Flashcards #2

1
Q

What is the correct sequence of DHCPv6 messages during a regular IPv6 address assignment?

A
  1. Solicit
  2. Advertise
  3. Request
  4. Reply
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Open Authentication allow?

A

Allows a client to connect without authenticating at the Layer 2 level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Flow Exporter?

A

THey are Flexible NetFlow components that are used to transmit flow monitor cache data to a remote destination. Only 1 flow exporters can be configured per destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Netflow?

A

a Cisco feature that can be used to monitor traffic on a network. A flow would be a sequence of IP packets n a network that have the same source address, the same destination address, and the same inbound interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Flexible Netflow?

A

an enhancemnet of NetFlow that enables a broader range of traffic matching and inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the modes of PAgP?

A

Auto: Places a port into a passive negotiating state in which the port responds to PAgP packets it receives but does not initiate PAgP packet negotiation

Desirable: Pleaces a port into an active negotiating state in which the port initiates negotiations with other ports by sending PAgP packets

ON: Enabled EtherChannel Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the modes of LACP?

A

Active: Enables LACP unconditionally

Passive: Enables LACP only if an LACP device is detected

ON: Enabled EtherChannel only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NETCONF

A

A southbound API automation tool

Has four Primary Actions (CRUD):

  • Create
  • Read
  • Update
  • Delete

Netconf CRUD operations are formatted as tags:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is VXLAN?

A

Can be used to create Layer 2 and Layer 3 overlay networks over any IP-based underlay infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is LISP?

A

Locator/ID Separation Protocol is used to manage the mappings between Endpoint Identifies (EIDs) and Routing Locators (RLOCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Cisco IBNS 2.0?

A

It includes Enhanced Flexible Authentication (FelxAuth). Cisco Common Classification Policy Language (C3PL), and Cisco Identity Services Engine (ISE).

IBNS 2.0 is a collection of technologies that is used to control access to network resources by providing authentication, access control, and user-based policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What detects looped links on a PPP?

A

Link Control Protocol (LCP).
It is used alongside Network Control Protocol (NCP) when setting up PPP (a WAN protocol that is used to provide remote connectivity)

LCP uses a magic number parameter to determine whether a link is looped. A PPP router transmits the magic number within an LCP message. If the router receives an LCP message wth that same magic number, the router will recognixe that the line is looped and will shut down the interface.

LCP establishes, configures, tests , maintains, and terminates PPP connections.
After authentication, NCP negotiate network protocols.

enacapsulation ppp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the HSRP states?

A
  1. Init
  2. Learn
  3. Listen
  4. Speak
  5. Standby
  6. Active
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the OSPF neighbor states?

A
  1. Down
  2. init
  3. 2-Way
  4. ExStart
  5. Exchange
  6. Loading
  7. Full
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can cause an OSPF neighbor to become stuck in the Exstart or Exchange state?

A

mismatched MTU sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is VRF-Lite?

A

VRF-lite is a feature that enables a service provider to support two or more VPNs, where IP addresses can be overlapped among the VPNs. VRF-lite uses input interfaces to distinguish routes for different VPNs and forms virtual packet-forwarding tables by associating one or more Layer 3 interfaces with each VRF. Interfaces in a VRF can be either physical, such as Ethernet ports, or logical, such as VLAN SVIs, but a Layer 3 interface cannot belong to more than one VRF at any time.

17
Q

What does HTTP status code 200 mean?

A

The requested action was successfully performed on the server.

18
Q

what are unsolicited messages and what is the command so they dont interrupt?

A

UNsolicited messages are debug or logging messages that appear in the console or terminal environemnt while an administratr is interfacting with that environment.

logging synchronous command ensure that unsolicited messages aways appear after solicited output (Solicited output is output that is generated by a user or admin who is directly interacting with the console session) So in this instance the unsolicited message will not interupt the users text, but will display after to avoid confusion

19
Q

JSON, What is an object?

A
  • Un unodered set of name/value pairs
  • Enclosed in CURLY Brackets

{
“firstName”:”Kevin”,
“lastName2:”Wallace”
}

20
Q

JSON, What is an Array?

A
  • An ordered set of comma-seperated values
  • Enclosed in STRAIGHT brackets
[
  "CCNA",
  "CCNA Enterprise",
  "CCIE Enterprise Infrastructure"
]
21
Q

What counts as numeric data in JSON?

A

Numeric data is defined by digits that are not enclosed in quotation marks.

If a string of digits is enclosed in quotation marks, it will be treated as text even if it contains only numeric characters

22
Q

What is MPP?

A

Management Plane Protection

Can be configured to restrict the interface and protocols over which remote administration can be performed

23
Q

What is the difference between HSRP and VRRP?

24
Q

What do both Traffic Policing and Traffic Shaping do?

A

Both use a Token Bucket and Limit bandwidth utilization

25
Q

What does Traffic Policing do?

A
  • Slows down traffic to a vlaue that the medium can support
  • Monitors bandwidth utilization,
  • Enforces bandwidth limitations athe service provider edge
  • Re-marks traffic that exceeds the SLA
26
Q

What does Traffic Shaping do?

A
  • Slowsd down traffic due to congestion
  • Enforces Bandwidth rates
  • Sends traffic classes at different rates
27
Q

What are the BGP Neighbor states?

A
  • IDLE
  • CONNECT
  • ACTIVE
  • OPENSENT
  • OPENRECEIVE
  • ESTABLISHED
28
Q

What is HTTP status 401?

A

An HTTP server returns a 401 status code if the HTTP server requires authentication to repond to the clients request, but the aithentication attempt fails

29
Q

What is HTTP tatus code 302 indicate?

A

indicates that the requested resource has been temporarily moved to another URL.

30
Q

What role do Fusion Routers have?

A

They connect Fabric Border Routers to Shared Services such as DNS, DHCP, NTP/

31
Q

What is the default MTU set across Cisco Routers?

32
Q

What is MFP?

A

Management Frame Protection.

MFP is a security mechanism that prevents management frames from being compromised by a malicious user. Management frames are used to manage the connection between an AP and a wireless client. 802.1W provides MFP.

33
Q

What two tables help with CEF decisions?

A

FIB and the Adjacency table

FIB is used to resolve next hop addressing. has a knowledge of the L2 data required for forwarding. and will determine whcih outgoing interfaces are needed for destination

34
Q

What can authenticate wireless clients by using a RADIUS server?

A

WPA2 Enterprise can use 802.1x to auth

802.1x personnal cannot, it uses PSK

35
Q

How does BGP select the best path to the destination?

A
  1. Highest weight
  2. Highest Local Prefrence
  3. Locally originated paths over externally originated paths
  4. Shortest AS Path
  5. Lowest Origin Type
  6. Lowest multi-exit discriminator (MED)
  7. External BGP (eBGP) paths over internal BGP (iBGP) paths
  8. Lowest Interior Gateway Protocol (IGP) cost
  9. Oldest eBGP path
  10. Lowest BGP router ID