137 Midterm Cards Flashcards

1
Q

Describe the 5 step boot sequence of the switch.

A
  1. First, the switch loads the POST (Power On Self Test)
  2. Next it loads up the boot loader software
  3. The bootloader performs the low level CPU initialization.
  4. Boot loader initializes the flash file system.
  5. Finally the default IOS software is launched on the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command is used to view the IOS boot file?

A

The show boot command shows you the IOS boot file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does SVI stand for?

A

SVI stands for the logical Switch Virtual Interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the default management interface on a switch?

A

VLAN 1 is the default management interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it best practice to change the VLAN management interface from 1?

A

Security. It is common knowledge that the default management VLAN is set to 1, which makes it easier to infiltrate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What commands are used to create a Virtual Management Interface?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to assign a default gateway to a switch?

A

In global config mode:

ip default gateway $default gateay ip address$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What commands are used to verify the status of physical and virtual switch interfaces?

A

show ip interface brief and show ipv6 interface brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Full Duplex communication?
What is Half Duplex communication?

A

Full Duplex communication is a high bandwidth form of communication where both ends of a connection transmit and receive data at the same time.
Half duplex is communication that is unidirectional, often resulting in collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a micro segmented LAN?

A

A microsegmented LAN is a network where a switch port only has one device connected to it running full-duplex mode. There is no collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What NICs require Full Duplex capability to operate?

A

Gigabit Ethernet and 10 GB NICs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the default Duplex configuration on most modern Cisco switches?

A

Most newer Cisco switches are set to Auto duplex mode, meaning that they change between half and full duplex mode depending on the network speed they are required to keep up with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What commands are used to configure duplex and speed on a switch port?

A
  • *duplex** #duplex type
  • *speed** # desired speed in MBPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Auto MDIX?

A

Auto MDIX is a process on most modern switches that allows the switch to automatically detect and configure the required cable connection type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you enable Auto MDIX?

A

On most modern switches, Auto MDIX is already enabled, but if you are working on a switch that has it disabled, you use the mdix auto command in interface config mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name and define the show commands you can use on a switch.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name some common Input Errrors.

A

Input Errors include runts, giants, CRC, frame, buffer overrun, and ignored counts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are input errors?

A

Input errors are the sum of all errors in datagrams that were received on a specifed interface.You can view these errors useing the show interfaces command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Runt Frame Errors and Giants?

A

Runt Frames are ethernet frames that are smaller than the minimum required size (64 bytes)

Giants are the opposite of runt frames. There are frames that are larger than the maximum allowed size for an ethernet frame (1518 bytes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are CRC errors?

A

CRC errors are usually indications of media or cable errors. Common CRC errrors include issues caused by EMI, using incorrect cabling, or damaged media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are output errrors?

A

Output errors are the sum of all errors that prevented the final transmission of datagrams OUT of an interface.

Output Errors include collisions and Late collisions (collisions that happen after 512 bits of the frame have been transmitted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe Telnet Remote Access.

A

Telnet is an obsolete and unsecure plaintext way to connect to a switch remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is SSH?

A

SSH stands for secure shell connection. It provides secure and encrypted remote connection to a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What TCP ports to Telnet and SSH use?

A

Telnet uses port 23.

SSH uses Port 22. `

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What command do you use to verify if a switch suports SSH?

A

The show ip ssh command verifies if SSH can be enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What command is used to configure the IP domain name of a network?

A

Ip domain-name $namehere$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How to you generate RSA key pairs?

A

You use the crypto key generate rsa command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How do you add credentials for SSH access?

A

In global configuration mode, use the commands username and secret to create a username and password that can be used for SSH connection.

Next, on the VTY lines, use the login local command to force login if connecting remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How do you view your SSH configuration?

A

The show ip ssh command lets you view your current SSH configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What configuration tasks must be done on a Cisco router?

A

Routers must be given:

hostnames (hostname command)

banners (banner motd #xxx# command)

passwords on both the console and the VTY lines

Secure encrypted password protection (service password-encryption command)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What different types of interfaces do routers and switches support?

A

Switches have multiple fast ethernet and gigabit ethernet interfaces, but no others.

Routers support many different types of interfaces because they connect with both LANs and WANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What IOS command is used to activate an interface?

A

Interfaces are activated using the no shutdown command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are loopback interfaces?

A

Loopback interfaces are logical and internal to the router. It is not and will never be assigned to a physical port. It is automatically set to up when the router is on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of loopback interfaces?

A

Loopback interfaces are used mainly for testing and managing a Cisco IOS device. It ensures that there will always be an interface on a device that is active and running at all times.

They can also be used in lab environments where more than 1 network is required, but the user doesn’t have access to all the hardware needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What commands are used to assign loopback interfaces?

A

First access your specified loopback interface

interface #loopbacknumber#

Next, assign an IP address to the loopback interface

ip address #xxx.xxx.xxx.xxx#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a link-local IPv6 address?

A

An IPv6 link local address is a unicast address automatically assigned when a global unicast address is assigned.

The link-local ddress always begins with an FE80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Name the 4 filtering parameters that can be piped to a show command.

A

Section - Shows an entire section starting with the filtering expression

Include - Includes all output lines that match the filtering expression

Exclude - Excludes all output lines that match the filtering expression

Begin - Shows all the output lines from a certain point, starting with the line that matches the filtering expression

38
Q

What are the two primary functions of a router?

A
  1. Determine the best path for a packet
  2. Forward that packet down the desired path.
39
Q

How does a router determine the best path to a destination?

A

The router refers to the IP routing table.

The routing table can be accessed by using the

show ip route

command

40
Q

Describe the longest match process.

A

The longest match is the process the router goes through when determining the best possible route.

The router checks its stored addresses and routes, compares addreses using prefix lengths. The route that contains the most matches from the left most area of an address is considered the longest match.

The longest match is always used as the prefered route.

41
Q

What types of routes does a routing table contain?

A

The routing table contains:

Directly connected routes

Static Routes (Manually configured)

Dynamic routes (Automatically configured)

Default Route (specifies a next hop router as back up if no addresses match the destination address)

42
Q

What are the 3 packet forwarding mechanisms routers use?

A

Process Switching

Fast Switching

Cisco Express Forwarding (CEF)

43
Q

Describe the differences between the 3 packet forwarding mechanisms.

A

Process Switching: Obsolte method, has to check every single packet even if the destination is the same, slowest

Fast Switching: Also older, uses a fast switching cache to store next-hop info, flow information is stored depending on how packets are sorted and distributed for future use.

CEF : Default for most cisco routers. Instead of table entries being packet triggered, they are change triggered. This means that routing tables stay consistent unless the network topology makes a change.

44
Q

Describe the core config of a router.

A

I aint writing core config again

45
Q

What do the different letters in the routing table represent?

A
  • L - Identifies the address assigned to a router interface.
  • C - Identifies a directly connected network. •
  • S - Identifies a static route created to reach a specific network.
  • O - Identifies a dynamically learned network from another router using the OSPF routing protocol.
  • R - Identifies a dynamically learned network from another router using the RIP routing protocol.
  • D - Identifies a dynamically learned network from another router using the EIGRP routing protocol
  • * - This route is a candidate for a default route.
46
Q

What are the 3 routing table principles?

A
  1. Every router makes decisions independently based on its own personal routing table.
  2. The information in one routers routing table does not nessicarily match the information on anothers.
  3. Routing information about a pth does not provide return routing information.
47
Q

What information do routing table entries contain?

A
  • -Route Source: Identifies how route was learned
  • -Destination Network: Identifies the address of the remote network (prefix and prefix length)
  • -Administrative Distance: Identifies the trustworthyness of the route source
  • -Metric: Identifies the value assigned to reach the remote network. Lower value = preferred route
  • -Next Hop: Identifies the IP address of the next router to which the packet would be forwarded
  • -Route timestamp: Ammount of time that has passed since the route was learned
    • Exit Interface : The egress interface to use for outgoing packets to reach their desination
      *
48
Q

What is the use of Administrative Distance?

A

Administrative distance is used to determine the most trustworthy orute that packets can take while traversing between networks.

49
Q

Name some routing protocols and their associated Administrative Distances.

A
  • Directly connected - 0
  • Static Route - 1
  • EIGRP summary route - 5
  • External BGP - 20
  • Internal EIGRP - 90
  • OSPF - 110
  • IS-IS - 115
  • RIP - 120
  • External EIGRP - 170
  • Internal BGP - 200
50
Q

What conditions should be considered when implementing static routing?

A

Static routing should be implemented when:

You are assigning a default route to an ISP

Routes are outside of your routing domain and are not learned by dynamic routing

The network administrator wants explicitly defined paths for a specifc network

Routes need to be esablished between stub networks

51
Q

What should be considered when implementing dynamic routing?

A

Dynamic routing should be used when:

Your network is large and contains a large number of routers

When network topologys change and finding a new route automatically is required

For scalibility as a network grows and new routes need to be learned and established.

52
Q

What is the purpose of dynamic routing?

A

Dynamic is in place to

  • Discover Remote Networks
  • Maintain up to date routing information
  • Choose the best path to destination networks
  • Find the next best path if the current path becomes unavailable.
53
Q

What are the main concepts of dynamic routing?

A

Data Structures: Typically routing protocols use tables or databases for their operations. Information is kept in the RAM of a router.

Routing protocol messages: Various tyes of messages are used to discover neghiboring routers, exchange routing information, and perform other tasks to maintain up to date information.

Algorithm: Finite list of steps used to accomplish a task. Routing protocols use algorithms for facilitating routing information and best path determination.

54
Q

How do different types of Dynamic Routing determine the best path?

A

RIP: Hop Count. Each router along a path adds a hop to a count, lower hop count = the better path.

OSPF: Cost. based on the cumulative bandwith from source to destination. Faster links = lower costs = best path.

EIGRP: Bandwidth and Delay. Could also include load and reliability into the metric calculation.

55
Q

How does router load balancing work?

A

When a router has multiple paths to a destination with equal cost metrics, then it can use these paths equally to increase the effectiveness of a network.

56
Q

Name the different types of static routes.

A

Standard

Default

Floating

Static Host route

57
Q

How are next hops defined when creating a static route?

A

Next-Hop route: Only the next-hop IP address is specified

Directly Connected Static Route - Only the router’s exit interface is specified

Fully specified static route - Both the next hop IP address and exit interface are specified

58
Q

What commands can be used to verify a static route?

A

show ip route static

show ip route #network address#

show running-config | section ip route

(replace ip with ipv6 for the v6 commands)

59
Q

What are floating static routes?

A

Floating static routes are routes made to provide a backup path to a primary static route.

This means that the route should be configured with a HIGHER administrative distance than the primary route (should be 1 by default if it is a static route)

60
Q

How do you change the administrative distance of a static route?

A

At the end of the static route command, add the number you wish the administrative distance to be set to.

Example

ip route 0.0.0.0 0.0.0.0 10.10.10.0 5

This route will have an administrative distance of 5.

61
Q

What are static host routes?

A

Host routes are IPv4 addresses with a 32 bit mask, or IPv6 addresses with a 128 bit mask.

A host route is used to route trafic to a specific host instead of a network.

62
Q

Name some reasons as to why a network can fail.

A

An interface fails

A service provider drops a connection

Links can become congested / oversaturated

An administrator made a whoopsie and messed up a configuration.

63
Q

Who is responsible for fixing a network problem?

A

Network administrators or you dummy fix yo network man.

64
Q

Name some common troubleshooting commands.

A

ping

traceroute

show ip route

show ip int brief

show cdp neghibors.

65
Q

When were dynamic routing protocols created and implemented?

A

Dynamic routing protocols have been implemented into networks since the late 1980s

66
Q

What type of netowrk implementation is RIP not suited for?

A

RIP is not suited for large network implementations as it does not scale well.

67
Q

What routing protocols meet the need of larger networks?

A

Open Shortest Path First (OSPF)

Intermediate System to Intermediate System (IS - IS)

Enhanced Interior Gateway Routing Protocol (EIGRP)

68
Q

Which dynamic routing protocol is used for links between ISPs?

A

Border Gateway Protocol (BGP)

69
Q

Which dynamic routing protocol. is unique to Cisco IOS?

A

EIGRP is a Cisco Proprietary routing protocol.

70
Q

What are some advantages and disadvantages of Static routing?

A

Advantages:

  • Easy to implement into a small network
  • Very secure
  • Route to destination is always the same

No routing algorithm required

Disadvantages

  • Suitible for only simple topologies
  • Configuration complexity increases with the size of the network
  • Manual intervention required to re-route traffic
71
Q

What are some advantages and disadvantages of dynamic routing?

A

Advantages

  • Suitible in all topologies that contain multiple routers
  • Generally independent of the networks size
  • Automatically adapts topology when needed

Disadvantages:

Can be more complex to implement initially

  • Less secure than static routing
  • Route depends on the current topology
  • Requires additional CPU, RAM, and Link Bandwidth
72
Q

What are some characteristics of EIGRP?

A

EIGRP is exclusive to Cisco and was designed by them

The basic configuration is simple and easy to understand. Commonly used in small networks

Its advanced features include Higher Scalability, support for multiple routed protocols

Faster Convergence

Uses less bandwidth than other routing protocols

Supports both IPv4 and IPv6

73
Q

How do you create and use the EIGRP Process ID?

A

To configure EIGRP, you use the router eigrp process_id command

All routers in the same EIGRP routing domain must have the same process ID number.

This ID number is an Autonomous System number (AS)

74
Q

How do you create and use EIGRP Router IDs?

A

Use the eigrp router-id #ipv4 address# command to create a router ID.

These uniquely identify each router in an EIGRP domain.

75
Q

How do you enable and avertise a network in EIGRP?

A

You use the network #network address command under the EIGRP configuration.

Example

router eigrp 1

network #network IP address#

76
Q

What command can be used to verify EIGRP has been successfully implemented?

A

show ip eigrp neghibors

show ipv6 eigrp neghibors

77
Q

Describe the EIGRP IPv6 process.

A

First use ipv6 unicast routing to enable IPv6 routing

Next use ipv6 router eigrp #proc id#

Use the eigrp router-id #router id# command to assign a router ID

Assign any passive interfaces

Use no shutdown to turn on eigrp.

On each interface you would like to assign EIGRP routing to:

Use ipv6 eigrp #router id# to enable EIGRP.

78
Q

How does a switch make forwarding decisions?

A

A switch makes forwarding decisions based on the Layer Two MAC addresses.

Ethernet switches are the most popular layer 2 device for networks.

79
Q

What are the two terms associated with frames moving through interfaces?

A

Ingres - Entering the Interfac

Egress - Exiting the interface

80
Q

What specific type of MAC address do switches make forwardiing decisions based on?

A

A swithc forwards frames based on the destination mac address.

81
Q

What MAC addresses are recorded in the MAC address table?

A

Source MAC addresses are recorded into the MAC table along with the associated port.

82
Q

Describe the learn and forward switch method.

A

Learning - Examines the source address and adds it to the MAC table.

Forward - Examines destination MAC address. If the desired destination MAC is in the source table, its forwarded out the associated port.

If there is no match in the MAC table, it is flooded out all interfaces except for the one it was received from.

83
Q

What are VLANS?

A

VLANs are used to virtually segment networks.

VLANs use logical connections to link devices. There are mutually isolated and can only share packets with other VLANs using a router.

84
Q

What are some characteristics of VLANs?

A

Provide segmentation of various groups based on the needs of the organization.

Provides manageable organization of networks.

Broadcasts, multicast and unicasts are isolated in each VLAN.

Each VLAN will have unique addressing structures.

85
Q

Name some of the benefits or VLAN implementation.

A

Smaller Broadcast domains

Improved Security

Improved IT efficiency

Reduced Costs

Better Performance

Simpler Management

86
Q

What is the default VLAN?

A

The default VLAN is 1.

This is also the default Native VLAN and the default Management VLAN.

For security purposes it is reccomended to change this VLAN to a different number.

87
Q

Describe the 4 types of VLANs.

A

Data VLAN - Dedicated to user generated traffic.

Native VLAN - Used for trunk links exclusively

Management VLAN - Used for SSH/Telnet VTY Traffic. Shouldn’t deal with end user traffic.

Voice VLAN - Seperate VLAN for voice traffic due to its different requirements . Voice traffic requires assured bandwidth, high QOS priority, must avoid congestion, a delay under 150ms.

88
Q

What are VLAN trunks?

A

A trunk is a point to point link between two network devices.

Cisco trunks:

Allow more than 1 VLAN

Extend VLAN across the entire network

Supports all VLANS

Supports 802.1Q Trunking

Usually established between switches to support intra VLAN communication.

89
Q

Describe the process of VLAN tagging.

A

VLAN Tagging happens before a frame is forwarded across a trunk link. It needs to contain its VLAN information.

VLAN information is added to the frame header.

This tag contains:

  • VLAN ID
  • Protocol Type ID
  • User Priority
  • Canonical Format ID.
90
Q

What is the purpose of the Native VLAN?

A

The native VLAN is used to carry untagged traffic across a trunk. Both ends of a trunk must be configured with the same Native VLAN.