• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/151

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

151 Cards in this Set

  • Front
  • Back

Local unicast addresses are defined by:

A. They are identified by the prefix FC00::/7


B. They are routable in your private network.



When you enable the passive interface feature on a router interface that is running RIPv2:

It suppresses the sending of routing updates out the interface

Full-duplex Ethernet

uses dedicated point-to-point connections and separate circuits for sending and receiving data, so there can be no collisions. Beacuse it is collision free, it can use 100% of the available bandwidth for data transmission.

Devices with collision detection turned on operate in:

Half-Duplex Mode

6-to-4 tunneling has the following characteristics:

a. Tunnel endpoints are configured on routers. b. Routers are dual stack routers to allow the the routers to tunnel IPv6 packets over the IPv4 network.


c. Works through NAT.


d. Tunnel endpoints are automawtically configured, and IPv6 addresses are automatically assigned.


e. Host computers run IPv6 only.

The only solution that allows IPv4 hosts to communicate with the IPv6 server without running IPv6 on the client systems is:

Network Address Translation-Protocol Translation (NAT-PT)

NAT-PT

converts the IPv6 packet header into an IPv4 packet header, and vice versa. A translation table is referenced by the device as it converts the headers to ensure the packet is sent to the correct host.

dual stack client

a host that runs both IPv4 and IPv6

Teredo, 6-to-4, and Intra-site Automatic Tunnel Addressing Protocol (ISATAP) are all:

tunneling protocols that allow an IPv6 host to communicate with another IPv6 host through an IPv4 network

OSPF is

a classless link-state routing protocol.

RIPv1 and IGRP are

classful distance vector routing protocols

EIGRP is

a hybrid protocol that supports classless addressing

FE80::/10

link-local prefix

FF00::/8

multiast prefix

FC00::/7

unique local prefix

2000::/3

an outdated prefix for global unicast addresses. In the future, global unicast addresses do not need to follow this standard.

2001:0DB8::/32

a prefix reserved for documentation purposes. This prefix is guaranteed not to be used as a global unique address.

What command would you use to view debug output from a Telnet session?

You must use the "terminal monitor" command to view debug output from a Telnet session. Debug ouput is sent to the console screen by default.

Functions of the MAC sublayer in the OSI model include:

a. Defining a unique hardware address for each device on the network


b. Letting devices on the network have access to the LAN.

The default switchport configuration parameters for a 2960 switch are:

a. Violation action is set to shutdown


b. a maximum of 1 MAC address per port is allowed.

Which trunking method does the 2950 switch support?

Only 802.1Q trunking

IEEE 802.1Q

a networking standard that supports virtual LANs (VLANs) on an Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames

To determine valid subnet addresses, complete the following steps:

a. Convert the custom subnet mask value to binary (240 = 11110000)


b. Select the rightmost masked bit (10000)


c. Convert this bit to decimal. This is the increment value (16)


d. Add the increment value to the network address, up to the subnet mask value. For example with a network address of 133.233.11.0 and mask of 255.255.255.240, the possible subnet addresses are: 1, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240.

The "ip route" command requires the following parameters:

a. Subnet/Network address of the remote network.


b. Subnet mask of the remote network.


c. The interface on the local router used to reach the remote network or the IP address of the next hop router.

ST connector

uses a bayonet-type connector.

SC connector

uses a separate push-on, pull-off connector with a locking tab for each wire.

LC connector

half the size of the other fiber optic connectors

MT-RJ connector

uses metal guide pins to ensure proper alignment

Fiber optic cable are used to support distances over

100 meters

When you enable port security on an interface that is also configure with a voice VLAN you must set the maximum allowed secure addresses on the port to:

two plus the maximum number of secure addresses allows on the access VLAN.

What command is used to enable port security?

switchport port-security

Cisco Express Forwarding (CEF)

an advanced layer 3 switching technology used mainly in large core networks or the Internet to enhance the overall network performance

CEF is mainly used to:

increase packet switching speed by reducing the overhead and delays introduced by other routing techniques. CEF consists of two key components: The Forwarding Information Base (FIB) and adjacencies

Both cisco express forwarding and fast switching cache:

frequently-used data link headers, allowing them to be copied instead of reconstructed from scratch every time a packet is forwarded.

Store and forward processing

data link layer process used in cisco switches that requires the switch to fuller buffer frames before forwarding them.




While the frame is in the switch's buffer, it calculates the CRC to check the frame for errors

fragment free processing

a data link layer process used in cisco switches that optimizes frame processing by waiting until the first 64 bytes of the frame have been received before forwarding the fram to the destination device.

Command to encrypt the CHAP password in the configuration file:

service password-encryption

used to encrypt the password used to enter Privileged exec mode.

enable secret 'password'

switchport mode dynamic

configure the port to automatically detect the trunking state using a trunking protocol.

dynamic desirable mode

set a preference for the port to be a trunk port.

When Converting a MAC address into an IPv6 EUI-64 interface identifier

add FFFE to the middle of the MAC address and invert the 7th bit from the left.

The command that can be used to verify the size of the IOS image is

show flash

The output of the show interfaces command shows:

a. The VLANs allowed on the trunk


b. The encapsulation method used for the trunk c. The interfaces that are trunks


d. The Native VLAN for the trunk


e. The administrative mode used to form the trunk

To identify Iv4 addresses that will be in the DHCP pool use:

the 'network' command

The native VLAN

a. must match on both ends of a trunk link


b. it is VLAN 1 by default


c. it is only available with dot1q encapsulation

To see what addresses have been handed out by your router acting as a DHCP server, use the:

"show ip dhcp bondings" command.

When considering implementing VLANs, consider the following:

a. VLAN 1 is the default VLAN


b. The maximum number of VLANs is switch dependent


c. The Native VLAN should be changed

Administrative distance

is used by routers to find out which route is better (lower number is better).

Administrative distance for Direct Connection

0

Administrative distance for static route

1

Administrative distance for internal EIGRP

90

Administrative distance for OSPF

110

Administrative distance for RIP

120

Administrative distance for external EIGRP

170

Administrative distance for unknown

255

Metric is a measure used to:

decide which route is better (lower number is better). Each routing protocol uses its own metric. For example, RIP uses hop counts as a metric, while OSPF uses cost.

The "show IP nat translations" command will show the following information:

a. The public IPv4 address that a private IPv4 address was translated to


b. The private IPv4 address that was translated.


c. The public IPv4 address that the translated packet is destined to

When an ACL has been applied to a router interface:

a. Inbound ACLs will be processed before the routing table lookup occurs


b. Outbound ACLs will be processed after the routing table lookup has occured

Where is the Cisco IOS image booted to?

RAM

To create a backup copy of your Cisco IOS image and save it to tftp you would use:

Copy flash tftp

a command in the line cty configuration mode that is needed while configuring SSH to inform the cisco router that authentication needs to be performed using usernames and passwords stored locally on the router.

login local

Port Address Translation (PAT)

is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.




PAT uses a combination of an IP address and a port number.

By default, the status of a cisco IOS ISR interface is

Administratively down, down

License boot module

used to disable the current technology package for a license

The Cisco IOS image is located in

Flash

License install

used to install a permanent license on a router.

To prevent your router from receiving and processing RIPv2 updates:

create an ACL denying UDP port 520 packets and apply it on the inbound interface

Open Shortest Path First (OSPF)

a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3

Application

Responsible for initiating or services the request.

Presentation

Formats the information so that it is understood by the receiving system.

Session

Responsible for establishing, managing, and terminating the session.

Transport

Breaks information into segments and is responsible for connection and connectionless communication.

Network

Responsible for logical addressing and routing

Data Link

Responsible for physical addressing, error correction, and preparing the information for the media

Physical

Deals with the electrical signal.

ROM

Read-Only Memory (ROM) on a Cisco device is like the ROM on a computer in the sense that it stores the POST and the boot loader program. The boot loader program is responsible for locating the IOS.

Flash

The flash memory is used to store the Cisco IOS.

RAM

RAM is used to store things like the routing table on a router, or the MAC address table on a switch. It is also used to store the running-config. RAM is also known as volatile RAM, or VRAM.

NVRAM

Non-volatile RAM (NVRAM) is used to store the startup-config, which is copied to the running-config on bootup after the IOS is loaded.

POST:

he first thing that occurs when a Cisco device boots up is the POST routine, which is responsible for performing a self diagnostic to verify everything is functioning on the router or switch.

Locate IOS

fter the POST, the bootloader program, which is stored in ROM, locates the IOS in flash memory and loads it into RAM.

Startup-config applied:

After the IOS is loaded into memory, the bootloader program then locates the startup-config and applies it to the device.

User Exec:

When you connect to a Cisco device, the default configuration mode is user exec mode. With user exec mode, you can view the settings on the device but not make any changes. You know you are in user exec mode because the IOS prompt displays a “>”.

Priv Exec:

In order to make changes to the device, you must navigate to priv exec mode, where you may be required to input a password. Priv exec mode displays with a “#” in the prompt.

Global Config:

Global configuration mode is where you go to make global changes to the router, such as the hostname. To navigate to global configuration mode from priv exec mode, you type config term, where you will be placed at the “(config)#” prompt.

Sub Prompts:

You can navigate to a number of different sub prompts from global configuration, such as the interface prompts to modify settings on a specific interface and the line prompts to modify the different ports on the device.

These commands are used to create an enable password and an enable secret.

R1>enableR1#config term


R1(config)#enable password mypass


R1(config)#enable secret mysecret

These commands are used to create a console password on the console port.

R1>enableR1#config term


R1(config)#line con 0


R1(config-line)#password conpass


R1(config-line)#login

These commands are used to create an auxiliary port password on the router.

R1>enableR1#config term


R1(config)#line aux 0


R1(config-line)#password auxpass


R1(config-line)#login

These commands are used to create a password for telnet connections that are made to the device.

R1>enableR1#config term


R1(config)#line vty 0 15


R1(config-line)#password vtypass


R1(config-line)#login

This command creates a message-of-the-day banner, which displays before someone logs in. This is used to give legal notice that unauthorized access is prohibited.

R1(config)#banner motd


#Enter TEXT message. End with the character ‘#‘.




This device is for authorized personnel only. Please disconnect at once if you have not been given permission to access this device#


R1(config)#

The following commands are used to configure the name of the router with the hostname command:

Router>enable


Router#config term


Router(config)#hostname R2

The following commands are used to configure the FastEthernet port on the router.

R2(config)#interface f0/0


R2(config-if)#ip address 25.0.0.1 255.0.0.0R2(config-if)#description Private LAN


R2(config-if)#speed 100


R2(config-if)#duplex full


R2(config-if)#no shutdown

The following commands are used to configure the Serial port on the router.

R1>enable


R1#config term


R1(config)#interface serial 0/0


R1(config-if)#ip address 24.0.0.1 255.0.0.0R1(config-if)#encapsulation hdlc


R1(config-if)#clock rate 64000 (only set for DCE device)


R1(config-if)#no shutdown

after an interface has been configured, what command is used to enable the port?

No shutdown

The following commands configure the hostname table on a router and display the entries in the hostname table:

NY-R1>enable


NY-R1#config term


NY-R1(config)#ip host BOS-R1 24.0.0.2

The following commands enable DNS lookups and specify the DNS server

NY-R1>enableNY-R1#config term


NY-R1(config)#ip domain-lookup


NY-R1(config)#ip name-server x.x.x.x


NY-R1(config)#ip domain-name domain.com

The following commands configure your router as a DHCP server by setting an address pool (range of addresses to give out) and setting up excluded addresses that are not to be given out.

NY-R1(config)#ip dhcp pool NY_Network


NY-R1(dhcp-config)#network 23.0.0.0 255.0.0.0


NY-R1(dhcp-config)#default-router 23.0.0.1


NY-R1(dhcp-config)#dns-server 23.0.0.200


NY-R1(dhcp-config)#lease 7 0 0


NY-R1(dhcp-config)#exit


NY-R1(config)#ip dhcp excluded-address 23.0.0.1 23.0.0.15

Switch#show mac-address-table

Used to display the MAC address table on the switch.

Switch(config-if)#shutdown

Disables the port.

show port-security address

Show the MAC addresses that have been configured for eachport.

show port-security interface f0/6

Show the configuration of port security on port 6

Display a list of VLANs.

Switch#show vlan

Displays the running configuration stored in VRAM.

show running-config

Displays the startup configuration stored in NVRAM.

show startup-config

Shows a summary of the interfaces and their status

show ip interface brief

Displays detailed information about each interface

show interfaces

Displays detailed information about a specific interface.

show interface serial 0/0

Displays the routing table.

show ip route

Displays the host name table.

show hosts

Displays whether the serial interface is a DCE or DTEdevice.

show controller serial0/1

Displays what routing protocols are loaded.

show ip protocols

Displays basic information about neighboring devices such asname, type of device, and model.

show cdp neighbors

Displays detailed information about neighboring devices such asname, type of device, model, and IP address.

show cdp neighbors detail

Rollover cable:

A rollover cable is also known as a console cable and gets the name rollover because the order of the wires from one end of the cable to the other are totally reversed, or rolled over. The rollover/console cable is used to connect a computer to the console port or auxiliary port of the router for administration purposes.

Back-to-back serial cable

The back-to-back serial cable is used to connect two Cisco routers directly together over a serial link. A back-to-back serial link will have one router act as the DCE device with the clock rate set and the other router act as the DTE device.

Straight-through cable:

A straight-through cable is used to connect dissimilar devices together. Scenarios that use straight-through cables are computer-to-switch and switch-to-router.

Crossover cable:

A crossover cable has wires 1 and 2 switch positions with wires 3 and 6 on one end and is used to connect similar devices together. Scenarios that use crossover cables are computer-to-computer, switch-to-switch, and computer-to-router (they are both hosts).

Coaxial cable

A network cable type used in old Ethernet environments, such as 10Base2 and 10Base5. Coaxial cable is seen in high-speed Internet connections with cable companies today.

Fiber optic cable:

A unique cable type that has a glass core which carries pulses of light as opposed to copper cable carrying electrical signals (coax and twisted pair cabling).

Enables routing on the router. Should be on by default.

ip routing

Disables routing on the router.

no ip routing

Displays the routing table.

show ip route

Adds a static route to the router for the 23.0.0.0 network andsends any data for that network to the 22.0.0.2 address (nexthop)

ip route 23.0.0.0 255.0.0.022.0.0.2

Deletes the static route from the routing table.

no ip route 23.0.0.0 255.0.0.022.0.0.2

Sets the gateway of last resort on the router to forward anypackets with unknown destinations to the 22.0.0.2 address.

ip route 0.0.0.0 0.0.0.022.0.0.2

Display what routing protocols are running on the router.

show ip protocols

Enable RIP debugging, which will display RIP related messageson the screen as RIP-related events occur (packets are sent andreceived)

debug ip rip

Turns off debugging once you are done troubleshooting RIP.

no debug all

Creates the wireless standards, such as 802.11a/b/g/n

Institute of Electrical and Electronics Engineers (IEEE)

Regulates the use of wireless devices (licenses of frequencies)

Federal Communications Commission (FCC)

WiFi-Alliance

Ensures compatibility of wireless components. The WiFi-Alliance is responsible for testing and certification of wireless devices.

No wireless access point is used. The wireless clients communicate in a peer-to-peer environment.

Ad hoc mode

802.11a

A wireless standard that uses the 5 GHz frequency range and runs at 54 Mbps.

802.11b

A wireless standard that uses the 2.4 GHz frequency range and runs at 11 Mbps. The WiFi standard was created and 802.11b is part of that standard. This is the frequency used by cordless phones and microwaves, so you may experience interference from those devices. As a correction, you can change the channel of the wireless network or purchase phones that use a different frequency

802.11g

A wireless standard, which is compatible with 802.11b, that also uses the 2.4 GHz frequency range and runs at 54 Mbps.

802.11n

A new wireless standard that can use either the 2.4 GHz frequency range or the 5 GHz frequency range and is compatible with 802.11a/b/g. 802.11n has a transfer rate of approximately 150 Mbps.

Basic Service Set (BSS)

A wireless network consisting of one access point using an SSID. If you had three access points, each using a different SSID, then this would be three BSS networks.

Extended Service Set (ESS)

A wireless network comprising multiple access points using the same SSID.

the configuration requirements to set up an ESS:

a. The SSID on each access point must be the same.


b. The range of the access points must overlap by 10% or more.


c. Each access point must use a different channel.

Wired Equivalent Privacy (WEP)

An old wireless encryption protocol that involves configuring a pre-shared key on the access point and the wireless client that is used to encrypt and decrypt data. WEP uses the RC4 encryption algorithm with the pre-shared key and is not considered secure due to the way the key is used. WEP supports 64-bit and 128-bit encryption.

WiFi Protected Access (WPA)

The improvement on WEP that adds the TKIP protocol in order to perform key rotation to help improve on the fact that WEP uses a static key. WPA has two modes: personal modeinvolves configuring a pre-shared key, and enterprise mode can use an authentication server such as RADIUS.

WiFi Protected Access 2 (WPA2)

Improves upon WPA by changing the encryption algorithm to the Advanced Encryption Standard (AES) and supports both personal mode and enterprise mode.

Internet Group Membership Protocol (IGMP)

A protocol for defining host groups. All group members can receive broadcast messages intended for the group (called multicasts)

Simple Network Management Protocol

A protocol designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. This information can be gathered by management software and can be used to monitor and manage the network.

What is data called at the Network layer?

Packets

What is data called at the Physical layer?

Bits


What is data called at the Transport layer?

Segments



What is data called at the Data Link layer?

Frames