Latest Cisco 100-101 ICND1 Real Exam Download 81-90

By | August 15, 2013





Correct Answer:





The following commands are entered on the router:


Burbank(config)# enable secret fortress

Burbank(config)# line con 0

Burbank(config-line)# login

Burbank(config-line)# password n0way1n

Burbank(config-line)# exit

Burbank(config)# service password-encryption


What is the purpose of the last command entered?


A.      to require the user to enter an encrypted password during the login process

B.      to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

C.      to encrypt the enable secret password

D.      to provide login encryption services between hosts attached to the router


Correct Answer: B




What is the effect of using the service password-encryption command?


A.      Only the enable password will be encrypted.

B.      Only the enable secret password will be encrypted.

C.      Only passwords configured after the command has been entered will be encrypted.

D.      It will encrypt the secret password and remove the enable secret password from the configuration.

E.       It will encrypt all current and future passwords.


Correct Answer: E




An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?


A.      Enable port security and use the keyword sticky.

B.      Set the switchport mode to trunk and save the running configuration.

C.      Use the switchport protected command to have the MAC addresses added to the configuration.

D.      Use the no switchport port-security command to allow MAC addresses to be added to the configuration.


Correct Answer: A




A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)


A.      Enable port security.

B.      Create the port as a trunk port.

C.      Create the port as an access port.

D.      Create the port as a protected port.

E.       Set the port security aging time to 0.

F.       Statically assign the MAC address to the address table.

G.      Configure the switch to discover new MAC addresses after a set time of inactivity.


Correct Answer: ACF




Why would a network administrator configure port security on a switch?


A.      to prevent unauthorized Telnet access to a switch port

B.      to prevent unauthorized hosts from accessing the LAN

C.      to limit the number of Layer 2 broadcasts on a particular switch port

D.      block unauthorized access to the switch management interfaces


Correct Answer: B




How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?


A.      Configure port Fa0/1 to accept connections only from the static IP address of the server.

B.      Configure the server MAC address as a static entry of port security.

C.      Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.

D.      Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.


Correct Answer: B




Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem?




A.      The serial interface is configured for half duplex.

B.      The serial interface does not have a cable attached.

C.      The serial interface has the wrong type of cable attached.

D.      The serial interface is configured for the wrong frame size.

E.       The serial interface has a full buffer.


Correct Answer: C




Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem?




A.      The NY router has an incorrect subnet mask.

B.      The TFTP server has an incorrect IP address.

C.      The TFTP server has an incorrect subnet mask.

D.      The network administrator computer has an incorrect IP address.


Correct Answer: C




If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?


A.      half-duplex operation

B.      broadcast storms

C.      network segmentation

D.      multicasting


Correct Answer: B



Download Latest Cisco 100-101 ICND1 Real Free Tests , help you to pass exam 100%.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.