2A Flashcards

1
Q

Manually Defined by the system administrator as the only path to the destination; they are useful for controlling security and reducing traffic.

A

Static Routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are simple to configure and work well in environments where network traffic is relatively predictable and where network design is relatively simple.

A

Static Routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A special static route manually defined by the system administrator as the path to take when no route to destination is known.

A

Default Route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A default route is often called what?

A

The Gateway of Last Resort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A router to which all non-routable packets are sent?

A

The Gateway of Last Resort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network layer protocol that exchanges information packets with other internetwork routers in order to Build and Maintain a routing table.

A

Dynamically Learned Routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most dominantly used routing algorithms used today are?

A

RIP, IGRP, OSPF, EIGRP, and BGP

They are popular since the y adjust to changing network circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most common routing metric is what?

A

Path Length aka Hop Count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refers to the dependability of each network link

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refers to the length of time required to move a packet from source to destination to internetwork.

A

Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refers to the available traffic capacity of a link.

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refers to the degree to which a network resource, such as a router, is busy.

A

Load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An example would be sending packets over their own lines rather than through the public lines that cost money for usage time.

A

Communication Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Support multiple paths to the same destination by load balancing or load sharing

A

Multi-Path Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

They provide substantially better throughput, reliability, and shorter convergence times

A

Multi-Path Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The routers are peers for all others.

A

Flat Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Operates in a flat address space, where all routers in a domain must use the same subnet mask, sometimes referred to as Glassful routing.

A

Flat Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This structure is called Classless routing and supports Variable Length Subnet Masks (VLSM)

A

Hierarchical Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Used with Interior Gateway Protocols, they are used to exchange routing information within an Autonomous System or routing domain. Examples are RIP, IGRP, EIGRP, OSPF, and IS-IS

A

Intra-domain algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Are used with Exterior Gateway Protocols, and exchange routing information within and between Autonomous systems such as the Internet.

A

Inter-domain algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An approach that determines the direction and distance to any link in the internetwork. Also known as Glassful

A

Distance Vector algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This form of routing update is often called “routing by rumor” since the routers don’t know where the information originally came from.

A

Distance Vector Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Build a complete topological map of the entire area in memory, which allows them to see the entire path to the destination network ensuring the path is valid and is the best path available.

A

Link State Algorithms

They use multicast link-state advertisements to notify other routers in the routing area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three classes of routing protocols?

A

Distance Vector, Link State, and Balanced Hybrid

25
Relatively simple and easy to configure and very reliable
Distance Vector Protocols
26
Is considered a pure distance vector routing protocol
Routing information protocol (RIP) Uses a hop count metric to indicate distance and a destination
27
Was developed as a Cisco proprietary protocol and is only available on Cisco devices. Limited by Hop Count and uses an autonomous system number to only share routing information with other routers that are configured with the same number.
Interior Gateway Routing Protocol (IGRP)
28
Created in the 1980s as a solution to RIPs inability to handle routing in large, diverse networks. Its a link state routing protocol that only sends information which describes the state of its own links to all the routers within the same hierarchical area.
Open Shortest Path First (OSPF)
29
Occurs when the source and destination are in the same area.
Intra-area
30
Occurs when the source and destination are in different areas.
Inter-area
31
Routers with multiple interfaces can participate in multiple areas.
These routers are called Area Border Routers and maintain separate topological databases for each area.
32
In OSPF its responsible for distributing routing information between areas
Backbone
33
After a router is powered up and assured that its interfaces are functioning, it uses OSPF Hello Protocol to acquire neighbors, which are routers with interfaces to a common network.
OSPF Initialization
34
When a router discovers a new neighbor, it records the neighbors address and interface as an entry.
Neighborship Database
35
Essentially an overall picture of networks in relationship to routers. Contains the collection of Link State Advertisements received from all routers in the same area.
Topological Database
36
The exchange of the Hello Protocol allows the election of a?
Designated Router and backup designated router
37
Responsible for generating Link State Advertisements for the entire area so only one router is responsible for sending multicast updates.
Designated Router
38
This algorithm uses the information from the topological database to calculate entries for insertion into the routing table.
SPF Algorithm
39
It maintains copies of its neighbors routing tables and uses the distance vectors to determine the best paths to destination networks, but resembles link-state protocols in the way it uses topology changes only to trigger link state updates by using multicast messages.
EIGRP
40
Each source of routing information, therefore, has an attached measure of its trustworthiness called?
Administrative Distance The lower the distance the more trustworthy
41
The primary function is to exchange routing information between autonomous systems while guaranteeing loop-free path selection.
Border Gateway Protocol
42
Advanced distance vector protocol, capable of detecting routing loops and uses many route parameters, called attributes or path vectors, to define routing policies and maintain a stable routing environment.
BGP
43
Does not contain any mechanism for automatic neighbor discovery
BGP
44
Provide basic traffic management capabilities and can be configured for all routes network protocols.
Access Control Lists
45
Filter network traffic by controlling whether routed packets are forwarded or dropped, based on the criteria you specify.
Access Control List
46
Provide a basic level of security for access your network.
Access Lists
47
What are the two types of Access Lists
Standard and Extended
48
Normally permit or deny the entire protocol suite for any packet coming through the router.
Standard Access Lists
49
Check both the source and destination addresses as well as specific protocols within the protocol suite and port numbers being used.
Extended Access Lists
50
How do you create Access Lists?
First step is to create an access list criteria statement or statements, and the second step is to apply the access list to an interface or terminal connection.
51
Access List Standard Number Range?
1-99
52
Access List Extended Number Range
100-199
53
Due to the implicit ____ _____ as the last access list test every list must have at least on permit statement.
"deny any"
54
A wildcard mask bit 0 means?
Check the corresponding bit value in the IP address" for an exact match
55
Wildcard mask bit 1 means?
Do not check the corresponding bit value in the IP address
56
Inbound access list are processed?
Before Routing
57
Outbound access lists are processed?
After Routing
58
Places a standard or extended list to a specific router interface to filter traffic through the router interface.
Access-Group
59
Places a standard access list on the virtual terminal lines of a router to prevent unauthorized access via telnet?
Access-Class