Flashcards
To specify all hosts in the Class C IP network 192.16.8.0, what wildcard access list mask would you use?
0.0.0.255
What access list will allow only web traffic into network 196.15.7.0 from any client?
access-list 100 permit tcp any 196.15.7.0 0.0.0.25 eq www
Which router command allows you to determine whether an IP access list is enabled on a particular interface?
show ip interface
What router command allows you to view the entire contents of all access lists?
show access-lists
What do IP extended access lists use as a basis for permitting or denying packets?
Source and destination addresses, source and destination ports, and protocol.
What is the IP extended access list range?
100-199 and 2000-2699
What is the dotted-decimal equivalent of /15?
255.254.0.0
Which command applies access list 110 inbound to an interface?
Router(config-if)#ip access-group 110 in
What is a network called that is used to allow limited access to certain resources from outside the LAN?
DMZ
____________lists use the number 1-99 or 1300-1999 and filter based on source IP address only.
Standard IP access
The block size of a /26 network is _____.
64
The output of the show startup-config command comes from ______.
NVRAM
What vendor-neutral protocol works much like CDP?
LLDP (Link Layer Discovery Protocol)
_______________lists use the range from 100 to 199 or from 2000 to 2699.
IP extended access
What type of mask do route in the routing table marked with an “L” have?
/32
True/False: Area border routers can be in only one area at a time.
False: Any router that is member of two areas is a border router, or an area border router (ABR), by definition.
Which configuration mode and command combination sets the bandwidth metric of a Frame Relay connection to 64000 bps?
router (config-if)#bandwidth 64
________ on an Ethernet network is the retransmission delay that’s enforced when a collision occurs.
Backoff
What Application layer protocols sets up a secure session that’s similar to Telnet?
SSH
What command, enabled by default starting with Cisco IOS version 12.x, allows the use of the first and last subnet in a network design?
ip subnet-zero
What mask yields only six IP addresses per subnet?
255.255.255.248, or /29
Which command backs up the Cisco IOS to a TFTP server?
copy flash tftp
What protocol resolves IP addresses to MAC address?
ARP
What command provides an excellent overview of the actual operation of all currently running protocols?
show ip protocols
Type the command that must be present for a Layer 3 switch to provide inter-VLAN routing between the two VLANs.
ip routing
Type the command that creates a named extended access list called 150.
ip access-list extended 150
In an Ethernet II frame, what is the function of the section labeled FCS?
Error detection
What mechanism is used by the client to avoid a duplicate IP address during DHCP process?
Gratuitous ARP
Which type of protocol determines the path of a packet through a network: routing or routed?
Routing
How many subnets are contained in the network 192.168.10.0 /27?
8 subnets
What IP address is called the loopback address?
127.0.0.1
What is the HyperTerminal setting for connecting to a Cisco router?
9600 bps, parity None, 1 stop bit, and 8 data bits
What type of cable is used to connect to a console port of a router?
Rolled/Rollover
What type of Ethernet cable is used to connect from a hub to a switch?
Crossover
What type of Ethernet cable is used to connect workstation to a router?
Crossover
What type of Ethernet cable is used to connect a router to a switch?
Straight-through
What type of Ethernet cable is used to connect a router to another router?
Crossover
The __________command causes the system to return you to your previous prompt after displaying a console message.
logging synchronous
True/False: OSPF uses cost as a metric.
True
What does the configuration register setting of 0x2102 do?
Tells the router to look in NVRAM for the boot sequence
Which command can be used to determine a router’s capacity to generate debug output?
show processes cpu
True/False: OSPF is called an advanced distance-vector routing protocol
False: EIGRP is an advanced distance-vector protocol
An IPv6 address is how many bits long?
128 bits
How does inter-VLAN communication take place?
Using a router Or layer 3 switch
What is the shortest possible version of this address-
2001:0db8:3c3d:0012:0000:0000:1234:56ab?
2001:00db8:3x3d:0012::1234:56ab?
What type of IPv6 address is delivered to a single interface?
Unicast
What is the IEEE standard frame tagging method?
802.1q
Which switching technology reduces the size of a broadcast domain?
VLANs
What is the main purpose for creating VLANs?
To break up broadcast domains at layer 2
What is a publicly routable IPv6 address called?
Global unicast
What advantage is offered by LAN segmentation?
More bandwidth is provided to each user.
What Class C mask can be used to provide seven subnets, each with 25 hosts?
255.255.255.224, or /27, although it actually provides a total of eight subnets, each with 30 hosts
_____________break up broadcast domains in layer 2 switched networks.
VLANs
__________links are used to carry VLAN information between switches.
Trunk
___________links can carry traffic for one VLAN.
Access
The typical reason for creating network segmentation is to provide more __________ to each user.
Bandwidth
What IPv6 address type is the equivalent of an Automatic Private IP (APIPPA) address?
Link-local
What is the binary equivalent of the decimal number 152?
10011000
What IPv6 address type is referred to as a “one-to-nearest” address?
Anycast
What command do you use to copy a configuration from a TFTP host to a Cisco router’s DRAM on your network?
copy tftp running-config
Which memory in a Cisco router stores packet buffers and routing tables?
RAM
What IPv6 address is the equivalent of 127.0.0.1 in IPv4?
::1
What IPv6 suffix describes the multicast range?
FF00::/8
Which command will show you the IOS version running on your router?
show version
The basic IPv6 header contains how many fields?
8 fields
To copy a configuration from the Cisco router’s DRAM to a TFTP host on your network, what command can you use?
copy run tftp
If you want to suspend a Telnet session, what keystroke combination would you use?
Ctrl+Shift+6, then X
The ICMPv6 packet is identified by the value 58 in the ______field, located inside the IPv6 header.
Next Header
What component performs the function of Address REsolution Protocol in ICMPv6?
Neighbor discovery
How do IPv6 hosts receive the address of the gateway?
Router Solicitation
Which command is used to find the path a packet takes through an Internetwork?
traceroute
Using the prefix 2001:db8:1:1 /64, convert the following MAC address into a EUI-64 address: 1020:ef01:5554.
2001:db8:1:1:1220:efff:fe01:5554
When hosts make up or receive an IPv6 address, they send three _______packets out via NDP NS asking if anyone has this same address.
Duplicate address detection (DAD)
Which command displays Cisco Discovery Protocol adjacencies?
show cdp neighbors
What command will show you a directly connected router’s interface IP address?
show cdp neighbor detail
What is the IPv6 version of OSPF called?
OSPFv3
What is the Class C private IP address range?
192.168.0.0/16 (192.168.0.0 - 192.168.255.255)
What is the Class B private IP address range?
172.16.0.0/12 (172.16.0.0 - 172.16.255.255)
What is the Class A private IP address range?
10.0.0.0/8 (10.0.0.0 - 10.255.255.255)
You use the ____________ command to copy a configuration of a router stored TFTP server to a router’s NVRAM.
copy tftp startup-config
On which types of networks will OSPF elect a backup designated router?
Non-broadcast and broadcast multi-access
____________ is used to store packet buffers and routing tables, among other things.
RAM
What is the hex equivalent of 11000111?
C7
The IPv6 address for an OSPF DR is_______.
FF02::6
The copy running-config startup-config command copies the configuration stored in ___________to__________.
RAM, NVRAM
What format of IPv6 addressing takes the unique MAC address of a host and inserts FF:FE in the middle of the address to change a 48-bit MAC address to a 64-bit interface ID?
EUI-64
To keep open multiple ___________ sessions, use the Ctrl+Shift+6, then X keystroke combination.
Telnet
What is the port number for Telnet?
23
What is the hex equivalent of 01110101?
0x75. Cisco sometimes likes to show the 0x in front of hex characters.
The ping and traceroute commands can both be used to test _________in an internetwork.
IP connectivity
What standard allows the use of subnet masks other than default masks?
Classless Inter-Domain Routing (CIDR) allows the use of subnet masks such as 255.255.224.0
Using the prefix 2001:db8:1:1/64, convert the following MAC address into a EUI-64 address: 0b0c:abcd:1234
2001:db8:1:1:090c:abff:fecd:1234
An access list will compare packets starting with the _________line.
first
Incoming/outgoing packets will be compared to lines on access list until when?
until a match is found, then no more comparisons are made OR until a match is not found, then the implicit “deny” at the end of the access list discards the packet
Standard Access lists only use ______________as a condition.
source IP address
Access lists can filter packets going ____________ of a single interface.
in and out
Inbound Access lists apply to packets going ____________.
outward
Outbound Access lists filter packets going _________.
inward
Where should IP standard access lists be placed?
as close to the destination as possible
Where should IP extended access lists be placed?
as close to the source as possible
What are the 2 systems help prevent common attacks such as a Denial of Service attack?
intrusion detection system (IDS) & intrusion prevention system (IPS)
What is the device that Cisco sells that provides the IPS and IDS modules?
Adaptive Security Appliance (ASA)
What is the standard IP access list number range?
1-99, 1300-1999 (for expanded range)
The ____________ command is used to enable access-lists on a VTY line.
access-class
How do you start off the command to create a named ACL?
router(config)#ip access-list
Use the ____________ command to view all the access-lists, access-list parameters, along with statistics of how many packets were denied/permitted.
show access-list
What will happen if there isn’t at least one permit rule in an access-list?
Effectively shuts down the interface
Bridges use___________to create and manage Content Addressable Memory (CAM) filter table.
software
Switches use______________to build and maintain their MAC filter tables.
application-specific integrated circuits (ASICs)
What are the three functions of a layer 2 switch?
Address learning, Forward/Filter decisions, Loop avoidence
What should you do with unused switch ports?
shut them down or add them to an unused VLAN
When a switch port gets shutdown by a violator, how would you bring the interface back up?
shutdown, then no shutdown
What term can some switches show that mean the same as secure-shutdown?
err-disabled
For switchport security, both of these violation modes alert you via SNMP that a violation has occurred.
Restrict violation mode and Shutdown violation mode
To manage a switch from a different subnet, this command needs to be present on the switch.
ip default-gateway
This command will dynamically save learned MAC addresses in the running-configuration of a Cisco switch?
switchport port-security mac-address sticky
What command disables the port if a security violation occurs?
switchport port-security violation shutdown
What command allows a MAC address into a port of a switch?
switchport port-security mac address MAC ADDRESS
The ______________command will display the routing table.
show ip routing
What are the 5 minimum factors a router must have in order to route packets effectively?
- destination address
- neighboring routers to learn about remote networks
- possible routes to those remote networks
- best routes to each remote network
- maintain and verify routing information
What are the 3 types of routing?
static, dynamic, default
This type of routing protocol shares routing information and automatically shares routing updates via a routing protocol.
Dynamic
This routing protocol class measures hop counts to determine the best route.
distance vector
In this routing protocol class routers create 3 separate tables: one for directly attached neighbors, one determines the topology of the entire internetwork, and one for the routing table.
Link State
This class of routing protocol sends updates about their own connections to all directly connected routers, then is propagated on.
link state
This class of routing protocol determines the lowest hop count number when deciding the best route
distance vector
Prevents broadcasts of routing table updates but still allows itself to receive those updates.
passive-interface
What is the command syntax for a static route?
[destination address] [subnet mask] [exit interface address] [administrative distance] [permanent]
Next hop can also mean the next__________.
router
_______________means the trustworthiness of a route.
administrative distance
What are the 3 types of packet forwarding Cisco routers perform?
process switching, fast switching, and Cisco Express Forwarding (CEF)
What does [permanent] in the command syntax of creating a static route mean?
The route entry is kept in the routing table no matter what.
This link-state routing protocol supports VLSM and classless routing.
OSPF
______________connects multiple autonomous systems together.
Autonomous system boundary router (ASBR)
What are the command syntax’s for configuring OSPF?
router ospf [process#1-65535]
network [ip address] [wildcard] area [#]
_____________ are elected whenever OSPF routers are connected to the same broadcast network and is responsible for publicizing routing info to and from routers on the broadcast network.
designated router (DR)
AD = 90
EIGRP
AD = 100
IGRP
AD = 110
OSPF
AD = 115
IS-IS
AD = 120
RIP
IP address range for Class A = ?
1 - 126
IP address range for Class B = ?
128 - 191
IP address range for Class C = ?
192 - 223
IP address range for Class D = ?
224 - 239
IP address range for Class E = ?
240 - 254
2^1
2
2^2
4
2^3
8
2^4
16
2^5
32
2^6
64
2^7
128
2^8
256
2^9
512
2^10
1024
2^11
2048
2^12
4096
Number of Hosts/Addresses formula
2^u - 2
Number of Subnets formula
2^b
2^u - 2
number of hosts
2^b
number of subnets
What multicast IP address is used to send OSPF messages to the DR?
224.0.0.6
1st step in Cisco’s 4-step troubleshooting method?
Ping loopback addreess
2nd step in Cisco’s 4-step troubleshooting method?
Ping NIC
3rd step in Cisco’s 4-step troubleshooting method?
Ping deafult gateway
4th step in Cisco’s 4-step troubleshooting method?
Ping remote device
What multicast address is used to send a message to ALL OSPF routers?
224.0.0.5
Stored in ROM, boots router up and then loads the IOS
Bootstrap
Stored in ROM, Checks basic functionality of router hardware, and the interfaces that are present
POST (power-on self-test)
Stored in ROM, runs, manufactures, tests, troubleshoots a mini-IOS when flash fails to load IOS
ROM monitor
Called RXBOOT or bootloader, stored in ROM, is a small IOS that can load Cisco IOS into flash memory
Mini-IOS
Holds the POST, bootstrap program, and mini-IOS. Used to start and maintain router.
ROM
Stores the Cisco IOS, not erased when router is reloaded
flash memory
Holds the switch/router configuration, not erased when device is reloaded, holds configuration register
NVRAM
Used to control HOW the router boots up, the show version command shows it
configuration register
TCP Port number
6
UDP Port number
17
2000::/3
global unicast address range
FC00::/7
unique local unicast range
FE80::/10
link-local unicast range
FF00::/8
multicast range
Summarizes a group of IP address into fewer.
NAT
What are the 3 types of NAT?
static, dynamic, overloading
_____________ is one-to-one IP address mapping between local and global addresses.
static NAT
____________ maps a range of unregistered IP addresses to a registered IP address out a pool of registered addresses.
dynamic NAT
_____________ maps multiple unregistered IP addresses to a single registered IP address by using different ports.
overloading (form of dynamic NAT)