Main Flashcards

(168 cards)

1
Q

What is

FF02::1, FF02::2, FF02::5, FF02::6, FF02::9, FF02::A?

A

Link-Local Multicast IPv6 addresses
• FF02::1 = group that all nodes (a.k.a. = all hosts) must join (like an IPv4 broadcast)
• FF02::2 = group that all IPv6 routers must join
• FF02::5 = group that all IPv6 OSPF routers must join
• FF02::6 = group that all IPv6 OSPF DR’s must join
• FF02::9 = group that all IPv6 RIP routers must join (except RIPv1)
• FF02::A = group that all IPv6 EIGRP routers must join

The full unabbreviated IPv6 address read as FF:02:0:0:0:0:0:0:1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSPF Metric Cost for:

Ethernet – Fast Ethernet – Gigabit – 10Gigabit?

A

OSPF Metric is determined based on the bandwidth of an interface vs the reference bandwidth

Cost = reference bandwidth / interface bandwidth

The default reference bandwidth for OSPF is 100mbps

OSPF rounds up from 0 to 1, since most of today’s technologies are over 100mbps, it results in a table like below:
………………………….Ethernet….FastEthernet….Gigabit….10Gigabit
Default Metric = …….10 ………………..1…………………1……………1
Should be = …………1,000…………….100……………..10…………..1

auto-cost reference-bandwidth xx-xx
is the cli to change the OSPF defaults

ip ospf cost
cli will allow you to manually configure an OSPF metric per interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is 01-00-5E-… ?

A

part of an IPV6 virtual MAC address for Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tables:

CAM vs MAC

A

A “MAC table” tells you what data the table holds, in this case MAC addresses

A “CAM table” tells you what is the technical nature of this table - (content-addressable memory), or a cache, that performs parallel and fast lookups

So, the MAC table refers to the content while the CAM table refers to the organization and principle of operation

A CAM table may hold many different kinds of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIB vs ARP

A

FIB = is a layer 3 construct - contains an optimized list of all prefixes from the IP routing table

The ARP table is a layer 3 function used to map (L2)MAC addresses to (L3)IP addresses
If no ARP entry exists, an ARP broadcast is sent out, and the table is updated with the response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NORTHBOUND API’s (NBI)?

List API’s & language written in or model of delivery

A

REST (XML or JSON) [HTTP]

OSGi (Java)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SOUTHBOUND API’s (SBI)?

List API’s & language written in or model of delivery

A

NETCONF (XML or RPC) Relies on SSH for transport

OnePK (Cisco-Java or C or Python) Cisco Proprietary

OpenFlow (Python) Uses imperative SDN model - sends specific instructions manages network and polices directly

OpFlex (XML or JSON) Uses declarative SDN model - vague instructions allow device to make decisions how to implement instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where does the Management Plane reside?

A

The Management Plan is a logical subset of the Control Plane

Any management traffic for the local device (such as SSH) is part of the management plane

  • *** Application Plane **
  • *** Control Plane (Management Plane) **
  • *** Data Plane **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does default-information originate do?

A

The cli
default-information originate
will cause the router to injects its own default route into the OSPF routing table as an external route, thereby advertising its default route to neighboring routers

It will also automatically become an (ASBR) Autonomous System Boundary Router

default-information originate notwithstanding, if the cli command
redistribute
is entered, it will also become an ASBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DAI?

A

Dynamic Arp Inspection - is a security feature that validates Address Resolution Protocol (ARP) packets in a network. DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings

Mitigates attacks knowns as ARP spoofing or ARP poisoning attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unique local unicast always begins with?

Unique global unicast always begins with?

A

Unique local unicast =
FC or FD because the first 7 bits of their address are always 111111xx (ie…11111100 or 11111101)

Unique global unicast =
always begin with a 2 or 3 (ie… 2000::/3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does static client mode mean?

A

A static client receives its time from a (one) specific NTP server. The cli command on the client is
ntp server {+ the IP - address of the NTP server}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is BPDU Guard?

A

BPDU guard protects access ports with PortFast and BPDU guard from accepting a Bridge Protocol Data Unit - upon receiving BPDUs a port with BPDU guard enabled will place that port in an error-disabled state - this Spanning Tree preventing loops

BPDU guard should be enabled on all ports that have PortFast enabled

A port shutdown by BPDU guard must be manually re-enabled, unless the cli 
errdisable recovery cause bpduguard
and the 
errdisable recovery interval {time}
commands have been run against the port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Root Guard?

A

Root Guard prevents and a root from accepting a superior BPDU (preventing it from losing an election and therefore maintaining the Root Bridge status). Basically, this prevents newly installed switches (that might incidentally have a lower priority) from being elected the root

Root Guard is applied per port (not globally) and inverts the syntax of the naming convention, the cli command is therefore
spanning-tree guard root
Thanks for that, Cisco!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What is the difference between the:
* AP-Manager Interface (what protocol?)
* Management Interface (what protocol?) 
 * Service port Interface 
on a WLC?
A

The AP-manager is for Layer 3 communication between WLC and AP’s using - CAPWAP’s two tunnel protocol (it’s not a physical port)

The Management interface is Layer 2 communication between WLC and AP’s, as well as other WLC’s using - LightWeight Access Point Protocol (LWAPP) (also not a physical port)

The Service port interface is used for maintenance purposes of the WLC itself (it IS a physical port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog error mnemonic?

A

Every / Awesome / Cisco / Engineer / Will / Need / Ice-Cream / Daily

Emergency-0 / Alerts-1 / Critical-2 / Error-3 /
Warning-4 / Notification-5 / Informational-6 / Debug-7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is APIC?

What are the 3 main reasons it’s used?

A

This is SDN (Software-Defined Networking)

APIC is Cisco’s Application Policy Infrastructure Controller. Basically, Cisco’s naming convention for its version of ACI (Application Centric Infrastructure)

It’s the main architectural component and unified point of automation and management for the Cisco ACI fabric for:

Health monitoring
Optimizes performance and agility
Policy enforcement

(HOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is WDS?

A

WDS - Wireless Domain Services - is a component used in Cisco’s Autonomous WLAN solution - it’s a feature that is installed on AP’s to enable interaction with WLSE
(like client software for the WLSE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA?

A

Authenticate (who are you?)

Authorization (what access do you have?)

Accounting (what have you done?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cisco or non-proprietary and what do the acronym stand for?
RADIUS?
TACACS?

A

RADIUS = (Remote Authentication Dial-In User Server)
is non proprietary

TACACS = (Terminal Access Controller Access Control System)
is a Cisco only protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Security acronyms:
•	IKE
•	SA (works with?)
•	AH (works how?)
•	ESP (works with?)
•	GRE (effectiveness in comparison to others)
A
  • IKE = Internet Key Exchange (works with IKE+SA and/or IPSec+IKE)
  • SA = Security Association (works with IKE+SA and/or IPSec+SA)
  • AH = Authentication Header (embedded within a packet)
  • ESP = Encapsulating Security Payload (encapsulates a packet as part of IPSec)
  • GRE = Generic Routing Encapsulation - tunnels any Layer 3 protocol - generic and therefore weak compared to protocol specific security transport methods like IPSec or PPPoA or PPPoE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP ARP inspection – all ports are trusted or untrusted by default?

A

All ports are untrusted by default when Dynamic ARP Inspection (DAI) is enabled

To trust, you need the
ip arp inspection trust
cli command applied in port configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RFC 1918 (private IP’s)?

A

A - 10.0.0.0/8 -> 10.255.255.255 (all of 10.x.x.x)

B - 172.16.0.0/12 -> 172.31.255.255 (only 172.{16-31}.x.x)

C - 192.168.0.0/16 -> 192.168.255.255 (all of 192.168.x.x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OSPF (DR & BDR)
Timers? / Elections? / Multi-cast sent? / Manual / Neighbors? / Defaults?

  • Broadcast
  • NonBroadcast
  • Point-to-Point
  • Point-to-Multipoint Broadcast
  • Point-to-Multipoint NonBroadcast
A
Broadcast:
Hello/dead timers 10 / 40
DR & BDR elections=yes
Mutlicast updates are sent
manual config of neighbor is NOT required
********default for Ethernet & FDDI
NonBroadcast:
Hello/dead timers 30 / 120
DR & BDR elections=yes
Mutlicast updates not sent
manual config of neighbor IS required
********defaults for Frame Relay & X.25
Point-to-Point:
Hello/dead timers 10 / 40
DR & BDR elections=no
Mutlicast updates are sent
manual config of neighbor is NOT required
********defaults for HDLC & PPP
Point-to-Multipoint Broadcast:
Hello/dead timers 30 / 120
DR & BDR elections=no
Mutlicast updates are sent
manual config of neighbor is NOT required
Point-to-Multipoint NonBroadcast:
Hello/dead timers 30 / 120
DR & BDR elections=no
Mutlicast updates not sent
manual config of neighbor IS required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ABR vs ASBR?
ABR = (Area Border Router) is a router with interfaces in multiple OSPF areas ASBR = (Autonomous System Boundary Router) is a router which redistributes routes into OSPF (even from another protocol)
26
FHRP: What does it stand for? Which one is Cisco Propriety? Single Active or Multiple Active? * HSRP (Hot Stand-bye Routing Protocol) * VRRP (Virtual Router Redundancy Protocol) * GLBP (Gateway Load Balancing Protocol)
FHRP (First Hop Redundancy Protocol) is a Layer 2 protocols works only in the local subnet *** HSRP (Hot Stand-bye Routing Protocol) = Cisco Proprietary - Single Active (cannot load balance) *** VRRP (Virtual Router Redundancy Protocol) = Non- Proprietary - Single Active (is not meant to load balance) *** GLBP (Gateway Load Balancing Protocol) = Cisco Proprietary - Active+4 active virtual forwarders (load balancing)
27
What is BSS / ESS /IBSS?
(X) Service Set * (Basic) - BSS is a single AP topology * (Extended) - ESS is overlapping (2 or more) APs topology * (Independent) - IBSS is a wireless topology with no APs at all
28
``` What is the method for: transport architecture configurations (names or modules) scripting language ``` * Ansible * Puppet * Salt * Chef
Ansible: transport SSH-TCP 22 / architecture client/server (without agent software) / configurations PLAYBOOKS / language YAML Puppet: transport HTTPS-TCP 8140 / architecture client/server / configurations MODULES / language PuppetDSL or RubyDSL Salt: transport ZeroMQ-TCP 4505/6 / architecture client/server / configurations SCRIPTS / language YAML or Python or PyDSL Chef: transport HTTPS-TCP 443 / architecture client/server or standalone / configurations COOKBOOKS / language Ruby DSL
29
Are FlexConnect ACL’s supported on the local VLAN? Are FlexConnect ACL’s applied to the [AP & VLAN] or [AP & Interface]?
Yes, as long as it is not inherited from a FlexConnect group FC ACL’s are applied per AP & VLAN - NOT per AP & Interface!!
30
Are per direction FlexConnect Access Lists possible?
No, unlike regular ACL’s you cannot create a per rule direction FlexConnect ACL
31
What is in the EIGRP Neighbor table?
Neighbor table – stores information about EIGRP neighbors. Before exchanging routes, routers need to establish a neighbor relationship It lists all adjacent routes including the routes that are not successors or feasible successors
32
What does mls qos trust cos command do?
Moves the trust boundary from the switch to the IP phone, which tells the switch to accept the traffic as having come from a trusted source *(MLS) Multi Layer Switching [tells the SWITCH to trust the PHONE and it's subsequent packet prioritization, even those packets that were sourced by the host attached to the IP phone]
33
What is the difference between an NTP static client and an NTP broadcast client? What does the cli command ntp peer do?
A static client can get it’s time only from the one NTP server specified for it, where as a broadcast client can get its time from any NTP server on the network ntp peer is where an ntp host will attempt to sync with another ntp host (a peer), this is called ntp symmetric mode, it may synchronize the other host or be synchronized by it
34
WLC dynamic interfaces are user defined and used for client data. T or F ? There are 256 dynamic interfaces per WLC. T or F?
True, WLC dynamic interfaces are user defined and used for client data False, there are 512 dynamic interfaces per WLC Dynamic interfaces function like a vlan, to segment traffic
35
What percentage of overlap is considered ideal for wireless coverage?
10%-15% (with non-overlapping channels)
36
Name 2 Link State and 2 Distance Vector protocols?
Link State = OSPF & IS-IS Distance Vector = RIP & IGRP
37
PortFast, UplinkFast & BackboneFast are what? | What protocol includes it natively?
These are all Spanning Tree Protocol features PortFast - enables a port to immediately access the network without listening and learning first UplinkFast - increases convergence speed for access layer switches once a Root Port fails, it immediately replaces it with an alternate root port BackboneFast - increases convergence on a switch that detects a failure on links that are not directly connected 802.1w a.k.a. Rapid Spanning Tree Protocol (RSTP) includes these three features natively
38
Is the DAI command cli ip arp inspection vlan applied to the vlan or to the interface?
ip arp inspection vlan is the cli command to enable DAI on VLANs it CANNOT be run in interface configuration mode To trust a port in interface configuration mode you would need the cli command ip arp inspection trust
39
Collision vs. late collision?
collisions - occur when a packet must be-resent BEFORE the 64th or 512th bit has been transmitted late collisions - occur when a packet must be-resent AFTER the 64th or 512th bit has been transmitted
40
Maximum Transmission Unit (MTU) What is a Runt / Giant / Baby Giant / Jumbo ?
* Runt - a frame with fewer than 64 bytes (they are discarded) * *Giant - a frame that exceeds 1,518 bytes anything up to 1522 will not generate a baby giant error * *Baby Giant - a frame that is up to 1,600 bytes in length (baby giant error=1600) * Jumbo - is a frame that is up to 9,216 (newer frame sizes)
41
What are the 4 types of IPv6 routes and their syntax (the order) ?
************ A fully specified route = Mostly used when the outbound interface is multiaccess and could therefore be configured with multiple next hop addresses IPv6 route {destination network/CIDR} {the routers outbound interface to the next-hop} {next-hop IPv6 address} Ie… ipv6 route 2001:db8a/32 fa 0/1 2001:db8:b::1 . . ************ A directly attached static route = Specifies the destination and only the outbound interface. The router must assume the destination is reachable through this outbound interface IPv6 route {destination network/CIDR} {the routers outbound interface to the next-hop} Ie… ipv6 route 2001:db8a/32 fa 0/1 . . ************ A recursive static route = Specifies the destination and only the next-hop. This next-hop IPv6 address must be resolvable through the outbound interface IPv6 route {destination network/CIDR} {next-hop IPv6 address} Ie… ipv6 route 2001:db8a/32 2001:db8:b::1 . . ************ A floating static route = A floating static route is a backup route and can be any of the above 3 types with an Administrative Distance (AD) higher than the primary route. 5 is representing the AD in the 3 examples below: (fully specified static route) ipv6 route 2001:db8a/32 fa 0/1 2001:db8:b::1 5 (directly attached static route) ipv6 route 2001:db8a/32 fa 0/1 5 (recursive static route) ipv6 route 2001:db8a/32 2001:db8:b::1 5
42
``` FHRP virtual MAC’s: • HSRP version 1? • HSRP version 2? • VRRP? • GLBP? ```
HSRP v 1 virtual MAC - 0000.0C07.ACxx (Cisco proprietary) HSRP v2 virtual MAC - 0000.0C9F.Fxxx (Cisco proprietary) VRRP -0000.5E000.01xx (non proprietary) GLBP - 0005.B400.xxyy (Cisco proprietary)
43
Which Message Integrity Check (MIC) associations with which security protocol? TKIP / CCMP / RC4 / AES / GCMP WEP / WPA / WPA2 / WPA3
* RC4 is for WEP - (Rivest Cipher 4) * TKIP is for WPA - (Temporal Key Integrity Protocol) * CCMP is for WPA 2 - (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) * AES is for WPA 2 & 3 - (Advance Encryption Standard) * GCMP is for WPA3 - (Galois/Counter Mode Protocol)
44
What do the 4 control frames of 802.11 stand for? RTS / CTS / ACK / PS
* RTS - Ready to Send - manage interference * CTS - Clear to Send - manage interference * ACK - Acknowledgment - acknowledgment * PS - Power Save - client asks AP if frames might have been buffered while it was resting
45
Does OSPF support equal cost load balancing; does EIRGP?
OSPF does support equal cost load balancing Don’t forget to issue the cli command maximum-paths 8 to override OSPF’s default max of 4 equal cost paths in the routing table EIGRP support BOTH equal and unequal cost load balancing
46
What is the difference between link link state and distance vector from a routing table (not metric) perspective?
Distance vector protocols (like RIP, IGRP) send their entire routing table to directly connected neighbors Link state protocols (like OSPF & IS-IS) send information about directly connected links to all the routers in the network - stays constantly connected EIGRP is a Hybrid (but closer to Distance Vector)
47
Standard numbered ACL are number? Extended numbered ACL are number?
1-99 and 1300-1999 100-199 and 2000-2699
48
``` Cisco applications? • Cisco Network Assistant • Cisco DNA Center • Cisco PI • Cisco IOS ```
Cisco DNA Center - Browser based GUI for network configuration and centralized control - Enterprise management solution built specifically for Cisco’s SDA for building LANs using policies and automation Cisco Network Assistant - Java based desktop application GUI for operations, diagnoses and interaction with devices (pre dates SDA and is not supported by SDA) Cisco PI (Prime Interface) - Browser based GUI for operations, diagnoses and interactions with devices (pre dates SDA and is not supported by SDA) Cisco IOS - Cisco’s CLI Operating System (OS) for switches and routers
49
What component creates VXLAN tunnels between the SDA switches?
* The overlay network creates the VXLAN tunnels * The underlay network is a more traditional network configuration of switches Alphabet soup: Cisco’s Software Defined Networking (SDN) is called Software Defined Access (SDA) and is controlled by a Digital Network Architecture (DNA) controller.
50
What are the 4 main steps in order, to enable SSH for VTY lines?
* hostname - give the router a name other than “Router” * ip domain-name - configure the domain name * crypt key generate rsa - generate an RSA key pair for the router * transport input ssh - finally, configure the VTY lines to use SSH ip ssh time-out xy command will be accepted by the router even before (the above commands are issued) SSH is setup - even though it would be irrelevant if SSH isn’t setup properly first
51
Route selection: AD vs longest prefix, when is one chosen over the other?
When multiple routes to a network exists and each route uses a different protocol - the router prefers the one with the lowest AD (Administrative Distance) When multiple overlapping routes to a network exists, the router will select the route with the longest prefix length, the most specific route
52
What is the main difference between routing tables in EIGRP and OSPF?
EIGRP exchanges the complete routing information just one time when the neighboring routes are established. After that it only tracks the changes OSPF keeps track of the whole topology database, of all the connection in the database consistently
53
What value (#) does a VoIP phone assign as a CoS priority to traffic it receives from form a host in its own access port by default? What value (#) does a VoIP phone assign its own data traffic? / its own voice signaling traffic by default?
higher is better 0-7 * 0 (zero) - The default behavior of a Cisco IP phone is to override the CoS value assigned by the host and reassign the lowest CoS priority value of a 0 to the data packets * 5 for VoIP data traffic (this is the voice) * 3 for voice signaling traffic
54
Does the global cli command no lldp holdtime prevent lldp from being held?
No! lldp’s will always be held no lldp holdtime restores the lldp holdtime to the default setting of 120, effectively overriding any manual changes to the hold time - think of it as, don't use any previous manual changes to the holdtime anymore Manual changes can be made to the hold time from 0 - 65535 using the cli command lldp holdtime x
55
Is PortFast automatically enabled on voice VLAN ports?
Yes; however, PortFast is NOT disabled if the voice VLAN is disabled PortFast should only be enabled on access mode ports PortFast can be applied globally or to the individual interface, the cli commands are: • Global mode - spanning-tree portfast default • Interface mode - spanning-tree portfast
56
Does power inline police restart a port if a Power Device (PD) attempts to draw more than its allocated amount of power?
No, by default it will error disable the port, forcing the administrator to shut and then no shut the port manually If the global cli command errdisable recovery cause inline-power has been issued, the ports on that switch will recover from error disable caused by in-line power police, automatically The default behavior of inline police can be change with the cli command power inline police action log this will not error disable the port in the event of a power incident, instead it will restart the port and send a log message to the console
57
Is the Site-Local unicast address used to form neighbor adjacencies in non-broadcast OSPF networks?
No, the Link-Local unicast address is used. Link local addresses always begin with FE8, FE9, FEA or FEB Site-Local unicast addresses have been deprecated by RFC 3879 and are not used today
58
How many bits are in a MAC address, how many octets?
48 bits, and 6 octets of 8 bits each
59
What/where is the division between Organizational Unique Identifier (OUI) and the unique Network Interface Card (NIC)?
The divider is at 3 octets (out of 6) - 24 bit divider [48 bits divided in 2] MAC address are unique because they are broken down in two parts, like so: OUI are assigned by the IEEE to identify the manufacturer NIC are assigned by the manufacture to be unique among the products they produce OUI------OUI----OUI--|||--NIC-----NIC-----NIC 8bits / 8 bits / 8 bits ||| 8bits / 8 bits / 8 bits
60
In general terms, define IaaS, SaaS and Paas?
IaaS - Infrastructure as a Service gives the greatest degree of freedom to the consumer over provisioning: processing, memory, storage and networking resources. The customer can install OSs and applications PaaS - Platform as a Service the middle ground of the three services. It allows the customer to install programs and programing languages. Often used to create cloud-based databases and customer relationship management tools SaaS - Software as a Service provides access to software running in the cloud. This option exposes the least amount of the customers network to the cloud. Often it is implemented as a browser-based access to application like an Office Suite or email services
61
``` What do these 802.11 data frames stand for and what do each do?: •**** FC •**** DUR •**** ADD1 •**** ADD2 •**** ADD3 •**** SEQ •**** ADD4 •**** Data •**** FCS ```
* **** FC - Frame Control - is used to identify the type of 802.11 frame * **** DUR - Duration - used by Control Frames to indicate transmission times, also used by Power Save (PS) - poll control to indicate the (AID) Association Identity of the client * **** ADD1 - Source Address * **** ADD2 - Destination Address * **** ADD3 - BSSID Address * **** SEQ - Sequence is divided to store two pieces of information, the fragment number and the sequence number * **** ADD4 - Address 4 is only present when a frame is passing between devices in the (DS) Distribution System, basically from one AP to another AP * **** Data - this is the reason for it all - the data payload * **** FCS - Frame Check Sequence - it is used to determine if the frame as a whole, was corrupted during transport
62
What is password 7 {hash} used for?
password 7 {hash} is a cli command that configures an encrypted virtual terminal (VTY) login password when issued in the VTY configuration mode
63
Difference between: switch port-security violation restrict switch port-security violation protect switch port-security violation shutdown
restrict - will discard traffic it receives from unauthorized hosts. It will increment the SecurityViolation counter protect - will discard traffic it receives from unauthorized hosts. It will not increment the SecurityViolation counter though ``` Stupid anagrams for Cisco's stupid naming convention: R E s t r i c T i n c R E m e n T ---------------------------------- p r O T e c t nOT ``` shutdown - will error-disable the port and will not come back unless shut no shut is performed manually or errdisable recovery cause shutdown had previously been issued against the port Note: port-security violation discard does not exist!
64
Which character is the JSON mark for an Object identified by? and Array?
{ is the mark for the start of a JSON object - is a group of key and value pairs [ is the mark for the start of a JSON array - arrays contain only values, an array can contain any of the other JSON types, including objects and even other array’s
65
What is WLSE / WDS / WiSM used for?
WLSE - Cisco’s Wireless LAN Solution Engine - simplifies the management and deployment of WAP’s (Wireless Access Point) WDS - Wireless Domain Services - is a component used in Cisco’s Autonomous WLAN solution - it’s a feature that is installed on AP’s to enable interaction with WLSE (like client software for the WLSE) WiSM - is a physical Wireless Service Module that can be installed on a Catalyst 6500 switch of 7600 router to function as a WLC WLC - Wireless Lan Controller - provides wireless LAN services
66
What is in the EIGRP Routing table?
EIGRP Routing table – ONLY successors! It stores only the best routes to reach a remote network
67
Other than “none,” name the 6 Layer 2 wireless security settings and the 4 of the Layer 3 wireless security settings.
Layer 2: • WPA+WPA2 ============ Wi-Fi Protected Access • 802.1x ================= Port Based Access Control - works with RADIUS • Static WEP ============= Wired Equivalent Privacy • Static WEP + 802.1x • CKIP ================== Cisco Key Integrity Protocol • None + EAP Passthrough = Resolution Extensible Authentication Protocol ``` Layer 3: • IPSec ================= IP Security • VPN Passthrough • Web Authentication • Web Passthrough ```
68
What is lldp's Cisco cousin?
LLDP’s Cisco-proprietary cousin is CDP (Cisco Discovery Protocol) Cisco switches have LLDP off by default, because they prefer CDP
69
What ports are:? ``` FTP SMTP DHCP TELNET TFTP SNMP SSH ```
``` FTP 20-21 TCP SMTP 25 TCP/UDP DHCP 67-68 UDP TELNET 23 TCP TFTP 69 UDP SNMP 661-662 UDP SSH 22 TCP ```
70
What are these protocols:? 802. 1s 802. 1d 802. 1w 802. 1q 802. 1x
802. 1s MST (Multi Spanning Tree Protocol) 802. 1d STP (Spanning Tree Protocol) 802. 1w RSTP (Rapid Spanning Tree Protocol) 802. 1q DOT1q tagging 802. 1x network authentication protocol RADIUS
71
``` High side Powers of 2: 8xxx 16xxx 32xxx 65xxx ```
8192 16384 32768 65536
72
``` What are each of these IPv6 addresses called:? 2000::/3 FC00::/8 FF00::/8 FD00::/8 FE80::/10 ```
``` 2000::/3 - Unique Global Unicast FC00::/8 - Unique Local Unicast FF00::/8 - Mulitcast FD00::/8 - Unique Local Unicast FE80::/10 - Link Local Unicast ```
73
When does a router become an ASBR automatically?
When the cli default-information originate is issued on a router ALSO, if the cli command redistribute is entered, it will also become an ASBR
74
What is the binary for Unique Local Unicast: | FC and FD
For FC or FD the first 7 bits of their address are always 1111110x ``` FC = 11111100 FD = 11111101 ```
75
What is EPG?
EndPoint Groups is a group of EndPoints The EndPoint Group (EPG) is the most important object in the policy model - part of APIC (Application Policy Infrastructure Controller) * Endpoints are devices that are connected to the network directly or indirectly * An EPG is a managed object that is a named logical entity that contains a collection of endpoints
76
OSPF (DR & BDR) Timers? Defaults? * Broadcast * NonBroadcast * Point-to-Point * Point-to-Multipoint Broadcast * Point-to-Multipoint NonBroadcast
Broadcast Hello/dead timers 10 / 40 ************************default for Ethernet & FDDI NonBroadcast = Hello/dead timers 30 / 120 ************************defaults for Frame Relay & X.25 Point-to-Point = Hello/dead timers 10 / 40 ************************defaults for HDLC & PPP Point-to-Multipoint Broadcast = Hello/dead timers 30 / 120 Point-to-Multipoint NonBroadcast = Hello/dead timers 30 / 120
77
What is Cisco PI?
Cisco PI (Prime Interface) - Browser based GUI for operations, diagnoses and interactions with devices (pre dates SDA and is not supported by SDA)
78
Is PortFast applied globally or individual to an interface?
PortFast can be applied globally OR to the individual interface, the cli commands are: * Global mode - spanning-tree portfast default * Interface mode - spanning-tree portfast
79
What protocol is Backbone fast part of and what does it do?
BackboneFast - increases convergence on a switch that detects a failure on links that are not directly connected
80
What is TLV part of and what does it describe?
Link Layer Discovery Protocol (LLDP) is an open standard protocol that provides (TLV): Type Length Value info includes: * port description * system description * management address
81
What do Link Local addresses always begin with? (4 answers)
Link Local addresses always begin with FE8, FE9, FEA or FEB
82
What is CDP default Send/Hold timers?
CDP send time is 60 seconds hold time of 180 seconds by default
83
``` Which wireless QoS levels service are equal to?: Platinum = Gold = Silver = Bronze = ```
``` Platinum = Voice / Wireless (CAPWAP) / Network Control Gold = Video / Mission Critical Silver = Default for WLAN and WLC (a.k.a. best effort) - most traffic is here Bronze = Guest network / Scavenger / Bulk ```
84
Which protocol is missing from the Layer 3 wireless security settings?: * IPSec * VPN Passthrough * Web Passthrough
• Web Authentication
85
Does switch port-security violation protect increment the SecurityViolation counter?
Port-Security: protect - will discard traffic it receives from unauthorized hosts It Will NOT increment the SecurityViolation counter prOTect ..nOT....
86
How many WLC dynamic interfaces are there per WLC?
There are 512 dynamic interfaces per WLC
87
What does switchport priority extend trust do?
Causes the switch to tell the IP phone to trust the CoS priority of incoming (from the phone's own host) data packets The phone will not override the CoS values from the host * extending the trust "all the way" to the host * trust the host to assign it's own CoS values
88
What is in the EIGRP Topology table?
EIGRP Topology table – stores ROUTING INFORMATION learned from neighbor routing tables contains the routes for the successors and feasible successors
89
``` Is routerA(config) #domain-name example.com the proper mode and formatting to configure a domain name for a DHCP pool? ```
No, this cli command must be performed in the DHCP Pool Configuration mode routerA(dhcp-config)# From this mode you can enter the cli command domain-name {name} BUT first, in order to enter dhcp configuration mode and assign a domain-name, you must have previously created a dhcp pool name to begin with by using ip dhcp pool {name} issuing this cli command automatically puts you in dhcp configuration mode Also, the global configuration cli command ip dhcp excluded-address {addresses} is often used to prevent a set of address that maybe reserved for static IP’s from being issued
90
VTP (VLAN Trunking Protocol) has VTP v2 disabled by default. What are the advantages of turning VTP v2 on?
If v2 is setup on all switches on VLAN it will allow VTP advertisements to be forwarded when they are in transparent mode. All switches must be running the same version of VTP
91
Difference between EIGRP and OSPF's protocol TYPE?
EIGRP is a Hybrid protocol (both Distance Vector and Link State) OSPF is a Link State protocol
92
What 3 modes are part of VTP and what can they do of the below list? Create, modifies and delete VLANs Sends and forwards advertisements Synchronizes VLAN configurations
Server: + Create, modifies and delete VLANs + Sends and forwards advertisements + Synchronizes VLAN configurations Client: - Can NOT create, modify or delete VLANs + Sends and forwards advertisements + Synchronizes VLAN configurations Transparent: + Create, modifies and delete VLANs +/- Forwards advertisements (DOESN'T send) - Does NOT Synchronizes VLAN configurations
93
IPSec’s main responsibility is to provide what three features?
* Data Confidentiality (It’s private) * Data Integrity (It’s accurate) * Origin Authentication (It came from the right source) CIA - Confidentiality - Integrity - Authentication
94
Distance Vector vs Link State path calculation differs how? Which one knows the entire topology?
Distance Vector = Hop Count Link State = Link Cost Link State knows the entire topology at all times
95
LLDP - global configuration or interface configuration commands? lldp transmit / no lldp run / lldp receive / lldp run
LLDP (Link Layer Discovery Protocol) lldp transmit / lldp receive = interface command lldp run / no lldp run = global command
96
What are each of these protocols (or method) associated with? * SA * AH * ESP GRE works with any Layer 3 protocol, it's generic nature makes it weaker than what 3 other specific Layer 3 security protocols?
* SA (Security Association) = works with IKE+SA and/or IPSec+SA * AH (Authentication Header) = embedded within a packet * ESP (Encapsulating Security Payload) = encapsulates a packet as part of IPSec * GRE (Generic Routing Encapsulations) is weaker than: * *** IPSec - IP Security * *** PPPoA - Point-to-Point Protocol over ATM * *** PPPoE - Point-to-Point Protocol over Ethernet
97
What is FIFO?
FIFO is a queuing method based on First In First Out theory It offers no packet prioritization, therefore it is considered a Congestion Management method, not Congestion Avoidance If the queue is full, all packets destined for that queue are dropped until existing packets in the queue can be processed, freeing up room in the queue. This method unfortunately causes burstiness, jitter and delay
98
``` What are the AD distances of?: iBGP EIGRP Summary Route eBGP IGRP External EIGRP Static Route ```
``` iBGP 200 EIGRP Summary Route 5 eBGP 20 IGRP 100 External EIGRP 170 Static Route 1 ```
99
``` Identify the letter abbreviations for protocol in show ip route?: I * E1 C S O L E R B IA E2 D M EX ```
``` I IGRP * default route E1 OSPF external type 1 C connected S static O OSPF L Local host route E EGP R RIP B BGP IA OSPF inter area route E2 OSPF external type 2 D EIGRP M Mobile EX EIGRP External ```
100
What is a EIGRP Feasible successor?
Feasible successors are backups routes that can be used if the successor route goes down They are guaranteed to represent a loop-free path to a destination Feasible successors has an AD that is less than the Feasible Distance (FD) of the successor. If the AD of a route is greater than the FD of the successor, the route cannot be guaranteed to be free of loops and cannot be chosen as a feasible successor.
101
What is an EIGRP successor?
An EIGRP successor is the best route to a destination. The successor is the route with the lowest Feasible Distance (FD), which is the best metric along a path to a destination
102
What is EIGRP Feasible Distance (FD)?
The FD is the metric to a neighbor router plus that neighbor router’s AD to the destination network
103
What is the normal OSPF neighbor state for a router that is neither the DR or BDR? What are the 7 states of OSPF adjacency?
2 way | ``` Remember 7 states of the IT ELF: Down Init Two-Way Exstart / Exchange Loading Full ```
104
If the router ID is not manually set, how is it determined and what is the order?
The router will use an interface IP address as its ID 1. The highest IP address among loopback interfaces 2. Then by the highest IP among physical interfaces (if no configured loopback exists)
105
What is an OSPF priority value used for, how are they communicated, and what is the default value?
The priority value is used for electing Designated Router (DR) and Backup Designated Router (BDR). The DR is typically the router with the highest OSPF priority Elections happen via Link State Advertisements (LSA) The default OSPF priority value is 1 Note: If priorities are equal among routers than the DR will become the one with the highest router ID
106
What is the FHRP router priority set to by default for - HSRP? What is the FHRP router priority set to by default for - VRRP?
Both HSRP and VRRP router priority is set to 100 by default
107
What is the difference between RED and WRED?
Both are a Congestion Avoidance method to attempt to prevent to prevent Tail Drop and Global Synchronization RED (Random Early Detection) prevents this by randomly dropping packets based on mark proximity denominator, which is a fraction of packets that should be dropped when a queue reaches its minimum threshold. Red does not care if the packet being drop is high or lower priority, it is random WRED (Weighted Random Early Detection) congestion avoidance technique is to selectively drop packets when the output queues reach a predefined threshold, called a Service Level. It selects packets to drop based on precedence, so low priority packets are dropped before high priority packets are
108
What is Global Synchronization?
Global Synchronization, is an event which occurs when - due to congestion each sender will reduce their transmission rate and RED may start drops packets, causing packet loss; this can sync-up the re-sends and create big “waves” of stopping and starting
109
What is the advantage of a K9 image over other images?
K9 images provide cryptographic functionality required to enable SSH ad IPSec • NPE Image • WAN image • Advanced IP Services Package • Advanced Enterprise IP Services Package Do not support cryptographic functionality. However, some of these do have K9 versions of these images with the word K9 prefacing the name to indicate that they are K9 images, but NOT NPE, they are for countries with restrictions
110
Are OSPF DR and BDR elections performed on any form of Point to Point or Point to Multi-Point networks?
NO This however, does not directly relate to whether the network needs manual configuration of neighbors! Point to Point and Point to Multi-Point Broadcast send multicasts and no NOT need manual configuration of neighbors However, Point to Multi-Point Nonbroadcast DOES need manual configuration of neighbors
111
Which type of OSPF networks use 10/40 hello/dead timers and what are the other hello/dead timers set at?
10/40: Broadcast Point to Point Point to Multipoint broadcast 30/120: NonBroadcast Point to Multipoint NonBroadcast
112
Do OSPF Process ID’s have to match in order to form neighbor adjacencies?
In OSPF the Process ID’s do NOT have to match in order to form neighbor adjacencies However, in EIGRP they do have to match
113
Do OSPF Router ID’s have to match in order to form neighbor adjacencies?
No, they MUST NOT match, they have to be unique Router ID’s are derived from the HIGHEST loopback address, or in the absence of a loopback address the HIGHEST configured IP address
114
Define EIRGP concepts of Bandwidth and Delay?
Bandwidth refers to data throughput of a link Delay refers to the length of time required to send a packet to a destination
115
What 8 services/protocols does the ip helper-address assist with broadcast to reach the desired service?
``` NTP TACACS DNS Bootstrap Protocol (BOOTP) and DHCP Port 67 Bootstrap Protocol (BOOTP) and DHCP Port 68 TFTP NetBIOS NetBIOS Datagram ```
116
How many incidents of ip helper-address are allowed?
ip helper-address command is not limited. There can be multiple incidents pointing to multiple different addresses of the same service and/or multiple incidents point to addresses of different services
117
What is MIB, NMS & OID and and what protocol do they interact with?
SNMP: * Management Information Base (MIB) is a hierarchical database of objects an SNMP agent uses to read and display information * Network Management Station (NMS) is used to extract information from an SNMP agent * Objects in the MIB are known as Object ID’s (OID) By using MIB, SNMP can perform complex management tasks, such as automated backups through the network
118
What is NMS & name 4 commands used by NMS?
Network Management Station Get GetNext GetBulk Set Trap and Inform are NOT used by NMS but are used by SNMP agents to alert the NMS
119
Which is the correct method, to encrypt a password to access privilege level 7? enable secret level 7 password enable secret 7 password
enable secret level 7 password
120
Which is the only security protocol that can establish a VPN tunnel through and untrusted network? Name 3 security protocols than can't
IPSec, with the help of IKE, SA GRE, PPPOE and PPOA cannot establish a tunnel through an untrusted network
121
How do you enter ACL configuration mode for a standard numbered access-list? How do you enter ACL configuration mode for a extended numbered access-list? and How do you enter ACL configuration mode for an standard named access-list? How do you enter ACL configuration mode for an extended named access-list?
access-list {number 1-99 or 1300-1999} access-list {number 100-199 or 2000-2699} and ip access-list standard {name} ip access-list extended {name}
122
Which should be placed higher in the ACL, less specific or more specific?
ACL’s are procced from top to bottom, so it is important to place more specific entries higher than less specific entries so they are processed first
123
All ports have DTP turned off by default on Cisco switches. T or F?
False, Layer 2’s Dynamic Trunking Protocol is set to AUTO by default on all Cisco switches to determine whether an interface should be a truck or an access port
124
Manually configuring trunk mode or access mode on a port, effective disables DTP What other cli command can you issue to disable DTP, and should you still issue it on a port manually configured as trunk or access ports?
Cli command switchport nonegotiate will disable DTP on a port. This command should be run even on ports that are manually configured as trunk or access ports
125
What cli command do you issue to enable trunking mode, access mode?
TRUNK: Once in interface configuration mode, to enable trunking manually on a port use the cli command switchport trunk encapsulation {*protocol} *This protocol will almost always be .dot1q Then to complete the trunk protocol use the cli command switchport mode trunk ACCESS: Once in interface configuration mode, to enable an access port manually use the cli command switchport access
126
What is the main difference between IPv6 addresses FF02 versus FF05?
Both are Multicast Addresses as the fall into the FF00 to FFFF range BUT - one is routable and the other isn't FF02 is a link-local address and is not routable at all, it is only valid on it’s local segment FF05 is a site local multicast address and is routable within a single site of an organization, not fully within the organization or globally HOWEVER, Site-local unicast addresses have been deprecated by RFC 3879 and are not used today ***Look closely and don’t confuse FF05 with FF02::5, which is the all OSPF routers multicast address!
127
What are the addresses 127.0.0.0, 169.254.0.0/16, 192.0.2.0/24 and 172.16.0.0 used for?
127. x.x.x is used for loopback addresses 169. 254.0.0/16 is reserved by IANA for auto-configuration of link-local address when a dynamic IP address can not be obtained from DHCP 192. 0.2.0/24 one of the address which is reserved for documentation 172. 16.0.0 through 172.31.255.255 is reserved by RFC 1918 as private IP address space and is not globally routable, along with 10.x.x.x and 192.168.x.x
128
192.0.2.0/24 and 198.51.100.0/24 and 203.0.113.0 are all used for what?
IANA has reserved these addresses for documentation and example code. Also, the domain names example.com and example.net
129
State the prefix for each of the following IPv6 MULTICAST addresses: ``` Node-local Link-Local Site-Local Organization-Local Global ``` and what is the full prefix range for multi cast address?
``` FF01::/16 - Node-local FF02::/16 - Link-Local FF05::/16 - Site-Local FF08::/16 - Organization-Local FF0E::/16 - Global ``` The full range of IPv6 multicast addresses is FF00 to FFFF
130
Cli command mls qos trust cos does what? ``` Cli command switchport priority extend cos does what? ***********ALERT - this is not the switchport priority extend trust command!!! ```
mls qos trust cos tells the switch to trust both voice and data sent through the IP phone switchport priority extend cos tells the phone to override the priority of the data packets it gets from it’s own host and assign new CoS values to those host generated packets. This prevents the computer from utilizing the high-priority queue
131
What is the default mode for VTP?
Server mode
132
Which DTP protocol can convey VTP information: CDP or LLDP?
The Cisco proprietary protocol CDP will pass VTP information
133
Link Aggregation - PAgP is EtherChannel’s protocol - does it use the terminology Active and Passive or Auto and Desirable and is the option “on” part of EtherChannel?
EtherChannel uses: Auto, Desirable and On So “on” IS part of EtherChannel . **Remember: LACP is LAG's protocol so think: ACtive = lACp “AC”tive = L“AC”P
134
What is the difference between DTP and VTP?
DTP should not be confused with VTP, as they serve different purposes DTP aids with trunk port establishment VTP communicates VLAN existence information between switches. It is used to centrally manage virtual local area networks and to propagate changes across all devices in the VTP domain Think of it like: DTP = Establish VTP = Maintain (uniformity) Neither protocol transmits the actual data frames that the trunks carry
135
What does Loop Guard do?
Loop Guard is a Spanning Tree Protocol feature that prevents a switch port from transitioning to the forwarding state when it stops receiving BPDU’s It places inconsistence ports in to a blocking state within the STP environment
136
Do trunk ports appear in the output of cli command | show vlan?
No, only access ports are displayed in the out put of show vlan To display trunks, you need the cli command show interfaces trunk
137
What field in an 802.11 MAC frame is used to indicate whether it is a management frame?
The first field, FC or Frame Control
138
What type of 802.11 frames are the following: beacon, association request & association response, probe request, Power-save poll?
Beacon, association response and probe request/response are all MANAGMENT FRAMES. They manage the connection between the AP’s and the wireless clients **Note: all frames with "authentication" or "association" in the name are management frames power-save is a CONTROL FRAME - they are used to manage access to the wireless medium, other control frames include, RTC, CTS and ACK (Control Frames are traffic cop managing access on the road) DATA FRAMES are the data and general exist in two categories, (CF) Contention Free and Contention-Based. Most wireless networks operate in a contention based infrastructure
139
In a Split-MAC environment, what are the WLC’s responsibilities?
The WLC handles tasks that are not time-sensitive, such as: ``` lightweight AP configuration management, client load balancing, authentication, resource reservation security management ``` LCARS Remember: the AP's handle the frames and the WLC handles the management functions
140
In a Split-MAC environment, what are the AP’s responsibilities?
``` Real-time processing of data Responding to beacons and probe messages Encryption Packet prioritization Sending management information to the WLC ``` Remember: the AP's handle the frames and the WLC handles the management functions
141
What does maximum-paths 8 do?
maximum-paths 8 is used to override OSPF’s default max of 4 equal cost paths in the routing table so that it can more efficiently support equal cost load balancing
142
Is Root Guard applied Globally or Per Port?
spanning-tree guard root | is Root Guard's cli command and is applied per port ONLY. It is not global command
143
Language and Transport for: Northbound's Protocol: REST? Southboound's Prorocol: NetConf?
``` Northbound = REST: XML - JSON - HTTP Southbound = NetConf: XML - RPC - SSH ```
144
Where is ip arp inspection trust applied?
ip arp inspection trust | is applied in the interface configuration mode - NOT globally
145
Is RouterA(config)#domain-name example.com a valid cli command?
No, it must be done in interface configuration mode RouterA(dhcp-config)#domain-name example.com Note: ip domain-name example.com is invalid syntax!
146
What is the frequency that a switch will send LLDP LSA's?
By default a switch will send an LLDP Link State Advertisements (LSA's) every 30 seconds, and the hold time is 120 seconds
147
Which is correct switchport port-security 2 or switchport port-security maximum 2 when attempting to limit the traffic on a port to two MACs?
switchport port-security maximum 2 is the correct syntax
148
crypto key generate rsa | will automatically enable ssh on a router. T or F?
True
149
What is a switch stack?
The switch stack is a feature that allows configuration of multiple Cisco switches in a way that they appear as a single switch and act cooperatively
150
What does an "embedded AP deployment" mean?
This simply means that the WLC is not a standalone item, it is (part-of) embedded within a stack of switches that are acting as one Ultimately, there isn't much difference between: a lightweight AP deployment that connects to a standalone WLC or a lightweight AP deployment that connects to an embedded WLC within a switch stack
151
What does CAPWAP stand for?
Control and Provisioning of Wireless Access Points
152
How many tunnels does CAPWAP use and what do the logical tunnels separate?
CAPWAP uses 2 tunnels between AP's and the WLC: one for Data and one for Control
153
Which are correctly formatted cli commands and which mode must they be entered? domain-name example.com ip domain-name example.com dhcp pool example.com ip dhcp pool example.com
Router1(config) #ip dhcp pool example.com is correct if issued in global configuration mode. This must come first in order to create the dhcp configuration mode needed for the domain command Router1(dhcp-config) #domain-name example.com is correct if issued in dhcp configuration mode
154
What cli command should you issue after entering the dhcp pool name? Does it take a wildcard mask or a subnet mask?
The cli command to specify what network addresses to use in the pool is: network n.n.n.n s.s.s.s example: network 192.168.2.10 255.255.255.240 or network 192.168.2.10/28 Note: you can use a CIDR notation in the cli for this command You cannot use a wildcard mask, you must use a subnet
155
What is dhcp manual binding?
use of the host command will allow you to specify a specific address for a specific host each and every time it request an address from a dhcp server An example of the cli is: host 192.168.1.50/26 client-identifier 0001.oc14.5432
156
What does the cli ip address dhcp do?
ip address dhcp | configures an interface to become a dhcp client
157
What does the cli command ip ssh version 2 effectively do?
It ensures that the device will only accept connections from SSH version 2 (aka NOT SSH v.1)
158
What 3 tables do EIGRP routers maintain and what do they contain?
Routing table - only successors (best routes) Topology table - successors and feasible successors Neighbor table - lists all adjacent routes including routes that are not successors or feasible successors
159
Which address is Link Local? FF02::/16 or FE80::/10
Both are link local! FE80 is Link Local Unicast and FF02 is Link Local Multicast
160
Describe the difference between Inside Global Address Inside Local Address
Inside Global Address - is an IP address that represents an inside host as seen by host on the outside network. In other words, it is not the REAL IP address of the host Inside Local Address - is the REAL IP address of the host
161
What encryption values (#) are available to: enable password and enable secret
enable password uses 0, 4 and 5 but 0 is no encryption and 4 has been deprecated (so basically, 5) enable secret uses 0 and 7 0 is no encryption and 7 is a Cisco proprietary encryption (so yea, 7)
162
How many 1's do these IPv6 addresses start with?: Unique Local Link Local Multicast
Link Local - the first 10 bits - 11111111010 Unique Local - the first 7 bits - 11111110 Multicast - the first 8 bits - 11111111
163
SOF stands for what and what field (#) is it in the ethernet frame?
Start of Frame comes 2nd (after Preamble) in the ethernet frame
164
Which frame type lists the destination first | Ethernet (802.3) or Wireless Ethernet (802.11)?
Ethernet (802.3) is Destination first and then Source (3rd and 4th fields) Wireless Ethernet (802.11) is Source first and then Destination (in the 3rd and 4th fields)
165
Do the Fabric, Overlay network and Underlay network all lay south of the DNA controller?
Yes
166
What are the 4 steps of creating a WLAN using the WLC GUI?
* Type - select the type of WLAN (a standard WLAN is the default for this step, so you would not have to use the drop down box to select it) * Profile Name - give it a Profile Name * SSID - name the SSID * ID - Choose a (VLAN) ID
167
What does PSK stands for and what is it used for? What are other forms of X* (*the function PSK provides)?
Passphrase = PSK (Pre Shared Key) 802.1x uses a RADIUS for keying CCKM uses Cisco fast rekeying without the need for WLC intervention
168
Does LLDP use LSA's?
NO!!! LLDP is Link Layer Discovery Protocol LSA's (Link State Advertisements) are part of OSPF