2A Review Questions Flashcards
What types of routes are designed to work well where network traffic is extremely predictable and network design is relatively simple?
Static Routes
______ Routes use algorithms to build and maintain routing tables that adjust to changing topology.
Dynamic Routes
Protocols such as RIP, IGRP, EIGRP, OSPF and BGP are classified as?
Dynamically Learned Routes
Refers to the available traffic capacity of a link?
Bandwidth
Refers to the length of time required move a packet from source to destination through the internetwork.
Delay
Some companies may not care about performance as much as they care about operating expenditures.
Communication Cost
The most common routing Metric.
Path Length AKA Hop Count
Refers to the dependability of each network link.
Reliability
Refers to the Degree to which a network resource, such as a router, is busy
Load
What is meant by the term classless routing?
That it is a hierarchical algorithms structure and its supports Variable Length Subnet Masks (VLSM)
Which classification of algorithm is used with Interior Gateway Protocols?
Intra-Domain
Distance vector algorithms build routing tables by using ______ messages to and from their neighbors only.
Broadcast Routing Update
A disadvantage of distance vector algorithms is they are limited by ___________ making them unusable for large networks.
Hop Count
Which algorithm sends multicast messages to notify routers about the status of their connect links?
Link State
What are three classes of routing protocols?
Distance Vector, Link State, Balanced Hybrid
Which is considered a pure distance vector protocol?
RIP
What is the algorithm used by OSPF?
Shortest Path First
What responsibility does the “backbone” have is OSPF?
For distributing routing info In-between areas
OSPF uses the _____ protocol during initialization to acquire neighbors.
Hello
The _______ is responsible for generating link state advertisments for an entire area so only one router is responsible for sending out multicast messages.
Designated Router
How often does OSPF send out Multicast update messages?
Every 30 min or when there is a change.
EIGRP is often referred as a_______ protocol.
Balanced Hybrid
When does EIGRP send multicast update messages?
Only when there is a topology change.
Name there key technologies that are used by EIGRP.
Neighbor Discover/Recovery, Reliable Transport Protocol (RTP), and DUAL Finite-state machine`
________ sends small “hello” packets to establish communication with neighboring routers.
Neighbor Discovery/Recovery
Which key technology is responsible for the Guaranteed, ordered delivery of certain EIGRP packets?
RTP (reliable transfer protocol)
Wha algorithm does EIGRP use for route determination?
DUAL
What EIGRP key technology is responsible for calculating “successors” and “feasible successors”?
DUAL
A______ is the best. least cost path to a destination and is copied to the routing table.
Sucessor
The _________ contains all destinations advertised by neighboring routers.
Topology Tables
What is administrative distance?
Measure of trust worthiness
When is administrative distance used?
When more than one path to a destination exists.
Which protocol path would be used is OSPF and EIGRP both provided a path to the same destination?
EIGRP because its a CISCO proprietary
What type of protocol is used to communicate between autonomous systems?
Exterior Gateway Protocol
How often does BGP send updates to other BGP routers?
Only when triggered by a topology change.
How does BGP discover its neighbor routers?
Must be manually configured by the admin
Access lists provide the basic level of _____ for networks
Security
List the statement options that can be used with an access list?
Permit and Deny
Every access list acting as a packet filter must have a least one what?
Permit
In which direction can access lists be applied to an interface using TCP/IP?
One per protocol per direction
What happens if a packet does not match any of the test conditions of the access list?
Discarded or destroyed
All access list end with
Implicit Denial
A standard access list is applied as an “access-class” to prevent which type of entry into the router?
Unauthorized access into Telnet