647-874 ARCH Flashcards

0
Q

When is a FHRP needed?

A

Only if the design implements Layer 2 between the access switch and the distribution switch. If Layer 3 is supported to the access switch, the default gateway for end devices is at the access level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the 3 layers of the Hierarchical Network Model?

A
  1. Access
  2. Distribution
  3. Core
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of the Access layer in the Hierarchical network Model?

A
  • Grants user access to network devices.
  • In the WAN environment , the access layer for teleworkers or remote sites may provide entry to the corporate network across WAN technology.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of devices that would attach to the Access layer?

A
  • PCs (including virtualized desktops)
  • IP Phones
  • Servers
  • Wireless Access Points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some of the functions provided by Access Layer devices and what are some generic examples of those types of devices?

A
  • Control traffic by localizing service requests to the access media.
  • Must provide connectivity without compromising network integrity.
  • Includes:
    • WAN Routers
    • Firewalls
    • PSTN Gateways
    • Multilayer or Layer 2 Access Switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of the Distribution layer in the Hierarchical network Model?

A
  • Aggregates the wiring closets, using switches to segment workgroups and isolate network problems in a campus environment.
  • Aggregates WAN connections at the edge of the campus and provides policy-based connectivity.
  • Addresses QoS and Policy-based traffic control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some of the functions provided by Distribution Layer devices and what are some generic examples of those types of devices?

A
  • Control access to resources that are available at the core layer and must, therefore, make efficient use of bandwidth.
  • Must address the quality of service (QoS) needs for different protocols by implementing policy-based traffic control to isolate backbone and local environments.
  • Includes:
    • Multilayer Switches that connect up to Access Layer devices and down to Multilayer Core Switches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the function of the Core layer in the Hierarchical network Model?

A
  • A high-speed backbone, designed to switch packets as fast as possible.
  • Must provide a high level of availability and adapt quickly to changes.
  • Provides scalability and fast convergence and an integration point for data center virtualization.
  • Provides services that optimize communication transport within the network.
  • Provides a high speed, layer 3 switching environment using hardware accelerated services.
  • Critical for connectivity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for the Core Layer?

A

Backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some examples of devices that would attach to the Core layer?

A
  • Distribution Layer Devices.

- Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some of the functions provided by Core Layer devices and what are some generic examples of those types of devices?

A
  • Provide services that optimize communication transport within the network.
  • Are expected to provide maximum availability and reliability with minimum packet processing.
  • Should be able to maintain connectivity when the circuits that connect them fail.

Includes:
-Multilayer Switches that connect up to Distribution Layer Multilayer Switches and down to Servers/Data Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Policy-Based Traffic Control?

A

A function of the Distribution Layer, it enables you to prioritize traffic to ensure the best performance for the most time-critical and time-dependent applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three overlapping architectures that Cisco developed as part of a holistic approach to network architecture and design?

A
  1. Borderless Networks
  2. Collaboration
  3. Virtualization (data center and desktop)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Borderless Networks Architecture address?

A

-Addresses increasing worker mobility and focuses on connecting anyone from anywhere , using any device, to any resource (securely, reliably, and seamlessly).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do the Borderless Networks technologies focus on and what are those technologies?

A

-Providing high-performance secure mobile connectivity.

  • Routing
  • Switching
  • Mobility
  • Security
  • Application
  • Performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the Collaboration Architecture address?

A

-Addresses the increased need for interaction among companies, including partners and suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do the Collaboration technologies focus on and what are those technologies?

A

-Integrating many different types of communication methods and devices.

  • Unified Communications
  • Tele???? (? is a placeholder for a variable)
  • Conferencing
  • Messaging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 3 major business challenges that the Data Center Architecture addresses?

A
  1. Business alignment
  2. Cost and power efficiency
  3. Risk management and compliance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do the Virtualization technologies focus on and what are those technologies?

A

-Provisioning data storage and computing resources to applications in a highly scalable and resilient manner by leveraging virtualization technology.

  • Virtualization
  • Unified Fabric
  • Unified Computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are 2 advantages of virtualization technology?

A
  • Enables more rapid application deployment and more-efficient use of resources, allowing you to do more with the same resources.
  • Offers better protection against disasters and outages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Medianet?

A

An intelligent network (IN) that is optimized for rich media, such as voice and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 6 Medianet services?

A
  1. Network Management
  2. High Availability
  3. QoS
  4. IP Multicasting
  5. Transcoding
  6. Authentication and Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some applications that leverage the Medianet architecture?

A
  • Cisco Unified Communications
  • Cisco Digital Media Systems
  • Cisco IP Video Surveillance
  • Cisco TelePresence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 5 modules you can commonly divide a network up into in order to facilitate gradual implementation and address specific requirements of each individual part?

A
  1. Campus
  2. Data Center
  3. WAN and MAN
  4. Branch
  5. Teleworker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three overlapping Cisco network architectures for the enterprise and what does each do?

A
  1. Borderless Networks - Solutions to increase work mobility. It focuses on connecting anyone from anywhere, using any device, to any resource (securely, reliably, and seamlessly).
  2. Collaboration - Provides a framework that enables new applications to address the need to communicate and collaborate across corporate boundaries, companies, and continents.
  3. Virtualization - Consolidates network, storage, and computing resources by leveraging virtualization technologies. Enables rapid deployment of new applications and services, scaling of existing services, and optimization of applications through flexible assignment of resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the three roles of the core layer in a LAN design?

A
  1. Provides high speed data transport
  2. Serves as a fast convergent infrastructure with a high level of redundancy.
  3. Avoids data manipulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What three sections provide network infrastructure and services for remote enterprise users?

A
  1. Teleworker Branch Section
  2. Enterprise Branch Section
  3. Data Center Section
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are three basic steps of the design methodology under PPDIOO?

A
  1. Identify customer requirements.
    - Key decision makers identify initial requirements
    - Typically done in the Prepare phase
  2. Characterize the existing network and sites.
    - Gap Analysis
    - Network Audit & Analysis
    - Typically done in the Plan phase
  3. Design the network topology and solutions.
    - Develop detailed design
    - Maybe build a prototype network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are three tasks that are involved in characterizing an existing network?

A
  1. Collecting information using the existing documentation and direct organizational input.
  2. Using tools to analyze network traffic.
  3. Using tools for automated auditing of the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the 6 phases of the Cisco formalized Lifecycle?

A
  1. Prepare
  2. Plan
  3. Design
  4. Implement
  5. Operate
  6. Optimize
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is involved in the Prepare phase?

A
  • Establishing organizational requirements
  • Developing a network strategy
  • Proposing a high-level conceptual architecture
  • Identifying technologies to support the architecture
  • Establishing financial justification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is involved in the Plan phase?

A
  • Identifying initial network requirements based on goals
  • Characterizing sites
  • Assessing existing networks
  • Performing Gap analysis
  • Creating a Project plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is involved in the Design phase?

A
Comprehensive, detail design that:
-  Meets current business and technical requirements
-  Incorporates specifications to support:
    -  Availability
    -  Reliability
    -  Security 
    -  Scalability
    -  Performance
Basis for implementation activities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is involved in the Implement phase?

A
  • Network components are built according to design specs.
  • Avoids disrupting current network if possible
  • Avoids creating points of vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is involved in the Operate phase?

A
  • Maintain network health through day to day operations
  • Monitor:
    • Fault detection
    • Correction
    • Performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is involved in the Optimize phase?

A
  • Proactive management of the network
  • Identify and resolve issues before they affect the organization.
  • May require network redesign if too many problems or errors arise.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Where does Cisco NSF with SSO and redundant supervisors have the most impact in the campus?

A

Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What hardware supports Cisco IOS Software Modularity?

A

Cisco Catalyst 6500 Series

NOT
3750
4500
XR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is NSF?

A

Nonstop Forwarding (NSF)

A Layer 3 function that works with SSO to minimize the amount of time a network is unavailable to its users following a switchover.

The main objective of Cisco NSF is to continue forwarding IP packets following an RP (Route Processor) switchover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What routing protocols support NSF?

A
  • EIGRP
  • OSPF
  • IS-IS
  • BGP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is SSO?

A

Stateful Switchover (SSO)

Allows the standby route processor (RP) to take control of the device after a hardware or software fault on the active RP.

SSO synchronizes startup configuration, startup variables, and running configuration; and dynamic runtime data, including Layer 2 protocol states for trunks and ports, hardware Layer 2 and Layer 3 tables (MAC, Forwarding Information Base [FIB], and adjacency tables) and access control lists (ACL) and QoS tables.

Available with these devices:
4500 switches
6500 switches
7600 switches 
Aggregation Services Routers (ASR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Cisco NSF with SSO and how do they work together?

A

A supervisor redundancy mechanism in Cisco IOS Software that allows extremely fast switchover at Layers 2 to 4.

Designed to maintain a link-up Layer 3 up state during a routing convergence event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the recommended version of STP to use for the enterprise campus?

A

RSTP - Rapid Spanning-Tree Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is UDLD and what is the enterprise recommendation regarding it?

A

Unidirectional Link Detection

Enables devices to monitor the physical configuration of the cables and detect when a unidirectional link exists where bidirectional communication has not been established.

Typically deployed on fiber topologies

Enable UDLD Aggressive mode in all environments where fiber-optic interconnections are used and enable it in Global mode to support every individual fiber-optic interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are some routing protocol issues you may encounter when using EtherChannel?

A
  • OSPF on an IOS switch could detect a failed link in the bundle and increase the link cost which causes a convergence event.
  • EIGRP may not change the link cost if there is a failed link in a bundle.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How many links can be in a EtherChannel bundle?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are two control mechanisms for EthernChannel?

A
  1. LACP - Link Aggregation Control Protocol (IEEE 802.3ad)

2 PAgP - Port Aggregation Protocol (Cisco Proprietary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are the four modes for LACP and what do they do?

A
  1. On - Forces it to be turned on. Only works with other ports set to On.
  2. Active - Puts port in active negotiating state. Works with other ports set to Active or Passive.
  3. Passive - Puts port in passive negotiating state. Works with other ports set to Active.
  4. Off - Turns off LACP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the four modes for PAgP and what do they do?

A
  1. On - Forces it to be turned on. Only works with other ports set to On.
  2. Desirable - Puts port in active negotiating state. Works with other ports set to Desirable or Auto.
  3. Auto - Puts port in passive negotiating state. Works with other ports set to Desirable.
  4. Off - Turns off PAgP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is ECMP?

A

Equal Cost Multipath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are some details of EtherChannel load balancing?

A
  • Load balancing using an alternate input hash can be tuned with the port-channel load-balance command.
  • The default input hash value of Layer 3 for the source and destination does not load balance across the links.
  • To achieve the best load balancing, use two, four, or eight ports in the port channel.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the reasons that passive interfaces should be implemented at distribution layer ports facing the access layer?

A
  • To limit unnecessary peering across the access layer switches when the Layer 2 to Layer 3 boundary is in the distribution layer
  • To avoid transit traffic through the access layer in the event of a link or node failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are 3 FHRPs?

A

First Hop Redundancy Protocols (FHRPs)

  1. HSRP - Hot Standby Router Protocol (Cisco Proprietary)
  2. VRRP - Virtual Router Redundancy Protocol (Standards Based)
  3. GLBP - Gateway Load Balancing Protocol (Cisco Proprietary) - Allows packet load sharing among groups of redundant routers.

GLBP can more easily achieve load balancing on the uplinks from the access layer to the distribution layer, and first- hop redundancy and failure protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What FHRP does Cisco recommend?

A

HSRP is the recommended protocol over VRRP because it is a Cisco-owned standard , which allows for the rapid development of new features and functionality before VRRP.

Use VRRP when needing to interoperate with other vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are some advantages of GLBP in the Distribution Layer?

A
  • GLBP provides all the benefits of HSRP and includes load balancing when VLANs do not span the access switches.
  • A convergence event on the uplink affects only half as many hosts as compared to HSRP when VLANs do not span the access switches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is a potential issue you may run into when daisy chaining access switches?

A

There is a danger that black holes will occur in the event of a link or node failure when the distribution interconnection is Layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the best mechanism to prevent unicast flooding issues?

A

Do not span VLANs across multiple access switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Why should you not span VLANs across multiple access switches if possible?

A

Because it is the best mechanism to prevent unicast flooding issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What hardware is supported by the Cisco Power Calculator?

A

Cisco Catalyst 4500 and 6500 Series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are some features that the Cisco Catalyst Integrated Security capabilities provide?

A
  • DHCP snooping prevents rogue DHCP activities.
  • Dynamic ARP inspection adds security to ARP to minimize the impact of ARP poisoning and spoofing attacks.
  • IP source guard prevents IP spoofing using the dynamic ARP inspection table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which three address blocks are summarizable?

a. 172.16.20.0/ 24 to 172.16.27.0/ 24
b. 172.16.20.0/ 24 to 172.16.23.0/ 24
c. 10.16.0.0/ 16 to 10.31.0.0/ 16
d. 10.16.0.0/ 16 to 10.47.0.0/ 16
e. 2001: 0DB8: C3B7: 10A0::/ 64 to 2001: 0DB8: C3B7: 10DF::/ 64
f. 2001: 0DB8: 1234: FB40::/ 64 to 2001: 0DB8: 1234: FB5F::/ 64
g. 10.96.0.0/ 16 to 10.159.0.0/ 16

A

b. 172.16.20.0/ 24 to 172.16.23.0/ 24
c. 10.16.0.0/ 16 to 10.31.0.0/ 16
f. 2001: 0DB8: 1234: FB40::/ 64 to 2001: 0DB8: 1234: FB5F::/ 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What are 2 examples of what bit splitting could be used for?

A
  1. OSPF Area Design

2. Summarizable address blocks with convenient role-based subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is a recommended design approach for OSPF?

A

Originate the default at the edge and redistribute it into dynamic routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is redistribution and some of its characteristics?

A

Redistribution is a powerful tool for manipulating and managing routing updates, particularly when two routing protocols are present in a network.

  • Easy to create routing loops
  • Works poorly with an arbitrary mix of routing protocols anywhere.
  • Works well with a limited number of redistribution points.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is Split Horizon?

A

A routing protocol feature. The idea behind it is that it is counterproductive to advertise information back to the source of that information, because the information may be out of date or incorrect, and because the source of the information is presumed to be better informed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

In what size network does routing design need to be most carefully done?

A

Large networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What three factors are the biggest influences on OSPF scalability?

A
  1. Flooding paths and redundancy
  2. Amount of routing information in the OSPF area or routing domain.
  3. Number of adjacent neighbors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are the different routing protocols and what classes do they fall into?

A

Distance Vector

  • RIPv1
  • RIPv2

Link State

  • OSPF
  • IS-IS

Hybrid Link State and Distance Vector
-EIGRP

Path Vector
-BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does IBGP require and why?

A

IBGP requires a full mesh of peers because it has no other way to prevent looping of routing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a route reflector?

A

A BGP route reflector is an IBGP speaker that reflects or repeats routes learned from IBGP peers to some of its other IBGP peers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What are 3 types of IBGP routers that will receive reflected routes from a route reflector client?

A
  1. Nonclient routers
  2. Other route reflector client routers
  3. EBGP peers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What technique does SONET use for framing voice and data onto a single wavelength on fiber?

A

TDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is CWDM?

A

Coarse Wavelength-Division Multiplexing

An optical technology for transmitting up to 16 channels, each in a separate wavelength or color, over the same fiber strand using less-sophisticated and less-costly transceiver designs than DWDM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is WDM?

A

Wavelength-Division Multiplexing

Uses a multiplexer (mux) at the transmitter to place multiple optical signals on a fiber and a demultiplexer (demux) at the receiver to split them off of the fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is DWDM and CWDM?

A

Dense Wavelength-Division Multiplexing
Coarse Wavelength-Division Multiplexing

DWDM and CWDM are technologies that increase the information-carrying capacity of existing fiber-optic infrastructure by transmitting and receiving data on different light wavelengths on a single strand of fiber.

CWDM is an optical technology for transmitting up to 16 channels, each in a separate wavelength or color, over the same fiber strand using less-sophisticated and less-costly transceiver designs than DWDM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is DWDM?

A

Dense Wavelength-Division Multiplexing

A core technology in an optical transport network. The concepts of DWDM are similar to those for CWDM except DWDM spaces the wavelengths more tightly, yielding up to 160 channels. The tighter channels are more precise which is why it is more sophisticated and costly than CWDM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is SONET?

A

Synchronous Optical Network (SONET),

A time -division multiplexing (TDM) technique for framing voice and data onto a single wavelength on fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is SDH?

A

Synchronous Digital Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is a drawback to using SONET?

A

It requires provisioning double the protected bandwidth. Bandwidth along SONET is committed as circuits between two points on the ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What Ethernet-based services are point-to-point services?

A
  1. EPL
  2. ERS
  3. EWS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is EPL?

A

Ethernet Private Line

A port-based point-to-point Ethernet-line (E-line) service that maps Layer 2 traffic directly onto a TDM circuit.

81
Q

What is ERS?

A

Ethernet Relay Service

A point-to-point VLAN-based E-line service that is used primarily for establishing a point-to-point connection between customer routers.

82
Q

What is EWS?

A

Ethernet Wire Service

A point-to-point port-based E-line service that is used primarily to connect geographically remote LANs over a P-network.

83
Q

What is EMS?

A

Ethernet Multipoint Service

A multipoint-to-multipoint port -based emulated LAN (ELAN) service that is used for transparent LAN applications.

Some characteristics are:

  • The P-network acts as a virtual switch for the customer.
  • All customer packets are transmitted to the destination ports transparently.
  • Oversubscription of the P-network is handled using stat muxing.
84
Q

What is ERMS?

A

Ethernet Relay Multipoint Service

A multipoint-to-multipoint VLAN-based ELAN service that is used primarily for establishing a multipoint-to-multipoint connection between customer routers

85
Q

What is service multiplexing?

A

Ability to support multiple instances of services or EVCs (Ethernet Virtual Circuit) on a single customer UNI (User Network Interface)

86
Q

Maybe add some characteristics to other Ethernet Services just like with EMS?

A

Maybe add some characteristics to other Ethernet Services just like with EMS?

87
Q

What is a PW in MPLS?

A

Pseudo Wires (PW)

  • Encapsulation of circuit data or PDUs at the ingress
  • Carries encapsulated data across the tunnel and acts as a logical wire
88
Q

What is Jitter?

A

The variation in delay in the interval between successive packets

89
Q

Why is a business risk assessment needed?

A

As a basis for design decisions.

90
Q

Which 3 factors should you consider when selecting a CPE device for a WAN service?

A
  1. Physical interface that is used by the WAN service.
  2. Performance limits of the CPE device
  3. Required additional services , such as VPN and QoS
91
Q

What is Pfr and what are its 5 operations?

A

Performance Routing (PfR) is the general term used for features that take into account diverse WAN characteristics and makes an informed-decision about the best path to reach a network or application.

  1. Learn
  2. Measure
  3. Apply Policy
  4. Optimize
  5. Verify
92
Q

What are four benefits of the three layer model for data center design?

A
  1. Support for layer 2 domain sizing
  2. Support for service modules
  3. Support for a mix of access layer models
  4. Support for NIC Teaming and HA clustering
93
Q

What are three design recommendations for OSPF in the data center?

A
  1. Use NSSA from the core layer down.
  2. Adjust the default bandwidth value with the auto-cost reference-bandwidth command.
  3. Tune the timers with the timers throttle spf command.
94
Q

Which layer 2 loop-free design is most susceptible to black holing of service module traffic in the event of an uplink failure?

A

Layer 2 loop-free U

95
Q

What are the two layer 2 loop-free topologies and their characteristics?

A
  1. Loop-free U
    - VLANs are contained in switch pairs (no extension outside of switch pairs).
    - No STP blocking; all uplinks are active.
    - Layer 2 service modules black hole traffic on uplink failure.
  2. Loop-free inverted U
    - Supports VLAN extension.
    - No STP blocking; all uplinks are active.
    - Access switch uplink failure black holes single attached servers.
    - ISL scaling considerations.
    - Supports all service module implementations.

Characteristics of both:

  • Redundancy can be supported using a trunk between the access switches.
  • VLANs are extended to the aggregation layer.
96
Q

What are the two main disadvantages to the layer 2 loop-free U design?

A
  1. VLANs cannot be extended between aggregation switches

2. Layer 2 service modules will black hole traffic in the event of an uplink failure.

97
Q

What are three characteristics of a Layer 3 access design model?

A
  1. VLANs do not extend to the aggregation layer.
  2. All uplinks are active, and none are blocking.
  3. Layer 2 server adjacency is supported across a single pair of access switches.
98
Q

What are the characteristics of top-of-rack access switch designs as compared to end-of-rack access switch designs?

A
  1. Cabling from the cabinet is minimized.
  2. Cooling requirements are eased.
  3. The number of devices to manage increases.
99
Q

What are the 7 most common things to consider in choosing access layer platforms?

A
  1. Cabling Design
  2. Cooling Requirements
  3. Power Requirements
  4. Density
  5. 10 GB Ethernet and 10 GB EtherChannel Support
  6. Resiliency features
  7. Intended use
100
Q

What are some characteristics of a ToR design?

A
  • Cooling is less than EoR
  • Less cabling from the cabinet
  • Higher STP Processing
  • More devices to manage
  • More port density
101
Q

What are some characteristics of a EoR design?

A
  • Decreased Management
  • Fewer devices to manage
  • Lower STP Processing
  • Redundant switch power and CPUs
102
Q

What are some disadvantages of the EoR design?

A
  • More cabling needs to be routed and managed.

- Cooling restraints due to the cable bulk coming into the cabinets and blocking airflow.

103
Q

What command is used to enable an EtherChannel hash for Layer 3 IP plus Layer 4 port-based Cisco Express Forwarding?

A

port-channel load-balance

104
Q

Where are service layer switches typically connected in the data center architecture?

A

At the aggregation layer in Layer 2 access layer designs

105
Q

What are STP virtual ports?

A

A per-line card value that reflects the total number of spanning-tree processing instances used on a particular line card

106
Q

The integral switch on a blade server is logically similar to what design?

A

1RU access switch design

107
Q

Which component has the largest failover time?.

A

RSTP

As compared to:
ACE Module
FWSM
Tuned EIGRP
HSRP
108
Q

What are three design options that are enabled by the use of VDCs on the Cisco Nexus 7000 series switches?

A
  1. Split-core topology: building two separate data center cores using a single redundant pair of Cisco Nexus 7000 switches
  2. Consolidated aggregation : using two VDCs of a single Cisco Nexus 7000 switch as a redundant pair of aggregation switches in an aggregation block
  3. Multiple aggregation layers: using VDCs to create separate aggregation blocks by business unit or function from a single pair of Cisco Nexus 2000 FEXs.
109
Q

What are three characteristics of Fibre Channel?

A
  1. Full duplex
  2. Addresses more than 16 million nodes
  3. Segment lengths of up to 6 miles (10 km)
110
Q

What technology allows multiple logical SANs to exist in the same physical fabric?

A

Virtual SAN (VSAN)

111
Q

What is a means of restricting visibility and connectivity between devices connected to a common Fibre Channel SAN or VSAN?

A

Zoning

112
Q

What are two characteristics of a large-scale SAN design?

A
  1. Uses a core-edge design to support much larger port densities than the collapsed-core design.
  2. Has a lower port-density efficiency as compared to small- or medium-scale designs.
113
Q

What are three factors in SAN design?

A
  1. Port density and topology
  2. Fault isolation using VSAN
  3. Simplified SAN management through storage captivity
114
Q

What are three benefits of a unified fabric?

A
  1. Reduced cabling
  2. Fewer network port adapters per server
  3. Power and cooling savings.
115
Q

Which types of adapters is used by a server when deploying FCoE?

A

Ethernet NIC and CNA (Converged Network Adapter).

116
Q

What are three best-practice guidelines for unified fabric design?

A
  1. If you enable MST, you should use a separate MST instance for FCoE VLANs.
  2. Use separate FCoE VLANs for SAN A and SAN B in dual-fabric SAN designs.
  3. When using FCoE on the Cisco Nexus 2000 FEXs, these FEXs should be connected straight through.
117
Q

What are the DCB Standards?

A
  1. 802.1Qbb Priority Flow Control (PFC)
  2. 802.1Qaz Enhanced Transmission Selection (ETS)
  3. 802,1Qau Congestion Notification
  4. 802.1ab Data Center Bridging Capability Exchange (DCBX) Protocol
118
Q

Where is an e-commerce design typically implemented?

A

In the data center

119
Q

What are three functions of SLB?

A
  1. Providing a public IP address or virtual IP address for each service
  2. Rewriting source and destination IP or MAC addresses, depending on SLB mode
  3. Supporting scaling and high availability by distributing client requests for service across active servers
120
Q

What are three characteristics of SLB one-armed mode?

A
  1. The SLB VIP and the real servers are in the same VLAN or subnet.
  2. The SLB VIP and the real servers are in the same VLAN or subnet.
  3. Return traffic can use PBR to deflect appropriate outbound server traffic over to the SLB as next hop.
121
Q

Where is the firewall perimeter in a basic e-commerce design?

A

At the core layer.

122
Q

What are two characteristics of the e-commerce design with two firewall layers when the Cisco ACE is not in Routed mode?

A
  1. The aggregation switch Cisco FWSM routes traffic to the server subnets.
  2. The MSFC is not directly connected to the Cisco ACE.
123
Q

What is a virtual firewall?

A

A logical separation of multiple firewall security contexts on a single firewall

124
Q

What command provides support for asymmetric routing on the FWSM 3.0?

A

asr-group interface command on FWSM 3.0

125
Q

What are three components of a PVLAN?

A
  1. Community VLAN
  2. Isolated VLAN
  3. Primary VLAN
126
Q

What are two methods to provide network security with access control?

A
  1. IBNS authentication

2. NAC posture assessment

127
Q

How many NAC Appliance Servers can Cisco NAC Appliance Super Manager manage?

A

40

128
Q

What are two characteristics of real IP gateway mode?

A
  1. The Cisco NAS has an IP address for every managed VLAN.

2. The Cisco NAS operates as the default gateway for untrusted network clients.

129
Q

What are two typical NAC agentless hosts?

A
  1. Scanners

2. Printers

130
Q

What are two characteristics of an IPS sensor?

A
  1. It is an active device in the traffic path.

2. Traffic arrives on one IPS interface and exits on another.

131
Q

What are two challenges for IPS deployments?

A
  1. Supporting asymmetric traffic flows

2. Supporting failover without dropping valid traffic

132
Q

What mechanism can be used to scale Cisco Security MARS deployments?

A

A global controller to summarize multiple local controllers

133
Q

Access control or admission control consists of which three elements?

A
  1. Identity
  2. Enforce
  3. Isolate
134
Q

What is the recommended practice for deploying the VPN termination device for best security?

A

To place the public side of the VPN termination device in a DMZ behind a firewall

135
Q

What is the most common address assignment design for remote-access VPNs?

A

Using internal address pools per VPN headend and implementing a static route for these subnets to the VPN headend

136
Q

What are two site to site VPN applications?

A
  1. WAN replacement

2. Mandated or regulatory encryption

137
Q

What is the typical IPsec deployment design?

A

Remote peers connected to the central site over a shared infrastructure in a hub-and-spoke topology

138
Q

What are two characteristics of the Cisco Easy VPN solution?

A
  1. Reduced management complexity for VPN deployments

2. Centralized VPN management across all Cisco VPN devices

139
Q

What are some advantages of DMVPN tunnels?

A
  • Dynamic mesh availability with fewer active tunnels on each spoke
  • Spoke-to-spoke tunnel creation dynamically based on traffic requirements
140
Q

What are some characteristics of a GET VPN?

A
  • It is a set of software features that provides a tunnel-less technology for end-to-end security.
  • It secures IP multicast group traffic or unicast traffic over a private WAN.
141
Q

What are three recommendations for managing VPNs?

A
  1. Use dedicated management interfaces if possible.
  2. Use a different username for configuration management and for troubleshooting.
  3. Use IPsec rather than SSH or SSL for access to VPN devices across the Internet.
142
Q

What is the primary issue in scaling VPNs?

A

Packets-per-second capacity from remote routers

143
Q

Which routing protocol is recommended for large-scale enterprise IPsec VPNs?

A

EIGRP

144
Q

Which VPN type does not tunnel traffic?

A

IPsec direct encapsulation

145
Q

What is a benefit of using IP multicast to deliver source traffic to multiple receivers?

A

It reduces network bandwidth consumption.

146
Q

What does multicast routing use for a broadcast to flood packets out all interfaces except for those incoming from the source.

A

RPF - Route Path Forwarding

147
Q

What is Route Path Forwarding (RPF)?

A

Forwarding multicast traffic away from the source, rather than to the receiver.

This is just the opposite of unicast routing.

148
Q

When will a router forward a multicast packet?

A

Only if it is received on the upstream interface; this interface is also called the RPF interface.

149
Q

What RPF checks does a router do to a mulicast packet?

A
  • The router looks up the source address in the unicast routing table to determine whether the packet has arrived on the interface that is on the reverse path back to the source.
  • If the packet has arrived on the interface leading back to the source, the RPF check succeeds and the packet is forwarded.
  • If the RPF check fails, the packet is dropped.
150
Q

Which purpose is served by IGMP in IP multicast?

A

To join hosts in a multicast group

151
Q

What is IGMP and what are the differences between IGMP v1 - v3?

A

Internet Group Management Protocol

Used between hosts and their local router.

Hosts use IGMP to register with the router to join (and leave) specific multicast groups.

Version 1
- Has no Leave Group mechanism

Version 2

  • Leave Group message
  • Group-specific queries
  • Querier election mechanism
  • Query-interval response time

Version 3
- Adds the ability to filter multicasts based on the multicast source so that hosts can indicate that they want to receive traffic only from particular sources within a multicast group.

152
Q

In which type of environments would PIM-SSM be efficiently used?

A

One-to-many applications

153
Q

What are three characteristics of ASM?

A
  1. Deployments use shared distribution trees.
  2. Deployments use source distribution trees.
  3. It is the traditional form for PIM deployments.
154
Q

Which multicast deployment model does not track (S, G) state?

A

Bidir-PIM

155
Q

Which two multicast protocols use candidate RPs?

A
  1. Auto-RP

2. BSR

156
Q

What are three characteristics of multicast state information?

A
  1. It grows when sources and receivers run multicast applications.
  2. It includes the unicast routing state information.
  3. State changes affect CPU utilization.
157
Q

How is packet filter-based access control typically deployed?

A

At the network ingress interface on the data plane before multicast processing.

158
Q

In which two types of environments would PIM-SSM be efficiently used?

A
  1. Deployments in which switches are used pervasively

2. One-to-many applications

159
Q

What are three of the benefits of GET VPN?

A
  1. It can take advantage of quick branch-to-branch connectivity while improving core meshing capability.
  2. Encryption is supported for native multicast and unicast traffic with Group Encrypted Transport’s GDOI protocol.
  3. It uses multicast to send the GET VPN packets to multiple destinations , which makes GET VPN very scalable.
160
Q

Which port does syslog use for sending messages to a syslog server?

A

UDP 514

161
Q

What are the four fields traditional Netflow uses to identify a flow?

A
  1. Destination IP Address
  2. Source IP Address
  3. ToS Byte
  4. Layer 3 Protocol Type
162
Q

What is the definition of a flow?

A

A unidirectional stream of packets between a given source and destination (both defined by a network layer IP address and source and destination port numbers).

163
Q

What are the 7 key fields that make up a flow?

A
  1. IP Source Address
  2. IP Destination Address
  3. Source Port
  4. Destination Port
  5. Layer 3 Protocol Field
  6. Type of Service (ToS) Byte
  7. Input Interface (IfIndex)
164
Q

What is Netflow?

A

An important embedded Cisco IOS Software technology that provides visibility into network behavior and how network assets are being used.

NetFlow answers the questions of what, when, where , and how traffic is flowing in the network.

165
Q

What are the different version of Netflow exports?

A

Version 1
- The original version

Version 5 (Most Common)
 - Adds autonomous system data and sequencing information to the NetFlow Data Export

Version 7
- Supports Cisco Catalyst 6500 series switches with an MSFC on Cisco Catalyst Operating System Version 5.5( 7) and later.

Version 8
- Is for on-router aggregation. It includes a choice of 11 aggregation schemes.

Version 9
- Supports dynamically defined fields.

166
Q

What are three reasons for expiration of NetFlow cache entries?

A
  1. As the cache becomes full, a number of heuristics are applied to aggressively age groups of flows simultaneously.
  2. Flows that have been idle for a specified time are expired and removed from the cache.
  3. TCP connections that have reached the end-of-byte stream (FIN) are expired.
167
Q

Which NetFlow export record type does Flexible NetFlow use?

A

Version 9

168
Q

What are three characteristics of Flexible NetFlow?

A
  1. It is the basis for IPFIX.
  2. It can monitor a wider range of packet information than traditional NetFlow.
  3. It can track multiple NetFlow applications simultaneously by using different flow monitors.
169
Q

What are two characteristics of NBAR?

A
  1. It can only monitor applications that are built in or that it recognizes from a PDLM.
  2. It can monitor a wider range of packet or protocol information than traditional NetFlow.
170
Q

What are two advantages of shadow routers?

A
  1. They allow scalability with many endpoints.

2. They provide separate memory and CPU from hardware in the switching path.

171
Q

What are shadow routers?

A

A dedicated router that is used to perform the IP SLA measurement operations when the number of operations is high for an IP SLA source (such as for hundreds or thousands of measurements).

172
Q

How many buildings should you have before deploying a dedicated campus core?

A

Three or more.

or four or more pairs of building distribution switches in a very large campus.

173
Q

What is TX-queue starvation?

A

When incoming packets are received faster than outgoing packets are transmitted. Packets are queued as they wait to serialize out onto the slower link.

174
Q

What is the current recommended practice for configuring a trunk?

A
  • Use 802.1Q
  • Set DTP to Desirable and Desireable with Encapsulation Negotiate to support DTP negotiation.
  • Disable trunks on host ports because host devices do not need to negotiate trunk status. This practice speeds up PortFast and is a VLAN-hopping security measure.
175
Q

What is the current recommended VTP mode and why?

A

Transparent because it decreases the potential for operational error.

176
Q

What is the current best practice for Vlan pruning?

A

Manually prune unused VLANS from trunked interfaces. This allows you to avoid broadcast propagation.

177
Q

Should you do automatic Vlan pruning?

A

No

178
Q

What is the default setting for VTP on Cisco switches?

A

Server mode with no VTP domain name.

179
Q

What would happen if you did not have a VTP domain name set and the switch was in client or server mode when you connected it to another switch that did have a domain set?

A

The switch you are connecting would accept the domain name of an adjacent VTP server and overwrite the local VLAN database.

180
Q

What is the purpose of the data center core?

A

Serves as the gateway to the campus core , where other campus modules connect , including the enterprise edge and WAN modules.

181
Q

How are the links connecting to the data center core terminated?

A
  • Layer 3
  • Use a distributed, low-latency forwarding architecture
  • Use 10 GB interfaces
182
Q

What is the recommended layer (2 or 3) that should be implemented for the core infrastructure in the data center?

A

Layer 3

183
Q

Where should the layer 2/layer 3 boundary be implemented in the data center?

A

Either within or below the aggregation layer modules.

184
Q

Should you implement layer 2 in the data center core? Why or why not?

A

No. Layer 2 should be avoided in the core because a Spanning Tree Protocol (STP) loop could cause a full data center outage.

185
Q

Should the data center core run an interior routing protocol? If so, which ones?

A

Yes, such as OSPF or EIGRP.

186
Q

What do you use to load balance traffic between the campus core and core aggregation layers and what is the command to enable it?

A

Using CEF (Cisco Express Forwarding) based hashing algorithms.

mls ip cef load-sharing

187
Q

What is the rule-of-thumb recommendation for data oversubscription for access ports on the access-to-distribution uplink?

A

20:1

188
Q

What is the rule-of-thumb recommendation for data oversubscription for access ports on the distribution-to-core links?

A

4:1

189
Q

What are 3 Fibre Channel topologies?

A
  1. Point to point
  2. Arbitrated Loop
  3. Switched
190
Q

What are some characteristics of Fibre Channel Communication?

A

Similar to TCP communication in the following ways:

  • Point to point oriented (similar to TCP session establishment.)
  • Supports a logical node connection point between node ports (N_Ports). (Similar to TCP and UDP Sockets).
  • Supports flow control on a hop-by-hop basis using a buffer-to-buffer credit (BB_Credit) method. (Similar to TCP flow control except the receiver calls the shots and there aren’t any drops)
  • Supports acknowledgements for certain classes of traffic. (Similar to TCP and UDP acknowledgement models).
  • Enables multiple sessions to be maintained per device. (Similar to TCP and UDP Sockets).
192
Q

What are the best practices for deploying VSS?

A
  • Always use star topologies that are based on MEC (MultiChassis EtherChannels) with the VSS.
  • Use unique VSS domain numbers for each VSS pair in your network, even if the pairs are not directly connected to each other.
  • As with any EtherChannel, always use a number of links that is a power of 2 (2, 4, 8) to optimize the load balancing of traffic across the VSLs.
  • Do not configure switch preemption.
  • Do not tune the Link Management Protocol (LMP), LACP, and PAgP timers in an aggressive manner or it may adversely affect the system performance.
  • Enable a dual-active detection mechanism to guard against VSL (Virtual Switch Link) failures.
193
Q

Where is the most common point to deploy VSS in the campus?

A

In the Distribution Layer

194
Q

What is VSS and what is the most important benefit of it?

A

Virtual Switched System (VSS)

  • VSS is a network virtualization technology that combines two Cisco Catalyst 6500 switches (and other models such as the 4500) into a single logical entity.
  • It enables loop-free logical star designs that retain full physical redundancy.
195
Q

What is the recommended practice for the Virtual Switch Link (VSL) Etherchannel between two switches using Virtual Switched System (VSS)?

A

The VSL EtherChannel should consist of at least two 10-Gbps links, which should be terminated on different line cards in the chassis for maximum availability.

196
Q

What are the 3 design models for the access-distribution block?

A
  1. Layer 2 loop-free (current best practice)
  2. Layer 2 looped
  3. Layer 3 routed
197
Q

What are the characteristics of the Layer 2 Loop-Free access-distribution design model?

A
  • Access switches use layer 2 switching.
  • Links between the access and distribution layers are configured as layer 2 trunks.
  • Links between distribution layer switches are configured as Layer 3 routed links and use Etherchannel.
  • All ports are in the Spanning-Tree Forwarding state
  • Spanning-tree is not involved with load balancing or network convergence.
  • Some flavor FHRP is used for load balancing traffic from the access to distribution layer.
  • Reconvergence time in case of failure is primarily driven by the FHRP in use.
  • VLANs should NOT be extended across multiple access switches.
198
Q

What are the characteristics of the Layer 2 Looped access-distribution design model?

A
  • Access switches use layer 2 switching.
  • Links between the access and distribution layers are configured as layer 2 trunks.
  • Links between distribution layer switches are configured as Layer 2 trunks routed links (and I believe use Etherchannel. The book didn’t say).
  • Not all ports are in the Spanning-Tree Forwarding state. Some are blocking to prevent the loop.
  • Spanning-tree is involved with network convergence along with the FHRP being used.
  • Load-balancing is limited using PVST root election tuning on a VLAN-by-VLAN basis. STP will still block one of the access switch uplinks within each VLAN.
  • Some flavor FHRP is used
  • VLANs can be extended across multiple access switches.
199
Q

What are the characteristics of the Layer 3 Routed access-distribution design model?

A
  • Access switches use layer 3 routing.
  • Links between all switches are configured as layer 3 routed links.
  • No Spanning-tree on inter-switch links and spanning-tree is not involved with load balancing or network convergence.
  • No FHRP is in use. Hosts use access switch as their default gateway. Some flavor FHRP is used for load balancing traffic from the access to distribution layer.
  • Reconvergence time in case of failure is dependent on the routing protocol being used.
  • VLANs can NOT be extended across multiple access switches.
200
Q

What is SLB?

A

A Server Load Balancer (SLB), also called a content load balancer, supports both scaling and high availability by distributing client requests for service across active servers.

The SLB provides a public IP address, also called a virtual IP (VIP) address, for each service.

201
Q

What are the three SLB Design Models?

A
  1. Router Mode - The SLB device routes between outside and inside subnets.
  2. Bridge mode (inline): The SLB device operates in Transparent Bridging mode.

3 One-armed or two-armed mode: The one-armed or two-armed mode can be implemented in several ways such that replies from servers pass back through the SLB on their way to the end user. The server default gateway can be set to the SLB device, policy-based routing (PBR) can be used, or client NAT can be used.

202
Q

What is the One-armed mode of the SLB Design Model?

A
  • Out-of-band approach
  • SLB connected to a switch with one or two connections.
  • Not directly inline with the traffic path.
  • SLB VIP and servers are in the same Vlan.