Flashcards #2
What is the correct sequence of DHCPv6 messages during a regular IPv6 address assignment?
- Solicit
- Advertise
- Request
- Reply
What does Open Authentication allow?
Allows a client to connect without authenticating at the Layer 2 level.
What is a Flow Exporter?
THey are Flexible NetFlow components that are used to transmit flow monitor cache data to a remote destination. Only 1 flow exporters can be configured per destination.
What is Netflow?
a Cisco feature that can be used to monitor traffic on a network. A flow would be a sequence of IP packets n a network that have the same source address, the same destination address, and the same inbound interface.
What is Flexible Netflow?
an enhancemnet of NetFlow that enables a broader range of traffic matching and inspection.
What are the modes of PAgP?
Auto: Places a port into a passive negotiating state in which the port responds to PAgP packets it receives but does not initiate PAgP packet negotiation
Desirable: Pleaces a port into an active negotiating state in which the port initiates negotiations with other ports by sending PAgP packets
ON: Enabled EtherChannel Only
What are the modes of LACP?
Active: Enables LACP unconditionally
Passive: Enables LACP only if an LACP device is detected
ON: Enabled EtherChannel only
What is NETCONF
A southbound API automation tool
Has four Primary Actions (CRUD):
- Create
- Read
- Update
- Delete
Netconf CRUD operations are formatted as tags:
What is VXLAN?
Can be used to create Layer 2 and Layer 3 overlay networks over any IP-based underlay infrastructure
What is LISP?
Locator/ID Separation Protocol is used to manage the mappings between Endpoint Identifies (EIDs) and Routing Locators (RLOCs)
What is Cisco IBNS 2.0?
It includes Enhanced Flexible Authentication (FelxAuth). Cisco Common Classification Policy Language (C3PL), and Cisco Identity Services Engine (ISE).
IBNS 2.0 is a collection of technologies that is used to control access to network resources by providing authentication, access control, and user-based policies.
What detects looped links on a PPP?
Link Control Protocol (LCP).
It is used alongside Network Control Protocol (NCP) when setting up PPP (a WAN protocol that is used to provide remote connectivity)
LCP uses a magic number parameter to determine whether a link is looped. A PPP router transmits the magic number within an LCP message. If the router receives an LCP message wth that same magic number, the router will recognixe that the line is looped and will shut down the interface.
LCP establishes, configures, tests , maintains, and terminates PPP connections.
After authentication, NCP negotiate network protocols.
enacapsulation ppp
What are the HSRP states?
- Init
- Learn
- Listen
- Speak
- Standby
- Active
What are the OSPF neighbor states?
- Down
- init
- 2-Way
- ExStart
- Exchange
- Loading
- Full
What can cause an OSPF neighbor to become stuck in the Exstart or Exchange state?
mismatched MTU sizes
What is VRF-Lite?
VRF-lite is a feature that enables a service provider to support two or more VPNs, where IP addresses can be overlapped among the VPNs. VRF-lite uses input interfaces to distinguish routes for different VPNs and forms virtual packet-forwarding tables by associating one or more Layer 3 interfaces with each VRF. Interfaces in a VRF can be either physical, such as Ethernet ports, or logical, such as VLAN SVIs, but a Layer 3 interface cannot belong to more than one VRF at any time.
What does HTTP status code 200 mean?
The requested action was successfully performed on the server.
what are unsolicited messages and what is the command so they dont interrupt?
UNsolicited messages are debug or logging messages that appear in the console or terminal environemnt while an administratr is interfacting with that environment.
logging synchronous command ensure that unsolicited messages aways appear after solicited output (Solicited output is output that is generated by a user or admin who is directly interacting with the console session) So in this instance the unsolicited message will not interupt the users text, but will display after to avoid confusion
JSON, What is an object?
- Un unodered set of name/value pairs
- Enclosed in CURLY Brackets
{
“firstName”:”Kevin”,
“lastName2:”Wallace”
}
JSON, What is an Array?
- An ordered set of comma-seperated values
- Enclosed in STRAIGHT brackets
[ "CCNA", "CCNA Enterprise", "CCIE Enterprise Infrastructure" ]
What counts as numeric data in JSON?
Numeric data is defined by digits that are not enclosed in quotation marks.
If a string of digits is enclosed in quotation marks, it will be treated as text even if it contains only numeric characters
What is MPP?
Management Plane Protection
Can be configured to restrict the interface and protocols over which remote administration can be performed
What is the difference between HSRP and VRRP?
TBC
What do both Traffic Policing and Traffic Shaping do?
Both use a Token Bucket and Limit bandwidth utilization
What does Traffic Policing do?
- Slows down traffic to a vlaue that the medium can support
- Monitors bandwidth utilization,
- Enforces bandwidth limitations athe service provider edge
- Re-marks traffic that exceeds the SLA
What does Traffic Shaping do?
- Slowsd down traffic due to congestion
- Enforces Bandwidth rates
- Sends traffic classes at different rates
What are the BGP Neighbor states?
- IDLE
- CONNECT
- ACTIVE
- OPENSENT
- OPENRECEIVE
- ESTABLISHED
What is HTTP status 401?
An HTTP server returns a 401 status code if the HTTP server requires authentication to repond to the clients request, but the aithentication attempt fails
What is HTTP tatus code 302 indicate?
indicates that the requested resource has been temporarily moved to another URL.
What role do Fusion Routers have?
They connect Fabric Border Routers to Shared Services such as DNS, DHCP, NTP/
What is the default MTU set across Cisco Routers?
1500
What is MFP?
Management Frame Protection.
MFP is a security mechanism that prevents management frames from being compromised by a malicious user. Management frames are used to manage the connection between an AP and a wireless client. 802.1W provides MFP.
What two tables help with CEF decisions?
FIB and the Adjacency table
FIB is used to resolve next hop addressing. has a knowledge of the L2 data required for forwarding. and will determine whcih outgoing interfaces are needed for destination
What can authenticate wireless clients by using a RADIUS server?
WPA2 Enterprise can use 802.1x to auth
802.1x personnal cannot, it uses PSK
How does BGP select the best path to the destination?
- Highest weight
- Highest Local Prefrence
- Locally originated paths over externally originated paths
- Shortest AS Path
- Lowest Origin Type
- Lowest multi-exit discriminator (MED)
- External BGP (eBGP) paths over internal BGP (iBGP) paths
- Lowest Interior Gateway Protocol (IGP) cost
- Oldest eBGP path
- Lowest BGP router ID