Lammle questions Flashcards

1
Q

Enable Rapid Spanning Tree. Config

A

Switch(config)#spanning-tree mode rapid-pvst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we know a spanning-tree network has converged?

A

All switch and bridge ports are assigned as either root or designated ports. When all bridges/switches have transitioned to either forwarding/blocking state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two types of EtherChannels? What modes enable each?

A

Two types of EtherChannel: Cisco proprietary PAgP and the IEEE’s LACP.

For PAgP, use auto or desirable mode, and with LACP use passive or active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can you do to provide two switches higher bandwidth than the default configuration is already providing?

A

Place the links in the same EtherChannel bundle. Up to 8 ports between switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would put switch interfaces into EtherChannel port number 1, using LACP?

A

Switch(config)#interface port-channel 1

Switch(config-if)#channel-group 1 mode active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two commands would guarantee your switch to be the root bridge for VLAN 30?

A

spanning-tree vlan 30 priority 0

spanning-tree vlan 30 root primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Difference between TACACS+ and RADIUS

A

TACACS+ is Cisco proprietary (uses TCP also, port 49) (all AAA packets encrypted too) (multiprotocol support) (for devi ce administration)

RADIUS is an open standard (uses UDP also, port 1646/6, 1812/3) (only passwords encrypted) (authentication and authorization is combined) (for network access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Difference between SNMP v2 and v3

A

SNMP v2 sends passwords as clear-text (also UDP). SNMP v3 can authenticate and encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMP v3 three security modes and definitions

A

noAuthNoPriv: username authentication but no encryption

authNoPriv: MD5 or SHA (Secure Hash Algorithm) authentication but no encryption

authPriv: MD5 or SHA authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enable AAA on a router

A

aaa new-model

in global config mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What mitigates access layer threats?

A

Port security, DHCP snooping, dynamic ARP inspection, and identity-based networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does DHCP snooping do?

A

DHCP snooping validates DHCP messages, builds and maintains the DHCP snooping binding database, and rate-limits DHCP traffic for trusted and untrusted sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the HSRP (Hot Standby Router Protocol) states?

A

INIT, Learn, Listen, Speak, Standby, Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HSRPv1 and HSRPv2 attributes

Group #:
Virtual MAC address:
Multicast Address:
Port:

A
HSRP v1
Group #: 0-255
Virtual MAC address: 0000.0c07.acxx
Multicast Address: 224.0.0.2
Port: UDP port 1985
HSRP v2
Group #: 0-4095
Virtual MAC address: 0000.0c9f.fxxx
Multicast Address: 224.0.0.102
Port: UDP port 1985
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You want to configure RADIUS so your network devices have external authentication, but you also need to make sure you can fall back to local authentication. Which command will you use?

A

aaa authentication login default group MyRadiusGroup local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Dynamic ARP Inspection (DAI)?

A

A security feature that verifies address resolution protocol (ARP) requests and responses in a network

Requires DHCP snooping for MAC-to-IP bindings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Three roles for IEEE 802.1x standard

A

Client, authenticator, and authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tables does EIGRP maintain in RAM

A

Neighbor, topology, and routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do you do when troubleshooting EIGRP adjacency?

A

Interfaces between the devices are down.

The two routers have mismatching EIGRP autonomous system numbers.

Proper interfaces are not enabled for the EIGRP process.

An interface is configured as passive.

K values are mismatched.

EIGRP authentication is misconfigured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What must match for two OSPF routers to become neighbors?

A

Area ID, stub area flag, authentication password if using one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How is the default router-id chosen in OSPF

A

Cisco chooses the router ID by using the highest IP address of all configured loopback interfaces. If no loopback interfaces are configured with addresses, OSPF will choose the highest IP address of all active physical interfaces

22
Q

In OSPF, Hellos are sent to what IP address?

A

224.0.0.5

23
Q

Updates addressed to 224.0.0.6 are destined for which type of OSPF router?

A

224.0.0.6 is used on broadcast networks to reach the DR and BDR

24
Q

What must match for OSPF routers to create an adjacency?

Also, what other items might prevent adjacency?

A

The hello and dead timers must match, they must both be configured into the same area as well as being in the same subnet.

Also, if authentication is configured, that info must match as well.

Check if an ACL is set and if a passive interface is configured
Every OSPF router must use a different RID.

25
Q

What is the relationship with OSPFv3, IPv4, and RID

A

If you have IPv4 configured on the router, it is not mandatory that you configure the RID.

If you don’t have IPv4 configured on the router, it is mandatory that you configure the RID.

32-bit RID (router ID)

26
Q

Which command will show all the LSAs known by a router? OSPF

A

show ip ospf database

27
Q

Troubleshooting steps for OSPF

A
  • Make sure interfaces are operational and enabled for OSPF
  • Verify Hello and Dead Timers
  • Make sure interfaces are in the same area
  • Make sure no passive interfaces are configured
28
Q

What is the default port mode of Cisco switches?

What needs to be done to trunk between switches

A

Auto. Need to switch one to either on or desirable

29
Q

Which command will display the CHAP authentication process as it occurs between two routers in the network?

A

debug ppp authentication

30
Q

R1(config-router)# neighbor 10.10.200.1 remote-as 6200

What is 10.10.200.1?

What is 6200?

A

IP Address of neighbor

AS # of the remote router

31
Q

What are some GRE characteristics?

A
  • GRE uses a protocol-type field in the GRE header so any layer 3 protocol can be used through the tunnel
  • GRE is stateless and has no flow control
  • GRE offers no security
  • GRE creates additional overhead for tunneled packets—at least 24 bytes.
32
Q

What does it mean when you receive a flapping message when you configure your GRE tunnel?

A

It means you have used your tunnel interface address instead of the tunnel destination address

33
Q

What command will show you the IP addresses and tunnel source and destination addresses of the interfaces?

A

show interface tunnel 0

34
Q

What do you need to configure to use frame relay?

A

DLCI

35
Q

Difference between VPN and GRE tunnel

A

If you are looking to provide a secure method of connecting remote users to resources stored within a central location, you should probably implement a VPN. However, if you need to pass traffic over an otherwise incompatible network, a GRE tunnel should be implemented.

36
Q

Which two technologies are examples of layer 2 MPLS VPN technologies?

A

Virtual Private Lan Switch (VPLS) and Virtual Private Wire Service (VPWS) are two technologies that provide layer 2 MPLS VPN’s

37
Q

What are one-way requirements for voice traffic?

A

One-way requirements include latency < 150 ms, jitter <30 ms, and loss < 1%, and bandwidth needs to be 30 to 128 Kbps.

38
Q

On which SDN architecture layer does Cisco APIC-EM reside?

A

Control

39
Q

What is a trust boundary and what are some examples of trust boundaries?

A

A trust boundary is where packets are classified and marked. IP phones and the boundary between the ISP and enterprise networks are common examples of trust boundaries.

40
Q

What is the traditional Data Plane?

A

It is responsible for forwarding frames and packets from ingress to egress interfaces using protocols. Needs the control plane for good info.

41
Q

What is the traditional Control Plane?

A

For managing and controlling any forwarding table the data plane uses. Routing protocols are managed by control plane.

42
Q

What is the SDN Data Plane?

A

Contains network elements, meaning any physical or virtual device that deals with traffic

43
Q

What is the SDN Control Plane?

A

Software solution, provides centralized control of the router and switches that populate the data plane

44
Q

What is the SDN Application Plane?

A

Contains applications that communicate their network requirements towards the controller using APIs

45
Q

What are Southbound APIs?

List the southbound API standards

A

They are used for communication between controllers and network elements.

OpenFlow, NETCONF, onePK, OpFlex

46
Q

What are Northbound APIs?

A

Used for communication between SDN applications and controllers

47
Q

What are trust boundaries?

A

Point where packet marking (which identify traffic such as voice, data, or video) can be created, removes, or rewritten.

48
Q

What are the three ways of classifying traffic?

A

Marking, Addressing, and Application signatures

49
Q

What is NBAR?

A

Provides deep-packet inspection on layer 4 to 7 on a packet

50
Q

Explain the difference between Policers and Shapers in terms of where to deploy them, TCP resends, and jitter/delay

A

Policers: deploy them on the ingress if possible, more TCP resends (since theres a higher drop probability), and no jitter/delay

Shapers: deploy on the egress side, fewer TCP resends than policers, and introduces jitter/delay

51
Q

What is VTP pruning?

A

A way to preserve bandwidth, only sending the broadcast to trunk links that must actually have the info