CCNA Flashcards

1
Q

HTTP verb for “Create”

A

Post

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTTP verb for “Read”

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP verb for “Update”

A

Put/Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTP verb for “Delete”

A

Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Administrative Distance Greater Priority: Higher or Lower?

A

Lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HSRP Greater Priority: Higher or Lower?

A

Higher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routing Protocols Greater Priority: Higher or Lower?

A

Lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spanning Tree Greater Priority: Higher or Lower?

A

Lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSPF Router ID Hierarchy: Manual Configuration: 1st, 2nd, 3rd?

A

1st

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSPF Router ID Hierarchy: Highest IP on a loopback interface: 1st, 2nd, 3rd?

A

2nd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSPF Router ID Hierarchy: Highest IP on any other interface: 1st, 2nd, 3rd?

A

3rd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default MTU

A

1500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“Runt” size in bytes: anything under x

A

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

“Baby Giant” size in bytes: x - x ?

A

1518 - 1600

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

“Giant” size in bytes: anything over x

A

1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“Jumbo Frames” size in bytes: anything over x

A

9000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Standard Ethernet Frame size in bytes: x - x ?

A

64 - 1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WEP uses X encryption

A

RC4 encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WPA uses X encryption and X

A

RC4 encryption and TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WPA2 uses X encryption with X

A

AES encryption with CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

REST: Stateless/Stateful

A

Stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MIC

A

Message Integrity Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NETconf uses what file type(s)

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RESTconf uses what file type(s)

A

XML and JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

FE80::/10

A

Link Local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

FC00::/7

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

FF00::/8

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

FF02::1

A

All nodes on local network (essentially broadcast)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

FF02::2

A

All Router multicast group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

2.4, 2mb

A

802.11

31
Q

2.4, 11mb

A

802.11b

32
Q

5, 54mb

A

802.11a

33
Q

2.4, 54mb

A

802.11g

34
Q

2.4/5, 600mb

A

802.11n

35
Q

5, 6.93gb

A

802.11ac

36
Q

2.4/5, 27.72gb (4x prev.)

A

802.11ax

37
Q

“X” bandwidth/“X” bandwidth

A

reference bandwidth/interface bandwidth

38
Q

Spanning Tree Cost Factor?

A

Higher Bandwidth

39
Q

Spanning Tree Cost is equal. What wins now?

A

Lowest Bridge ID

40
Q

Spanning Tree Cost and bridge ID are equal. What wins now?

A

Lowest port #

41
Q

Functionality that is useful for small branches connected at the edge of a WAN that allows the APs to forward LOCAL traffic rather than having it flow alllll the way back to the remote WLC and back (reduces delay)

A

Flex Connect

42
Q

Which 802.11 standard provides “assisted” roaming in a wireless network

A

802.11k

43
Q

Site-to-site VPN IPSec encryption process: Step 1

A

Sender encrypts the original packet and session key

44
Q

Site-to-site VPN IPSec encryption process: Step 2

A

Sender encapsulates the encrypted data w/ new headers

45
Q

Site-to-site VPN IPSec encryption process: Step 3

A

Sender sends the packet

46
Q

Site-to-site VPN IPSec encryption process: Step 4

A

Destination device decrypts the data and session key

47
Q

What command would you use for an HTTPS connection to a WLC

A

config network secureweb enable

48
Q

what will happen if a PD attempts to draw more power than allocated when this command is entered: “power inline police action log”

A

the port will restart, and a log message will appear on the console

49
Q

Syslog: Emergencies # ?

A

0

50
Q

Basic NTP client config on switch:

A

1 Manually config system clock
2 ntp server xxx.xxx.xxx.xxx

51
Q

Which IPSec mode DOES encrypt the header

A

Transport mode

52
Q

Which IPSec mode DOES NOT encrypt the header

A

Tunnel mode

53
Q

globally turn lldp off command:

A

no lldp run

54
Q

default lldp advertisements time:

A

30 sec

55
Q

{},

A

object

56
Q

[],

A

array

57
Q

Command to trust incoming host-assigned priority values on a switch (overriding the default reassignment to 0)

A

switchport priority extend trust

58
Q

802.1x

A

“PNAC” Port-based Network Access Control

59
Q

EAP

A

Extensible Authentication Protocol

60
Q

CCKM

A

Cisco Centralized Key Management

61
Q

LAP mode that sends captured traffic to an analyzer

A

Sniffer mode

62
Q

OSPF Neighbor states in order 1-7

A

Down, Init, 2-way, Exstart, Exchange, Loading, Full

63
Q

Which, and How many octets make up the OUI-specific section of a MAC address?

A

1st 3

64
Q

Which, and How many octets make up the NIC-specific section of a MAC address?

A

Last 3

65
Q

Feasible Distance

A

a router’s specific metric value to the route’s destination

66
Q

Feasible Distance L or R?

A

Left

67
Q

aka “Advertised Distance” metric value to destination reported by a neighbor

A

Reported Distance

68
Q

Reported Distance L or R?

A

Right

69
Q

The Route with the lowest metric value (the best route)

A

Successor

70
Q

An alternate route (not the best) that meets the “feasibility condition”

A

Feasible Successor

71
Q

Feasibility Condition

A

In order to be considered a feasible successor, a route must have a reported distance that is lower than the successor route’s feasible distance

72
Q

EIGRP full formula

A

([K1 x bandwidth + (K2 x bandwidth) / (256 - load) + K3 x delay] [K5 / (reliability + K4)]) x 256

73
Q

EIGRP simplified formula

A

metric = bandwidth of the slowest link + the delay of all the other links

74
Q

EIGRP default “K” values (K1, K2, K3, K4 and K5)

A

K1=1, K2=0, K3=1, K4=0, K5=0