3 Qtr Final Flashcards
What is the OSPF Loading state?
LSRs and LSUs are used to gain more information about route information, then are processed using the SPF formula.
What is the OSPF Full state?
The link-state database is fully synchronized.
In ExStart, who sends the DBD packets first?
The router with the higher router ID.
What is the initialism to remember the OSPF Adjacency States?
FLEETID
What is the multicast address used by the DR?
224.0.0.5 (this is the address used to send packets to all OSPF participating routers)
What is the multicast address used by DROTHER routers?
224.0.0.6 (this is the address the routers will use to send packets to the DR and BDR)
What is the default priority for OSPF?
1
When is it normal for a router to be stuck in a 2-WAY/DROTHER state? (two answers)
When a non-DR or BDR router has a neighbor relationship with another non-DR or BDR router or when it is a point-to-point network.
What is the range for the interface priority? Which one is highest?
0-255; 255 is the highest, 0 is permanently a DROTHER
What is the criteria for the election process?
- Interface Priority
- Router ID
- Highest Loopback Address
- Highest Active Interface Address
What is the formula to calculate cost?
cost = reference bandwidth / interface bandwidth
What is the default reference bandwidth? (2 answers)
100,000,000 bps (100mbps)
What is the cost for FastEthernet, Gigabit, 10 Gig? (considering the default reference values)
1
.1
.01
(anything less than 1 is rounded)
How can you change the cost? (2 answers)
auto-cost reference-bandwidth (on the router)
ip ospf cost (on the interface)
What is the default hello and dead timer for multicast networks?
30 and 120 (nonbroadcast, multipoint broadcast, multipoint nonbroadcast)
What is the default hello and dead timers for Point-to-Point networks?
10 and 40 (broadcast and point-to-point)
How would you verify the hello and dead timers?
show ip ospf interface
What is adware?
Displays unsolicited advertising.
What is ransomeware?
Denies access to files, requiring payment
What is a rootkit?
Used to gain administrative access to a computer.
What is spyware?
Used to gather user information and send it to threat actors
What is a worm?
Self-replicating that propagates automatically.
Where should you ideally place a standard ACL?
Near the destination
Where should you ideally place an extended ACL?
Near their source
What is a clientless VPN?
Uses a web browser SSL connection.
How is a site-to-site VPN created?
It is created with VPN terminating devices, such as a router or ASA.
How is a remote access VPN create?
It is created with VPN terminating devices, such as a router or ASA
Does GRE include encryption?
No