• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/90

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

90 Cards in this Set

  • Front
  • Back
A contiguous range of numeric IP addresses, defined by a starting IP address and an ending IP address, to be managed by a DHCP server is known as a(n) ____.
Address Pool
A single bit at the start of the Flags field of the DHCP packet that indicates whether a client can receive unicast packets before the four-packet DHCP boot up process completes is known as:
Broadcast Bits
Typically, the client’s hardware address is used as the ____ value.
Client Identifier
An identification number that the DHCP server uses to keep track of the client and its IP address, lease time, and other parameters is known as:
Client Identifier
The software component on a TCP/IP client, usually implemented as part of the protocol stack software that issues address requests, lease renewals, and other DHCP messages to a DHCP server is known as:
DHCP Client
The four-packet process used to obtain an IP address, lease time, and configuration parameters is known as:
DHCP Discovery
Parameter and configuration information that defines what the DHCP client is looking for are known as:
DHCP Options
A special-purpose piece of software built to recognize and redirect DHCP Discovery packets to known DHCP servers is known as:
DHCP Relay Agent
A DHCP message that contains a reply from a server to a client’s DHCP Request message is known as:
DHCP Reply
A DHCP message from a client to a server, requesting some kind of service is known as:
DHCP Request
The software component that runs on a network server of some kind, responsible for managing TCP/IP address pools, or scopes, and for interacting with clients to provide them with IP addresses and related TCP/IP configuration data on demand is known as:
DHCP Server
The process of discovering a DHCP server by broadcasting a DHCP Discover packet onto the local network segment is known as:
Discovery Broadcast
A type of DHCP address lease in which each address allocation comes with an expiration timeout so that address leases must be renewed before expiration occurs, or a new address will have to be allocated instead is called: ____ Address Lease
Dynamic
If a DHCP client does NOT renew or rebind its address by the ____, it must release the address and reinitialize.
Lease Expiration Time
The amount of time that a DHCP client may use an assigned DHCP address is known as:
Lease Time
A process or execution thread that executes on a local host is known as: ____ Process
Local
A type of DHCP address lease wherein the administrator takes full responsibility for managing address assignments, using DHCP ONLY as a repository for such assignment data, and related TCP/IP configuration data is called: ____ Address Lease
Manual
A required option that indicates the purpose of a DHCP packet is known as:
Message Type
Give three examples of a message type.
(pick 3)
Discover, Offer, Inform,
Request, Acknowledge, Decline,
Negative Acknowledge (NAK)
A string of bytes that contains the value 0 is known as a(n) ____.
Null-Terminated String
When a field is filled with a(n) ____, it is said to be “zero-padded.”
Null-Terminated String
An address the DHCP client remembers from the previous network session is known as the ____ address.
Preferred
The process of contacting any DHCP server through the use of a broadcast to obtain renewal of an address is referred to as the ____ process.
Rebinding
The process of beginning the standard DHCP Discovery process anew after failure of the renewal and rebinding processes is referred to as ____.
Reinitialize
The process or execution thread that executes on a local host and forwards DHCP packets as unicasts directed to a remote DHCP server for clients operating outside a DHCP broadcast domain is known as a(n) ____ process.
Relay Agent
The process of releasing an IP address by formally sending a DHCP Release packet to the DHCP server is known as a(n) ____.
Release
If a client shuts down without sending the ____, the DHCP server maintains the lease until expiration.
Release Packet
The process of renewing the IP address for continued use is known as: ____ Process
Renewal
By default a DHCP client begins the ____ halfway between the lease grant and the lease expiration time.
Renewal Process
What term is defined by Microsoft as a group of addresses that can be assigned by a Microsoft DHCP server?
Scope
Other vendors often refer to ____ as an address pool or address range.
Scope
What term is used by Microsoft to describe a collection of IP address scopes, managed by any single DHCP server?
SuperScope
What term is used to describe a Windows Server 2003 technology that enables automatic restoration of services to an alternate server upon detection of a primary server failure?
Windows Clustering
When any cable segment or broadcast domain has NO DHCP server directly attached but includes DHCP clients that need address management services and configuration data, it is necessary to install a(n) ____ on the cable segment or broadcast domain.
DHCP Relay Agent
What type of address lease is used primarily for client machines that do NOT require stable IP address assignments? ____ Address Lease
Dynamic
By default, Windows 2000 Server and Windows Server 2003 set DHCP leases at ____ days.
8
What commands are used to release or renew an IP address?
ipconfig /release & ipconfig /renew
A database of a local network segment and its attached routers are referred to as: ____ Database
Adjacencies
A(n) ____ is a piece of software that performs services on behalf of another process or user.
Agent
Designated routers share the ____ database view across link-state networks.
Adjacencies
A router used to connect separate areas is referred to as: ____ Router
Area Border
Groups of contiguous networks are referred to as ____.
Areas
A group of routers that is under a single administrative authority is called:
Autonomous System (AS)
A router that connects an independent routing area to another AS is called:
Autonomous System Border Router (ASBR)
A required area to which all other routers should be attached directly or through a tunnel is called: ____ Area
Backbone
The router with the second highest priority on a broadcast segment of a link-state network is referred to as: ____ Router
Backup Designated
A point on the network where packets are silently discarded is referred to as a(n) ____.
Black Hole
The process of ensuring all routers on a network have up-to-date information about available networks and their costs is referred to as:
Converge
A network state in which all routers are synchronized to share a complete view of the network is referred to as a(n) ____.
Converged State
A network routing problem caused by a routing loop is called _______. Packets circulate continuously until they expire.
Counting to Infinity
The router with the highest priority on a segment of a link-state network is called a _______ Router.
Designated
The number of hops that a network routing protocol can span is referred to as the ____.
Diameter
What algorithm is used to compute the best route on a link-state network? ____ Algorithm
Dijkstra
The source point or location for determining distance to another network is referred to as a(n) ____.
Distance Vector
A routing protocol that uses information about the distances between networks, rather than the amount of time it takes for traffic to make its way from the source network to the destination network is referred to as: ______ Routing Protocol
Distance Vector
Name a distance routing protocol.
RIP
Routing protocols used to exchange routing information between separate autonomous systems are referred to as: _____ Protocols
Exterior Gateway
A route entry received from a different area is called:
_____ Route Entry
External
What table is referenced to make forwarding decisions on a link-state network? _____ Table
Forwarding
A process link-state routers use to discover neighbor routers is known as the ____ process.
Hello
A routing table entry with a 32-bit subnet mask designed to reach a specific network host is known as a(n) ____.
Host Route
In the case of routing, ____ is the maximum number of hops that a packet can cross before being discarded.
Infinity
In an IP packet, the ____ field is used to define the remaining lifetime of a packet.
Time To Live
What acronym refers to protocols used within an autonomous system?
IGP
The ability to provide routing within an autonomous system is called: ____ Autonomous System Routing
Intra
The time that a packet can remain on the network is referred to as the ____ value.
Lifetime
A type of routing protocol that uses and shares information ONLY about adjacent neighbors, and that uses transit time to assess link costs, rather than hop counts or routing distances is known as:
Link-State
A packet that includes information about a router, its neighbors and the attached network is called:
Link-State Advertisement
A routing protocol based on a common link-state picture of the network topology is known as: _____ Routing Protocol
Link-State
____ can identify the best path based on bandwidth availability or other path characteristics associated with one or more links available to them.
Link State Routers
Name a link-state routing protocol.
Open Shortest Path First
In link-state routing, a router that distributes its view of the link-state database or slave routers is known as the ____.
Master Router
On a link-state network, ____ are connected to the same network segment.
Neighbor Routers
What acronym refers to the information about available networks and the routes whereby they may be reached, which routing protocols collect, manage, and distribute to the routers or other devices that use such routing protocols?
NLRI
A low-overhead feature that provides IP routing for sites on a hub-and-spoke network is called:
On-Demand Routing
A routing technique used to share BGP routing information across a non-BGP network is known as:
Pass-Through Autonomous System Routing
A router that silently discards packets that are too large to be forwarded and have the Don’t Fragment bit set is called:
Path Maximum Transmission Unit Black Hole Router
An update to data values that occurs at a regular interval or time period is known as a(n) ____ Update.
Periodic
In the case of routing protocols, most distance vector protocols include ____ to help maintain router table currency.
Periodic Updates
A password that is transferred across the cable in plain ASCII text is referred to as a(n) _____ Password.
Plain Text
A process used to make a router undesirable for a specific routing path is referred to as ______. This process is one of the methods used to eliminate routing loops.
Poison Reverse
A method whereby information collected and managed by one routing protocol is exchanged with similar information managed by another routing protocol is known as:
Redistributing
A network configuration that enables packets to circle the network is called:
Routing Loops
What two processes are used to resolve routing loops on distance vector networks?
Split Horizon & Poison Reverse
OSPF networks ____ resolve loops by defining best paths through an internetwork.
Automatically
Name a Layer 3 protocol that was designed to permit routers to exchange information about networks that are reachable, the routes by which they may be reached, and the costs associated with such routes.
Routing Protocol
On an OSPF network, the ____ receives and acknowledges link-state database summary packets from a master router.
Slave Router
What rule is used to eliminate the counting-to-infinity problem?
Split Horizon
The ____ rule states that information can NOT be sent back the same direction from which it was received.
Split Horizon
Name an update that occurs in response to some specific event in a network environment, usually associated with a router entering or leaving that environment, or some change in cost assessments or configurations for network links. ______ Update
Triggered