• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/76

Click to flip

76 Cards in this Set

  • Front
  • Back
Briefly describe the Class A IP addresses.
Assigned for governments and large corporations, 1-126 for their first octet number. Basic subnet masking of 255.0.0.0.
Basic routing protocols such as RIP version 1 and IGRP support VLSM.

True
False
False
They cannot support VLSM because they do not send subnet information in their updates.
The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask.

prefix
suffix
route mask
mask table
prefix
The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.

binary
decimal
hexadecimal
vigesimal
hexadecimal
It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is reserved as the ____ address.

multicast
loopback
broadcast
unicast
loopback
IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them.

multicasting
anycasting
unicasting
broadcasting
broadcasting
In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.

classful
class-dependant
class-based
classless
classless
To determine how many digits are used for the network identifier, you must look at the ____, which is a required component for all IP hosts.

subnet mask
MAC mask
network mask
TCP/IP mask
subnet mask
____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.

Tunneling
Scheduling
Natting
Dual stack
Tunneling
TCP/IP networks cannot use MAC addresses in communication.

True
False
False
TCP/IP networks can use MAC addresses in communication.
However they do not efficiently route traffic on a large network or on the internet and can not provide information on physical or logical network configuration.
Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC and IPv6 addresses.

2
16
20
21
16
____________________ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255.
?
____ is the version of IP currently deployed on most systems today.

IPX
IP2
IPv6
IPv4
IPv4
The allocation of network numbers based on CIDR has let to the depletion of IP addresses.

True
False
False

CIDR was developed to SLOW the exhaustion of IP addresses.
Briefly describe the hexadecimal numbering system.
The hexadecimal system is a base 16 number system comprised of the numbers 0-9 and then transitioning to letters A-F to represent the numbers 10-15.
Briefly describe Class C IP addresses.
For medium to small sized companies, the Ip addressing ranges from 192-223 and has a basic subnet mask of 255.255.255.0.
What are some reasons to incorporate subnetting into an organization’s network?
to provide private IP ranges within the organization. Also to configure more or less hosts or subnets depending on organizational needs.
The purpose of ____________________ is to allow many IP subnets to be advertised as one.
Summarization
____ is the most important layer 3 security protocol.

IPSec
ARP
DNS
NAT
Internet Security Protocol
(IPSec)
The ____ port allows a remote administrator to dial into the router through an external modem.

auxiliary
console
virtual
terminal
Auxiliary
What are some of the types of interfaces in a Cisco router?
Console, Auxiliray, Virtual terminals (VTY)
How can you configure a router host name?
config t (to enter global configuration mode) > then type hostname followed by the name that you want to use.

IE Router (config)# hostname router22 <Enter>
Routers operate at the Application layer of the OSI reference model.

True
False
False, they operate at the Network layer
How can you configure a router’s banner?
Must be in global configuration mode and then type banner motd followed by a space and then any delimiting character on the keyboard. Then the system will prompt you to enter the TEXT message and end your message with the set delimiter.

IE Router (config)# banner motd #
Welcome to Router1! #
The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router.

True
False
True
When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode.

privileged
admin
superuser
user
user
You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt.

init
config
dialog
setup
setup
The editing command ____ moves the cursor to the end of the current line.

Ctrl+E
Ctrl+F
Esc+B
Esc+F
Ctrl+E
Describe the router’s ROM.
loads the bootstrap program and initializes the routers basic hardware components
You can configure a description for each of the interfaces physically attached to your router by using the ____ command.

banner
description
motd
interface
description
To enter privileged EXEC, you can type the ____ command at the user mode prompt.

sudo
setup
enable
privileged
enable
The content of ROM is maintained even when the router is rebooted.

True
False
True
User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode.

privileged
config
user
router
privileged
Network administrators commonly configure and interact with a Cisco router via the Cisco ____________________.
Internetwork Operating System (IOS)
If you want to remove the enable secret password, you can type ____ at the global configuration mode prompt.

enable secret off
enable off
no enable secret
no secret
no enable secret
In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco router.

True
False
True
When entering the time zone, you must include the name of the time zone and the offset from the ____________________.
Coordinated Universal Time (UTC) Otherwise known as Greenwich Mean Time
During a POST, the bootstrap program, also called the ____________________, checks basic operations of the attached hardware, including CPU, memory, and interfaces.
ROM Monitor
Ping and Trace are available only from the user EXEC mode.

True
False
False
Ping and Trace are available from both User EXEC and privileged EXEC modes
A(n) ____ server is a computer, such as a PC, UNIX workstation, or laptop that is running TFTP server services.

Web
TCP
SSH
TFTP
TFTP
Using CDP can help you quickly determine the network topology.

True
False
True
Briefly describe the ROM Monitor mode.
Also known as the bootstrap program, it checks basic operations of the attached hardware such as memory, CPU, and interfaces.
____ in a router typically contains the power-on self-test (POST).

ROM
RAM
NVRAM
Flash memory
ROM
You can use the ____ command in enable mode to retrieve the statistics that CDP will report on the local router’s interfaces.

show cdp running
show cdp startup
show cdp config
show cdp interface
show cdp interface
You can examine the configuration register by typing ____ at either the enable mode or user mode prompt.

show configuration
show reg
show version
show register
show version
Most types of computer equipment perform some type of POST immediately after being turned on.

True
False
True
What are the replies return by a trace?
!H: Indicates that a router recieved, but did not forward, the ICMP echo request
P: Protocol unreachable
N: Network unreachable
U: Port unreachable
*: Request timed out
All Cisco devices, including routers, switches, and wireless access points, can use ____ to discover each other and learn about the configurations of other devices.

TFTP
CDP
ICMP
Trace
CDP
To manually configure IP on an interface, you must first change to interface configuration mode. Then, you can use the ____ command to configure an IP address for the specific interface.

ip address
int address
ip interface
interface address
ip address
What are the replies returned by Ping in a Cisco router?
!: Successful reciept of the ICMP echo
.: Request timed out
U: Destination was unreachable
C: Congestion experienced
I: Ping interrupted
?: Packet type unknown
&: Packet TTL exceeded
The command ____ copies the configuration from the TFTP server to the startup configuration.

copy run start
copy tftp running-config
copy tftp startup-config
copy start run
copy tftp startup-config
Trace sends multiple ICMP packets with progressively higher ______________________________ until the packet reaches the destination.
Time to Live Counters (TTL)
If you want to view the contents of the startup-config, you can type ____ at the enable prompt.

show config
run startup-config
show startup-config
show rom-config
show startup-config
What are the options of the show cdp neighbors command?
FastEthernet
Serial
Detail
In the event you are configuring a serial interface as a DCE (data communication equipment), you will need to add the ____ [bandwidth in bits per second] command.

clockrate
baud
bbps
baudrate
clockrate
If you want to disable CDP information from being sent on a given interface, change to the interface configuration mode prompt, and then issue the ____ command.

cdp enable off
cdp off
no cdp enable
off cdp enable
no cdp enable
The command ____ indicates that you want to overwrite the existing NVRAM with the configuration information stored on the TFTP server.

configure memory
configure overwrite-network
copy tftp startup-config
configure terminal
configure overwrite-network
The ____ command allows you to configure an administrative distance.

ip distance
ip route
adm distance
adm route
ip route
____ are often referred to as count-to-infinity problems because loops, without preventive measures, will cause packets to bounce around the internetwork infinitely.

Hop loops
Routing hops
Routing loops
Hop counts
routing loops
Briefly describe IGRP.
Proprietary distance-vector routing protocol ceated by Cisco to solve some of the problems associated with RIP
The Cisco ____ command turns on RIP routing for a network.

rip
network
routing rip
rip ip on
network (router rip is the correct command before setting network)
____________________ are protocols used by routers to make path determination choices and to share those choices with other routers.
Routing protocols
Routers configured with a link-state routing protocol use ______________________________ to inform neighbor routers on the internetwork.
Link State Advertisements (LSAs)
Early networks were sometimes configured as ____________________ networks, in which computers communicate with and provide services to their “peers.”
peer-to-peer
___, which are the packets used to send out LSAs, allow every router in the internetwork to share a common view of the topology of the internetwork.

SPFs
OSPFs
EGPs
LSPs
Link state packets (LSPs)
What are the metrics that can be configured for IGRP?
Hops
Load
Bandwidth
Reliability
Delay
MTU
IPX/SPX can be routed across the Internet.

True
False
True
The ____ command allows you to set the maximum hop count for IGRP.

metric maximum-hops
igrp maximum-hops
metric hops
maximum-hops
metric maximum-hops
____ are very powerful, as they allow administrators complete control over path selection.

RIP routes
Dynamic routes
Static routes
Stub routes
Static Routes
What are some of the drawbacks of using link-state routing protocols?
more cpu power and memory usage, much more complicated to setup
A(n) _________________________ is a group of routers under the control of a single administration.
Autonomous system
(AS)
When IP routing is enabled, you can use the ____ command or the ip route 0.0.0.0 0.0.0.0 command to configure a default route.

ip default-network
ip default
ip network default
ip default 0.0.0.0
ip default-network
___ is a proprietary protocol suite developed by Novell.

NetBIOS
NetBEUI
IPX/SPX
TCP/IP
IPX/SPX
What are some of the attributes of RIP?
Distance vectoring
maximum hop count of 15
Hop count is only available metric
load balancing
easy to configure
How can you change a route administrative distance?
using the ip route command (with the admin distance placed at the end of the entry.
IE router(config)# ip route 192.168.5.0 255.255.255.0 192.168.4.2 150
NetBEUI cannot scale into large internetworks because it cannot hold Network layer information in its network header.

True
False
True