• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/200

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

200 Cards in this Set

  • Front
  • Back
What is a network?
A collection of systems and devices exchanging data over some form of media.
What is a host?
A device that holds a logical address on the network.
What is a protocol?
An agreed upon set of rules for a particular network function.
What is bandwidth?
The total amount of data (in bits) you can theoretically transmit within a given time period (typically one second).
What is throughput?
The actual measurement of the data that's able to pass through the media at any given time.
What is the difference between simplex and duplex transmission?
Devices can only send in one direction.
What does the physical topology refer to in networking?
How the network actually looks from a bird's-eye view. The physical cabling layout of the network itself.
What are the five different physical topologies?
1. Bus
2. Ring
3. Star
4. Mesh
5. Hybrid
What is the formula for calculating the number of links in a mesh network?
N(N-1)/2, where N is the number of hosts.
What are hybrid topologies?
Any combination of two or more physical topologies.
What is a LAN?
A network that serves users within a small geographic footprint.
What is a WAN?
A network connecting a collection of LANs across a wide geographic area—perhaps a state, nation, or even the whole world!
What is the most common LAN technology?
Ethernet.
What are the three major categories of WAN technologies?
1. Circuit switched
2. Packet (or cell) switched
3. Dedicated connections (point to point)
How do circuit switched connections work?
Like your telephone at home. When you wish to transmit, you make a call and the line is in use until you are finished transmitting.
What WAN technologies use circuit switching?
Regular dial-up with a modem, using POTS or Integrated Services Digital Networking (ISDN).
What are the advantages of circuit switched technologies?
Cost (cheaper, generally), scalability (easy to install and expand), and availability.
How do packet or cell switched connections work?
The point-to-point circuits between devices are opened for the length of time it takes to send a message, and are then cleared for use.
What is the difference between cell switching and packet switching networks?
The length of the individual packet sent.
What is the advantage of packet/cell switching technologies?
Packet switching allows multiple connections from one device.
How do point-to-point/dedicated WAN connections work?
A leased line directly connects one network to another.
What are the advantages of direct connections?
The connection is always up and available, and you are guaranteed 100 percent of the bandwidth available 100 percent of the time.
What is a small office/home office (SOHO)?
Refers to a single user, or a small group of people (one to ten), working from a single location, such as a home or office space.
What is a branch office?
Supports a small group of people, just as the SOHO does. However, it has its own LAN and is considered a part of the overall corporation or enterprise.
What is a mobile user?
Forms part of the corporation, but is not located at a branch office.
What is the main purpose of the OSI Reference Model?
To provide a means for us to break down the communications process between two computers into stages, and easily discuss and describe the steps within each stage.
What is encapsulation?
The process of adding a header and a trailer to a piece of data.
What benefits does the OSI Reference Model provide?
"It simplifies training and learning.
What are the disadvantages of direct connections?
Whether you use the bandwidth or not, you pay for it and generally speaking, these connections are rather expensive to implement.
What are the disadvantages of packet/cell switching technologies?
Generally much more expensive than circuit switching and are also harder to implement and may not be available in all locations.
Which OSI layer is concerned with reliable end-to-end delivery of data?
Transport layer
At what layer of the OSI model would you find framing?
Data Link layer
What is the PDU at layer 4 called?
Segment
What is the PDU at layer 3 called?
Packet
The Transport layer on the recipient machine requests a retransmission of a segment from the sending machine. This is an example of:
Same layer interaction
In which layer of the TCP/IP stack is routing and logical addressing found?
Internet layer
In which layer of the TCP/IP stack is framing found?
Network Access layer
Which TCP/IP Application layer protocol provides IP address resolution for domain names?
DNS
TCP completes a three-way handshake before exchanging data. In order, what are the steps?
SYN, SYN/ACK, ACK
What is the well-known port number for SMTP?
25
This point-to-point protocol was replaced by PPP, largely because it could only transport TCP/IP.
SLIP
Which cable type would be used to connect a router to a switch?
Straight-through
Which network device monitors network traffic for network attack signatures and notifies administrators when an attack is in progress?
An IDS
Which network device monitors network traffic for network attack signatures and is capable of stopping the attack in progress?
An IPS
Pin 1 on the PC NIC is set to?
Transmit.
Hub port pinouts have pins 1 and 2 set to?
Receive.
Hub port pinouts have pins 3 and 6 set to?
Transmit.
What is the name of the Frame Relay field used to identify Frame Relay virtual circuits?
Data-link connection identifier.
A leased line is installed between each router and a nearby Frame Relay switch; these links are called?
Access links.
What functions as the DCE in Frame Relay?
The Frame Relay switches
What functions as a DTE in Frame Relay?
The customer equipment (router).
In Frame Relay, the logical path that a frame travels between each pair of routers is called?
A Frame Relay VC.
What is the committed information rate (CIR)?
The minimum bandwidth guaranteed by the provider.
Each Class B network contains how many IP addresses that can be assigned to hosts?
65,534
Each Class C network contains how many IP addresses that can be assigned to hosts?
254
What is a routing protocol?
A protocol that aids routers by dynamically learning about the groups of addresses in the network.
A value used to prevent routing loops.
TTL.
What learns routes and puts those routes in a routing table?
Routing protocols.
What are the two key points about how IP addresses are organized?
* All IP addresses in the same group must not be separated by a router.
* IP addresses separated by a router must be in different groups.
What are the two reserved IP addresses for every network?
* The network address (all zeros)
* The broadcast address (all ones)
What is the size of a DS0?
64 kbps
What is the size of a DS1 (T1)?
1.544 Mbps (24 DS0s, plus 8 kbps overhead)
What is the size of a E1?
2.048 Mbps (32 DS0s)
What does Cisco HDLC frames have that is not found in the standard HDLC frames?
A type field.
The process of forwarding packets (Layer 3 PDUs).
Routing
Addresses that can be used regardless of the type of physical networks used, providing each device (at least) one address. Enables the routing process to identify a packet's source and destination.
Logical addressing
A protocol that aids routers by dynamically learning about the groups of addresses in the network, which in turn allows the routing (forwarding) process to work well.
Routing protocol
The primary tool for testing basic network connectivity.
Ping
What are the two steps used by hosts when routing packets?
Step 1 - If the destination IP address is in the same subnet as I am, send the packet directly to that destination host.
Step 2 - If the destination IP address is not in the same subnet as I am, send the packet to my default gateway.
What is the default duplex status for a Cisco switch?
Auto
Describe the Layer 4 feature called error recovery (reliability)?
The process of numbering and acknowledging data with Sequence and Acknowledgment header fields.
A protocol that requires an exchange of messages before data transfer begins or that has a required preestablished correlation between two endpoints
Connection-oriented protocol
A protocol that does not require an exchange of messages and that does not require a preestablished correlation between two endpoints
Connectionless protocol
The size of the largest Layer 3 packet that can sit inside a frame's data field.
maximum transmission unit (MTU)
Ethernet MTU
1500 bytes.
An attack whose purpose is to break things.
Denial of service (DoS) attacks
A program that is somehow transferred onto an unsuspecting computer, possibly through an e-mail attachment or website download. This program could just cause problems on the computer, or it could steal information and send it back to the attacker.
Computer viruses
Can monitor when devices first connect to a LAN, be they wireless or wired and can prevent a computer from connecting to the LAN until its virus definitions were updated. It also includes a requirement that the user supply a username and password before being able to send other data into the LAN.
Network Admission Control (NAC)
A virus that looks for private or sensitive information, tracking what the user does with the computer, and passing the information back to the attacker in the Internet.
Spyware
A self-propagating program that can quickly replicate itself around Enterprise networks and the Internet, often performing DoS attacks, particularly on servers.
Worm
A virus that logs all keystrokes, or possibly just keystrokes from when secure sites are accessed, reporting the information to the attacker.
Keystroke logger
The attacker sets up a website that outwardly looks like a legitimate website, often for a bank or credit card company, but is an illegitimate website designed to capture private information.
Phishing
This refers to a broad class of malicious viruses, including spyware.
Malware
Refers to the whole class of security tools that prevent various problems, including Anti-virus, Anti-spyware, Anti-spam, Anti-phishing, URL filtering, and E-mail filtering tools.
Anti-x
A security tool that typically receives a copy of packets via a monitoring port, rather than being part of the packets' forwarding path. This tool can then rate and report on each potential threat, and potentially ask other devices, such as firewalls and routers, to help prevent the attack (if they can).
Intrusion Detection Systems (IDS)
This security tool often sits in the packets' forwarding path, giving it the capability to perform the same functions as the IDS, but also to react and filter the traffic.
Intrusion Prevention Systems (IPS)
A frame sent with a destination address of FFFF.FFFF.FFFF and implies that all devices on the LAN should receive and process the frame.
Broadcast addresses
Addresses used to allow a dynamic subset of devices on a LAN to communicate. The MAC addresses used in the Ethernet frame follow this format: 0100.5exx.xxxx.
Multicast addresses
Content Addressable Memory (CAM)
The type of physical memory used to store the MAC address table.
The switch fully receives all bits in the frame before forwarding the frame. This allows the switch to check the FCS before forwarding the frame.
Store-and-forward switching method
The switch forwards the frame as soon as it can. This reduces latency but does not allow the switch to discard frames that fail the FCS check.
Cut-through switching method
The switch forwards the frame after receiving the first 64 bytes of the frame, thereby avoiding forwarding frames that were errored due to a collision.
Fragment-free switching method
What does a LAN consist of?
All devices in the same broadcast domain.
List five motivations/benefits of using VLANs.
1. To create more flexible designs that group users by department, or by groups that work together, instead of by physical location.
2. To segment devices into smaller LANs (broadcast domains) to reduce overhead caused to each host in the VLAN.
3. To reduce the workload for STP by limiting a VLAN to a single access switch.
4. To enforce better security by keeping hosts that work with sensitive data on a separate VLAN.
5. To separate traffic sent by an IP phone from traffic sent by PCs connected to the phones.
Cisco uses three terms to describe the role of each switch in a campus design. What are they?
1. Core
2. Distribution
3. Access
Describe Access switches
Switches that connect directly to end users, providing access to the LAN.
Describe Distribution switches
Switches that provide a path through which the access switches can forward traffic to each other.
Describe Core switches
Aggregates distribution switches in very large campus LANs, providing very high forwarding rates.
The default console port settings on a switch are?
* 9600 bits/second
* No hardware flow control
* 8-bit ASCII
* No stop bits
* 1 parity bit
The four main types of memory found in Cisco switches are?
1. RAM
2. ROM
3. NVRAM
4. Flash
What is stored in the RAM of Cisco routers and switches?
The running (active) configuration file is stored here.
What is stored in the ROM of Cisco routers and switches?
Stores a bootstrap (or boothelper) program that is loaded when the switch first powers on. This bootstrap program then finds the full Cisco IOS image and manages the process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the switch.
What is stored in the Flash memory of Cisco devices?
It stores fully functional Cisco IOS images and is the default location where the switch gets its Cisco IOS at boot time.
What is stored in the NVRAM of Cisco devices?
Stores the initial or startup configuration file that is used when the switch is first powered on and when the switch is reloaded.
Configure SSH on Cisco switch:
>enable
#configure terminal
(config)#line vty 0 4
(config-line)#login local
(config-line)#transport input ssh
(config-line)#exit
(config)#username John password Doe
(config)#ip domain-name imlost.com
(config)#crypto key generate rsa
(config)#end
What are the three banners available on Cisco switches?
MOTD, login, and exec.
This message is shown before the login prompt. For temporary messages that may change from time to time.
Message of the Day (MOTD) banner
Shown before the login prompt but after the MOTD banner. For permanent messages such as "Unauthorized Access Prohibited."
Login banner
Shown after the login prompt. Used to supply information that should be hidden from unauthorized users.
Exec banner
Configure MOTD banner
>enable
#configure terminal
(config)#banner motd #
Switch down for maintenance at 11PM Today #
(config)#exit
#
Configure login banner
>enable
#configure terminal
(config)#banner login #
Unauthorized Access Prohibited!!!! #
(config)#exit
#
Configure exec banner
>enable
#configure terminal
(config)#banner exec Z
Company picnic at the park on Saturday. Don't tell outsiders! Z
(config)#exit
#
How do you configure a static IP address on a Cisco switch?
switch1#configure terminal
switch1(config)#interface vlan 1
switch1(config-if)#ip address 192.168.1.200 255.255.255.0
switch1(config-if)#no shutdown
switch1(config-if)#exit
switch1(config)#ip default-gateway 192.168.1.1
switch1(config)#exit
switch1#
On a Cisco switch, what does interface status "err-disabled" indicate?
Port security has disabled the interface.
On a Cisco switch, what does interface status "disabled" indicate?
The interface is configured with the shutdown command.
What is a late collision?
When a switch has already sent 64 bytes of a frame, and the switch receives another frame on that same interface.
If the CRC errors grow, but the collisions counters do not, the problem may simply be what?
Interference on the cable.
An incrementing late collisions counter typically means one of two things:
* The interface is connected to a collision domain whose cabling exceeds Ethernet cable length standards.
* The interface is using half duplex, and the device on the other end of the cable is using full duplex.
What counter values indicate excessive noise?
Many input errors, few collisions
What is the common root cause of excessive noise?
Wrong cable category (Cat 5, 5E, 6); damaged cables; EMI
What counter values indicate excessive collisions?
More than roughly .1% of all frames are collisions
What is the common root cause of excessive collisions?
Duplex mismatch (seen on the half-duplex side); jabber; DoS attack
What counter values indicate excessive late collisions?
Increasing late collisions values.
Down Down notconnect"
No cable; bad cable; wrong cable pinouts; the speeds are mismatched on the two connected devices; the device on the other end of the cable is powered off or the other interface is shutdown.
cdp run
Global command that enables CDP for the entire switch or router.
cdp enable
Interface subcommand that enables CDP for a particular interface.
What are the differences with the router CLI as compared to the switch CLI?
* The configuration of IP addresses differs in some ways.
* The questions asked in setup mode differ.
* Routers have an auxiliary (Aux) port, intended to be connected to an external modem to allow remote users to access the CLI.
The clock rate command
dictates the actual speed used to transmit bits on a serial link.
If you do not know which router has the DCE cable in it, how can you find out?
By using the show controllers command.
What routing protocols use the interface bandwidth settings to set their default metrics, with the metrics impacting a router's choice of the best IP route to reach each subnet?
The EIGRP and OSPF routing protocols.
Every router interface has a default setting of the bandwidth command that is used when there is no bandwidth command configured on the interface. What is it?
* For serial links, the default bandwidth is 1544.
* Ethernet interfaces default to a bandwidth setting that reflects the current speed of the interface.
Do Cisco switches have an Aux port?
No.
List the process to upgrade an IOS image into Flash memory:
Step 1 - Obtain IOS image from Cisco, by downloading the IOS image from Cisco.com using HTTP or FTP.
Step 2 - Place IOS image into the default directory of a TFTP server that is accessible from the router.
Step 3 - Issue the copy command from the router, copying the file into Flash memory. --> R1#copy tftp flash
During the process of copying the IOS image into Flash memory, the router will ask what questions?
1. What is IP address or host name of the TFTP server?
2. What is name of the file?
3. Is space available for this file in Flash memory?
4. Does the server actually have a file by that name?
5. Do you want the router to erase the old files?
Which command shows the current value of the configuration register?
The show version command.
To enter the ROM monitor set the configuration register value to?
0x2100
To configure the system to use the boot system commands in NVRAM, set the configuration register to?
Any value from 0x2102 to 0x210F.
To install a router, follow these steps:
Step 1 - Connect any LAN cables to the LAN ports.
Step 2 - If using an external CSU/DSU, connect the router's serial interface to the CSU/DSU, and the CSU/DSU to the line from the telco.
Step 3 - If using an internal CSU/DSU, connect the router's serial interface to the line from the telco.
Step 4 - Connect the router's console port to a PC (using a rollover cable), as needed, to configure the router.
Step 5 - Connect the power cable.
Step 6 - Turn on the router.
What conditions must be met for a router to add routes to its routing table for the subnets connected to each of the router's interfaces?
First, router must have IP address and mask configured on the interface.
Second, both interface status codes must be "up."
(T or F) To add a static route to the IP routing table, the next-hop router IP address must be in an "up and up" state.
True.
The ip route command allows a slightly different syntax on point-to-point serial links. What is it?
You can configure the outgoing interface instead of the next-hop IP address.
What is the primary goal of IP routing protocols?
To fill the IP routing table with the current best routes it can find.
RIP routers send periodic routing updates about every ____ seconds by default.
30
IP routing protocols fall into one of two major categories:
* Interior Gateway Protocol (IGP)
* Exterior Gateway Protocol (EGP)
Define Interior Gateway Protocol (IGP):
A routing protocol that was designed and intended for use inside a single autonomous system.
Define Exterior Gateway Protocol (EGP):
A routing protocol that was designed and intended for use between different autonomous systems.
What is an autonomous system?
An internetwork under the administrative control of a single organization.
Only one routing protocol is used today to exchange routes between routers in different autonomous systems.
Border Gateway Protocol (BGP)
(T or F) By assigning each autonomous organization an ASN, BGP can ensure that packets do not loop around the global Internet by making sure that packets do not pass through the same autonomous system twice.
TRUE
RIP uses a metric called what?
Hop count.
How is the EIGRP metric calculated?
It considers both the interface bandwidth and interface delay settings as input into a mathematical formula to calculate the metric.
What are the steps to configure RIP?
Step 1 - Use the router rip configuration command to move into RIP configuration mode.
Step 2 - Use the version 2 RIP subcommand to tell the router to use RIP Version 2 exclusively.
Step 3 - Use one or more network net-number RIP subcommands to enable RIP on the correct interfaces.
Step 4 - (O) As needed, disable RIP on an interface using the passive-interface type number RIP subcommand.
What is the multicast IP address for RIP-2 updates?
224.0.0.9
This command lists one line per router interface, including the IP address and interface status.
show ip interface brief
This command lists the routing table, including RIP-learned routes, and optionally just RIP-learned routes.
show ip route [rip]
This command lists information about the RIP configuration, plus the IP addresses of neighboring RIP routers from which the local router has learned routes.
show ip protocols
What is the Administrative Distance (AD)?
A numeric value assigned to each routing protocol and used to select the best route (lower number).
What is the Administrative Distance of EIGRP?
90
What is the Administrative Distance of RIP?
120
What is the Administrative Distance of OSPF?
110
What is the Administrative Distance of connected routes?
0
What is the Administrative Distance of static routes?
1
RIP-1 sends updates to what address?
The 255.255.255.255 broadcast address.
The three things that occur on an interface matched by a RIP-2 network command.
1. The router multicasts routing updates to 224.0.0.9.
2. The router listens for incoming updates on that same interface.
3. The router advertises about the subnet connected to the interface.
Global command that tells the router to put a timestamp on log messages, including debug messages.
service timestamps
Global command that defines a static route.
ip route network mask {ip-addr | interface type/number}
RIP subcommand that tells RIP to no longer advertise RIP updates on the listed interface.
passive-interface [default] { interface type/number}
This command lists info about the various processes running in IOS, and most importantly, overall CPU utilization statistics.
show process
For the length of the user's session, this command causes IOS to display mask info in dotted-decimal format instead of prefix format.
terminal ip netmask-format decimal
The term Public Switched Telephone Network (PSTN) refers to:
The equipment and devices that telcos use to create basic telephone service between any two phones in the world.
The original standard for converting analog voice to a digital signal is called?
Pulse-code modulation (PCM).
What are some of the key features of DSL?
* Allows analog voice signals and digital data signals to be sent over the same local loop wiring at the same time.
* The local loop must be connected to something besides a traditional voice switch at the local CO, in this case a device called a DSL access multiplexer (DSLAM).
* Allows for a concurrent voice call to be up at the same time as the data connection.
* Unlike modems, DSL's data component is always on; in other words, you do not have to signal or dial a phone number to set up a data circuit.
The speed of DSL can vary widely, based on what factors?
* The distance between the CO and the consumer
* The quality of the local loop cabling
* The type of DSL (each standard has different maximum theoretical speeds)
* The DSLAM used in the CO (older equipment may not have recent improvements that allow for faster speeds on lower-grade local loops)
What is the length of ATM cells?
53 bytes in length
To support the web browser, a router must first be configured from the CLI with what?
At least one IP address, typically on the local LAN, so that the engineer's computer can connect to the router.
You can configure the DHCP client, DHCP server, and PAT functions with SDM using the following five major steps:
Step 1 - Establish IP connectivity. (from the CLI)
Step 2 - Install and access SDM.
Step 3 - Configure DHCP and PAT.
Step 4 - Plan for DHCP services.
Step 5 - Configure the DHCP server.
To configure the DHCP server with SDM:
1. Click Configure near the top of the SDM window.
2. Click Additional Tasks at the bottom of the Tasks pane to open the Additional Tasks window.
3. Select the DHCP Pools option on the left.
4. Click Add button to open the Add DHCP Pool dialog box.
What should you do when some users' connections that need to use NAT work fine, and other users' connection that need to use NAT do not work at all?
Run the "clear ip nat translation * " command.
This command lists info learned from a DHCP server, by a router acting as a DHCP client.
show dhcp server
The process by which a TCP/IP host sends data can be viewed as a five-step process.
Step 1 - Create and encapsulate the application data with any required application layer headers.
Step 2 - Encapsulate the data supplied by the application layer inside a transport layer header.
Step 3 - Encapsulate the data supplied by the transport layer inside an internet layer (IP) header.
Step 4 - Encapsulate the data supplied by the internet layer inside a network access layer header and trailer.
Step 5 - Transmit the bits.
The CSMA/CD algorithm works like this:
Step 1 - A device with a frame to send listens until the Ethernet is not busy.
Step 2 - When the Ethernet is not busy, the sender(s) begin(s) sending the frame.
Step 3 - The sender(s) listen(s) to make sure that no collision occurred.
Step 4 - If a collision occurs, the devices that had been sending a frame each send a jamming signal to ensure that all stations recognize the collision.
Step 5 - After the jamming is complete, each sender randomizes a timer and waits that long before trying to resend the collided frame.
Step 6 - When each random timer expires, the process starts over with Step 1.
A router uses the following logic when receiving a data-link frame—a frame that has an IP packet encapsulated in it:
Step 1 - Use the data-link FCS field to ensure that the frame had no errors; if errors occurred, discard the frame.
Step 2 - Assuming the frame was not discarded at step 1, discard the old data-link header and trailer, leaving the IP packet.
Step 3 - Compare the IP packet's destination IP address to the routing table, and find the route that matches the destination address. This route identifies the outgoing interface of the router, and possibly the next-hop router.
Step 4 - Encapsulate the IP packet inside a new data-link header and trailer, appropriate for the outgoing interface, and forward the frame.
The following steps list the commands used to configure IP on a switch:
Step 1 - Enter VLAN 1 configuration mode using the interface vlan 1 global configuration command.
Step 2 - Assign an IP address and mask using the ip address ip-address mask interface subcommand.
Step 3 - Enable the VLAN 1 interface using the no shutdown interface subcommand.
Step 4 - Enter the ip default-gateway ip-address global command to configure the default gateway.
To install a router, follow these steps:
Step 1 - Connect any LAN cables to the LAN ports.
Step 2 - If using an external CSU/DSU, connect the router's serial interface to the CSU/DSU, and the CSU/DSU to the line from the telco.
Step 3 - If using an internal CSU/DSU, connect the router's serial interface to the line from the telco.
Step 4 - Connect the router's console port to a PC (using a rollover cable), as needed, to configure the router.
Step 5 - Connect a power cable from a power outlet to the power port on the router.
Step 6 - Turn on the router.
List steps in the routing process:
Step 1 - Router checks the frame's FCS for errors.
Step 2 - Router then discards the Ethernet header and trailer.
Step 3 - Router compares the packet's destination address to the routing table and finds the entry for subnet.
Step 4 - Router forwards the packet to next-hop router after encapsulating the packet in a HDLC frame.
A DS1, also called a T1 line has what characteristics?
A single line that supports 24 DS0s, plus an 8-kbps overhead channel, for a speed of 1.544 Mbps.
What is an E1 line?
A standard used in Europe and Japan holds 32 DS0s.
How many DS0s make a T1 line?
24 DS0s.
How many DS0s make an E1 line?
32 DS0s.
How many DS1s make a DS3 line?
28 DS1s.
How many E1s make an E3 line?
16 E1s.
You see the names of the routers you traverse when using the Windows Tracert command, but not when using the router's traceroute command. How can you fix this?
Configure DNS via ip name-server ip address command.
When would a switch revert to store and forward mode?
When a port is already busy transmitting or receiving and another station sends a frame to that busy port, the switch will store the new frame until the port is available.
When a frame is too big to fit on an intermediate LAN, what happens?
The network layer fragments it.
How can you tell if your router booted into RxBoot mode?
The prompt will be Router(boot)>.
What does WEP stand for?
Wired Equivalent Privacy.
Routers' routing tables have three kinds of entries. What are they?
Connected, static, and routed.
What are the two trunking protocols supported by Cisco switches?
802.1q and ISL.
What is the command to display the current value of the configuration register?
show version
What Cisco command clears all the NAT mappings in the NAT table?
The clear ip nat translation * command clears all the NAT translations in the NAT table. This command is useful for troubleshooting NAT.