This page was exported from Free Exams Dumps Materials [ http://exams.dumpsmaterials.com ] Export date:Thu Nov 21 15:34:59 2024 / +0000 GMT ___________________________________________________ Title: 2022 Realistic 100-101 Dumps Latest Cisco Practice Tests Dumps [Q45-Q67] --------------------------------------------------- 2022 Realistic 100-101 Dumps Latest Cisco Practice Tests Dumps 100-101 Dumps PDF - 100-101 Real Exam Questions Answers NO.45 Refer to the exhibit.The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch.What two operations will the switch perform when it receives this frame? (Choose two.)  The MAC address of 0000.00aa.aaaa will be added to the MAC address table.  The MAC address of 0000.00dd.dddd will be added to the MAC address table.  The frame will be forwarded out port fa0/3 only.  The frame will be forwarded out fa0/1, fa0/2, and fa0/3.  The frame will be forwarded out all the active ports. If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.It will also add the MAC address of the source device to its MAC address tableTopic 3, IP addressing (IPv4 / IPv6)NO.46 Which network device functions only at Layer 1 of the OSI model?  Option A  Option B  Option C  Option D  Option E Most hubs are amplifying the electrical signal; therefore, they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices.NO.47 A body care brand is launching a new skincare line in the upcoming campaign the brand wants to individually showcase the new products with the ability to lead users to their respective product pages.Which ad format should the brand use?  Carousel  Image  Video  Slideshow NO.48 Refer to the exhibit.A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations.A ping from Host1 to Host 2 fails, but the technician is able to ping the S0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem?  The serial cable on R1 needs to be replaced.  The interfaces on R2 are not configured properly  R1 has no route to the 192.168.1.128 network.  The IP addressing scheme has overlapping subnetworks.  The ip subnet-zero command must be configured on both routers. Explanation/Reference:Without a static route pointing to host 2 network the router is unaware of the path to take toreach that network and reply traffic cannot be sent.NO.49 The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements.Which three items will adequately fulfill the request? (Choose three).  One IP subnet with a mask of 255.255.254.0  Two IP subnets with a mask of 255.255.255.0  Seven 48-port hubs  Seven 48-port switches  One router interface  Seven router interfaces Explanation/Reference:of 255.255.254.0 can absorb 510 hosts being 23 bits mask and also 7*48 port switches canhandle this much hosts and router interface is required to be minimum to avoidunnecessary wastage hence the answers.NO.50 Which option is best to reach existing customers?  Lookalike Audience  Custom Audience  Conversion audience  Interest-based audience NO.51 Refer to the exhibit.As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three.)  Hub1  Switch1  Router1  Switch2  Router2  Switch3 Switches use the destination MAC address information for forwarding traffic, while routers use the destination IP address information. Local Area Networks employ Layer 2 Switches and Bridges to forward and filter network traffic. Switches and Bridges operate at the Data Link Layer of the Open System Interconnect Model (OSI). Since Switches and Bridges operate at the Layer 2 they operate more intelligently than hubs, which work at Layer 1 (Physical Layer) of the OSI. Because the switches and bridges are able to listen to the traffic on the wire to examine the source and destination MAC address. Being able to listen to the traffic also allows the switches and bridges to compile a MAC address table to better filter and forward network traffic. To accomplish the above functions switches and bridges carry out the following tasks: MAC address learning by a switch or a bridge is accomplished by the same method. The switch or bridge listens to each device connected to each of its ports and scan the incoming frame for the source MAC address. This creates a MAC address to port map that is cataloged in the switches/bridge MAC database. Another name for the MAC address table is content addressable memory orCAM table. When a switch or bridge is listening o the network traffic, it receives each frame and compares it to the MAC address table. By checking the MAC table the switch/ bridge are able o determine which port the frame came in on. If the frame is on the MAC table the frame is filtered or transmitted on only that port. If the switch determines that the frame is not on the MAC table, the frame is forwarded out to all ports except the incoming port.NO.52 A company is delivering multiple ad sets and ads within a single campaign. The company wants to know the amount spent on a specific ad. Where can this be found?  The Campaigns tab within Ads Manager in the Budget column  The Ads tab within Ads Manager in the Amount Spent column  The Campaigns tab within Ads Manager in the Amount Spent column  The Ads tab within Ads Manager m the Budget column NO.53 Which IOS command is used to initiate a login into a VTY port on a remote router?  router# login  router# telnet  router# trace  router# ping  router(config)# line vty 0 5  router(config-line)# login VTY ports are telnet ports hence command B will initiate login to the telnet port.NO.54 Where can people see a boosted post?  Audience Network  WhatsApp  Messenger  Instagram NO.55 Which command is used to display the collection of OSPF link states?  show ip ospf link-state  show ip ospf lsa database  show ip ospf neighbors  show ip ospf database The “show ip ospf database” command displays the link states. Here is an example:Here is the lsa database on R2.R2#show ip ospf databaseOSPF Router with ID (2.2.2.2) (Process ID 1)Router Link States (Area 0)Link ID ADV Router Age Seq# Checksum Link count2.2.2.2 2.2.2.2 793 0x80000003 0x004F85210.4.4.4 10.4.4.4 776 0x80000004 0x005643 1111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA 2133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0) Link ID ADV Router Age Seq# Checksum10.1.1.1 111.111.111.111 794 0x80000001 0x001E8B10.2.2.3 133.133.133.133 812 0x80000001 0x004BA910.4.4.1 111.111.111.111 7550x80000001 0x007F1610.4.4.3 133.133.133.133 775 0x80000001 0x00C31FNO.56 An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?  Router# show startup-config  Router# show current-config  Router# show running-config  Router# show memory  Router# show flash  Router# show processes This command followed by the appropriate parameter will show the running config hence the admin will be able to see what changes have been made, and then they can be saved.NO.57 How should an advertiser describe Meta Conversion API to a customer?  A series of standard and custom events tracked through a base code installed on an advertiser’s website  A way to track app login and events by integrating SDK to the mobile app  A piece of code for a website that allows measuring, optimizing and building audiences for ad campaigns  A direct connection to an advertiser’s server to optimize ad targeting decrease CPA and measure results NO.58 On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?  RTP  TCP  CDP  UDP The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch.NO.59 An advertiser initially creates a Conversions objective campaign and optimizes for landing page views. The advertiser then decides to increase the budget.Which change might the advertiser observe when using the estimated daily results tool?  Estimated impressions increase  Estimated conversions decrease  Estimated clicks decrease  Estimated reach increases NO.60 A brand launches a new website and wants to encourage people to visit it. What should the brand select first to create the campaign?  The appropriate ad objective  Custom Audiences and Lookalike Audiences  Automatic Placements  The right creative for the campaign  The right call to action for the audience NO.61 Which of the following statements are TRUE regarding Cisco access lists? (Choose two.)  In an inbound access list, packets are filtered as they enter an interface.  In an inbound access list, packets are filtered before they exit an interface.  Extended access lists are used to filter protocol-specific packets.  You must specify a deny statement at the end of each access list to filter unwanted traffic.  When a line is added to an existing access list, it is inserted at the beginning of the access list. Explanation/Reference: In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include: Filtering traffic as it passes through the router To control access to the VTY lines (Telnet) To identify “interesting” traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699. Other features of access lists include: Inbound access lists are processed before the packet is routed. Outbound access lists are processed after the packet has been routed to an exit interface. An “implicit deny” is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped). Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect.Packets are filtered as they exit an interface when using an outbound access list. The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list. When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic.access-list 110 permit ip host 192.168.5.1 any access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any anyTopic 6, Network Device SecurityNO.62 Which layer of the TCP/IP stack combines the OSI model physical and data link layers?  Internet layer  transport layer  application layer  network access layer Explanation/Reference: The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD’s goal was to bring international standards which could not be met by the OSI model. Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather then the OSI. Below is a side by side comparison of the TCP/IP and OSI models.NO.63 Refer to the exhibit.SwitchA receives the frame with the addressing shown in the exhibit. According to the command output also shown in the exhibit, how will SwitchA handle this frame?  It will drop the frame.  It will forward the frame out port Fa0/6 only.  It will forward the frame out port Fa0/3 only.  It will flood the frame out all ports.  It will flood the frame out all ports except Fa0/3. When frame receives the frame, it checks the source address on MAC table if MAC address found in MAC table it tries to forward if not in MAC table adds the Address on MAC table. After checking the source address, it checks the destination address on MAC table, if MAC address found on MAC table it forwards to proper ports otherwise floods on all ports except the source port.NO.64 A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown.router#show interfacesSerial0/1/0 is up, line protocol is downAt which OSI layer should the administrator begin troubleshooting?  physical  data link  network  transport Explanation/Reference: https://learningnetwork.cisco.com/thread/12389I think the indication here is “Serial 0 is up, line protocol is down”. What causes this indication? Correct me if I am wrong. When you have this indication, a cable unplugged is not a correct answer. If you check the output of your “show interface serial 0” command again, you should notice it as “Serial 0 is down, line protocol is down. Under the “show ip int brief” you should see status = down and protocol = down as opposed to up, down. Because you disconnected the cable, layer 1 will go down, which is indicated by the serial 0 down status. The line protocol status is for layer 2. So, a cable unplugged is not a correct answer to “Serial 0 is up, line protocol is down”. Hope this helps.NO.65 A business wants to reply privately to a customer’s message.Which two solutions can the business use? (Choose 2)  Business Suite  Facebook Page Inbox  Ads Manager  Audience Network NO.66 Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme? (Choose three)  static mapping of IPv4 address to IPv6 addresses  configuring IPv4 tunnels between IPv6 islands  use DHCPv6 to map IPv4 addresses to IPv6 addresses  use proxying and translation (NAT-PT) to translate IPv6 packets into IPv4 packets  configure IPv6 directly  enable dual-stack routing Explanation/Reference: http://www.opus1.com/ipv6/howdoitransitiontoipv6.html Connecting IPv6 islands with tunnels An IPv6 island is a network made of IPv6 links directly connected by IPv6 routers. In the early days of IPv6 deployment, there are many IPv6 islands. IPv6 in IPv4 tunnels are used to connect those islands together. In each island, one (or more) dual stack routers are designated to encapsulate and decapsulate IPv6 packets within IPv4 packets. Different mechanisms have been developed to manage tunnels: automatic tunnels3, configured tunnels3, tunnel brokers3, 6over43, 6to43,… Reference 2: http://www.petri.co.il/ipv6-transition.htm Network Address Translation – Protocol Translation (NAT-PT) The NAT-PT method enables the ability to either statically or dynamically configure a translation of a IPv4 network address into an IPv6 network address and vice versa. For those familiar with more typically NAT implementations, the operation is very similar but includes a protocol translation function. NAT-PT also ties in an Application Layer Gateway (ALG) functionality that converts Domain Name System (DNS) mappings between protocols.Dual Stack The simplest approach when transitioning to IPv6 is to run IPv6 on all of the devices that are currently running IPv4. If this is something that is possible within the organizational network, it is very easy to implement. However, for many organizations, IPv6 is not supported on all of the IPv4 devices; in these situations other methods must be considered.NO.67 Refer to the exhibit.Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)  It ensures that data will be forwarded by RouterB.  It provides stability for the OSPF process on Router  It specifies that the router ID for RouterB should be 10.0.0.1.  It decreases the metric for routes that are advertised from RouterB.  It indicates that RouterB should be elected the DR for the LAN. Explanation A loopback interface never comes down even if the link is broken so it provides stability for the OSPF process (for example we use that loopback interface as the router-id) The router-ID is chosen in the order below:+ The highest IP address assigned to a loopback (logical) interface.+ If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen. -> The loopback interface will be chosen as the router ID of RouterB Loading … 100-101 Premium Exam Engine pdf Download: https://www.dumpsmaterials.com/100-101-real-torrent.html --------------------------------------------------- Images: https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-11-08 13:14:30 Post date GMT: 2022-11-08 13:14:30 Post modified date: 2022-11-08 13:14:30 Post modified date GMT: 2022-11-08 13:14:30