[Free] 2019(Nov) EnsurePass Cisco 100-105 Dumps with VCE and PDF 181-190

Get Full Version of the Exam

Question No.181

Refer to the exhibit. Why was this message received?


  1. No VTY password has been set.

  2. No enable password has been set.

  3. No console password has been set.

  4. No enable secret password has been set.

  5. The login command has not been set on CON 0

  6. The login command has not been set on the VTY ports.

Correct Answer: A


Your CCNA certification exam is likely going to contain questions about Telnet, an application- level protocol that allows remote communication between two networking devices. With Telnet use being as common as it is, you had better know the details of how to configure it in order to pass your CCNA exam and to work in real-world networks.

The basic concept is pretty simple – we want to configure R1, but we#39;re at R2. If we telnet successfully to R1, we will be able to configure R1 if we#39;ve been given the proper permission levels. In this CCNA case study, R2 has an IP address of and R1 an address of Let#39;s try to telnet from R2 to R1.


Trying … Open Password required, but none set

[Connection to closed by foreign host]

This seems like a problem, but it#39;s a problem we#39;re happy to have. A Cisco router will not let any user telnet to it by default. That#39;s a good thing, because we don#39;t want just anyone connecting to our router! The quot;password requiredquot; message means that no password has been set on the VTY lines on R1. Let#39;s do so now.

R1(config)#line vty 0 4

R1(config-line)#password baseball

A password of quot;baseballquot; has been set on the VTY lines, so we shouldn#39;t have any trouble using Telnet to get from R2 to R1. Let#39;s try that now.


Trying … Open User Access Verification Password:


We#39;re in, and placed into user exec mode.

Reference: http://www.mcmcse.com/cisco/guides/telnet_passwords_and_privilege_levels.shtml

Question No.182


Which of the following is true regarding the configuration of SwitchA?

  1. only 5 simultaneous remote connections are possible

  2. remote connections using ssh will require a username and password

  3. only connections from the local network will be possible

  4. console access to SwitchA requires a password

Correct Answer: B

Question No.183

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?

  1. decrease the window size

  2. use a different source port for the session

  3. decrease the sequence number

  4. obtain a new IP address from the DHCP server

  5. start a new session using UDP

Correct Answer: A


The Window bit in the header determines the number of segments that can be sent at a time. This is done to avoid overwhelming the destination. At the start of the session the window in small but it increases over time. The destination host can also decrease the window to slow down the flow. Hence the window is called the sliding window. When the source has sent the number of segments allowed by the window, it cannot send any further segments till an acknowledgement is received from the destination. On networks with high error rates or issues, decreasing the window size can result in more reliable transmission, as the receiver will need to acknowledge fewer segments. With a large window size, the sender will need to resend all the frames if a single one is not received by the receiver.

Question No.184

Refer to the exhibit. After the power-on-self test (POST), the system LED of a Cisco 2950 switch turns amber. What is the status of the switch?


  1. The POST was successful.

  2. The switch has a problem with the internal power supply and needs an external power supply to be attached.

  3. POST failed and there is a problem that prevents the operating system from being loaded.

  4. The switch has experienced an internal problem but data can still be forwarded at a slower rate.

  5. The switch passed POST, but all the switch ports are busy.

Correct Answer: C




Each time you power up the switch, eight Power-On Self Tests (POSTs) run automatically. POSTs check the most important system components before the switch begins to forward packets. When the switch begins the POST, the port status LEDs display amber for two seconds, and then display green. As each test runs, the port status LEDs go out. 1x is the first to go out.

The port status LEDs for ports 2x through 8x go out sequentially as the system completes a test. When the POST completes successfully, the port status LEDs go out. This indicates that the switch is operational. If a test fails, the port status LED associated with the test displays amber. The system LED also displays amber.

Not E: From Cisco IOS Software Release 11.2(8.5) SA6 onwards, the port and system LEDs both remain amber after a POST failure. In the earlier Cisco IOS Software Releases, only the LEDs of failed linked ports remained amber.

Question No.185

What should be part of a comprehensive network security plan?

  1. Allow users to develop their own approach to network security.

  2. Physically secure network equipment from potential access by unauthorized individuals.

  3. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.

  4. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.

  5. Minimize network overhead by deactivating automatic antivirus client updates.

Correct Answer: B


From Cisco CCENT Exam Essentials study guide by Todd Lammle:

Know what the first part of a comprehensive network security plan is. The first part of your comprehensive network security plan is to physically secure network equipment from potential access by unauthorized individuals.

List the recommended ways of protecting network devices from outside network security threats. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations.


CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition by Todd Lammle Published by Sybex, 2013

Question No.186

Refer to the exhibit. A user cannot reach any web sites on the Internet, but others in the department are not having a problem. What is the most likely cause of the problem?


  1. IP routing is not enabled.

  2. The default gateway is not in the same subnet.

  3. A DNS server address is not reachable by the PC.

  4. A DHCP server address is not reachable by the PC.

  5. NAT has not been configured on the router that connects to the Internet.

Correct Answer: C


Answer C is only answer that makes sense. IP routing does not need to be enabled on PC#39;s, this is a router function. We can see from the output that the PC and default gateway are on the same subnet. DHCP has not been enabled on this PC so it has been configured with a static address so reaching the DHCP server is not the issue. Finally, NAT must be configured correctly or the other users in the department would also be having issues.

Question No.187

An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?

  1. Enable port security and use the keyword sticky.

  2. Set the switchport mode to trunk and save the running configuration.

  3. Use the switchport protected command to have the MAC addresses added to the configuration.

  4. Use the no switchport port-security command to allow MAC addresses to be added to the configuration.

Correct Answer: A

Explanation: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_ sec.pdf

One can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts, hence enabling security as desired.

Question No.188

Refer to the exhibit. The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation?


  1. Verify that the DNS server address is correct in the DHCP pool.

  2. Ping the default gateway to populate the ARP cache.

  3. Use the tracert command on the DHCP client to first determine where the problem is located.

  4. Clear all DHCP leases on the router to prevent address conflicts.

  5. Issue the ipconfig command with the /release and /renew options in a command window.

Correct Answer: E


A PC will retain its DHCP assigned IP address until the lease time expires, which often times is 24 hours or more. When changes are made to the DHCP server, the client should issue the ipconfig/release and then ipconfig/renew commands to obtain a new IP address lease.

Question No.189

Why would a network administrator configure port security on a switch?

  1. to prevent unauthorized Telnet access to a switch port

  2. to prevent unauthorized hosts from accessing the LAN

  3. to limit the number of Layer 2 broadcasts on a particular switch port

  4. block unauthorized access to the switch management interfaces

Correct Answer: B


You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

Question No.190


Drag the appropriate command on the left to the configuration task it accomplishes. (Not all options are used.)


Correct Answer:


Get Full Version of the Exam
100-105 Dumps
100-105 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.