[Free] 2017(Apr) Ensurepass Testking Cisco 100-105 Latest Dumps 191-200

Ensurepass
2017 April Cisco Official New Released 100-105 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/100-105.html

Interconnecting Cisco Networking Devices Part 1 v3.0 (ICND1)

 

QUESTION 191

From which of the following attacks can Message Authentication Code (MAC) shield your network?

 

A.

DoS

B.

DDoS

C.

spoofing

D.

SYN floods

 

Correct Answer: C

Explanation:

Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces the source address of the packets header with the address of the authorized host, and reinserts fake information which is sent to the receiver. This type of attack involves modifying packet contents. MAC can prevent th
is type of attack and ensure data integrity by ensuring that no data has changed. MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks.

MAC is a secure message digest that requires a secret key shared by the sender and receiver, making it impossible for sniffers to change both the data and the MAC as the receiver can detect the changes.

A denial-of-service (DoS) attack floods the target system with unwanted requests, causing the loss of service to users. One form of this attack generates a flood of packets requesting a TCP connection with the target, tying up all resources and making the target unable to service other requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense against a DoS attack.

A Distributed Denial of Service attack (DDoS) occurs when multiple systems are used to flood the network and tax the resources of the target system. Various intrusion detection systems, utilizing stateful packet filtering, can protect against DDoS attacks.

In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood attack is a type of denial of service attack that exploits the buffers of a device that accept incoming connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN cookies.

 

 

QUESTION 192

clip_image001

clip_image003

clip_image004

 

The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue?

 

clip_image005

 

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

 

Correct Answer: B

Explanation:

Do a “show ip int brief” and you will see that Fa0/1 has an IP address assigned, but it is shut down.

 

 

QUESTION 193

clip_image001[1]

clip_image006

clip_image004[1]

 

What is the subnet broadcast address of the LAN connected to Router1?

 

A.

192.168.8.15

B.

192.168.8.31

C.

192.168.8.63

D.

192.168.8.127

 

Correct Answer: A

Explanation:

The IP address assigned to FA0/1 is 192.168.8.9/29, making 192.168.8.15 the broadcast address.

 

 

QUESTION 194

What is the effect of using the service password-encryption command?

 

A.

Only the enable password will be encrypted.

B.

Only the enable secret password will be encrypted.

C.

Only passwords configured after the command has been entered will be encrypted.

D.

It will encrypt the secret password and remove the enable secret password from the configuration.

E.

It will encrypt all current and future passwords.

 

Correct Answer: E

Explanation:

Encryption further adds a level of security to the system as anyone having access to the database of passwords cannot reverse the process of encryption to know the actual passwords which isn’t the case if the passwords are stored simply.

 

 

QUESTION 195

Refer to the exhibit. After configuring two interfaces on the HQ router, the network administrator notices an error message. What must be done to fix this error?

 

clip_image007

 

A.

The serial interface must be configured first.

B.

The serial interface must use the address 192.168.1.2

C.

The subnet mask of the serial interface should be changed to 255.255.255.0

D.

The subnet mask of the FastEthernet interface should be changed to 255.255.255.240

E.

The address of the FastEthernet interface should be changed to 192.168.1.66

 

Correct Answer: D

Explanation:

The IP address 192.168.1.17 255.255.255.0 specifies that the address is part of the 192.168.1.0/24 subnet

 

24 mask bits = 255.255.255.0

28 mask bits = 255.255.255.240

192.168.1.0/24 subnet has a host range of 192.168.1.1 to 192.168.1.254 (0 being network and 255 being broadcoast)

192.168.1.17/28 subnet has a host range of 192.168.1.17 to 192.168.1.30 (16 being network and 31 being broadcast)

192.168.1.65/28 subnet has a host range of 192.168.1.65 – 192.168.1.78 (64 being network and 79 being broadcast)

 

If fa0/0 was left as /24, you can see that the host range includes the host range of 192.168.1.64/28 which conflicts. Simply speaking, you can’t overlap the subnets. By changing the subnet mask of fa0/0 to 255.255.255.240, these networks would no longer overlap.

 

 

QUESTION 196

clip_image008

clip_image009

 

Select two options which are security Issues which need to be modified before RouterA is used? (Choose two.)

 

A.

unencrypted weak password is configured to protect privilege mode

B.

inappropriate wording in banner message

C.

< font style="font-size: 10pt" color="#000000">the virtual terminal lines have a weak password configured

D.

virtual terminal lines have a password, but it will not be used

E.

configuration supports un-secure web server access

 

Correct Answer: BD

 

 

QUESTION 197

The network administrator has found the following problem. The remote networks 172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the Central router’s serial 0/0 interface. No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what is the most likely cause of the problem?

 

clip_image010

 

A.

no gateway of last resort on Central

B.

Central router’s not receiving 172.16.20.0 update

C.

incorrect static route for 172.16.20.0

D.

172.16.20.0 not located in Central’s routing table

 

Correct Answer: C

Explanation:

If we use 172.16.20.0 to route to 172.16.150.15, then the packet will route back. To clear this error we have to use #no ip route 172.16.20.0 255.255.255.0 172.16.150.15 command in configuration mode.

 

QUESTION 198

Refer to the exhibit. A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 on Switch1 is disconnected. What would be an effect of this cable being disconnected?

 

clip_image011

 

A.

Host B would not be able to access the server in VLAN9 until the cable is reconnected.

B.

Communication between VLAN3 and the other VLANs would be disabled.

C.

The transfer of files from Host B to the server in VLAN9 would be significantly slower.

D.

For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.

 

Correct Answer: D

Explanation:

Because Switch1 has multiple redundant links in this network, traffic would not work for less than a minute, and then it would get rerouted along the longer path to the host. The 1 minute outage would be the length of time it takes STP to converge.

 

 

QUESTION 199

Refer to the exhibit. A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem?

 

clip_image013

 

A.

A remote physical layer problem exists.

B.

The host NIC is not functioning.

C.

TCP/IP has not been correctly installed on the host.

D.

A local physical layer problem exists.

 

Correct Answer: D

Explanation:

Here we see that the host is able to ping its own loopback IP address of 127.0.0.1 and it’s own IP address of 10.0.0.35, so we know that the NIC is functioning and that the host’s TCP/IP stack is OK. However, it is not able to ping the IP address of its local default gateway, so we know that there is a local cabling problem between the switch and the router.

 

 

QUESTION 200

If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?

 

A.

half-duplex operation

B.

broadcast storms

C.

network segmentation

D.

multicasting

 

Correct Answer: B

Explanation:

A broadcast storm can consume sufficient network resources so as to render the network unable to transport normal traffic.

 

100% Free Download!
—Download Free Demo:100-105 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensu
repass 100-105 Full Exam PDF and VCE
Q&As:269
—Get 10% off your purchase! Copy it:8GTC-8UIE-M1SC [2017.04.01-2017.04.30]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE

HOT EXAM!
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com