Review Questions Flashcards

(75 cards)

1
Q

Switches are ______________ based and utilize ______________ to help them make filtering decisions.

A

hardware based
ASIC (Application Specific Integrated Circuits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switches move frames of information at the ______________ Layer of the OSI model.

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a hub and switch?

A

Hubs transmit messages out of every interface other than the one it was received on, and switches break up a network into collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allows direct local access to configure a switch using a terminal, or a computer using terminal emulation software for initial configuration. DoD policy states this must be password protected to prevent unauthorized changes.

A

Console Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This part of the switch is where end devices such as computers and printers are connected. The number of interfaces can vary depending on the model.

A

Network Interfaces or switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is where the operating system is saved. Every time that the switch boots up, the ____ _____ will be accessed to load the OS into the running memory.

A

Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Contains information such as the diagnostics and bootup routines. Cannot be accessed or changed.

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Running memory that the switch uses for operations. Changes to the current configuration are stored in the “running-configuration”.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Holds the startup-configuration, which is loaded to the RAM upon bootup and then becomes the running-config.

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishes communication directly between two network devices without relying on any host or network system. Is a data link layer protocol that operates over a point-to-point link.

A

PPP (Point to Point) Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a loop-prevention protocol that allows switches to communicate to prevent loops in a network. Defined by IEEE 802.1D.

A

STP (Spanning Tree Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Occurs when traffic in one of two directions fail on a link.

A

UDLD (Unidirectional Link Detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vendor neutral neighbor discovery protocol.

A

LLDP (Link Layer Discovery Protcol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cisco proprietary neighbor discovery protocol that shares information of connected Cisco devices.

A

CDP (Cisco Discovery Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two VLAN trunking methods for encapsulating frames? _____________________. Which one is non-proprietary? __________.

A

ISL and 802.1q
802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______________ switches store the entire frame in internal memory and check the frame for errors before forwarding the frame to its destination.

A

Store and forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__________ switching reduces latency; however, bad frames are forwarded, and the destination will ultimately have to request the source send the frame again.

A

Cut through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_________ Switching is a hybrid of Store-and-Forward and Cut-Through
switching. It stores the first 64 bytes before forwarding.

A

Fragment Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When two system transmissions occur at the same time, on shared bandwidth, the result is a ______________.

A

collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_______ is defined as a “logical” grouping of network devices into a single broadcast domain or flat network.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three benefits of VLANs?

A

increased security, flexibility and scalability, removes geographical barrier limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What command do you use to determine what VLAN a port is a member of?

A

show vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What type of VLAN is used for SNMP, management, and syslog?

A

Management VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a layer 3 networking device that use IP addressing to forward packets between networks?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
___ ___ allows you to configure the router remotely using a modem. This port must be configured before you can use it
Auxillary port
26
This is where the diagnostic and boot up routines are stored
ROM
27
Manufacture memory that holds the Internetwork Operating Systems (IOS)
Flash memory
28
is used to store the startup-configuration file
NVRAM
29
is the working memory for the router. It contains the running configuration file, a copy of the IOS, the routing tables, and any associated data required by the routing process.
RAM
30
What is a router that directs packets inside a LAN?
Interior Gateway Routers
31
What is a router that directs packets between two separate LANS?
Exterior Gateway Routers
32
In today's terminology, the term ______________ often refers to a device that converts information or data from one protocol or format to another.
gateway
33
is a connected group of one or more IP prefixes run by one or more network operators which has a SINGLE and CLEARLY DEFINED routing policy
Autonomous System
34
What are some internetworking challenges?
connectivity, reliable service, network management, flexibility
35
What do routers break up and is defined as a potion of a network limited by its router connection to a specific group of host computers in a common LAN segment.
Broadcast domain
36
What is the world's most popular open- system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected networks.
TCP/IP
37
What is used to send information from one Layer 2 interface to another Layer 2 interface?
physical or MAC address
38
What is used to send information from one network to another network?
network or logical addresses
39
What is the difference between dynamic and static routing?
Static routes are established by the network administrator and do not change until the network administrator changes them. Information takes the same route every time. Dynamic routing happens when routers learn about other networks and calculate the best path. Static routes are manually created by network administrators, and dynamic routes enable the router to calculate the best route automatically
40
Routing involved two basic activities: ______________________ and ___________________.
Path Determination and Packet Switching
41
Routers populate their routing tables by learning network destinations using what three types of routes.
Static, dynamic or default routes
42
When given multiple routes to the same destination routers use what is called ________________________to determine the most trustworthy route.
Administrative Distance
43
are routes that have been manually configured by the network or system administrator as the only path to a destination.
Static routes
44
are routes that have been learned and maintained in a routers routing table from other internetwork routers using network layer protocols and routing algorithms such as RIP, IGRP, OSPF, EIGRP, and BGP.
Dynamic routes
45
____ ____ or as it can also be called as, a gateway of last resort, is a specific type of static route that has been manually configured by a system administrator to act as a path when there is no known destination for a route to follow.
Default routes
46
The following describes the advantages of which algorithm? simple to understand and configure Less expensive Less processor demand to maintain routing table
Distance Vector algorithms
47
The following describes the disadvantages of which algorithm? limited by hop count does not support variable length subnet masking updates via broadcasts and builds routing tables from neighbors tables
Distance Vector algorithms
48
The following describes the advantages of which algorithm? 1. Fast convergence times. 2. Support for variable length subnet masks (VLSM) 3. Complete topological picture, non-reliant on neighbors for information. 4. Less prone to routing loops.
Link State algorithms
49
The following describes the disadvantages of which algorithm? 1. Higher CPU/Memory requirements. 2. More expensive.
Link State algorithms
50
Routing Information Protocol, or RIP, is a ________________algorithm and uses ______________ for its algorithm metrics.
distance vector hop count
51
Open Shortest Path First, or OSPF, is a ____________algorithm and is based on ________________________ for its algorithm.
link state Dijkstra’s Shortest Path First
52
OSPF networks operate best when used within a ____________ due to their use of multi-area configurations.
hierarchy
53
This area within an OSPF network is responsible for distributing routing information between areas. It consists of all area border routers, networks not wholly contained in any area and their attached routers.
Backbone
54
Routers utilizing OSPF use the ________________to acquire neighbors and maintain link-state awareness.
Hello protocol
55
The following describes the advantages of which algorithm? 1. Hierarchical routing supports very large networks. 2. Shortest Path First algorithm allows for fast convergence. 3. Does not suffer from the routing loop issues (unlike distant vector protocols). 4. Supports classless routing (VLSM reduces routing protocol overhead). 5. Smaller routing updates and, they only occur when there is a topology change (less bandwidth and CPU utilization).
OSPF
56
The following describes the disadvantages of which algorithm? 1. Complex. Requires a structured topology (otherwise efficiency will be reduced) 2. Requires highly trained staff to understand and configure a large OSPF network due to complete configurations. 3. Link State database requires considerable memory due to numerous tables and databases. 4. SPF algorithm utilizes more processing power as the size of the topology database increases.
OSPF
57
Enhanced Interior Gateway Routing Protocol (EIGRP) is a ______________ protocol created as a Cisco proprietary protocol that later became open standard.
balanced hybrid
58
EIGRP networks combine both advantages and disadvantages from Distance Vector and Link State algorithms. What concept is utilized in OSPF networks is missing from EIGRP.
Area concept
59
Border Gateway Protocol (BGP) is considered a ______________protocol.
path vector
60
Cisco’s hierarchical internetworking model is a _________ model for _________ design first proposed by Cisco.
three-layer Network
61
The three layers of the Cisco Hierarchical internetworking model, from top to bottom, are the __________, __________, and __________ layers.
Core, Distribution, Access
62
The core layer is often called a ____________ backbone.
high-speed
63
The primary function of the distribution layer is to provide __________, __________, __________ and ______________________________________.
routing, filtering, WAN access, determine how packets can access the core when necessary
64
The distribution layer of the Cisco hierarchical internetworking model is where __________ should be implemented.
policies
65
The access layer is the aggregation point and includes hubs and switches to ______________such as ____________ to the network.
connect nodes workstations
66
The access layer is sometimes referred to as the __________ layer because the majority of devices connected to the access switch are ____________________.
desktop desktop computers
67
A ______________is a logical division of a network of connected network devices based on the IP address.
subnet
68
An IP address is made of three components, a/an ______________, ______________, and ______________.
network part, subnet part, host part
69
_____ are used to differentiate the network component of an IP address by dividing the IP address into __________________and __________________.
subnet masks network address host address
70
Classless Internet Domain Routing (CIDR) is used to represent IP addresses. The concept is to adapt subnetting to the entirety of the Internet, because of this it is also often referred to as ______.
supernetting
71
When an IP network is assigned more than one subnet mask, it is said to have a _____.
Variable Length Subnet Mask (VLSM)
72
When designing and configuring a simple network, what two things should you take into consideration?
How many subnets needed and/or how many hosts needed
73
A late collision indicates that another system attempted to transmit after a host has transmitted at least the first __ ___ ___ __ ___.
64 bytes of its frame
74
What is the default VLAN that is automatically assigned to interfaces on switches?
VLAN 1
75
BGP is an exterior gateway protocol and uses what for it’s metrics?
Manual input from network administrators.