2.0 Virtualization Domain 10% Flashcards

1
Q

The basis of the SD-Access control plane and is used to manage the mappings between endpoint identifiers (EIDs) which are assigned to hosts and routing locators (RLOCs) which are assigned to routers.

A

Locator/ID Separation Protocol (LISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Manages the endpoint to fabric node mapping

A

Host Tracking Database (HTDB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LISP device that encapsulates IP packets from Endpoint Identifiers (EIDs) that have destinations to a different LISP site.

A

Ingress Tunnel Router (ITR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encapsulates traffic from non-LISP sites destined for EIDs at LISP sites

A

Proxy Ingress Tunnel Router
(PITR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

device that de-encapsulates LISP packets from EIDs that reside outside the LISP site but have destinations the lie inside the LISP site

A

Egress Tunnel Router (ETR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ETR router uses to send traffic to non-LISP sites

A

Proxy Egress Tunnel Router
(PETR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Single device that combines both ITR and ETR LISP functions

A

Tunnel Router
(xTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • accepts encapsulated Map-Request messages from the ITRs,
  • dencapsulate those messages,
  • forwards towards the ETRs
A

LISP Map Resolver
(MR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Basis of the SD-Access data plane and is used to extend and enchance VLAN capabilities by overlaying a layer 2 network on top of a layer 3 network

A

Virtual Extensible Local Area Network
(VXLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encapsulation method is used in VXLAN to transport layer 2 data over an IP-based underlay?

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

24-bit segment ID that replaces the VLAN ID and extends layer 2 segmentation from 4,094 possible VLANS to 16 million broadcast domains

A

VXLAN Network Identifier
(VNID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does VXLAN use for loop protection?

A

Layer 3 routing protocols and Equal Cost Multipathing (ECMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Draft IETF standard that redefines a reserved portion of the standard VXLAN header to inclue Security Group Tag (SGT) information.

A

VXLAN Group Policy Option
(VXLAN-GPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

device that provides the encapsulation and deencapsulation for the VXLAN

A

Virtual Tunnel Endpoint
(VTEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

logical interface where the VXLAN encapsulation and deencapsulation occurs

A

Network Virtual Interface (NVI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

network virtualization mechanism that enables a single layer 3 router to function as multiple virtual routers

A

Virtual Routing and Forwarding
(VRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an open standard that operates at the Network layer and is responsible for securing VPN traffic by providing device authentication, data encryption, and data integrity

A

IPSec

18
Q

What encryption methods are supported by IPSec

A
  • Data Encrytpion Standard (DES)
  • Triple DES (3DES)
  • Advanced Encryption Standard (AES)
19
Q

What command creates and names a VRF?

A

ip vrf vrf-name

20
Q

What command within the VRF configuration is used to distinguish routing domains?

A

rd asn:arbitrary#

21
Q

What command is required if BGP is running in the VRF and creates a list of import and export route target (RT) communities for the VRF?

A

route-target {export | import | both} asn:arbitrary#

22
Q

What command is used to associate interfaces with the VRF?

A

within the interface configuration mode of each interface you want to participate in the VRF issue:
ip vrf forwarding vrf-name

23
Q

which command was issued to produce the following output:

A

show ip vrf detail vrf-name

24
Q

What command is used to create the logical interface of a tunnel?

A

interface tunnel tunnel-number

25
Q

Cisco IOS defaults to what mode of GRE?

A

IPv4 GRE

26
Q

What command with the tunnel configuration is used to assign the virtual interface of the tunnel?

A

ip address ipv4-address

27
Q

what commands identify the source and destination ip addresses of the physical intefaces?

A

tunnel source ip-address of source router
tunnel destination ip-address of destination router

28
Q

What command produced the following output?

A

show interfaces tunnel tunnel-number

29
Q

What IP protocol needs to be allowed by and ACL or firewall if GRE tunnels are being used?

A

IP protocol 47

30
Q

What type of hypervisor doesn’t require a host OS?

A

Type 1

31
Q

What are some examples of type 1 hypervisors?

A

VMWare ESXi and Microsof Hyper-V

32
Q

What are some examples of type 2 hypervisors?

A

Oracle Virtual Box
VMWare Fusion
VMWare Player

33
Q

Emulates the physical hardware of a host computer system such as a desktop or server

A

Virtual Machine

34
Q

Allows VMs to quickly and easily migrate between host machines

A

Encapsulation

35
Q

Ensures that a VM can migrate to any physical host with the appropriate resources

A

Hardware Independance

36
Q
  • Is an ETSI standard that defines the decoupling of network functions (NFs) from hardware
  • used to create appliances, such as load balancers, firewalls and intrusion detection systems (IDSs),
  • can perform the functions of their physical counterparts without being confined to a dedicated hardware platform
A

Network Functions Virtualization (NFV)

37
Q

T/F a vSwitch is a virtualized switch that emulates a physical multilayer switch?

A

False
a vSwitch can only emulate a physical layer 2 switch

38
Q

What are some common Cisco VNFs

A

Cisco Cloud Services Router 1000v (CWR 1000v)
Cisoco Integrated Services Virtual Router (ISRv)
Cisco NextGen Firewall Virtual Appliance (NGFWv)

39
Q

What are some limitations of a vSwitch?

A
  • cannot share a connection to a physical NIC with another vSwitch
  • two vSwitches cannot be connected together
40
Q

What hash algorithms are used by IPSec to ensure data integrity?

A

Message Digest 5 (MD5) or
Secure Hash Algorithm 1 (SHA 1)

41
Q

What are Authentication methods used by IPSec?

A

Pre-Shared Keys
Digital Signatures