Flashcards #4

(31 cards)

1
Q

In LISP how is the Map Register broken down?

A

2 parts:
EID - (Endpoint Identifier) Ip address, Vlan Netowk identifier
RLOC - Routing Locator Tunnel Router IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On what Lisp device is de-encapsulation performed

A

ETR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is EAP?

A

Extendible Auhtentication Protocol. Provides a common protocol for differing authentication mechanims.
Enables the dynamic selction of the authentication mechanism at authentication time based on information transmitted in the Access-Request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What EAP method requires that digital certificates are installed on the server but not the client?

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What EAP method require both a client and a server digital certificate?

A

EAP-TLS. Can be used for point-to-point connections and for both wired and wireless links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What symbol in the output of show ip bgp indicates the best route to a destination?

A

>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first step of QoS

A

Classification
The first device that is capable of marking will examine the packet and place it into a traffic class

Typically classification is initially classified based on source or destination IP address, source or destination port number, or application type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the 2nd step of QoS

A

Marking
After classify the traffic, the network device then marks the packet in accordance with the QoS policy applied on the outbound interface.
The marking process always uses traffic descriptors that are dedicated to QoS, such as the Class of Service(CoS), Type of Server (ToS), Differentitated Services Code Point (DSCP), or IP Precedence fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In QoS, what traffic descriptors are available at the Data Link Layer of the OSI model?

A
  • CoS
  • 802.1Q User Priority (PRI)
  • Frame Relay discard Eligible (DE)
  • Asynchronous Transfer Mode (ATM) Cell Loss Priority (CLP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In QoS, what traffic descriptors are available at the Network Layer of the OSI model?

A
  • ToS
  • DSCP
  • IP Precedence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In EEM, what sync status are used with the event cli command to allow the EEM applet to finsih before the CLI command be executed?

A

sync yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the maximum path command mean?

A

it limits the number of parallel paths that can be used for load balancing./ Maximum number of parallel routes that an IP routing protocol installs in a routing table.
It supports all IP routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where is Traffic Policing applied?

A

Inbound AND Outbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of Traffic Policing?

A

To slow down the traffic to t a value that the medium can support, to monitor bandwidth utilization, to enforce bandwidth limitations at the service PE, and to re-mark traffic that exceeds the SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of traffic shaping?

A

Used to slow down traffic due to congestion, to enforce bandwidth rates, and to send traffic classes at different rates. Applied to only inbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is symmetric active mode, and how do you enable it?

A

ntp peer command from global config.

NTP i sused to synchronize the time on network devices. A device in sym,etric active mode atempts to mutually synchronize with another NTP host. When symmetric active mode is enabled, the host might synchronize the peer or it might be synchronized by the peer.

17
Q

When the service password-encryption command has been run, hat happends to the current and future Type 0 passwords?

A

They are encrypted as Type 7 passwords in the devices running config

18
Q

What type are enable secret passwords stored as?

19
Q

What is the difference between service password-encryption and enable secret?

A

enable password - Sets the enable password, and stores that password in plaintext in the config.

enable secret - Sets the enable password, and stores that password as an md5 hash in the config.

service password-encryption - For any passwords in the config that are stored in plaintext, this command changes them to be stored as hashed values instead. This includes the enable password and username password , as well as some other types of passwords.

The big thing to note is that the hashing algorithm used by service password-encryption is a weak one - it is reversed very easily and there are tools online to do so. The hashing algorithm used by enable secret (md5) is not so easily broken.

Here’s the practical effect of the different commands:

20
Q

What is Syslog default Transport protocol?

21
Q

What is VRF Lite?

A

Virtual Routing and Forwarding Lite is an implementation of ciscos cirtual routing and forwarding (VRF) for catalyst switches and branch routers.

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/vrf.html#wp1045190

Does not support IS-IS and IGRP

22
Q

Which commands does privilege level 0 grant the user access to?

A

Only:

  • Disable
  • Enable
  • Exit
  • Help
  • Logout
23
Q

What are the default Hello and Dead timers on a OSPF network?

A

10 seconds Hello

40 seconds Dead ( 4 x Hello)

24
Q

In Spanning Tree, is Higher or Lower preferred

A

Lower priority etc wins the race.

25
What is severity level 6 in Syslog?
Informational
26
What IS-IS PDUs use the area authentication password?
Only Level 1 PDUs PDU= Protocol Data Units 3 Levels of PDUs: 1. Area Authentication
27
What state will all OSPF neighbor routers other than the desingated router (DR) and backup Designatied Router (BDR) remain in?
2-way state ``` Down Init 2-Way Exstart Exchange Loading Full ```
28
Three facts about Ansible?
* Agentless * Uses SSH * Uses YAML
29
what does the command 'service timestamps debug datetime msec' do?
Allows the milliseconds to be displayed on the log output.
30
What is H-REAP?
Hybrid Remote Edge . also referred to as Flex Connect. Enables admins to deploy AP in remote office withou talso needing to deploy a WLC to the office.
31
What must you do to a WLC immediately after making cahnges to the LAG configuration?
Reboot the WLC