Switch and IOS Fundamentals Flashcards

1
Q

What layer does a switch operate at?

A

Layer 2 devices with many ports designed to forward frames from source to destination, according to specific MAC addresses in the frame (Data-Link Layer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a forwarding decision

A

Forwarding frames in accordance with their destination addresses and MAC tables using a MAC learning process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What commend displays the MAC address table?

A

show mac address-table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What information will the MAC address table show?

A

VLAN, MAC Address, Dynamic or static, associated physical ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DYNAMIC frame?

A

Frame with a source MAC that arrives at a switch
and updates the table with the MAC address for that port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a STATIC frame

A

Frame that has a manually configured MAC address on a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 switching methods?

A

Store-and-forward, Cut-through, Fragment Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain store-and-forward switching?

A

Store-and-forward method buffers the entire frame upon receipt. This enables the switch to support various port speeds. Error checking takes place after entire frame is received. Relatively slow but supports different speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain cut-through switching?

A

In cut-through only the first 6 bytes of the incoming frame are buffered, meaning the switch only regards the destination MAC address of the frame. Switch forwards immediately no error checking. Disadvantage is because no error checking frame can be corrupt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Fragment free switching?

A

Fragment-free buffers the first 64 bytes of the frame, including MAC address data and
the frame’s payload, also performing partial error checking to make sure there is no fragmentation on the first 64 bytes of the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Half Duplex?

A

A connection for which the communication is restricted to exchanging data in one direction at a time example Wireless is half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Full-Duplex?

A

Full-duplex means that data can be transmitted in both directions, on a signal carrier, at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are switch ports transfer speeds?

A

10 Mbps, 100 Mbps,or 1000 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Auto-Negotiation?

A

Auto-negotiation tells connected devices to announce their
capabilities, and then, based on the settings of the interconnected
device at the other end, chooses the optimal speed and duplex mode. Done by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a NOS Network Operating System ?

A

Operating System for a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an IOS Internetwork Operating System?

A

CLI-based system, and users interface with it using text-based Cisco commands.

17
Q

What is Cisco Packet Tracer?

A

Cisco Packet Tracer allows the user to map a network. Packet Tracer enables the testing of network configurations, trains users to work with network configuration, helps them understand how a network operates, and provides them with network deployment experience.

18
Q

What is CLI?

A

Command Line Interface is a means of interacting with programs by entering commands on the command line. Advantage is minimum resources usage, faster ability to operate on the system

19
Q

What is Terminal Emulation?

A

Used to configure an intermediary device when connecting with a console cable. software, such as PuTTY. TE programs enable configuration of local devices using a
serial cable or a remote management protocol, such as SSH.

20
Q

What is Putty?

A

Versatile tool for remote access to another
computer. It is often used by people who want secure
remote shell access to a UNIX or Linux system, though that
is only one of its many uses.

21
Q

What is Out-of-Band Access Method?

A

Uses a dedicated management console
cable that must be physically connected to the device.
Initial configuration is usually done using this method.

22
Q

What is In-Band Access Method?

A

This method uses management protocols, such as SSH
or Telnet, which access the device remotely over the
network.

23
Q

What are the 3 IOS Work Modes Structure?

A

Permissions, Modes, Structure

24
Q

What is User EXEC Mode?

A

Low-level capabilities but is useful for basic operations. It has a limited
number of monitoring commands and does not allow device configuration changes. (ping, enable and limited show) Router>

25
Q

What is Privileged EXEC Mode

A

Has a large number of monitoring commands and device configuration
viewing commands (show commands). It also enables file management operations,
such as device configuration backups and IOS upgrades. (sll user exec commands, debug, reload, configure Router>

26
Q

What is Global Configuration Mode?

A

(config)# Global configuration is the only mode that allows administrators to change device configuration. This mode is only accessible from the privileged EXEC mode. Router(config)#

27
Q

What is Interface Configuration Mode?

A

The interface mode allows you to change specific parameters within a switch or
router Router(config-if)#

28
Q

What does the enable command do?

A

Moves the user from user mode to privileged mode.

29
Q

What does configure terminal command do?

A

Moves the user from user mode to global configuration mode.

30
Q

What command takes the user one mode back?

A

Exit command or ctrl Z

31
Q

What is RAM?

A

Random Access Memory - Volatile memory that stores the system configuration (running-config) and tables (such as the MAC table) designed to hold data while the computer was turned on and to lose it when the power went away

32
Q

What is ROM?

A

Non-volatile memory responsible for the Power-On Self-Test
(POST) process and bootstrap, which is the initial program responsible for booting the IOS. Read-only memory (ROM) chips had the data that they stored hardwired into their physical structures and would retain it until they were destroyed.

33
Q

What is FLASH?

A

Non-volatile memory that stores the operating system itself (IOS).

34
Q

What is NVRAM?

A

Non-volatile memory that stores the startup config file. Computer memory that can hold data even when power to the memory chips has been turned off. NVRAM is a subset of the larger category of non-volatile memory (NVM), which includes storage-class memory based on NAND flash.

35
Q

Explain the Device Boot Process?

A

1) POST-LOAD bootstrap checks the CPU, RAM, and NVRAM then copies from ROM to RAM
2) IOS- LOAD copying the bootstrap program from the ROM to the RAM, the IOS (which is still stored in flash memory) is copied to the RAM for execution.
3) Configuration - The bootstrap program now copies the startup configuration file from the NVRAM to the RAM.