dragndrop Flashcards
Place the Ethernet frame fields into the correct order.
FCS type preamble destination address source adress data and pad
1 preamble 2 destination address 3 source address 4 type 5 data and pad 6 FCS
Drag and drop the steps in the process of upgrading the IOS on a Cisco router.
Update the boot statement Step
Reboot and verify the IOS running version
Verify the available flash memory on the device
Verify the checksum of the new IOS version Step
Use FTP or TFTP to copy the new IOS to the device Step
Step 1: Verify the available flash memory on the device
Step 2: Use FTP or TFTP to copy the new IOS to the device Step
3: Verify the checksum of the new IOS version Step
4: Update the boot statement Step
5: Reboot and verify the IOS running version
Drag and drop the steps to configure EIGRP IPv6 into the appropriate order.
ipv6 eigrp as-number (under interface mode) router id configure terminal enable ipv6 router eigrp as-number
Step 1: enable Step 2: configure terminal Step 3: ipv6 router eigrp as-number Step 4: router id Step 5: ipv6 eigrp as-number (under interface mode)
Drag the “show” commands on the left to their proper locations on the right
\+ show ip route eigrp: \+ show ip eigrp interface: \+ show ip eigrp traffic: \+ show ip eigrp neighbors: \+ show ip eigrp topology:
shows the routes known to a router‟s EIGRP routing process. Confirm what EIGRP learning. Show what does it learned
show EIGRP routing tables in routing table / confirm what is actually being used / does routing
Displays the neighbor discovered by EIGRP. Show what is learned
show the number of EIGRP packets sent and received
show information about interface configured for EIGRP / Verify the routing of specific interface / show what being used
+ show ip route eigrp: show EIGRP routing tables in routing table / confirm what is actually being used / does routing
+ show ip eigrp interface: show information about interface configured for EIGRP / Verify the routing of specific interface / show what being used
+ show ip eigrp traffic: show the number of EIGRP packets sent and received
+ show ip eigrp neighbors: Displays the neighbor discovered by EIGRP. Show what is learned
+ show ip eigrp topology: shows the routes known to a router‟s EIGRP routing process. Confirm what EIGRP learning. Show what does it learned
Drag drop about characteristics of a cloud environment.
+ Multitenancy:
+ Scalability:
+ Workload movement:
+ On-demand:
+ Resiliency:
Resources can be added and removed as needed to support current workload and tasks
Tasks and data residing on a failed server can be seamlessly migrated to other physical resources
One or more clients can be hosted with the same physical or virtual infrastructure
Tasks can be migrated to different physical locations to increase efficiency or reduce cost
Resources are dedicated only when necessary instead of on a permanent basis
+ Multitenancy: One or more clients can be hosted with the same physical or virtual infrastructure
+ Scalability: Resources can be added and removed as needed to support current workload and tasks
+ Workload movement: Tasks can be migrated to different physical locations to increase efficiency or reduce cost
+ On-demand: Resources are dedicated only when necessary instead of on a permanent basis
+ Resiliency: Tasks and data residing on a failed server can be seamlessly migrated to other physical resources
Drag and drop the items on the right to the correspondent definitions on the left.
BPDU Filter: BPDU guard: PortFast: Root guard: UplinkFast:
prevents the port from becoming a locked port
enables quick convergence when a direct link to a non-end device fails
drops all BPDU received on the switch port
forces the switch to transition directly from the blocking state to the forwarding state
disables the switch port when it receives a BPDU
+ BPDU Filter: drops all BPDU received on the switch port
+ BPDU guard: disables the switch port when it receives a BPDU
+ PortFast: forces the switch to transition directly from the blocking state to the forwarding state
+ Root guard: prevents the port from becoming a locked port
+ UplinkFast: enables quick convergence when a direct link to a non-end device fails
Drag and drop the extended traceroute options from the left onto the correct description on the right.
\+ Maximum time to live: \+ Minimum time to live: \+ Numeric display: \+ Source address: \+ Timeout: \+ Timestamp, verbose:
suppresses the display of known hops
IP header options
value that, when reached, terminates the traceroute command
sets the interval for which the probe waits for a response
suppresses the display of hostnames
overrides the router selection of an outbound interface
+ Maximum time to live: value that, when reached, terminates the traceroute command
+ Minimum time to live: suppresses the display of known hops
+ Numeric display: suppresses the display of hostnames
+ Source address: overrides the router selection of an outbound interface
+ Timeout: sets the interval for which the probe waits for a response
+ Timestamp, verbose: IP header options
Drag the term on the left to its definition on the right (not all options are used)
+ poison reverse:
+ LSA:
+ split horizon:
+ holddown timer:
For a given period, this causes the router to ignore any updates with poorer metrics to a lost network
A router learns from its neighbor that a route is down and the router sends an update back to the neighbor with an infinite metric to that route
The packets flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes
This prevents sending information about a route back out the same interface that originally learned about the route
+ poison reverse: A router learns from its neighbor that a route is down and the router sends an update back to the neighbor with an infinite metric to that route
+ LSA: The packets flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes
+ split horizon: This prevents sending information about a route back out the same interface that originally learned about the route
+ holddown timer: For a given period, this causes the router to ignore any updates with poorer metrics to a lost network
Drag and drop the DHCP client states from the left into the standard order in which the client passes through them on the right.
rebinding binding initializing renewing selecting requesting
initializing – first selecting – second requesting – third binding – fourth renewing – fifth rebinding – sixth
Drag drop about QoS.
\+ Committed Access Rate (CAR): \+ Best effort: \+ Soft QoS: \+ Hard QoS: \+ PBR: \+ NBAR:
service level that provides preferred handling
policies traffic based on its bandwidth allocation
service level that provides reserved network resources
service level that provides basic connectivity without differentiation
identification tool ideal for handling web applications
uses route maps to match traffic criteria
Answer:
+ CAR: policies traffic based on its bandwidth allocation
+ Best effort: service level that provides basic connectivity without differentiation
+ Soft QoS: service level that provides preferred handling
+ Hard QoS: service level that provides reserved network resources
+ PBR: uses route maps to match traffic criteria
+ NBAR: identification tool ideal for handling web applications
Note:
+ Committed Access Rate (CAR)
+ Network-based application recognition (NBAR)
+ Policy-based routing (PBR)
+ Soft QoS: also known as Differentiated Services (Diffserv), which ensures resources for applications based on available bandwidth
+ Hard QoS: Differentiated Service (DiffServ) is an appropriate example for this type of QoS service
Drag the options below unto the planes they operate
Control Plane and Data Plane
- QoS
- Filtering
- Routing state exchange
- Establishes telnet session
- Device access
- Data Encapsulation
Control Plane:
- Routing state exchange
- Establishes telnet session
- Device access
Data Plane:
- QoS
- Filtering
- Data Encapsulation
Drag drop about BGP
iBGP eBGP Prefix Private AS range Public AS range Autonomous System
separate network operating within one administrative domain
relationship between peers in same autonomous system
block of IP addresses
relationship between peers in different autonomous system
Value between 1 and 64,511
Value between 64,512 and 65,535
iBGP relationship between peers in same autonomous system
eBGP relationship between peers in different autonomous system
Prefix block of IP addresses
Private AS range Value between 64,512 and 65,535
Public AS range Value between 1 and 64,511
Autonomous System separate network operating within one administrative domain
Drag and Drop on Wireless LAN Controller
+ Dynamic RF Feature:
+ Easy Deployment Process:
+ Optimized user performance:
+ Easy upgrade process:
Controller provides centralized management of users and VLANs
Access points auto adjust signal strength
Controller uses loadbalancing to maximize throughput
Controller image auto deployed to access Points
+ Dynamic RF Feature: Access points auto adjust signal strength
+ Easy Deployment Process: Controller provides centralized management of users and VLANs
+ Optimized user performance: Controller uses loadbalancing to maximize throughput
+ Easy upgrade process: Controller image auto deployed to access Points
Drag and drop the PPPoE message types from the left into the sequence in which PPPoE messages are sent on the right.
PADO
PADR
PADI
PADS
- PADI 2. PADO 3. PADR 4. PADS
Drag and drop the PPPoE packet type on the left to the corresponding description on the right.
+ PADI (PPPoE Active Discovery Initiation)
+ PADO (PPPoE Active Discovery Offer)
+ PADR (PPPoE Active Discovery Request)
+ PADS (PPPoE Active Discovery Session Confirmation)
+ PADT (PPPoE Active Discovery Termination)
– A packet that is sent to terminate the PPPoE session
– A packet that is sent with the destination_addr set to the broadcast address. The packet indicates the type of service requested.
– A packet that is sent from the PPPoE client with the destination_addr set to the chosen access concentrator. The packet contains a session request from the client
– A packet that is sent as confirmation to the client. The packet contains the unique PPPoE session ID
– A packet that is sent with the destination_addr set to the unicast address of the PPPoE client. The packet contains an offer for the client
+ PADI – A packet that is sent with the destination_addr set to the broadcast address. The packet indicates the type of service requested.
+ PADO – A packet that is sent with the destination_addr set to the unicast address of the PPPoE client. The packet contains an offer for the client
+ PADR – A packet that is sent from the PPPoE client with the destination_addr set to the chosen access concentrator. The packet contains a session request from the client
+ PADS – A packet that is sent as confirmation to the client. The packet contains the unique PPPoE session ID
+ PADT – A packet that is sent to terminate the PPPoE session.
Drag and Drop on MAC addresses.
\+ Dynamic MAC address: \+ MAC ACL: + MAC address table: \+ MAC learning: \+ MAC aging: \+ Static MAC:
adding a previously unknown MAC into the address table
associates a learned MAC address with its connected interface
removing an inactive MAC after a specified time
MAC that is learned by the switch through normal traffic
feature that determines whether incoming traffic will be allowed
MAC address that remains in the MAC address table after reboot
+ Dynamic MAC address: MAC that is learned by the switch through normal traffic
+ MAC ACL: feature that determines whether incoming traffic will be allowed
+ MAC address table: associates a learned MAC address with its connected interface
+ MAC learning: adding a previously unknown MAC into the address table
+ MAC aging: removing an inactive MAC after a specified time
+ Static MAC: MAC address that remains in the MAC address table after reboot
Drag and drop the IPv6 addresses from the left onto the correct types on the right
+ Modified EUI-64:
+ multicast:
+ unicast:
+ unspecified:
- 2020:10D8:0:0:85:800:52:7348
- FF01::1
- DB:FC:93:FF:FE:D8:05:0A
- ::
+ Modified EUI-64: DB:FC:93:FF:FE:D8:05:0A
+ multicast: FF01::1
+ unicast: 2020:10D8:0:0:85:800:52:7348
+ unspecified: ::
Below lists some reserved and well-known IPv6 multicast address in the reserved multicast address range: match
FF01::1 FF01::2 FF02::1 FF02::2 FF02::5 FF02::6 FF02::9 FF02::A FF02::D FF02::1:2 FF05::2 FF02::1:FF00:0/104
All DHCPv6 agents (servers and relays) within the link-local scope
All EIGRP routers within the link-local scope
IPv6 solicited-node multicast address within the link-local scope
All OSPFv3 routers within the link-local scope
All IPv6 nodes within the node-local scope
All EIGRP routers within the link-local scope
All RIPng routers within the link-local scope
All IPv6 nodes within the link-local scope
All IPv6 routers within the node-local scope
All IPv6 routers within the link-local scope
All IPv6 routers within the site-local scope
All PIM routers within the link-local scope
All OSPFv3 designated routers within the link-local scope
FF01::1 All IPv6 nodes within the node-local scope
FF01::2 All IPv6 routers within the node-local scope
FF02::1 All IPv6 nodes within the link-local scope
FF02::2 All IPv6 routers within the link-local scope
FF02::5 All OSPFv3 routers within the link-local scope
FF02::6 All OSPFv3 designated routers within the link-local scope
FF02::9 All RIPng routers within the link-local scope
FF02::A All EIGRP routers within the link-local scope
FF02::D All PIM routers within the link-local scope
FF02::1:2 All DHCPv6 agents (servers and relays) within the link-local scope
FF05::2 All IPv6 routers within the site-local scope
FF02::1:FF00:0/104 IPv6 solicited-node multicast address within the link-local scope
Arrange in the order of creation of GRE tunnel
Step 1:
Step 2:
Step 3:
Step 4:
Specify passenger protocol (IPv4 or IPv6)
Specify carrier protocol (like tunnel GRE)
Add source and destination on tunnel interface
Create tunnel interface
Answer:
Step 1: Create tunnel interface
Step 2: Specify carrier protocol (like tunnel GRE)
Step 3: Specify passenger protocol (IPv4 or IPv6)
Step 4: Add source and destination on tunnel interface
Drag drop about DNS related commands.
\+ ip dns-server: \+ ip domain list: \+ ip domain lookup: \+ ip domain name: \+ ip host: \+ ip name-server:
specifies the default domain to append to unqualified host name.
identified a DNS server to provide lookup service
enable dns lookup
enable the DNS server on the device
statically map on ip address to host name
specifies a sequence of domain names.
+ ip dns-server: enable the DNS server on the device
+ ip domain list: specifies a sequence of domain names.
+ ip domain lookup: enable dns lookup
+ ip domain name: specifies the default domain to append to unqualified host name.
+ ip host: statically map on ip address to host name
+ ip name-server: identified a DNS server to provide lookup service
Drag drop about STP port roles.
+ alternate:
+ designated:
+ disable:
+ root:
port that is excluded from the spanning-tree process
path to the root bridge that excludes the root port
elect port for an individual LAN segment
elected port for the spanning tree topology as a whole
+ alternate: path to the root bridge that excludes the root port
+ designated: elect port for an individual LAN segment
+ disable: port that is excluded from the spanning-tree process
+ root: elected port for the spanning tree topology as a whole
Drag drop about DNS services
\+ cache: \+ DNS: \+ no ip domain-lookup: \+ name resolver: \+ domain:
in response to client requests, queries a name server for IP address information
component of a URL that indicates the location or organization type, such as .com or .edu
service that maps hostnames to IP addresses
local database of address mappings that improves name-resolution performance
disables DNS services on a Cisco device
+ cache: local database of address mappings that improves name-resolution performance
+ DNS: service that maps hostnames to IP addresses
+ no ip domain-lookup: disables DNS services on a Cisco device
+ name resolver: in response to client requests, queries a name server for IP address information
+ domain: component of a URL that indicates the location or organization type, such as .com or .edu
Drag drop about SDN
\+ HTTPS: \+ JSON: \+ OpenFlow: \+ RBAC: \+ REST:
token-based security mechanism
data-structure format that passes parameters for API calls
call to the APIC-EM API from a library
southbound API
northbound API
+ HTTPS: call to the APIC-EM API from a library
+ JSON: data-structure format that passes parameters for API calls
+ OpenFlow: southbound API
+ RBAC: token-based security mechanism
+ REST: northbound API
Drag drop about RADIUS & TACACS+
RADIUS:
TACACS:
\+ Multi-vendors \+ Proprietary \+ Encrypts the entire body \+ Combines authentication and authorization \+ Encrypts only the password \+ UDP \+ Separate AAA \+ TCP
RADIUS: \+ Multi-vendors \+ UDP \+ Combines authentication and authorization \+ Encrypts only the password
TACACS+: \+ Proprietary \+ Separate AAA \+ Encrypts the entire body \+ TCP