ELN DAY 2 Flashcards

1
Q

is a Layer 2 Cisco proprietary protocol that gathers information about neighboring (attached) Cisco devices. Since CDP is a Layer 2 protocol and does not require any IP addresses to be assigned, successful communication does not indicate routing (a Layer 3 function) is configured. CDP data is used to develop network maps by analyzing the CDP packets.

A

Cisco Discovery Protocol (CDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how often a device transmits CDP packets.

A

CDP timer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how long a device stores CDP information it receives from neighboring devices.

A

CDP holdtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 2 devices used to define collision domains with independent bandwidth on each port. Although collision domains are defined with a switch, broadcast domains are not.

A

switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three Functions of a Switch

A

address learning, making forward/filter decisions, and loop avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

automatically monitor links between all bridges(switches) in a network to prevent network loops. It is required in a network comprised of Layer 2devices if redundant links are used for backup purposes.

A

Spanning Tree Protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sent every two seconds to detect changes and dynamically reconfigure the logical topology of the layer 2 network if needed.

A

BPDUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Does not forward, accept network traffic, or learn any MAC addresses. Port receives (but does not send) BPDUs.

A

blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sends and receives BPDUs, but does not learn MAC addresses, or forward/ process traffic. Calculating a loop-freetopology occurs when listening.

A

Listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Learns MAC addresses and populates the MAT to prevent flooding, but does not forward traffic.

A

Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Processes and forwards traffic, while actively learning MAC addresses from incoming traffic; considered normal switch operation.

A

Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Administratively shutdown; does not participate in STP or forward frames.

A

Disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is the reference point for all other devices in the STP network. STP selects the root bridge by an election process where the lowest bridge identification wins.

A

root bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

based on the802.1w standard, developed to make STP convergence quicker. RSTP responds to network change and re-converge within six seconds. RSTP reduces the number of port states from five to three, which helps speed convergence.

A

Rapid Spanning Tree Protocol (RSTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RSTP port state

No user data is sent over the port. This is comparable to the blocking, listening, and disabled states of the original 802.1d STP specification.

A

Discarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

forces switch ports to immediately enter the forwarding state, bypassing the STP listening and learning states.

A

PortFast

17
Q

Physical Interfaces

Encapsulation methods utilized: HDLC, PPP, Frame Relay and X.25.

A

Serial/High Speed Serial Interface (HSSI)

18
Q

Physical interfaces

Encapsulation method utilized: ARPA (Advanced Research Projects Agency) which means that the encapsulation being utilized is Ethernet II on the interfaces.

A

Ethernet/FastEthernet/GigabitEthernet

19
Q

Basic Rate Interface (BRI) supports two 64 Kbps B-data channels and one 16 Kbps channel for transmitting control information.

Primary Rate Interface (PRI) supports 23 B channels of 64Kbps each and one 64 Kbps channel transmitting control information for a total bit rate of 1.544 Mbps.

A

ISDN

20
Q

is a virtual interface that uses a parent physical interface, allowing for network expansion despite a limited number of physical interfaces. The format for the name is listed below. Notice the decimal point in the name.

Ethernet0/1.1

A logical interface that has the parent physical interface of Ethernet0/1Sub-interfaces allow for management of multiple subnets while only having one physical interface. They are most commonly used in conjunction with VLANs.

A

Sub-Interface

21
Q
A virtual interface utilized used to encapsulate data within a separate protocol. Tunnels are used to deliver one protocol across a network using a different protocol or to provide a secure delivery across a network. The following information is needed when configuring a Tunnel interface:
Tunnel Interface Number
Tunnel Source (Beginning of the tunnel)
Tunnel Destination (End of the tunnel)

Default encapsulation method used is Generic Routing Encapsulation(GRE).

A

Tunnel

22
Q

A virtual interface configured on the router, used for maintenance/management functions. The loopback interface is commonly configured to provide an IP address when utilizing an ipunnumbered schema or to establish the router id for OSPF and BGP.

A

Loopback

23
Q

The null interface provides an alternative method of filtering traffic. Directing undesired network traffic to the null interface avoids the overhead involved with using access lists.

A

Null

24
Q

Routed Protocols IPv4, IPv6

Routing Protocols RIP, EIGRP, OSPF

Note: Routing protocols are discussed in detail later in this topic.Static Routing Manually entered routing information

A

Protocols

25
Q

Method by which an interface is configured without a dedicated IP address. If interface must provide an IP address (i.e., Traceroute), an IP unnumbered interface uses another local address as its own.

A

IP unnumbered

26
Q

Global password for privileged access. Not used if enable secret is set (mainly pre-10.3 systems).

router(config)#enable password

A

enable password

27
Q

Overrides the enable password if set.

router(config)#enable secret

If both the enable and enable secret password are set, only the enable secret password provides access.

A

enable secret

28
Q

segment configuration to reduce broadcast traffic and improve performance. A VLAN is a logical grouping of users that allows the control of information flow, independent of physical locations. A VLAN allows system administrators to logically separate a device as if it were multiple pieces of hardware.

A

VirtualLAN(VLAN)

29
Q

Security by controlling access

Efficient bandwidth by limiting broadcasts

Isolation of failure

Increased flexibility

A

VLAN advantages

30
Q

can only belong to and carry traffic for one VLAN. Upon receipt of a frame, a switch examines the destination MAC address, and checks its configuration to see if the destination interface is in the same VLAN as the source interface from which it received the frame. If the interfaces are within the same VLAN, the frame is forwarded. If not, the frame is sent to a router for inter-VLAN communication, or dropped if no router is available.

A

Access Ports

31
Q

is a 100-1000 Mbps point-to-point link between switches, or between a switch and a router. Trunk ports carry information for multiple VLANs across their links, or trunk lines.

A

trunk port

32
Q

connects two or more switches together and allows like VLANs (e.g., VLAN 10 to VLAN 10) to communicate.

A

trunking

33
Q

An older encapsulation method that adds 30 bytes of overhead data to the frame.

A

InterSwitch Link (ISL)

34
Q

Adds only four (4)bytes of overhead/data to the frame.

A

EEE 802.1q (Dot1q)

35
Q

Support 802.1Q trunks

treat each VLAN as a separate network and utilize separate STP instances for each VLAN configured on the network. PVST and PVST+ allow a VLAN trunk to forward for some VLANs while blocking others.

A

Per-VLAN STP Plus (PVST+)

36
Q

Support ISL trunk links

treat each VLAN as a separate network and utilize separate STP instances for each VLAN configured on the network. PVST and PVST+ allow a VLAN trunk to forward for some VLANs while blocking others.

A

Per-VLAN STP (PVST)

37
Q

is the addition of VLAN information into a transmitted frame, extending the Ethernet frame to 18 bytes.

A

Frame Tagging