BN EXAM 1 CARDS Flashcards

1
Q

The Gold wireless QOS level prioritizes what kind of traffic?

A

Video Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Platnium wireless QOS level prioritizes what kind of traffic?

A

Voice VOIP. It is succeptible to network delay which can create jitter and affect the quality of the call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Silver wireless QOS level prioritizes what kind of traffic?

A

Most transactional traffic is delivered at this priority.

Default setting when you configure a WLAN on a Cisco WLC. Also known as best effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Bronze wireless QOS level prioritizes what kind of traffic?

A

Provides the lowest bandwidth and is typically used for guest services on a Cisco WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Overlay

A

Creates VXLAN tunnels between SDA switches. These tunnels send and receive traffic between fabric endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Underlay

A

A collection of devices that comprise the IP network that connects to each fabric node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fabric

A

Is the entirety of the overlay network and the underlay network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Southbound API

A

Enables an SDN controller to communicate with devices in the data plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Northbound API

A

Enables an SDN controller to communicate with applications in the application plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When will a router use AD values to determine route selection?

A

When multiple routes to the same destination network are received, and each of these routes is received from a different routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AD for directly connected route.

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Static route AD

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EIGRP summary route AD

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

eBGP AD

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internal EIGRP AD

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IGRP AD

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IGRP AD

A

115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSPF AD

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ISIS AD

A

115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RIP AD

A

120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

External EIGRP

A

170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

iBGP AD

A

200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Unknown AD

A

225

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What cost metric does EIGRP use.

A

Bandwidth and delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

OSPF broadcast network type is enabled by default on what interfaces?

A

FDDI and Ethernet.
Fiber Distributed Data Interface.
If the ip ospf network command has not been issued for an OSPF interface, the default network type is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

OSPF non-broadcast type is enabled by default on what interfaces?

A

X.25 and Frame Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OSPF point to point network type is enabled by default on what interfaces?

A

P2P is enabled by default on High-Level Data Link Control (HDLC) and point to point (PPP) serial interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What command do you use to configure OSPF point to point network?

A

ip ospf network point-to-point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

If you configure etherchannel on two switches with one having lacp and the other having pagp, what will happen?

A

No link will be formed.
The EtherChannel aggregation protocol must match on each switch, or they will be unable to dynamically establish an EC link between them.

LACP link aggregation control protocol. 802.3ad is open standard. Cisco-proprietary Port Aggregation Protocol PAgP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An EtherChannel can have up to how many active switch ports in the bundle that forms the logical link between switches.

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the command used to configure a switch port to use an aggregation protocol.

A

channel-protocol {lacp | pagp}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

PAgP modes

A

active - passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

LACP modes

A

desirable - passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What 2 things are used by WPA2 to provide MIC and encryption?

A

AES - Advanced Encryption Standard -
128 bit block cipher is used to encrypt data. Security key of 128,192, or 256 can be used.
and
CCMP - Counter mode with Cipher Block Chaining Message Authentication Code Protocol. Which provides encryption.
WPA2 = 802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

802.11 2-byte Frame Control (FC) Field of the frame header is used to do what?

A

The 2-byte Frame Control (FC) Field of the frame header is used to identify the type of subtype of each frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

802.11 Management frames are used to do what?

A

802.11 management frames are used to manage the connection between an access point and a wireless client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

List 4 802.11 control frames.

A

RTS - Ready to Send
CTS - Clear to send
ACK - Acknowledgment
PS - Power Save

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Square brackets indicate what? [ ]

A

The beginning or end of an array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

T/F WLC dynamic interfaces are defined by the manufacturer.

A

False.

Dynamic interfaces are user-defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

T/F - Dynamic interfaces are used for management information.

A

False.
Dynamic interfaces are typically used for client data.

WLC can contain up to 512 dynamic interfaces. They function similar to VLAN’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This WLC interface is used for all layer 2 lightweight access points (LWAPP) communications between the controller and the Lightweight access points (AP’s)

A

Management Interface.

It is also used to communicate with other WLC’s.

42
Q

IPv6 link local addys are used for what?

A

IPv6 link local addys are used for communication over a single link.
It is automatically configured after you issue the ipv6 enable command.

The traffic stays on the local link. Often used for neighbor discovery.

Usually begins with FE8

43
Q

What command enables (SLAAC) on an interface.

A

ipv6 address autoconfig
command configures an interface to automatically assign itself a global unicast IPv6 address by using SLAAC - Stateless Address Automatic Configuration.

44
Q

Which of the following VLAN’s is used by DTP to negotiate a trunk link when 802.1q encapsulation is configured on the interface. Select the best answer.

a. 4094
b. 0
c. the native Vlan
d. 1

A

C.
Dynamic Trunking Protocol uses the native virtual local area network (VLAN) to negotiate a trunk link when 802.1q encapsulation is configured on the interface.

DTP frames are always transmitted on the native VLAN.

45
Q

What command allows you to change the native vlan?

A

switchport trunk native vlan {vlan id}

46
Q

T/F.

DTP set to automatically negotiate on a cisco switch by default.

A

True

47
Q

What does moving an unused port to an unused vlan accomplish?

A

Moving an unused port to an unused Vlan creates a logical barrier that prevents rouge devices from communicating on the network should such a device connect to the port.

48
Q

What command will allow you to move an unused port to an unused vlan?

A

switchport access vlan {unused vlan number}
then.
shutdown command

49
Q

What IEEE standard natively includes PortFast, UplinkFast and BackboneFast?

A

802.1w

Rapid Spanning Tree Protocol (RSTP) standard natively includes PortFast, UplinkFast and BackboneFast.

50
Q

What does Portfast do?

A

Portfast enables a port to immediately access the network by transitioning the port into the STP forwarding state without passing through the listening and learning states.

51
Q

What does UplinkFast do?

A

UplinkFast increases the convergence speed for an access layer switch that detects a failure on the root port with backup root port selection by immediately replacing the root port with an alternative root port.

52
Q

What does BackboneFast do?

A

BackboneFast increases convergence speed for switches that detect a failure on links that are not directly connected to the switch.

53
Q

EIII standard for traditional STP?

A

802.1D

54
Q

802.1s is the EIII standard for what protocol?

A

802.1s represents Multiple Spanning Tree (MST).
MST standard is used to create multiple spanning tree instances on a network.
Implementing MST on a switch also implements RSTP.

It doesn’t include PortFast, UplinkFast and BackboneFast.

55
Q

What command would you use to configure DAI - Dynamic ARP Inspection on vlans 11, 12 and 14?

A

S1 (config)# ip arp inspection valn 11-12, 14

56
Q

T/F - DAI can only be configured on a single VLAN.

A

False.

Dynamic ARP Inspection can be enabled on a single or multiple VLANs

57
Q

What does configuring DAI on each VLAN ensure?

A

Configuring DAI on each VLAN ensures that traffic sent from each host is inspected. Each port is by default an untrusted port.

58
Q

When DAI is configured for an entire VLAN, what command would you use to override the default config for a given port?

A

ip arp inspection trust

59
Q

Which of the following best describes what occurs when a packet must be re-sent because of an interruption that occurs before the 64th byte has been transmitted?

a. A runt frame is transmitted
b. a collision occurs
c. A baby giant frame is transmitted.
d. A jumbo frame is transmitted.
e. A late collision occurs.

A

b. A collision occurs.

60
Q

When does a late collision occur?

A

A late collision occurs when a packet must be re-sent because of an interruption that occurs after the 64th byte or the 512th bit

61
Q

What is a runt frame?

A

A runt frame is one that is fewer than 64 bytes and has a bad FCS. Frames under 64 bytes are discarded.

Runts can sometimes be caused by excessive collisions and/or malfunctioning hardware.

62
Q

How many bytes is a baby jumbo frame?

A

A baby jumbo frame is 1600 bytes in length.

63
Q

How many bytes is a jumbo frame?

A

A jumbo frame is a frame that is up to 9,216 bytes in length.

64
Q

What kind of hash does enable secret use?

A

Secure Hash Algorithm (SHA) 256-bit hash.

65
Q

What is MAC spoofing?

A

MAC spoofing is a layer 2 attack that uses the MAC address of another known host on the network in order to bypass port security measures.

66
Q

What is ARP poisoning?

A

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the hacker’s known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker’s computer first instead of sending it to the original destination. As a result, both the user’s data and privacy are compromised. An effective ARP poisoning attempt is undetectable to the user.

67
Q

How can you prevent a VLAN hopping attack from taking place?

A

You can prevent a VLAN hopping attack by disabling Dynamic Trunking protocol on trunk ports, by changing the native VLAN, and by configuring user-facing ports as access ports.

68
Q

What does the spanning-tree-guard root command do?

A

the spanning -tree guard root command is used to prevent newly introduced switches from being elected as a new root switch. Allows admin to control which switch is the root.

69
Q

What is PortFast used for?

A

PortFast is a feature that provides immediate accessibility to the network for edge ports, such as access ports that are connected to end-user workstations.

70
Q

What are the 9 fields fo the 802.11 MAC - Media Access Control frame?

A
FC 2 bytes - frame control
DUR 2 bytes - Duration
Address 1,2,3 - 6 bytes each
SEQ 2 bytes - Sequence
Address 4 - 6 bytes
DATA - varies in size
FCS - 4 bytes - Frame Check Sequence
71
Q

How would you configure a normal WLAN via WLC GUI with the SSID of MyCompanyLAN?

A
  1. click create new on WLANs page.
  2. select the type of WLAN you are creating from the type drop-down list box. (by default it is config. to WLAN)
  3. enter a 32 char. or less profile name in the profile name field.
  4. enter 32 char. or less SSID-service set identifier in the SSID field.
  5. choose a WLAN ID from the ID drop-down list box.
72
Q

What does the ntp broadcast client command do?

A

The ntp broadcast client command from int config mode tells the client to listen on the configured interface for NTP broadcasts from an NTP server. The NTP client uses this to adjust it’s time.

Broadcast client can receive its time from any NTP server where a static client receives it’s time from the NTP server specified in the ntp server command.

73
Q

What command would you use to cause the switch to instruct the IP phone to trust the class of service (CoS) priority of incoming data packets.

A

switchport priority extend trust.

QoS - 802.1p

74
Q

What does WRED stand for

A

Weighted random early detection.

75
Q

When is the use of WRED beneficial.

A

WRED is useful for networks where the majority of traffic uses Transmission Control Protocol (TCP) packets that are dropped must be retransmitted.

TCP sources reduce traffic flow when congestion occurs, thereby slowing down the network.

76
Q

Which REST API encoding format uses HTML-like tags to define blocks of data?

A

XML

77
Q

How would you configure DAI - Dynamic ARP Inspection on a switch to inspect traffic from hosts on VLAN 1, 3 and 4.

A

SwitchA# configure terminal
SwitchA(config)# ip apr inspection vlan 2-4
SwitchA(config)# exit

78
Q

Describe ARP poisoning attacks.

A

ARP poisoning attacks are also know as ARP spoofing attacks. an attacker intercepts an ARP request packet and replies with the attacker’s own MAC - Media Access Control addy rather than the addy of the intended recipient.

Subsequently the attacker is able to intercept any traffic intended for the original recipient.

79
Q

How does DAI work?

A

DAI - Dynamic ARP Inspection functions by inspecting traffic on ingress ports from host computers.

80
Q

What does VTP stand for?

A

Virtual Trunking Protocol.

81
Q

T/F - By default Cisco switches are configured for VTP server mode.

A

True

82
Q

What are the the three states of VTP that a switch can be set to?

A

Server, Client and Transparent

83
Q

What are three processes of the VTP transparent mode?

A
  1. creates/modifies/deletes VLANs.
  2. forward VTP advertisements.
  3. stores VLAN information in NVRAM.
84
Q

What are three processes of the VTP client mode?

A
  1. synchronizes VTP information.
  2. originates VTP advertisements.
  3. forwards VTP advertisements.
85
Q

What are three processes of the VTP server mode?

A
  1. creates/modifies/deletes VLANs
  2. synchronizes VTP information.
  3. originates VTP advertisements.
  4. forwards VTP advertisements.
  5. stores VLAN information in NVRAM
86
Q

What are some functions of an AP in a split-MAC deployment?

A
  • Prioritizing packets
  • Responding to beacon and probe requests.
  • Handling the real time processing of data..
  • Encryption
87
Q

How would you configure your Cisco router to provide IP address to the computers on your network? IP addys should be assigned from the 192.168.1.0/26 address range

A

R1(config)#ip dhcp pool 1

R1(config)#network 192.168.1.0 255.255.255.192

88
Q

What percentage of wireless coverage overlap is considered appropriate to ensure that wireless clients do not lose connectivity when roaming from one AP to another?

A

10 to 15 percent of overlapping coverage is considered appropriate to ensure that wireless clients do not lose connectivity when roaming from one access point to another.

89
Q

T/F. The transport input ssh command will automatically enable SSH - Secure Shell on a router?

A

False.

90
Q

What command will automatically enable SSH on a router

A

crypto key generate rsa

91
Q

enable secret command is used to help prevent unauthorized access to what mode?

A

The enable secret command helps to prevent unauthorized access to the privileged EXEC mode.

92
Q

What ports will use port fast when it is enabled?

A

Access ports because hosts will connect to an access-layer switch port. With portfast is enabled the switch port will not transition throught the STP listening and learning states before it enters the forwarding state.

93
Q

What is another name for hypervisor?

A

VMM - Virtual Machine Monitor.

94
Q

What does hypervisor software do?

A

Hypervisor software is capable of virtualizing the physical components of computer hardware.

95
Q

Which Cisco lightweight AP mode provides BSSs?

A

Local mode provides Basic Service Sets (BSSs). Local mode is the default mode.

96
Q

What is a BSS?

A

A BSS is a closed group of wireless devices that are dependent on a fixed device. Before a wireless device can join the group, it must advertise its capabilities and obtain permission from the fixed device.

97
Q

Finish this, Bridge mode enables….?

A

Bridge mode enables a lightweight AP to act as a dedicated connection between two networks. Lightweight APs operating in bridge mode can connect to other networks in either a ptp or a point to multipoint fashion.

98
Q

What does this command display?

show ap config global

A

Displays Syslog server settings for every AP joined to the WLC

99
Q

What does this command display?

show ap config core-dump MyLAP

A

displays the memory dump for a specific lightweight AP

100
Q

What does this command display?

show ap crash-file

A

displays a list of dump files generated by lightweight APs

101
Q

What does this command display?

sh ap config general MyLAP

A

displays IP addressing and other information about the specified AP.

102
Q

What is the MAC - Media Access Control Ethernet multicast range that has been allocated for IP multicast use

A

01-00-5E-00-00-00 through 01-00-5E-7F-FF-FF