Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/92

Click to flip

92 Cards in this Set

  • Front
  • Back
A contiguous range of numeric IP addresses, defined by a starting IP address and an ending IP address, to be managed by a DHCP server is known as a(n) ____.
address pool
A single bit at the start of the Flags field of the DHCP packet that indicates whether a client can receive unicast packets before the four-packet DHCP boot up process completes is known as:
broadcast
Typically, the client’s hardware address is used as the ____ value.
client identifier
An identification number that the DHCP server uses to keep track of the client and its IP address, lease time, and other parameters is known as:
client identifier
The software component on a TCP/IP client, usually implemented as part of the protocol stack software that issues address requests, lease renewals, and other DHCP messages to a DHCP server is known as:
DHCP Client
The four-packet process used to obtain an IP address, lease time, and configuration parameters is known as:
DHCP Discovery
Parameter and configuration information that defines what the DHCP client is looking for are known as:
DHCP Options
A special-purpose piece of software built to recognize and redirect DHCP Discovery packets to known DHCP servers is known as:
DHCP Relay Agent
A DHCP message that contains a reply from a server to a client’s DHCP Request message is known as:
DHCP Reply
A DHCP message from a client to a server, requesting some kind of service is known as:
DHCP Request
The software component that runs on a network server of some kind, responsible for managing TCP/IP address pools, or scopes, and for interacting with clients to provide them with IP addresses and related TCP/IP configuration data on demand is known as:
DHCP Server
The process of discovering a DHCP server by broadcasting a DHCP Discover packet onto the local network segment is known as:
Discovery Broadcast
A type of DHCP address lease in which each address allocation comes with an expiration timeout so that address leases must be renewed before expiration occurs, or a new address will have to be allocated instead is called:
Dynamic Address Lease
If a DHCP client does NOT renew or rebind its address by the ____, it must release the address and reinitialize.
lease expiration time
The amount of time that a DHCP client may use an assigned DHCP address is known as:
Lease Time
A process or execution thread that executes on a local host is known as:
Local Process
A type of DHCP address lease wherein the administrator takes full responsibility for managing address assignments, using DHCP ONLY as a repository for such assignment data, and related TCP/IP configuration data is called:
Manual Address Lease
A required option that indicates the purpose of a DHCP packet is known as:
Message Type
Give three examples of a message type.
Discover
Offer
Request
Decline
Acknowledge
Negative Acknowledge (NAK)
Release
Inform
A string of bytes that contains the value 0 is known as a(n) ____.
null-terminated string
When a field is filled with a(n) ____, it is said to be “zero-padded.”
null-terminated string
An address the DHCP client remembers from the previous network session is known as the ____ address.
preferred address
The process of contacting any DHCP server through the use of a broadcast to obtain renewal of an address is referred to as the ____ process.
rebinding process
The process of beginning the standard DHCP Discovery process anew after failure of the renewal and rebinding processes is referred to as a(n) ____.
reinitialize
The process or execution thread that executes on a local host and forwards DHCP packets as unicasts directed to a remote DHCP server for clients operating outside a DHCP broadcast domain is known as a(n) ____ process.
relay agent process
The process of releasing an IP address by formally sending a DHCP Release packet to the DHCP server is known as a(n) ____.
release
If a client shuts down without sending the ____, the DHCP server maintains the lease until expiration.
release
The process of renewing the IP address for continued use is known as:
renewal process
By default a DHCP client begins the ____ halfway between the lease grant and the lease expiration time.
renewal process
What term is used to define is defined by Microsoft as a group of addresses that can be assigned by a Microsoft DHCP server?
Scope
Other vendors often refer to ____ as an address pool or address range.
scope
What term is used by Microsoft to describe a collection of IP address scopes managed by any single DHCP server?
Superscope
What term is used to describe a Windows Server 2003 technology that enables automatic restoration of services to an alternate server upon detection of a primary server failure?
Windows Clustering
When any cable segment or broadcast domain has NO DHCP server directly attached but includes DHCP clients that need address management services and configuration data, it is necessary to install a(n) ____ on the cable segment or broadcast domain.
DHCP Relay Agent
What type of address lease is used primarily for client machines that do NOT require stable IP address assignments?
Dynamic Address Lease
By default, Windows 2000 Server and Windows Server 2003 set DHCP leases at ____ days.
8
What commands are used to release or renew an IP address?
Ipconfig /release
Ipconfig /renew
A database of a local network segment and its attached routers are referred to as: ____.
adjacencies database
A(n) ____ is a piece of software that performs services on behalf of another process or user.
agent
Designated routers share the ____ database view across link-state networks.
adjacencies
A router used to connect separate areas is referred to as:
Area Border Router (ABR)
Groups of contiguous networks are referred to as ____.
areas
A group of routers that is under a single administrative authority is called:
Autonomous System (AS)
A router that connects an independent routing area to another AS is called:
Autonomous System Border Router
(ASBR)
A required area to which all other routers should be attached directly or through a tunnel is called:
Backbone Area
The router with the second highest priority on a broadcast segment of a link-state network is referred to as:
Backup Designated Router
(BDR)
A point on the network where packets are silently discarded is referred to as a(n) ____.
black hole
The process of ensuring all routers on a network have up-to-date information about available networks and their costs is referred to as:
Converge
A network state in which all routers are synchronized to share a complete view of the network is referred to as a(n) ____.
converged state
A network routing problem caused by a routing loop is called:
Counting to Infinity
When packets circulate continuously until they expire, this is referred to as:
Counting to Infinity
When packets circulate continuously until they expire, this is referred to as a(n)
Infinity Count
The number of hops that a network routing protocol can span is referred to as the ____.
diameter
What algorithm is used to compute the best route on a link-state network?
Dijkstra Algorithm
The source point or location for determining distance to another network is referred to as a(n) ____.
distance vector
A routing protocol that uses information about the distances between networks, rather than the amount of time it takes for traffic to make its way from the source network to the destination network is referred to as:
Distance Vector Routing Protocol
Name a distance routing protocol.
Distance Vector Routing Protocol
Routing protocols used to exchange routing information between separate autonomous systems are referred to as:
Exterior Gateway Protocols
(EGPs)
A route entry received from a different area is called:
External Route Entry
What table is referenced to make forwarding decisions on a link-state network?
Forwarding Table
A process link-state routers use to discover neighbor routers is known as the ____ process.
hello
A routing table entry with a 32-bit subnet mask designed to reach a specific network host is known as a(n) ____.
host route
In the case of routing, ____ is the maximum number of hops that a packet can cross before being discarded.
infinity
In an IP packet, the ____ field is used to define the remaining lifetime of a packet.
Time To Live
What acronym refers to protocols used within an autonomous system?
Interior Gateway Protocols (IGPs)
The ability to provide routing within an autonomous system is called:
Intra-Autonomous System Routing
The time that a packet can remain on the network is referred to as the ____ value.
lifetime
A type of routing protocol that uses and shares information ONLY about adjacent neighbors, and that uses transit time to assess link costs, rather than hop counts or routing distances is known as:
Link-State Routing Protocol
A packet that includes information about a router, its neighbors and the attached network is called:
Link-State Advertisement (LSA) Packet
A routing protocol based on a common link-state picture of the network topology is known as:
Link-State Routing Protocol
____ can identify the best path based on bandwidth availability or other path characteristics associated with one or more links available to them.
Link State Routers
Name a link-state routing protocol.
Open Shortest Path First
(OSPF)
In link-state routing, a router that distributes its view of the link-state database or slave routers is known as the ____.
master router
On a link-state network, ____ are connected to the same network segment.
neighbor routers
What acronym refers to the information about available networks and the routes whereby they may be reached, which routing protocols collect, manage, and distribute to the routers or other devices that use such routing protocols?
Network Layer Reachability Information
(NLRI)
A low-overhead feature that provides IP routing for sites on a hub-and-spoke network is called:
On-Demand Routing (ODR)
A routing technique used to share BGP routing information across a non-BGP network is known as:
Pass-Through Autonomous System Routing
A router that silently discards packets that are too large to be forwarded and have the Don’t Fragment bit set is called:
Path Maximum Transmission Unit Black Hole Router
An update to data values that occurs at a regular interval or time period is known as a(n) ____.
periodic update
In the case of routing protocols, most distance vector protocols include ____ to help maintain router table currency.
periodic updates
A password that is transferred across the cable in plain ASCII text is referred to as a(n) ___.
plain text password
A process used to make a router undesirable for a specific routing path is referred to as:
Poison Reverse
Name a method that is used to eliminate routing loops.
Poison Reverse
A method whereby information collected and managed by one routing protocol is exchanged with similar information managed by another routing protocol is known as:
Redistributing
A network configuration that enables packets to circle the network is called:
Routing Loops
What two processes are used to resolve routing loops on distance vector networks?
Split Horizon and Poison Reverse
OSPF networks ____ resolve loops by defining best paths through an internetwork.
automatically
Name a Layer 3 protocol that was designed to permit routers to exchange information about networks that are reachable, the routes by which they may be reached, and the costs associated with such routes.
Routing Protocol
On an OSPF network, the ____ receives and acknowledges link-state database summary packets from a master router.
slave router
What rule is used to eliminate the counting-to-infinity problem?
Split Horizon
The ____ rule states that information can NOT be sent back the same direction from which it was received.
split horizon
Name an update that occurs in response to some specific event in a network environment, usually associated with a router entering or leaving that environment, or some change in cost assessments or configurations for network links.
Triggered Update