Boson Test 2 Flashcards

(158 cards)

1
Q

What is the MAC address for VRRP for IPv4?

A

0000.5E00.01xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the MAC address for VRRP for IPv6?

A

0000.5E00.02xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the MAC address for HSRP v4?

A

0000.0C07.ACxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the MAC address for HSRP v2?

A

0000.0C9F.Fxxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the MAC address for HSRP for IPv6?

A

0005.73A0.0xxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the MAC address for GLBP?

A

0007.B400.xxyy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What FHRPs are Cisco proprietary? (two answers)

A

HSRP and GLBP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three encryption algorithms are asymmetric? (three answers)

A

ECDH, RSA, DH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the order of the Ethernet II frame? (seven answers)

A

preamble, SOF, destination address, source address, type, payload, FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the order of the 802.11 MAC frame? (nine answers)

A

FC, DUR, Address 1, Address 2, Address 3, SEQ, Address 4, DATA, FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe GLBP?

A

Has one active virtual gateway and multiple active virtual forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe HSRP?

A

Has one active router and one standby router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe VRRP?

A

Has one master router and multiple backup routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does C mean in the acronym CIA?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does I mean in the acronym CIA?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does A mean in the acronym CIA?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the name for Syslog level 0

A

Emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the name for Syslog level 1

A

Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the name for Syslog level 2

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the name for Syslog level 3

A

Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the name for Syslog level 4

A

Warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the name for Syslog level 6

A

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the name for Syslog level 5

A

Notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the name for Syslog level 7

A

Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What metric does EIGRP use? (two answers)
Bandwidth and delay
25
What is an initialism to remember the levels?
Din we care (with a silent R)
26
What metric does IS-IS use?
Cost
27
What metric does OSPF use?
Cost
28
What metric does RIP use?
Hop count
29
What are the PAgP modes? (two answers)
Desirable and auto
30
What are the LACP modes? (two answers)
Active and passive
31
What does the VTP server mode? (four answers)
creates/modifies/deletes VLANs, synchronizes information, originates and forwards advertisements, and stores VLAN information in the NVRAM
32
What does the VTP client mode? (two answers)
Synchronizes information, originates and forwards advertisements
33
What does the VTP transparent mode? (three answers)
creates/modifies/deletes VLANs, forward advertisements and stores VLAN information in NVRAM
34
What is the FF01::/16 address used for?
node-local
35
What is the FF02::/16 address used for?
link-local
36
What is the FF05::/16 address used for?
unique-local
37
What is the FF08::/16 address used for?
organization-local
38
What is the FF0E::/16 address used for?
global
39
What API type uses XLM exclusively?
SOAP
40
What HTTP verb does the CRUD operation CREATE correspond to? (two answers)
PUT/POST
41
What HTTP verb does the CRUD operation READ correspond to?
GET
42
What HTTP verb does the CRUD operation UPDATE correspond to? (three answers)
PUT/POST/PATCH
43
What HTTP verb does the CRUD operation DELTETE correspond to?
DELETE
44
What does the command "switchport port-security" do?
Prevents the port from hosting a hub or switch
45
What does Cisco DMVPN do?
Enables you to create a single mGRE tunnels interface in the main office with a single IPsec profile to manage all spoke routers.
46
What encryption method does WPA use?
TKIP
47
What encryption method does WPA2 and WPA3 Personal use?
CCMP (AES)
48
What encryption method does WPA3 Enterprise use?
GCMP-256 encryption
49
How do you mitigate DDoS attacks? (six answers)
- ACLs - Rate Limiting - Traffic-flow Reporting - Using a Firewall - Moving critical systems to another location or more secure LAN - IDS
50
What does C mean in the routing table?
Connected
51
What does L mean in the routing table?
Local
52
What does S mean in the routing table?
Static Route
53
What does D mean in the routing table?
EIGRP Route
54
What does D EX mean in the routing table?
EIGRP External Route
55
What does O mean in the routing table?
OSPF Intra Area Route
56
What does O IA mean in the routing table?
Inter Area Route
57
What does O E1 mean in the routing table?
External Type 1 Route
58
What does OE2 mean in the routing table?
External Type 2 Route
59
What does R mean in the routing table?
RIP
60
What does B mean in the routing table?
BGP
61
What does * mean in the routing table?
Candidate for default route
62
What describes the split horizon?
A router will not send route information back out the same interface over which it was learned
63
What of the following statements are true when discussing link-state? (this one is a ton of words)
Packets are routed based upon the shortest path calculated by an algorithm with link-state protocols. They require a hierarchal IP addressing scheme for optimal functionality. The use hello packets and LSAs from other routers to build and maintain the topological database. They place a high demand on the router resources running the algorithm.
64
How many address filed are in an 802.11 data frame?
four
65
What are the four address filed in the 802.11 data frame for? (four answers)
Receiver address, transmitter address, destination address, and source address
66
When is the fourth address used in the 802.11 data frame?
It is only present for frames passing between devices in the DS, such as from one access point to another.
67
How many address fields can be expected in an 802.11 data frame that is sent from a wireless station and destined to a host on the wired network.
Three
68
What does "flip the 7th bit" mean?
In EUI-64 addresses, the bit can be 0 for assigned EUI-64 address, or 1 for self-administered
69
What does the FC field in the 802.11 MAC frame mean? What is it used for?
It stands for frame control. It identifies a lot of information about the frame, but mostly if the frame is control, data, or management.
70
What does the customer not have control over in an IaSS server model?
The customer does not have control over the physical infrastructure in the cloud.
71
What is the common multicast address for all hosts?
224.0.0.1 or FF02::1
72
What is the common multicast address for all routers?
224.0.0.2 or FF02::2
73
What is the common multicast address for all OSPF routers?
224.0.0.5 or FF02::5
74
What is the common multicast address for all OSPF DRs?
224.0.0.6 or FF02::6
75
What is the common multicast address for all RIP routers (except RIPv1)?
224.0.0.9 or FF02::9
76
What is the common multicast address for all EIGRP routers?
224.0.0.10 or FF02::A
77
What is a giant?
An ethernet frame that exceeds 1,518 bytes and has a bad FCS value.
78
What is a baby giant?
An ethernet frame that is up to 1,600 bytes in lenght.
79
When are baby giants likely to occur?
When using Q-in-Q encapsulation, MPLS, or any other features that adds top the size of an Ethernet frame.
80
What is a jumbo frame?
A frame that is up to 9,216 bytes in length.
81
What is an autonomous AP?
An AP that connects a wireless client to a wired network without requiring a separate wireless controller.
82
In a Split-MAC deployment, what functions are performed by a WLC?
Authentication and resource reservation
83
How are tasks distributed between an AP and WLC in a Split-MAC deployment?
The WLC handles non-time-sensitive tasks, such as security management, lightweight AP configuration management, and client load balancing, along with client association requests, data encapsulation, client authentication, key exchange, security policy enforcement and RF management.
84
What makes a root bridge?
The switch with the lowest priority, the the lowest MAC address
85
What is root guard?
Preventing a new switch from being elected root switch
86
What deployment is needed for Cisco Meraki to automatically configure an AP?
cloud-based AP deployment
87
What is different between traditional ACLs and FlexConnect ACLs?
FlexConnect ACLs are applied to Lightweight APs
88
Can FlexConnect ACLs be applied on the native VLAN?
Yes
89
What type of 802.11 frame is a Power Save Poll?
A control frame
90
Will auto and auto make an Etherchannel?
No
91
Will passive and passive make an Etherchannel?
No
92
Will on and on make an Etherchannel?
Yes
93
What does active/desirable do?
Will attempt to negotiate
94
What does passive/auto do?
Will not negotiate
95
How do you identify if STP will block a port?
To identify which port will be blocked, you must first identify which switch will become the root bridge. then identify root ports (shortest path to root bridge), identify the designated ports, then all other ports will be in a blocking state.
96
How do you identify the root ports?
The root port is the link connected to the root bridge or the shortest path to the root bridge.
97
How do you identify designated ports?
The designated port is a port that does not face the root but forwards traffic form another segment at the lowest possible cost.
98
What is the default update frequency for CDP?
60 seconds
99
What is the default hold timer for CDP?
180 seconds
100
What is the default update frequency for LLDP?
30 seconds
101
What is the default hold timer for LLDP?
120 seconds
102
Which neighbor discovery protocol sends VTP information?
CDP
103
What is the AP-manager interface on a WLC?
It controls all Layer 3 communication between the WLC and lightweight access point. It is a dedicated management interface for control and management traffic.
104
What is the virtual interface?
Used to manage the WLC itself.
105
What is the service port interface on a WLC?
Used for out-of-band management and troubleshooting purposes, is used for inaccessible or misconfigured devices, or for initial config, troubleshooting or firmware updates.
106
What is MST?
It allows for a single spanning tree instance to be used for multiple VLANs.
107
What does IPsec in tunnel mode encrypt?
It encrypts the entire packet
108
When looking at a NAT translation, where would you find the destination IP address for an outside computer?
Outside local
109
What network functions are most likely moved to a centralized controller?
Routing, switching, traffic engineering, security, QoS, network monitoring and analytics, virtual network management
110
What components used to calculate the EIGRP composite metric?
Delay and bandwidth
111
If there are multiple routes to the same network, how are they picked?
The most specific route, then the lowest AD
112
What are the three port security violation modes? (three answers)
- Shutdown, which shuts down the port on violation - Restrict, which logs, drops the traffic from the violating device, and shows a message - Protect, which logs the violation and drops the devices packets but there are no visible messages
113
Which configuration management tool is written in Ruby?
Chef and Puppet
114
What MAC address represents an IP multicast address
01-00-5E-0F-0F-0F
115
What MAC address represents STP?
01-80-C2-00-00-00
116
What MAC address represens LLDP?
01-80-C2-00-00-0E
117
What MAC address represents CDP?
01-00-0c-cc-cc-cc
118
Where are REST APIs used?
They are typically used to communicate with an SDN application plane?
119
What APIs are used for northbound communication?
OSGi and REST
120
What APIs are used for southbound communication?
OnePK, OpFlex, OpenFlow, NETCONF
121
What encryption method is used for WEP?
RC4
122
Why would you use the switchport trunk encapsulation dot1q command on a switch?
To specify the encapsulation method for trunk links.
123
What is the command aaa new-model used for?
Used prior to enabling AAA accounting on a router
124
What command should you use to move the trust boundary to an IP phone?
mls qos trust cos
125
What would cause a RSTP topology change notification?
A non-edge port that transitions to the forwarding state
126
What IP protocol number is GRE?
47
127
What IP protocol number is ICMP?
1
128
What IP protocol number is TCP?
6
129
What IP protocol number is ESP?
50
130
What IP protocol number is AH?
51
131
What IP protocol number is ICMP for IPv6?
58
132
What IP protocol number is EIGRP?
88
133
What IP protocol number is OSPF?
89
134
What IP protocol number is VRRP?
112
135
What encryption protocol is symmetric?
DH and ECDH; AES, RC4, 3DES
136
What DTP mode will result in misconfigs?
access and trunk
137
What DTP mode will access trunk?
none, except for access and trunk, they will result in access ports
138
What happens if a port is dynamic auto and another port is dynamic auto?
They cause an access link
139
What metric does RIP use?
Hop count
140
What metric does IS-IS use?
cost
141
What of the following statements are true when discussing distance vector protocols?
Send the entire routing table to a neighbor
142
What does password 7 do?
Configures and encrypted VTY login password
143
What does enable secret 5 do?
Configures a previously encrypted password for gaining access to enable mode
144
What has the AD of 0?
Connected interfaces, static routes to a connected interface
145
What has the AD of 1?
Static route directed toward an IP address
146
What has the AD of 5?
EIGRP summary route
147
What has the AD of 20?
External BGP route
148
What has the AD of 90?
Internal EIGRP route
149
What has the AD of 100?
IGRP route
150
What has the AD of 110?
OSPF route
151
What has the AD of 115?
IS-IS route
152
What has the AD of 120
RIP route
153
What has the AD of 140?
EGP route
154
What has the AD of 160?
On Demand Routing (ODR)
155
What has the AD of 170?
External EIGRP route
156
What has the AD of 200?
Internal BGP route
157
What has the AD of 255?
Unknown origin routes