1.0 Architecture 15% Flashcards

1
Q

What are the components of the Cisco Enterprise 3-tier architecture?

A

Core Layer
Distribution Layer
Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

layer that provides network connectivity for end-user devices such as computers, printers, and IP phones

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ideal layer to perform user authentication, port security, Network Admission Control (NAC), Quality of Service (Qos) classification and marking, and Power over Ethernet (PoE).

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of classification and marking?

A

ensure that different categories of traffic, such as voice, video, and data, receive enough bandwidth to ensures acceptable levels of service through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer that is traditionally implemented with multilayer switches, performs QoS resource reservation, interVLAN routing, packet manipulation, route filtering, and summarization

A

Distribution Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

typically provides the fastest switching path in the network, and is primarily associated with low latency and high reliability

A

Core Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cisco two-tier architecture where the functionality of the core layer is provided by the distribution layer?

A

Collapsed Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a drawback of using a collapsed core design?

A

the topology does not scale well beyond a small number of swithces so it is only recommended for small campuses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What modules make up the Cisco Enterprise Architecture model?

A
  • Enterprise Campus
  • Enterprise Edge
  • Service Provider Edge
  • Remote Locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What network services are provided by the data center submodule in the Cisco Enterprise Architecture Model?

A
  • Applications
  • Email
  • DHCP
  • DNS
  • File Services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

provides connectivity to the service provider infrastructure and the internal network

A

Enterprise Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

module that contains teleworkers, branch offices, and any other enterprise network components that are geographically distant from the main headquarters

A

Remote Locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet, MPLS, Metro Ethernet and other WAN service providers are contained within what module?

A

Service Provider Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the attributes of the Hot Standby Routing Protocol (HSRP)

A
  • Cisco Proprietary
  • HSRP gateways share a virtual IP and a Virtual MAC
  • Each HSRP group contains one active router and one standby router
  • Only the active router responds to ARP requests and forwards traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the attributes of the Virtual Router Redundancy Protocol (VRRP)

A
  • IETF Standard
  • VRRP gateways share a virtual IP and a Virtual MAC
  • Each VRRP group contains one master virtual router and one or more backup virtual routers
  • Only the master virtual router responds to ARP requests and forwards traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the attributes of the Gateway Load Balancing Protocol (GLBP)

A
  • Cisco Proprietary
  • Share a virtual IP address but have individual virtual MAC addresses
  • Each GLBP group contains an Active Virtual Gateway (AVG), up to four Active Virtual Forwarders (AVFs), and several Secondary Virtual Forwarders (SVFs)
  • The AVG and AVFs can all forward traffic thereby providing redundancy and load balancing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What modes can a redundant supervisor module be configured in?

A
  • Route-processor redundancy (RPR)
  • RPR Plus (RPR+)
  • Stateful Switchover (SSO)
  • SSO with Nonstop Forwarding (NSF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the features of the Route-processor redundany (RPR) mode?

A
  • standby supervisor module partially boots and intializes
  • Failover time is greater than 2 minutes
  • Traffic is disrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the features of (RPR+) mode

A
  • The standby supervisor fully boots and intialized without Layer 2 and Layer 3 functionality
  • Failover time greater than 30 seconds
  • Traffic is disrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the features of SSO mode

A
  • the standby supervisor fully boots, intializes, and synchronizes
  • Failover time is greater than 1 second
  • Layer 2 port states are maintained
  • Layer 3 forwarding is disrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are features of SSO with NSF

A
  • Failover time is reduced to milliseconds
  • NSF-enabled devices prevent Layer 2 and Layer 3 disruptions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which deployment solution gives organizations more control and customization, is easier to secure, and has lower latency?

A

On-premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which deployment model has lower-up front cost, does not require hiring of staff, and is easier to scale?

A

Cloud Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which deployment model has higher up-front costs, requires hiring staff, and is harder to scale?

A

On-premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which deployment model gives the service provider full control, is harder to secure, and has higher latency and service interuptions?

A

Cloud Deployment

26
Q

What are the four primary workflows of the DNA Center Applications?

A
  • DNA Design
  • DNA Policy
  • DNA Provision
  • DNA Assurance
27
Q

What subsystems of Cisco DNA Center operate at the controller layer?

A
  • Network Control Platform (NCP)
  • Network Data Platform (NDP)
28
Q

Provides the underlay and fabric automation for the network layer and physical layer

A

Network Control Platform (NCP)

29
Q

What facilitates the automation of the management tasks by enabling the controller to communicate with applications rather than relying on an administrator to manually intervene?

A

Application Programming Interfaces (APIs)

30
Q

NCP can configure network devices by using NETCONF which is what type of API?

A

Southbound

31
Q

What northbound API is used by NCP to communicate status information to the management plane?

A

Representational State Transfer (REST)

32
Q

What are some sources of information from which NDP can collect and analyze data and present it in a contextualized format to NCP and ISE?

A
  • Netflow
  • Switchport Analyzer (SPAN)
33
Q

Which Cisco DNA Center subsystem provides status messages to the management layer?

A

Network Data Platform (NDP)

34
Q

What access layer mechanisms can Cisco ISE use to provide Network Access Control (NAC) and identy services?

A
  • 802.1x
  • MAC Authentication Bypass (MAB)
  • Web Authentication (WebAuth)
35
Q

What function of ISE translates administrator-created group-based policies into configuration changes that are automatically applied to network devices within the fabric?

A

Policy Services

36
Q

Which portion of the SDN fabric is the collection of devices, interfaces, and media that comprises the IP netowrk that connects each fabric node?

A

Underlay Network

37
Q

What are some routing protocols that are typically included in the underlay network?

A
  • IS-IS
  • OSPF
  • EIGRP
38
Q

Why is IS-IS the Cisco recommended routing protocol for SDN networks, as opposed to OSPF or EIGRP?

A

Because it typically performs better and is able to form neighbor relationships without a dependance on IP protocol configuration or operation

39
Q

Which planes of the SDN fabric operate with the overlay network?

A
  • Data Plane
  • Control Plane
40
Q

True or False

Only one overlay network can be implemented on top of a single underlay network?

A

False.
Multiple overlay networks can be implemented on a single underlay network.

41
Q

What are some common overlay network protocols?

A
  • VXLAN
  • VRF
  • Network Virtualization using GRE (NVGRE)
  • GRE
  • Overlay Transport Virtualization (OTV)
  • Multicast VPN (mVPN)
42
Q

What are the primary components of the Cisco SD-WAN solution and where dooes each reside?

A
  • vManage Network Management System (NMS) in the Management Plane
  • vEdge and cEdge Routers in the Data Plane
  • vBond Orchestrator in the Orchestration Plane
  • vSmart Controller in the Control Plane
43
Q

Which SD-WAN component provides a single GUI to configure and manage the components of the SD-WAN architecture and can include enhanced monitoring and analysis capabilities?

A

vManage NMS

44
Q

What components manage the data plane, form the IP fabric, and handle all routing decisions of SD-WAN overlay network?

A

vEdge and cEdge Routers

45
Q

What are the features of the vBond component of the Cisco SD-WAN solution?

A
  • Manages the orchestration plane
  • Authenticates Edger routers and vSmart Controllers
  • Has a publicaly routable IP address
  • Uses load-balancing mechanisms to ensure efficient distribution of controllers
46
Q

Which SD-WAN component manages the control plane and ensures that only authenticated devices can access the SD-WAN?

A

vSmart Controller

47
Q

What protocol is used by the vSmart Controller to distribute routing information, security keys, and policy configurations to Edge routers?

A

Overlay Management Protocol

48
Q

What type of tunnel is used by the vSmart controller to communicate with Edge routers and the vBond orchestrator?

A

Datagram Transport Layer Security (DTLS) tunnels

49
Q

What type of wireless deployment has the WLC in a data center or near the network core in order to maximize the number of number of APs joined to it based on the concept that most of the resources users need to reach are located together?

A

Centralized Deployment

50
Q

How does a centralized wireless deployment affect security?

A

A centralized WLC enables security policies for wireless clients to be centralized as well.

51
Q

How many APs and wireless clients can one large enterprise WLC support?

A

6000 APs and 64,000 clients

52
Q

What type of wireless deployment uses fully functional, stand-alone access points that do not need a WLC?

A

Autonomous Deployment

53
Q

Distributed wireless deployments that use APs with embedded wireless controllers (EWCs) are considered what category of wireless deployments?

A

Controller-less deployment

54
Q

What are the two categories of wireless deployments?

A

Controller-based and Controller-less

55
Q

How does an autonomous deployment affect the data path compared to a centralized deployment?

A

An autonomous deployment allows clients to send traffic to each other directly through the autonomous access point, whereas the centralized deployment requires clients to send traffic though the access point, over a CAPWAP tunnel to the WLC, then information is dencapsulated, inspected, reencapsulated, then sent back down to the intended recipient wireless client

56
Q
A
57
Q
A
58
Q
A
59
Q
A
60
Q
A