Day 1&2 Flashcards

1
Q

enterprise level networking

A

the communications backbone connecting devices across LAN’s and WAN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network management principles

A

the following principles help to ensure proper network management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

configuration management

A

documents and controls network changes for equipment, hardware, and software througout the network’s lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

accounting/administration management

A

accounting management gathers usage statistics for billing and accounting purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

fault management

A

detects, runs diagnostics tests, isolates, and corrects network faults to include error log maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

performance management

A

encompasses the evaluation and reporting of networked equipment functionality. performance management gathers and maintains historical logs of statistical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security management

A

protects a network from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Cisco model

A

uses a three layer model: Core layer, distribution layer, access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

core layer

A

core of the network focused on transporting data as fas as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

distribution layer

A

the communications point between the core and access layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

access layer

A

controls access to intra-network resources. LOCAL!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cisco device management

A

relies on two main files to run: cisco internetwork operating system (IOS) and configuration (startup-config)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco boot process

A
  1. power on self-test (POST)
  2. loads bootstrap from ROM
  3. load IOS from flash memory into RAM
  4. load configuration from NVRAM (startup-config) into RAM (running-config)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ROMMON

A

manually interrupting the boot process puts device into ROMMON.
allows you to reinstall IOS software or recover passwords.
only accessible through physical access to the console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cisco IOS naming conventions

A

a. b (c.d) e f
a: major version number
b: minor version number
c: maintenance release number
d: interim build number
e: release train identifier (no letter indicates mainline)
f: rebuild number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mainline train (M)

A

designed to be the most stable release Cisco can offer. never expands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Technology train (T)

A

these IOS versions get new features and bug fixes throughout their lifecycle, but are less stable than mainline trains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IOS 15

A

considered the M&T or M/T release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

show version command

A

lists hardware and software version information

p 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

show ip interface brief

A

shows the current status of all interfaces including any virtual interfaces
p 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

show interface

A

provides detailed information about the interfaces, including encapsulation, MAC address, bandwidth, duplex, IP address, and DCE/DTE setting
p16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

show arp

A

reveals all devices with which the router has communicated.

p17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IOS access and privileges

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

console port

physical connection

A

local, command-line access through a terminal emulation program.
(out-of-band management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

auxiliary port

physical connection

A

remote, command-line access through a modem. it can also be used as a console port.
(out of band management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VTY lines

A

remote, logical access using application layer protocols such as Telnet or SSH.
(In band management)

27
Q

user exec mode

>

A

basic monitoring commands

Router>

28
Q
Privileged Exec
#
A

access to all other router commands.

accessed with the ENABLE command

29
Q

show privilege

A

command used to verify access levels

30
Q
global configuration
(config)
A

changes affect the entire ssytem as a whole

Router(config)#

31
Q

Specific configuration

config-…

A

changes affect specific interfaces or processes.

Router(config-router)#

32
Q

setup

A

used when no startup-config exists in NVRAM, such as when a router/switch is turned on for the first time
p20

33
Q

cisco discovery protocol (CDP)

A

layer 2 Cisco protocol that gathers information about neighboring (attached) Cisco devices only.

34
Q

show cdp

A

displays information about CDP timer and hold time parameters

35
Q

show cdp neighbors

A

displays basic information about directly-connected cisco devices
p 23

36
Q

show cdp neighbors detail

A

adds in IP address and remote device IOS information

p24

37
Q

switches

A

layer 2 devices used to define collision domains

38
Q

three main functions of switches

A

are address learning, making/forwarding/filter decisions, and loop avoidance

39
Q

address learning

A

switches rely on their MAC address table (MAT) to make forwarding decisions

40
Q

forward/filter decisions

A

frame filtering

41
Q

loop avoidance

A

when multiple switches are connected, loops may occur. Spanning tree protocol eliminates redundant links and stops loops

42
Q

spanning tree protocol

A

monitors links between switches to prevent loops.

STP communicates using Bridge Protocol Data Units (BPDU’s)

43
Q

STP port states

A

Blocking: will not forward, accept network traffic, or learn any MAC addresses.
listening: sends and receives BPDU’s, but does not learn MAC addresses
Learning: Learns MAC addresses and populates the MAT to prevent flooding, but does not forward traffic
Forwarding: Processes and forwards traffic..normal operation
DIsabled: administratively shut down

44
Q

STP process

A
  1. root bridge is selected as reference point for all other devices.
  2. all other devices identify their root port (port with lowest cost to root bridge)
  3. all other switches find their designated port, which are advertised to other switches as having the lowest cost to root bridge
  4. designated ports are forwarding ports to connected network segments
  5. every port that is not a root or designated port is placed in a blocking state
45
Q

more on STP

A

it had a 30-50 second convergence time.. slow!!!

46
Q

Rapid Spanning Tree Protocol (RSTP)

A

converegence was much quicker….6 seconds!

47
Q

RSTP only has 3 port states

A

Discarding: no user data is sent over the port
Learning: Same as STP learning; MAT population
Forwarding: Same as STP forwarding; fully operational

48
Q

Portfast

A

forces switch ports to immediately enter the forwarding state, bypassing STP learning and listening states.
should only be used on ports with a single host, other wise bridge loops may occur.

49
Q

physical interfaces

A

Ethernet 1 non modular
Ethernet0/1 modular
GigabitEthernet0/1/1 modular

50
Q

virtual interfaces

A

sub-interface and tunnel

51
Q

sub-interface

A

a subinterface that uses a physical interface allowing for network expansion.
used in conjunction with VLAN’s

52
Q

note about subinterfaces and VLANS

A

VLANS are set up on switches, but are supported byh a router. switches interface with a router through a trunk. the trunk has subinterfaces that connect to each vlan

53
Q

tunnel

A

used to deliver one protocol across a network using a different protocol or to provide a secure delivery across a network

54
Q

loopback

A

the loopback interface is commonly configured to provide an IP address when utilizing an ipunnumbered schema or to establish the router id for OSPF and BGP.

55
Q

null

A

directing undesired network traffic to the null interface can avoid the overhead involved with using access lists

56
Q

protocols

A

routed protocols, routing protocols, static routing

57
Q

IP unnumbered

A

method by which an interface is configured without a dedicated IP address

58
Q

username passwords

A

enable password-shows password in plain text
enable secret-password is hashed using MD5

router(config)#username geemoney privilege 5 secret jcac

59
Q

line passwords

A

set a console user-mode password:
router(config)#line con 0
router(config-line)#password

set a telnet password to enable telnet
router(config)#line vty 0 15
router(config-line)#password

60
Q

service password encryption

A

applies type 7 encryption to the plain text passwords. Type 7 is a weak algorithm originally used to prevent simple password snooping.

61
Q

access ports

A

can only belong to and carry traffic for one VLAN

one of two types of VLAN ports

62
Q

trunk ports

A

between a switch and a router

the other type of VLAN port

64
Q

two trunking protocols

A

ISL: adds 30 bytes of overhead data to the frame

802.1q: adds only 4 bytes of overhead/data to the frame

64
Q

Per-VLAN Spanning Tree (PVST) and Per-VLAN Spanning Tree Plus (PVST+)

A

simply treat each vlan as a separate network.

PVST is used on ISL trunk links, while PVST+ is used to support 802.1Q trunks