Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
You have a Frame Relay network. What type of encapsulation is necessary if the routers are from different vendors?
|
IETF Internet Engineering Task Force encapsulation
|
|
If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method are you using?
|
Cut-through
|
|
In which switching method does latency vary depending on frame length?
|
store-and-forward
|
|
The reasons to use a layer model are what?
|
To clarify what general functions are to be done rather than how to do them
To reduce the complexity of networking into more manageable sublayers To enable interoperability using standard interfaces To allow changes in one layer to occur without changing other layers To speed up network industry progress by allowing specialization To allow for shortcut explanations to facilitate protocol comparisons To order network troubleshooting steps To facilitate systematic troubleshooting |
|
What part of the OSI model corresponds with the DoD's host-to-host layer?
|
Transport
|
|
How is cost calculated on an 802.1D link?
|
Bandwidth
|
|
What are the benefits of Fast Ethernet?
|
100BaseT has 10 times the performance of 10BaseT
All cable does not have to be upgraded You can use most of your existing cabling and network equipment 10Mbps and 100Mbps can be used together It uses tried-and-true CSMA/CD technology Migration is easy |
|
What is the distance limitation of 100BaseFX?
|
Up to 412 meters
|
|
What is the distance limitation of 1000BaseCX (IEEE 802.3z)
|
25 meters
|
|
What is the distance limitation of 1000BaseSX (IEEE 802.3z)
|
220 meters with 62.5 micron, 550 meters with 50 micron
|
|
What is the distance limitation of 1000BaseLX (IEEE 802.3z)
|
3 km to 10 km
|
|
What is the purpose of the Spanning Tree Protocol (STP)?
|
Bridges use the scanning-tree algorithm, enabling a learning bridge to dynamcially work around loops in a network topology by creating a spanning tree
|
|
What is the IEEE version of spanning tree?
|
IEEE 802.1d
|
|
Enhanced Editing Commands: CTRL + A, E, B, F, D
|
Ctrl+A = move cursor to beginning of line
Ctrl+E = Move cursor to end of line Ctrl+B=Moves back one character Ctrl+F = move forward one character Ctrl+D = Deletes single character |
|
Enhanced Editing Commands: CTRL + R, U, W, Esc+B, Esc+F
|
CTRL + R = Redisplays line
Ctrl + U=erase a line Ctrl + W = Erase a word Esc+B = Moves back one character Esc+F = moves forward one word |
|
What are the four layers of the DOD model?
|
(Application/Process), Host-to-Host (Transport), Internet, Network Access
|
|
What does the "Base" in 10BaseT indicate?
|
The word Base indicates baseband signaling, which is digital signalling
|
|
What is the process of placing one frame inside another?
|
Tunneling
|
|
You are at a client’s site, trying to detect the source of network trouble. While using a protocol analyzer, you detect the presence of BPDU frames. Identify the role of BPDU frames in a network environment.
|
Switches or bridges running Spanning Tree Protocol exchange Bridge Protocol Data Units (BPDUs) every two seconds. BPDUs carry bridge ID information that includes the MAC address and bridge priority of the source device.
|
|
How many unequal-cost load-balanced routes can IGRP support for a given destination network?
|
IGRP provides support for up to six unequal-cost load-balanced routes
the default configuration provides support for four. |
|
When configuring a static route, which keyword would you use to ensure that the route is not removed even if the interface goes down?
|
If an interface shuts down or cannot communicate with the next-hop router, a static route is removed from the routing table unless the keyword permanent is used when the route is configured.
|
|
You have created access list 104 to be applied inbound. When you attempted to apply this list to an interface, you mistakenly linked the interface to access list 105, which does not exist. What will happen to traffic attempting to pass through the interface?
|
Prior to Cisco IOS 10.3, applying an undefined access list to an interface would stop all traffic from passing through the router. With later releases of the IOS, the router recognizes that there is no defined access list and continues routing.
|
|
While reviewing your running configuration, you notice an access list line that reads access-list 10 deny 192.168.5.19. The wildcard mask field is notably absent. How is this access list line interpreted by the router?
|
The wildcard mask is optional when configuring a standard access list. If a wildcard mask is not specified, the router interprets the statement to be that the list is to match all bits of the source address.
|
|
When is authentication of a PPP session completed?
|
After a link has been established, the authentication phase will proceed if authentication has been requested by either peer device. Once the authentication phase has completed, the Network layer protocol phase begins. Once the Network layer protocol phase is successfully completed, a PPP session has been established.
|
|
When might DDR be better than Frame Relay?
|
Dial-on-demand routing is well suited to networks that require periodic connections, that transfer small amounts of data, and that need to support telecommuters by providing access to the corporate network. As traffic demands grow, alternatives to DDR should be considered what commands would you use to set the history buffer to its maximum value?
|