試験科目：Implementing Cisco Threat Control Solutions (SITCS)
試験科目：Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0)
IT認定試験の中でどんな試験を受けても、JPshikenの100-105試験感想はあなたに大きなヘルプを与えることができます。それは JPshikenの100-105試験感想には実際の試験に出題される可能性がある問題をすべて含んでいて、しかもあなたをよりよく問題を理解させるように詳しい解析を与えますから。真剣にJPshikenのCisco 100-105試験感想を勉強する限り、受験したい試験に楽に合格することができるということです。
NO.1 Refer to the graphic.
R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this
problem? (Choose two.)
A. All of the routers need to be configured for backbone Area 1.
B. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being
C. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3.
D. EIGRP is also configured on these routers with a lower administrative distance.
E. R1 and R3 are configured in different areas.
F. The hello and dead interval timers are not set to the same values on R1 and R3.
This question is to examine the conditions for OSPF to create neighborhood.
So as to make the two routers become neighbors, each router must be matched with the
1.The area ID and its types;
2.Hello and failure time interval timer;
3.OSPF Password (Optional);
NO.2 From which of the following attacks can Message Authentication Code (MAC) shield your
B. SYN floods
Message Authentication Code (MAC) can shield your network from spoofing attacks. Spoofing, also
known as masquerading, is a popular trick in which an attacker intercepts a network packet, replaces
the source address of the packets header with the address of the authorized host, and reinserts fake
information which is sent to the receiver. This type of attack involves modifying packet contents.
MAC can prevent this type of attack and ensure data integrity by ensuring that no data has changed.
MAC also protects against frequency analysis, sequence manipulation, and ciphertext-only attacks.
MAC is a secure message digest that requires a secret key shared by the sender and receiver, making
it impossible for sniffers to change both the data and the MAC as the receiver can detect the
changes. A denial-of-service (DoS) attack floods the target system with unwanted requests, causing
the loss of service to users. One form of this attack generates a flood of packets requesting a TCP
connection with the target, tying up all resources and making the target unable to service other
requests. MAC does not prevent DoS attacks. Stateful packet filtering is the most common defense
against a DoS attack. A Distributed Denial of Service attack (DDoS) occurs when multiple systems are
used to flood the network and tax the resources of the target system. Various intrusion detection
systems, utilizing stateful packet filtering, can protect against DDoS attacks. In a SYN flood attack, the
attacker floods the target with spoofed IP packets and causes it to either freeze or crash. A SYN flood
attack is a type of denial of service attack that exploits the buffers of a device that accept incoming
connections and therefore cannot be prevented by MAC. Common defenses against a SYN flood
attack include filtering, reducing the SYN-RECEIVED timer, and implementing SYN cache or SYN
NO.3 Refer to the exhibit.
A TFTP server has recently been installed in the Atlanta office. The network administrator is located
in the NY office and has made a console connection to the NY router. After establishing the
connection they are unable to backup the configuration file and IOS of the NY router to the TFTP
server. What is the cause of this problem?
A. The TFTP server has an incorrect subnet mask.
B. The NY router has an incorrect subnet mask.
C. The TFTP server has an incorrect IP address.
D. The network administrator computer has an incorrect IP address.
The TFTP server is using a mask of 255.255.255.240 (/28) while the router is configured with a /29.
Because of this, the Atlanta router does not see the TFTP server as being in the same subnet.
NO.4 Refer to the exhibit.
Mary is sending an instant message to Robert. The message will be broken into a series of packets
that will traverse all network devices. What addresses will populate these packets as they are
forwarded from Router1 to Router2?
A. Option E
B. Option A
C. Option C
D. Option B
E. Option D
The Source and Destination IP address is not going to change. Host 1 IP address will stay
as being the source IP and the Host 2 IP address will stay the destination IP address.
Those two are not going to change.
For the MAC address it is going to change each time it goes from one hope to another.
(Except switches... they don't change anything)
Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of
Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting
interface, and making Router2's interface as the destination MAC address. Then the same will
happen... Router2 is going to change the source/destination info to the source MAC being the
Router2 interface that it is going out, and the destination will be Host2's MAC address.