network and can#39;t set up an ad hoc network, you can use an Ethernet crossover cable to create a direct cable connection.
Generally speaking, a crossover cable is constructed by reversing (or crossing over) the order of the wires inside so that it can connect two computers directly. A crossover cable looks almost exactly like a regular Ethernet cable (a straight-through cable), so make sure you have a crossover cable before following these steps.
Both devices need to be on the same subnet, and since one PC is using 188.8.131.52 and the other is using 184.108.40.206, the subnet mask should be changed to 255.255.255.0.
100% Free Download!
–Download Free Demo:100-105 Demo PDF
100% Pass Guaranteed!
–Download 2017 Dumps4Cert 100-105 Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|