Chapter 4 Flashcards

1
Q

What two mechanisms can be used to monitor and manage the amount of traffic?

A

Shaping and policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two mechanisms assign packets to queues and determine how they are forwarded?

A

Classification and marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is tail drop?

A

A congestion avoidance mechanism that drops further incoming packets when the queue is full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Random Early Detection? (RED)

A

A congestion avoidance mechanism that drops packets before congestion occurs, the rate at which it drops packets depends on how much of the queue has filled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What congestion avoidance methods tacks packet priority into account when dropping packets?

A

Weighted Random Early Detection (WRED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What QoS level prioritizes voice traffic?

A

Platinum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does traffic shaping do?

A

Queues excess traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What modifies the QoS attributes of a packet?

A

Marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two configurations that are required to enable SSH?

A

hostname
ip domain-name
crypto key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What serves as a password to protect access to MIB objects?

A

Community strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What ports do syslog communicate on?

A

UDP 514, TCP 6514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is syslog severity level 7?

A

Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is syslog severity level 6?

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is syslog severity level 5?

A

Notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is syslog severity level 4?

A

Warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is syslog severity level 3?

A

Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is syslog severity level 2?

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is syslog severity level 1?

A

Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is syslog severity level 0?

A

Emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are incoming syslog server messages categorized?

A

Severity level, based on importance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the logging trap debug command do on a router?

A

Router will send all messages to the syslog server, you can specify a severity level and it will send that level and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What might have happened if a notice level message was sent to a syslog server?

A

An interface line has changed status, a routing instance has flapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How would you configure a syslog to receive error conditions?

A

logging trap 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a syslog facility?

A

A numeric value that represent the processes that can generate a log message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What port does FTP use?
TCP 20 & 21
26
What port does TFTP use?
UDP 69
27
What is the more secure protocol between FTP and TFTP and why?
FTP, because it has user authentication
28
What is true about the connections in FTP?
It uses two separate connections for control and data traffic
29
What is a use of TFTP?
To transfer configurations to and from network devices
30
What is a use of FTP?
Mostly used by remote users to upload and download files
31
What protocol uses block numbers to identify and mitigate data-transfer errors and offers anonymous user login ability?
TFTP
32
What port does DNS use?
TCP/UDP 53
33
What port does DHCP use?
UDP 67 & 68
34
What port does SNMP use?
UDP 161
35
What global configuration do all dynamic NAT and PAT begin with?
1. Access list 2. #ip nat inside source list n
36
What is the unique global command that configures NAT statically?
#ip nat inside source static [private address] [public address]
37
What is the unique global command that configures NAT dynamically?
1. ip nat pool n [start-end ip] netmask [a.b.c.d] 2. #ip nat...pool n
38
What is the unique global command that configures PAT?
#ip nat... interface [outside if] overload
39
What is the command to verify NAT configuration?
#show ip nat translation
40
What must be configured on an NTP server?
Time zone ntp server-pool ntp master
41
What must be configured on an NTP client?
Time zone ntp server
42
What protocol does NTP use?
UDP
43
What is the configuration needed to enable SSH?
(config)#ip domain-name (name) (config)#username (name) password (pw) (config)#crypto key generate rsa
44
What is the configuration needed to enable only SSH access to a device?
(config)#line vty 0 15 (config-line)#login local (config-line)#transport input ssh
45
How do you configure a DHCP client?
#ip address dhcp
46
What configuration is needed to configure a DHCP relay agent?
#ip helper-address (dhcp server ip address)
47
Why would a DHCP relay agent be configured?
When clients and a DHCP server are not on the same physical network, a DHCP relay agent is needed to forward DHCP requests and replices
48
What router gets configured as a helper? (location)
The one closest to the client
49
What command can be used to verify DHCP relay agent address configuration?
#show ip interface
50
Which command could be used on a DHCP server to look at addresses assigned?
#show ip dhcp binding
51
What does a DHCP server do when two hosts are using the same IP address?
The address is removed from the pool until until an administrator resolves the conflict
52
What is the highest security network device monitoring protocol?
SNMPv3
53
In SNMP, what do community strings do?
They're passwords to protect access to MIB objects
54
What protocol allows you to back up multiple network configurations globally using the copy function?
SNMP
55
What does an SNMP agent do?
Responds to requests from the NMS and sends information about a device (MIB)
56
In SNMP operations, what are MIBs?
A collection of variables that can be monitored
57
What security was added in SNMPv3?
Authentication
58
What is a GetBulkRequest in SNMPv2?
Allows a management station to retrieve a large amount of data in one request
59
In SNMP, what is the difference between trap and inform?
Trap messages are not reliable, they're sent and forgotten
60
In SNMP, what is a similarity between trap and inform?
Both use UDP, and both notify the manager of events
61
What commands are needed to configure a router to provide IP addresses to computers on the network?
ip dhcp pool [1] network [address] [mask]
62
What does policing do to excess packets?
Drops and remarks
63
What is the purpose of traffic shaping?
Limit the bandwidth usage to prevent congestion