CCNA Flashcards
HTTP verb for “Create”
Post
HTTP verb for “Read”
Get
HTTP verb for “Update”
Put/Patch
HTTP verb for “Delete”
Delete
Administrative Distance Greater Priority: Higher or Lower?
Lower
HSRP Greater Priority: Higher or Lower?
Higher
Routing Protocols Greater Priority: Higher or Lower?
Lower
Spanning Tree Greater Priority: Higher or Lower?
Lower
OSPF Router ID Hierarchy: Manual Configuration: 1st, 2nd, 3rd?
1st
OSPF Router ID Hierarchy: Highest IP on a loopback interface: 1st, 2nd, 3rd?
2nd
OSPF Router ID Hierarchy: Highest IP on any other interface: 1st, 2nd, 3rd?
3rd
Default MTU
1500
“Runt” size in bytes: anything under x
64
“Baby Giant” size in bytes: x - x ?
1518 - 1600
“Giant” size in bytes: anything over x
1518
“Jumbo Frames” size in bytes: anything over x
9000
Standard Ethernet Frame size in bytes: x - x ?
64 - 1518
WEP uses X encryption
RC4 encryption
WPA uses X encryption and X
RC4 encryption and TKIP
WPA2 uses X encryption with X
AES encryption with CCMP
REST: Stateless/Stateful
Stateless
MIC
Message Integrity Check
NETconf uses what file type(s)
XML
RESTconf uses what file type(s)
XML and JSON
FE80::/10
Link Local
FC00::/7
Private
FF00::/8
Multicast
FF02::1
All nodes on local network (essentially broadcast)
FF02::2
All Router multicast group
2.4, 2mb
802.11
2.4, 11mb
802.11b
5, 54mb
802.11a
2.4, 54mb
802.11g
2.4/5, 600mb
802.11n
5, 6.93gb
802.11ac
2.4/5, 27.72gb (4x prev.)
802.11ax
“X” bandwidth/“X” bandwidth
reference bandwidth/interface bandwidth
Spanning Tree Cost Factor?
Higher Bandwidth
Spanning Tree Cost is equal. What wins now?
Lowest Bridge ID
Spanning Tree Cost and bridge ID are equal. What wins now?
Lowest port #
Functionality that is useful for small branches connected at the edge of a WAN that allows the APs to forward LOCAL traffic rather than having it flow alllll the way back to the remote WLC and back (reduces delay)
Flex Connect
Which 802.11 standard provides “assisted” roaming in a wireless network
802.11k
Site-to-site VPN IPSec encryption process: Step 1
Sender encrypts the original packet and session key
Site-to-site VPN IPSec encryption process: Step 2
Sender encapsulates the encrypted data w/ new headers
Site-to-site VPN IPSec encryption process: Step 3
Sender sends the packet
Site-to-site VPN IPSec encryption process: Step 4
Destination device decrypts the data and session key
What command would you use for an HTTPS connection to a WLC
config network secureweb enable
what will happen if a PD attempts to draw more power than allocated when this command is entered: “power inline police action log”
the port will restart, and a log message will appear on the console
Syslog: Emergencies # ?
0
Basic NTP client config on switch:
1 Manually config system clock
2 ntp server xxx.xxx.xxx.xxx
Which IPSec mode DOES encrypt the header
Transport mode
Which IPSec mode DOES NOT encrypt the header
Tunnel mode
globally turn lldp off command:
no lldp run
default lldp advertisements time:
30 sec
{},
object
[],
array
Command to trust incoming host-assigned priority values on a switch (overriding the default reassignment to 0)
switchport priority extend trust
802.1x
“PNAC” Port-based Network Access Control
EAP
Extensible Authentication Protocol
CCKM
Cisco Centralized Key Management
LAP mode that sends captured traffic to an analyzer
Sniffer mode
OSPF Neighbor states in order 1-7
Down, Init, 2-way, Exstart, Exchange, Loading, Full
Which, and How many octets make up the OUI-specific section of a MAC address?
1st 3
Which, and How many octets make up the NIC-specific section of a MAC address?
Last 3
Feasible Distance
a router’s specific metric value to the route’s destination
Feasible Distance L or R?
Left
aka “Advertised Distance” metric value to destination reported by a neighbor
Reported Distance
Reported Distance L or R?
Right
The Route with the lowest metric value (the best route)
Successor
An alternate route (not the best) that meets the “feasibility condition”
Feasible Successor
Feasibility Condition
In order to be considered a feasible successor, a route must have a reported distance that is lower than the successor route’s feasible distance
EIGRP full formula
([K1 x bandwidth + (K2 x bandwidth) / (256 - load) + K3 x delay] [K5 / (reliability + K4)]) x 256
EIGRP simplified formula
metric = bandwidth of the slowest link + the delay of all the other links
EIGRP default “K” values (K1, K2, K3, K4 and K5)
K1=1, K2=0, K3=1, K4=0, K5=0