Chapter 4 Flashcards

1
Q

What two mechanisms can be used to monitor and manage the amount of traffic?

A

Shaping and policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two mechanisms assign packets to queues and determine how they are forwarded?

A

Classification and marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is tail drop?

A

A congestion avoidance mechanism that drops further incoming packets when the queue is full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Random Early Detection? (RED)

A

A congestion avoidance mechanism that drops packets before congestion occurs, the rate at which it drops packets depends on how much of the queue has filled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What congestion avoidance methods tacks packet priority into account when dropping packets?

A

Weighted Random Early Detection (WRED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What QoS level prioritizes voice traffic?

A

Platinum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does traffic shaping do?

A

Queues excess traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What modifies the QoS attributes of a packet?

A

Marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two configurations that are required to enable SSH?

A

hostname
ip domain-name
crypto key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What serves as a password to protect access to MIB objects?

A

Community strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What ports do syslog communicate on?

A

UDP 514, TCP 6514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is syslog severity level 7?

A

Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is syslog severity level 6?

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is syslog severity level 5?

A

Notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is syslog severity level 4?

A

Warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is syslog severity level 3?

A

Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is syslog severity level 2?

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is syslog severity level 1?

A

Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is syslog severity level 0?

A

Emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are incoming syslog server messages categorized?

A

Severity level, based on importance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the logging trap debug command do on a router?

A

Router will send all messages to the syslog server, you can specify a severity level and it will send that level and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What might have happened if a notice level message was sent to a syslog server?

A

An interface line has changed status, a routing instance has flapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How would you configure a syslog to receive error conditions?

A

logging trap 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a syslog facility?

A

A numeric value that represent the processes that can generate a log message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What port does FTP use?

A

TCP 20 & 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What port does TFTP use?

27
Q

What is the more secure protocol between FTP and TFTP and why?

A

FTP, because it has user authentication

28
Q

What is true about the connections in FTP?

A

It uses two separate connections for control and data traffic

29
Q

What is a use of TFTP?

A

To transfer configurations to and from network devices

30
Q

What is a use of FTP?

A

Mostly used by remote users to upload and download files

31
Q

What protocol uses block numbers to identify and mitigate data-transfer errors and offers anonymous user login ability?

32
Q

What port does DNS use?

A

TCP/UDP 53

33
Q

What port does DHCP use?

A

UDP 67 & 68

34
Q

What port does SNMP use?

35
Q

What global configuration do all dynamic NAT and PAT begin with?

A
  1. Access list
  2. # ip nat inside source list n
36
Q

What is the unique global command that configures NAT statically?

A

ip nat inside source static [private address] [public address]

37
Q

What is the unique global command that configures NAT dynamically?

A
  1. ip nat pool n [start-end ip] netmask [a.b.c.d]
  2. # ip nat…pool n
38
Q

What is the unique global command that configures PAT?

A

ip nat… interface [outside if] overload

39
Q

What is the command to verify NAT configuration?

A

show ip nat translation

40
Q

What must be configured on an NTP server?

A

Time zone
ntp server-pool
ntp master

41
Q

What must be configured on an NTP client?

A

Time zone
ntp server

42
Q

What protocol does NTP use?

43
Q

What is the configuration needed to enable SSH?

A

(config)#ip domain-name (name)
(config)#username (name) password (pw)
(config)#crypto key generate rsa

44
Q

What is the configuration needed to enable only SSH access to a device?

A

(config)#line vty 0 15
(config-line)#login local
(config-line)#transport input ssh

45
Q

How do you configure a DHCP client?

A

ip address dhcp

46
Q

What configuration is needed to configure a DHCP relay agent?

A

ip helper-address (dhcp server ip address)

47
Q

Why would a DHCP relay agent be configured?

A

When clients and a DHCP server are not on the same physical network, a DHCP relay agent is needed to forward DHCP requests and replices

48
Q

What router gets configured as a helper? (location)

A

The one closest to the client

49
Q

What command can be used to verify DHCP relay agent address configuration?

A

show ip interface

50
Q

Which command could be used on a DHCP server to look at addresses assigned?

A

show ip dhcp binding

51
Q

What does a DHCP server do when two hosts are using the same IP address?

A

The address is removed from the pool until until an administrator resolves the conflict

52
Q

What is the highest security network device monitoring protocol?

53
Q

In SNMP, what do community strings do?

A

They’re passwords to protect access to MIB objects

54
Q

What protocol allows you to back up multiple network configurations globally using the copy function?

55
Q

What does an SNMP agent do?

A

Responds to requests from the NMS and sends information about a device (MIB)

56
Q

In SNMP operations, what are MIBs?

A

A collection of variables that can be monitored

57
Q

What security was added in SNMPv3?

A

Authentication

58
Q

What is a GetBulkRequest in SNMPv2?

A

Allows a management station to retrieve a large amount of data in one request

59
Q

In SNMP, what is the difference between trap and inform?

A

Trap messages are not reliable, they’re sent and forgotten

60
Q

In SNMP, what is a similarity between trap and inform?

A

Both use UDP, and both notify the manager of events

61
Q

What commands are needed to configure a router to provide IP addresses to computers on the network?

A

ip dhcp pool [1]
network [address] [mask]

62
Q

What does policing do to excess packets?

A

Drops and remarks

63
Q

What is the purpose of traffic shaping?

A

Limit the bandwidth usage to prevent congestion