Main Flashcards

1
Q

What is

FF02::1, FF02::2, FF02::5, FF02::6, FF02::9, FF02::A?

A

Link-Local Multicast IPv6 addresses
• FF02::1 = group that all nodes (a.k.a. = all hosts) must join (like an IPv4 broadcast)
• FF02::2 = group that all IPv6 routers must join
• FF02::5 = group that all IPv6 OSPF routers must join
• FF02::6 = group that all IPv6 OSPF DR’s must join
• FF02::9 = group that all IPv6 RIP routers must join (except RIPv1)
• FF02::A = group that all IPv6 EIGRP routers must join

The full unabbreviated IPv6 address read as FF:02:0:0:0:0:0:0:1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSPF Metric Cost for:

Ethernet – Fast Ethernet – Gigabit – 10Gigabit?

A

OSPF Metric is determined based on the bandwidth of an interface vs the reference bandwidth

Cost = reference bandwidth / interface bandwidth

The default reference bandwidth for OSPF is 100mbps

OSPF rounds up from 0 to 1, since most of today’s technologies are over 100mbps, it results in a table like below:
………………………….Ethernet….FastEthernet….Gigabit….10Gigabit
Default Metric = …….10 ………………..1…………………1……………1
Should be = …………1,000…………….100……………..10…………..1

auto-cost reference-bandwidth xx-xx
is the cli to change the OSPF defaults

ip ospf cost
cli will allow you to manually configure an OSPF metric per interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is 01-00-5E-… ?

A

part of an IPV6 virtual MAC address for Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tables:

CAM vs MAC

A

A “MAC table” tells you what data the table holds, in this case MAC addresses

A “CAM table” tells you what is the technical nature of this table - (content-addressable memory), or a cache, that performs parallel and fast lookups

So, the MAC table refers to the content while the CAM table refers to the organization and principle of operation

A CAM table may hold many different kinds of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIB vs ARP

A

FIB = is a layer 3 construct - contains an optimized list of all prefixes from the IP routing table

The ARP table is a layer 3 function used to map (L2)MAC addresses to (L3)IP addresses
If no ARP entry exists, an ARP broadcast is sent out, and the table is updated with the response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NORTHBOUND API’s (NBI)?

List API’s & language written in or model of delivery

A

REST (XML or JSON) [HTTP]

OSGi (Java)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SOUTHBOUND API’s (SBI)?

List API’s & language written in or model of delivery

A

NETCONF (XML or RPC) Relies on SSH for transport

OnePK (Cisco-Java or C or Python) Cisco Proprietary

OpenFlow (Python) Uses imperative SDN model - sends specific instructions manages network and polices directly

OpFlex (XML or JSON) Uses declarative SDN model - vague instructions allow device to make decisions how to implement instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where does the Management Plane reside?

A

The Management Plan is a logical subset of the Control Plane

Any management traffic for the local device (such as SSH) is part of the management plane

  • *** Application Plane **
  • *** Control Plane (Management Plane) **
  • *** Data Plane **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does default-information originate do?

A

The cli
default-information originate
will cause the router to injects its own default route into the OSPF routing table as an external route, thereby advertising its default route to neighboring routers

It will also automatically become an (ASBR) Autonomous System Boundary Router

default-information originate notwithstanding, if the cli command
redistribute
is entered, it will also become an ASBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DAI?

A

Dynamic Arp Inspection - is a security feature that validates Address Resolution Protocol (ARP) packets in a network. DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings

Mitigates attacks knowns as ARP spoofing or ARP poisoning attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unique local unicast always begins with?

Unique global unicast always begins with?

A

Unique local unicast =
FC or FD because the first 7 bits of their address are always 111111xx (ie…11111100 or 11111101)

Unique global unicast =
always begin with a 2 or 3 (ie… 2000::/3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does static client mode mean?

A

A static client receives its time from a (one) specific NTP server. The cli command on the client is
ntp server {+ the IP - address of the NTP server}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is BPDU Guard?

A

BPDU guard protects access ports with PortFast and BPDU guard from accepting a Bridge Protocol Data Unit - upon receiving BPDUs a port with BPDU guard enabled will place that port in an error-disabled state - this Spanning Tree preventing loops

BPDU guard should be enabled on all ports that have PortFast enabled

A port shutdown by BPDU guard must be manually re-enabled, unless the cli 
errdisable recovery cause bpduguard
and the 
errdisable recovery interval {time}
commands have been run against the port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Root Guard?

A

Root Guard prevents and a root from accepting a superior BPDU (preventing it from losing an election and therefore maintaining the Root Bridge status). Basically, this prevents newly installed switches (that might incidentally have a lower priority) from being elected the root

Root Guard is applied per port (not globally) and inverts the syntax of the naming convention, the cli command is therefore
spanning-tree guard root
Thanks for that, Cisco!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What is the difference between the:
* AP-Manager Interface (what protocol?)
* Management Interface (what protocol?) 
 * Service port Interface 
on a WLC?
A

The AP-manager is for Layer 3 communication between WLC and AP’s using - CAPWAP’s two tunnel protocol (it’s not a physical port)

The Management interface is Layer 2 communication between WLC and AP’s, as well as other WLC’s using - LightWeight Access Point Protocol (LWAPP) (also not a physical port)

The Service port interface is used for maintenance purposes of the WLC itself (it IS a physical port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog error mnemonic?

A

Every / Awesome / Cisco / Engineer / Will / Need / Ice-Cream / Daily

Emergency-0 / Alerts-1 / Critical-2 / Error-3 /
Warning-4 / Notification-5 / Informational-6 / Debug-7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is APIC?

What are the 3 main reasons it’s used?

A

This is SDN (Software-Defined Networking)

APIC is Cisco’s Application Policy Infrastructure Controller. Basically, Cisco’s naming convention for its version of ACI (Application Centric Infrastructure)

It’s the main architectural component and unified point of automation and management for the Cisco ACI fabric for:

Health monitoring
Optimizes performance and agility
Policy enforcement

(HOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is WDS?

A

WDS - Wireless Domain Services - is a component used in Cisco’s Autonomous WLAN solution - it’s a feature that is installed on AP’s to enable interaction with WLSE
(like client software for the WLSE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA?

A

Authenticate (who are you?)

Authorization (what access do you have?)

Accounting (what have you done?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cisco or non-proprietary and what do the acronym stand for?
RADIUS?
TACACS?

A

RADIUS = (Remote Authentication Dial-In User Server)
is non proprietary

TACACS = (Terminal Access Controller Access Control System)
is a Cisco only protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Security acronyms:
•	IKE
•	SA (works with?)
•	AH (works how?)
•	ESP (works with?)
•	GRE (effectiveness in comparison to others)
A
  • IKE = Internet Key Exchange (works with IKE+SA and/or IPSec+IKE)
  • SA = Security Association (works with IKE+SA and/or IPSec+SA)
  • AH = Authentication Header (embedded within a packet)
  • ESP = Encapsulating Security Payload (encapsulates a packet as part of IPSec)
  • GRE = Generic Routing Encapsulation - tunnels any Layer 3 protocol - generic and therefore weak compared to protocol specific security transport methods like IPSec or PPPoA or PPPoE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP ARP inspection – all ports are trusted or untrusted by default?

A

All ports are untrusted by default when Dynamic ARP Inspection (DAI) is enabled

To trust, you need the
ip arp inspection trust
cli command applied in port configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RFC 1918 (private IP’s)?

A

A - 10.0.0.0/8 -> 10.255.255.255 (all of 10.x.x.x)

B - 172.16.0.0/12 -> 172.31.255.255 (only 172.{16-31}.x.x)

C - 192.168.0.0/16 -> 192.168.255.255 (all of 192.168.x.x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OSPF (DR & BDR)
Timers? / Elections? / Multi-cast sent? / Manual / Neighbors? / Defaults?

  • Broadcast
  • NonBroadcast
  • Point-to-Point
  • Point-to-Multipoint Broadcast
  • Point-to-Multipoint NonBroadcast
A
Broadcast:
Hello/dead timers 10 / 40
DR & BDR elections=yes
Mutlicast updates are sent
manual config of neighbor is NOT required
********default for Ethernet & FDDI
NonBroadcast:
Hello/dead timers 30 / 120
DR & BDR elections=yes
Mutlicast updates not sent
manual config of neighbor IS required
********defaults for Frame Relay & X.25
Point-to-Point:
Hello/dead timers 10 / 40
DR & BDR elections=no
Mutlicast updates are sent
manual config of neighbor is NOT required
********defaults for HDLC & PPP
Point-to-Multipoint Broadcast:
Hello/dead timers 30 / 120
DR & BDR elections=no
Mutlicast updates are sent
manual config of neighbor is NOT required
Point-to-Multipoint NonBroadcast:
Hello/dead timers 30 / 120
DR & BDR elections=no
Mutlicast updates not sent
manual config of neighbor IS required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ABR vs ASBR?

A

ABR = (Area Border Router) is a router with interfaces in multiple OSPF areas

ASBR = (Autonomous System Boundary Router) is a router which redistributes routes into OSPF (even from another protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

FHRP: What does it stand for?
Which one is Cisco Propriety? Single Active or Multiple Active?

  • HSRP (Hot Stand-bye Routing Protocol)
  • VRRP (Virtual Router Redundancy Protocol)
  • GLBP (Gateway Load Balancing Protocol)
A

FHRP (First Hop Redundancy Protocol) is a Layer 2 protocols works only in the local subnet

*** HSRP (Hot Stand-bye Routing Protocol) = Cisco Proprietary - Single Active (cannot load balance)

*** VRRP (Virtual Router Redundancy Protocol) = Non- Proprietary - Single Active (is not meant to load balance)

*** GLBP (Gateway Load Balancing Protocol) = Cisco Proprietary - Active+4 active virtual forwarders (load balancing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is BSS / ESS /IBSS?

A

(X) Service Set

  • (Basic) - BSS is a single AP topology
  • (Extended) - ESS is overlapping (2 or more) APs topology
  • (Independent) - IBSS is a wireless topology with no APs at all
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
What is the method for:   
transport
architecture
configurations (names or modules)
scripting language
  • Ansible
  • Puppet
  • Salt
  • Chef
A

Ansible: transport SSH-TCP 22 / architecture
client/server (without agent software) /
configurations PLAYBOOKS / language YAML

Puppet: transport HTTPS-TCP 8140 / architecture
client/server / configurations MODULES / language
PuppetDSL or RubyDSL

Salt: transport ZeroMQ-TCP 4505/6 / architecture
client/server / configurations SCRIPTS / language
YAML or Python or PyDSL

Chef: transport HTTPS-TCP 443 / architecture
client/server or standalone / configurations
COOKBOOKS / language Ruby DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Are FlexConnect ACL’s supported on the local VLAN?

Are FlexConnect ACL’s applied to the [AP & VLAN] or [AP & Interface]?

A

Yes, as long as it is not inherited from a FlexConnect group

FC ACL’s are applied per AP & VLAN - NOT per AP & Interface!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Are per direction FlexConnect Access Lists possible?

A

No, unlike regular ACL’s you cannot create a per rule direction FlexConnect ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is in the EIGRP Neighbor table?

A

Neighbor table – stores information about EIGRP neighbors. Before exchanging routes, routers need to establish a neighbor relationship

It lists all adjacent routes including the routes that are not successors or feasible successors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does
mls qos trust cos
command do?

A

Moves the trust boundary from the switch to the IP phone, which tells the switch to accept the traffic as having come from a trusted source

*(MLS) Multi Layer Switching

[tells the SWITCH to trust the PHONE and it’s subsequent packet prioritization, even those packets that were sourced by the host attached to the IP phone]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the difference between an NTP static client and an NTP broadcast client?

What does the cli command ntp peer do?

A

A static client can get it’s time only from the one NTP server specified for it, where as a broadcast client can get its time from any NTP server on the network

ntp peer is where an ntp host will attempt to sync with another ntp host (a peer), this is called ntp symmetric mode, it may synchronize the other host or be synchronized by it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

WLC dynamic interfaces are user defined and used for client data. T or F ?

There are 256 dynamic interfaces per WLC. T or F?

A

True, WLC dynamic interfaces are user defined and used for client data

False, there are 512 dynamic interfaces per WLC

Dynamic interfaces function like a vlan, to segment traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What percentage of overlap is considered ideal for wireless coverage?

A

10%-15% (with non-overlapping channels)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Name 2 Link State and 2 Distance Vector protocols?

A

Link State = OSPF & IS-IS

Distance Vector = RIP & IGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

PortFast, UplinkFast & BackboneFast are what?

What protocol includes it natively?

A

These are all Spanning Tree Protocol features

PortFast - enables a port to immediately access the network without listening and learning first

UplinkFast - increases convergence speed for access layer switches once a Root Port fails, it immediately replaces it with an alternate root port

BackboneFast - increases convergence on a switch that detects a failure on links that are not directly connected

802.1w a.k.a. Rapid Spanning Tree Protocol (RSTP) includes these three features natively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Is the DAI command cli
ip arp inspection vlan
applied to the vlan or to the interface?

A

ip arp inspection vlan
is the cli command to enable DAI on VLANs
it CANNOT be run in interface configuration mode

To trust a port in interface configuration mode you would need the cli command
ip arp inspection trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Collision vs. late collision?

A

collisions - occur when a packet must be-resent BEFORE the 64th or 512th bit has been transmitted

late collisions - occur when a packet must be-resent AFTER the 64th or 512th bit has been transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Maximum Transmission Unit (MTU)

What is a Runt / Giant / Baby Giant / Jumbo ?

A
  • Runt - a frame with fewer than 64 bytes (they are discarded)
  • *Giant - a frame that exceeds 1,518 bytes anything up to 1522 will not generate a baby giant error
  • *Baby Giant - a frame that is up to 1,600 bytes in length (baby giant error=1600)
  • Jumbo - is a frame that is up to 9,216 (newer frame sizes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the 4 types of IPv6 routes and their syntax (the order) ?

A

**** A fully specified route =
Mostly used when the outbound interface is multiaccess and could therefore be configured with multiple next hop addresses

IPv6 route {destination network/CIDR} {the routers outbound interface to the next-hop} {next-hop IPv6 address}

Ie… ipv6 route 2001:db8a/32 fa 0/1 2001:db8:b::1

.
.

**** A directly attached static route =
Specifies the destination and only the outbound interface. The router must assume the destination is reachable through this outbound interface

IPv6 route {destination network/CIDR} {the routers outbound interface to the next-hop}

Ie… ipv6 route 2001:db8a/32 fa 0/1

.
.

**** A recursive static route =
Specifies the destination and only the next-hop. This next-hop IPv6 address must be resolvable through the outbound interface

IPv6 route {destination network/CIDR} {next-hop IPv6 address}

Ie… ipv6 route 2001:db8a/32 2001:db8:b::1

.
.

**** A floating static route =
A floating static route is a backup route and can be any of the above 3 types with an Administrative Distance (AD) higher than the primary route. 5 is representing the AD in the 3 examples below:

(fully specified static route) ipv6 route 2001:db8a/32 fa 0/1 2001:db8:b::1 5

(directly attached static route) ipv6 route 2001:db8a/32 fa 0/1 5

(recursive static route) ipv6 route 2001:db8a/32 2001:db8:b::1 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
FHRP virtual MAC’s:
•	HSRP version 1?
•	HSRP version 2?
•	VRRP?
•	GLBP?
A

HSRP v 1 virtual MAC - 0000.0C07.ACxx
(Cisco proprietary)

HSRP v2 virtual MAC - 0000.0C9F.Fxxx
(Cisco proprietary)

VRRP -0000.5E000.01xx
(non proprietary)

GLBP - 0005.B400.xxyy
(Cisco proprietary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which Message Integrity Check (MIC) associations with which security protocol?

TKIP / CCMP / RC4 / AES / GCMP

WEP / WPA / WPA2 / WPA3

A
  • RC4 is for WEP - (Rivest Cipher 4)
  • TKIP is for WPA - (Temporal Key Integrity Protocol)
  • CCMP is for WPA 2 - (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
  • AES is for WPA 2 & 3 - (Advance Encryption Standard)
  • GCMP is for WPA3 - (Galois/Counter Mode Protocol)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What do the 4 control frames of 802.11 stand for?

RTS / CTS / ACK / PS

A
  • RTS - Ready to Send - manage interference
  • CTS - Clear to Send - manage interference
  • ACK - Acknowledgment - acknowledgment
  • PS - Power Save - client asks AP if frames might have been buffered while it was resting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Does OSPF support equal cost load balancing; does EIRGP?

A

OSPF does support equal cost load balancing

Don’t forget to issue the cli command
maximum-paths 8
to override OSPF’s default max of 4 equal cost paths in the routing table

EIGRP support BOTH equal and unequal cost load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the difference between link link state and distance vector from a routing table (not metric) perspective?

A

Distance vector protocols (like RIP, IGRP) send their entire routing table to directly connected neighbors

Link state protocols (like OSPF & IS-IS) send information about directly connected links to all the routers in the network - stays constantly connected

EIGRP is a Hybrid (but closer to Distance Vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Standard numbered ACL are number?

Extended numbered ACL are number?

A

1-99 and 1300-1999

100-199 and 2000-2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Cisco applications?
•	Cisco Network Assistant
•	Cisco DNA Center
•	Cisco PI
•	Cisco IOS
A

Cisco DNA Center - Browser based GUI for network configuration and centralized control - Enterprise management solution built specifically for Cisco’s SDA for building LANs using policies and automation

Cisco Network Assistant - Java based desktop application GUI for operations, diagnoses and interaction with devices (pre dates SDA and is not supported by SDA)

Cisco PI (Prime Interface) - Browser based GUI for operations, diagnoses and interactions with devices (pre dates SDA and is not supported by SDA)

Cisco IOS - Cisco’s CLI Operating System (OS) for switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What component creates VXLAN tunnels between the SDA switches?

A
  • The overlay network creates the VXLAN tunnels
  • The underlay network is a more traditional network configuration of switches

Alphabet soup:
Cisco’s Software Defined Networking (SDN)
is called Software Defined Access (SDA)
and is controlled by a Digital Network Architecture (DNA) controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the 4 main steps in order, to enable SSH for VTY lines?

A
  • hostname - give the router a name other than “Router”
  • ip domain-name - configure the domain name
  • crypt key generate rsa - generate an RSA key pair for the router
  • transport input ssh - finally, configure the VTY lines to use SSH

ip ssh time-out xy
command will be accepted by the router even before (the above commands are issued) SSH is setup - even though it would be irrelevant if SSH isn’t setup properly first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Route selection: AD vs longest prefix, when is one chosen over the other?

A

When multiple routes to a network exists and each route uses a different protocol - the router prefers the one with the lowest AD (Administrative Distance)

When multiple overlapping routes to a network exists, the router will select the route with the longest prefix length, the most specific route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the main difference between routing tables in EIGRP and OSPF?

A

EIGRP exchanges the complete routing information just one time when the neighboring routes are established. After that it only tracks the changes

OSPF keeps track of the whole topology database, of all the connection in the database consistently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What value (#) does a VoIP phone assign as a CoS priority to traffic it receives from form a host in its own access port by default?

What value (#) does a VoIP phone assign its own data traffic? / its own voice signaling traffic by default?

A

higher is better 0-7

  • 0 (zero) - The default behavior of a Cisco IP phone is to override the CoS value assigned by the host and reassign the lowest CoS priority value of a 0 to the data packets
  • 5 for VoIP data traffic (this is the voice)
  • 3 for voice signaling traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Does the global cli command
no lldp holdtime
prevent lldp from being held?

A

No!
lldp’s will always be held
no lldp holdtime
restores the lldp holdtime to the default setting of 120, effectively overriding any manual changes to the hold time

  • think of it as, don’t use any previous manual changes to the holdtime anymore

Manual changes can be made to the hold time from 0 - 65535 using the cli command
lldp holdtime x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Is PortFast automatically enabled on voice VLAN ports?

A

Yes; however, PortFast is NOT disabled if the voice VLAN is disabled

PortFast should only be enabled on access mode ports

PortFast can be applied globally or to the individual interface, the cli commands are:
• Global mode - spanning-tree portfast default
• Interface mode - spanning-tree portfast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Does
power inline police
restart a port if a Power Device (PD) attempts to draw more than its allocated amount of power?

A

No, by default it will error disable the port, forcing the administrator to shut and then no shut the port manually

If the global cli command
errdisable recovery cause inline-power
has been issued, the ports on that switch will recover from error disable caused by in-line power police, automatically

The default behavior of inline police can be change with the cli command
power inline police action log
this will not error disable the port in the event of a power incident, instead it will restart the port and send a log message to the console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Is the Site-Local unicast address used to form neighbor adjacencies in non-broadcast OSPF networks?

A

No, the Link-Local unicast address is used. Link local addresses always begin with FE8, FE9, FEA or FEB

Site-Local unicast addresses have been deprecated by RFC 3879 and are not used today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How many bits are in a MAC address, how many octets?

A

48 bits, and 6 octets of 8 bits each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What/where is the division between Organizational Unique Identifier (OUI) and the unique Network Interface Card (NIC)?

A

The divider is at 3 octets (out of 6) - 24 bit divider
[48 bits divided in 2]

MAC address are unique because they are broken down in two parts, like so:

OUI are assigned by the IEEE to identify the manufacturer

NIC are assigned by the manufacture to be unique among the products they produce

OUI——OUI—-OUI–|||–NIC—–NIC—–NIC
8bits / 8 bits / 8 bits ||| 8bits / 8 bits / 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

In general terms, define IaaS, SaaS and Paas?

A

IaaS - Infrastructure as a Service gives the greatest degree of freedom to the consumer over provisioning: processing, memory, storage and networking resources. The customer can install OSs and applications

PaaS - Platform as a Service the middle ground of the three services. It allows the customer to install programs and programing languages. Often used to create cloud-based databases and customer relationship management tools

SaaS - Software as a Service provides access to software running in the cloud. This option exposes the least amount of the customers network to the cloud. Often it is implemented as a browser-based access to application like an Office Suite or email services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
What do these 802.11 data frames stand for and what do each do?:
•****	FC
•****	DUR
•****	ADD1
•****	ADD2
•****	ADD3
•****	SEQ	
•****	ADD4 
•****	Data
•****	FCS
A
  • ** FC - Frame Control - is used to identify the type of 802.11 frame
  • ** DUR - Duration - used by Control Frames to indicate transmission times, also used by Power Save (PS) - poll control to indicate the (AID) Association Identity of the client
  • ** ADD1 - Source Address
  • ** ADD2 - Destination Address
  • ** ADD3 - BSSID Address
  • ** SEQ - Sequence is divided to store two pieces of information, the fragment number and the sequence number
  • ** ADD4 - Address 4 is only present when a frame is passing between devices in the (DS) Distribution System, basically from one AP to another AP
  • ** Data - this is the reason for it all - the data payload
  • ** FCS - Frame Check Sequence - it is used to determine if the frame as a whole, was corrupted during transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is
password 7 {hash}
used for?

A

password 7 {hash}
is a cli command that configures an encrypted virtual terminal (VTY) login password when issued in the VTY configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Difference between:

switch port-security violation restrict

switch port-security violation protect

switch port-security violation shutdown

A

restrict - will discard traffic it receives from unauthorized hosts. It will increment the SecurityViolation counter

protect - will discard traffic it receives from unauthorized hosts. It will not increment the SecurityViolation counter though

Stupid anagrams for Cisco's stupid naming convention:
R E s t r i c T 
i n c R E m e n T
----------------------------------
p r O T e c t
nOT

shutdown - will error-disable the port and will not come back unless
shut
no shut
is performed manually or
errdisable recovery cause shutdown
had previously been issued against the port

Note:
port-security violation discard
does not exist!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which character is the JSON mark for an Object identified by? and Array?

A

{
is the mark for the start of a JSON object - is a group of key and value pairs

[
is the mark for the start of a JSON array - arrays contain only values, an array can contain any of the other JSON types, including objects and even other array’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is WLSE / WDS / WiSM used for?

A

WLSE - Cisco’s Wireless LAN Solution Engine - simplifies the management and deployment of WAP’s (Wireless Access Point)

WDS - Wireless Domain Services - is a component used in Cisco’s Autonomous WLAN solution - it’s a feature that is installed on AP’s to enable interaction with WLSE (like client software for the WLSE)

WiSM - is a physical Wireless Service Module that can be installed on a Catalyst 6500 switch of 7600 router to function as a WLC

WLC - Wireless Lan Controller - provides wireless LAN services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is in the EIGRP Routing table?

A

EIGRP Routing table – ONLY successors! It stores only the best routes to reach a remote network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Other than “none,” name the 6 Layer 2 wireless security settings and the 4 of the Layer 3 wireless security settings.

A

Layer 2:
• WPA+WPA2 ============ Wi-Fi Protected Access
• 802.1x ================= Port Based Access Control - works with RADIUS
• Static WEP ============= Wired Equivalent Privacy
• Static WEP + 802.1x
• CKIP ================== Cisco Key Integrity Protocol
• None + EAP Passthrough = Resolution Extensible Authentication Protocol

Layer 3:
•	IPSec ================= IP Security
•	VPN Passthrough
•	Web Authentication
•	Web Passthrough
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is lldp’s Cisco cousin?

A

LLDP’s Cisco-proprietary cousin is CDP (Cisco Discovery Protocol)

Cisco switches have LLDP off by default, because they prefer CDP

69
Q

What ports are:?

FTP
SMTP
DHCP
TELNET
TFTP
SNMP
SSH
A
FTP	        20-21	TCP
SMTP	25	        TCP/UDP
DHCP	67-68	UDP
TELNET	23	        TCP
TFTP	69	        UDP
SNMP	661-662	UDP
SSH	        22	        TCP
70
Q

What are these protocols:?

  1. 1s
  2. 1d
  3. 1w
  4. 1q
  5. 1x
A
  1. 1s MST (Multi Spanning Tree Protocol)
  2. 1d STP (Spanning Tree Protocol)
  3. 1w RSTP (Rapid Spanning Tree Protocol)
  4. 1q DOT1q tagging
  5. 1x network authentication protocol RADIUS
71
Q
High side Powers of 2:
8xxx
16xxx
32xxx
65xxx
A

8192
16384
32768
65536

72
Q
What are each of these IPv6 addresses called:?
2000::/3
FC00::/8
FF00::/8
FD00::/8
FE80::/10
A
2000::/3 - Unique Global Unicast
FC00::/8 - Unique Local Unicast
FF00::/8 - Mulitcast
FD00::/8 - Unique Local Unicast
FE80::/10 - Link Local Unicast
73
Q

When does a router become an ASBR automatically?

A

When the cli
default-information originate
is issued on a router

ALSO, if the cli command
redistribute
is entered, it will also become an ASBR

74
Q

What is the binary for Unique Local Unicast:

FC and FD

A

For FC or FD the first 7 bits of their address are always 1111110x

FC = 11111100 
FD = 11111101
75
Q

What is EPG?

A

EndPoint Groups is a group of EndPoints

The EndPoint Group (EPG) is the most important object in the policy model - part of APIC (Application Policy Infrastructure Controller)

  • Endpoints are devices that are connected to the network directly or indirectly
  • An EPG is a managed object that is a named logical entity that contains a collection of endpoints
76
Q

OSPF (DR & BDR)
Timers? Defaults?

  • Broadcast
  • NonBroadcast
  • Point-to-Point
  • Point-to-Multipoint Broadcast
  • Point-to-Multipoint NonBroadcast
A

Broadcast
Hello/dead timers 10 / 40
******default for Ethernet & FDDI

NonBroadcast =
Hello/dead timers 30 / 120
******defaults for Frame Relay & X.25

Point-to-Point =
Hello/dead timers 10 / 40
******defaults for HDLC & PPP

Point-to-Multipoint Broadcast =
Hello/dead timers 30 / 120

Point-to-Multipoint NonBroadcast =
Hello/dead timers 30 / 120

77
Q

What is Cisco PI?

A

Cisco PI (Prime Interface) - Browser based GUI for operations, diagnoses and interactions with devices (pre dates SDA and is not supported by SDA)

78
Q

Is PortFast applied globally or individual to an interface?

A

PortFast can be applied globally OR to the individual interface, the cli commands are:

  • Global mode - spanning-tree portfast default
  • Interface mode - spanning-tree portfast
79
Q

What protocol is Backbone fast part of and what does it do?

A

BackboneFast - increases convergence on a switch that detects a failure on links that are not directly connected

80
Q

What is TLV part of and what does it describe?

A

Link Layer Discovery Protocol (LLDP) is an open standard protocol that provides (TLV):
Type
Length
Value

info includes:

  • port description
  • system description
  • management address
81
Q

What do Link Local addresses always begin with? (4 answers)

A

Link Local addresses always begin with FE8, FE9, FEA or FEB

82
Q

What is CDP default Send/Hold timers?

A

CDP

send time is 60 seconds

hold time of 180 seconds

by default

83
Q
Which wireless QoS levels service are equal to?:
	Platinum =
	Gold = 
	Silver = 
	Bronze =
A
Platinum = 	Voice / Wireless (CAPWAP) / Network Control
Gold = 		Video / Mission Critical
Silver = 		Default for WLAN and WLC (a.k.a. best effort) - most traffic is here
Bronze =	        Guest network / Scavenger / Bulk
84
Q

Which protocol is missing from the Layer 3 wireless security settings?:

  • IPSec
  • VPN Passthrough
  • Web Passthrough
A

• Web Authentication

85
Q

Does switch port-security violation protect increment the SecurityViolation counter?

A

Port-Security:
protect - will discard traffic it receives from unauthorized hosts

It Will NOT increment the SecurityViolation counter

prOTect
..nOT….

86
Q

How many WLC dynamic interfaces are there per WLC?

A

There are 512 dynamic interfaces per WLC

87
Q

What does switchport priority extend trust do?

A

Causes the switch to tell the IP phone to trust the CoS priority of incoming (from the phone’s own host) data packets

The phone will not override the CoS values from the host

  • extending the trust “all the way” to the host
  • trust the host to assign it’s own CoS values
88
Q

What is in the EIGRP Topology table?

A

EIGRP Topology table – stores ROUTING INFORMATION learned from neighbor routing tables

contains the routes for the successors and feasible successors

89
Q
Is 
routerA(config) #domain-name example.com
the proper mode and formatting to configure a domain name for a DHCP pool?
A

No,
this cli command must be performed in the DHCP Pool Configuration mode
routerA(dhcp-config)#
From this mode you can enter the cli command
domain-name {name}

BUT first, in order to enter dhcp configuration mode and assign a domain-name, you must have previously created a dhcp pool name to begin with by using
ip dhcp pool {name}
issuing this cli command automatically puts you in dhcp configuration mode

Also, the global configuration cli command
ip dhcp excluded-address {addresses}
is often used to prevent a set of address that maybe reserved for static IP’s from being issued

90
Q

VTP (VLAN Trunking Protocol) has VTP v2 disabled by default. What are the advantages of turning VTP v2 on?

A

If v2 is setup on all switches on VLAN it will allow VTP advertisements to be forwarded when they are in transparent mode. All switches must be running the same version of VTP

91
Q

Difference between EIGRP and OSPF’s protocol TYPE?

A

EIGRP is a Hybrid protocol (both Distance Vector and Link State)

OSPF is a Link State protocol

92
Q

What 3 modes are part of VTP and what can they do of the below list?

Create, modifies and delete VLANs
Sends and forwards advertisements
Synchronizes VLAN configurations

A

Server:
+ Create, modifies and delete VLANs
+ Sends and forwards advertisements
+ Synchronizes VLAN configurations

Client:
- Can NOT create, modify or delete VLANs
+ Sends and forwards advertisements
+ Synchronizes VLAN configurations

Transparent:
+ Create, modifies and delete VLANs
+/- Forwards advertisements (DOESN’T send)
- Does NOT Synchronizes VLAN configurations

93
Q

IPSec’s main responsibility is to provide what three features?

A
  • Data Confidentiality (It’s private)
  • Data Integrity (It’s accurate)
  • Origin Authentication (It came from the right source)

CIA - Confidentiality - Integrity - Authentication

94
Q

Distance Vector vs Link State path calculation differs how?

Which one knows the entire topology?

A

Distance Vector = Hop Count

Link State = Link Cost

Link State knows the entire topology at all times

95
Q

LLDP - global configuration or interface configuration commands?

lldp transmit / no lldp run / lldp receive / lldp run

A

LLDP (Link Layer Discovery Protocol)

lldp transmit / lldp receive = interface command

lldp run / no lldp run = global command

96
Q

What are each of these protocols (or method) associated with?

  • SA
  • AH
  • ESP

GRE works with any Layer 3 protocol, it’s generic nature makes it weaker than what 3 other specific Layer 3 security protocols?

A
  • SA (Security Association) = works with IKE+SA and/or IPSec+SA
  • AH (Authentication Header) = embedded within a packet
  • ESP (Encapsulating Security Payload) = encapsulates a packet as part of IPSec
  • GRE (Generic Routing Encapsulations) is weaker than:
  • *** IPSec - IP Security
  • *** PPPoA - Point-to-Point Protocol over ATM
  • *** PPPoE - Point-to-Point Protocol over Ethernet
97
Q

What is FIFO?

A

FIFO is a queuing method based on First In First Out theory

It offers no packet prioritization, therefore it is considered a Congestion Management method, not Congestion Avoidance

If the queue is full, all packets destined for that queue are dropped until existing packets in the queue can be processed, freeing up room in the queue. This method unfortunately causes burstiness, jitter and delay

98
Q
What are the AD distances of?:
iBGP
EIGRP Summary Route
eBGP
IGRP
External EIGRP
Static Route
A
iBGP 			        200
EIGRP Summary Route 	5
eBGP 		 	        20
IGRP 			        100
External EIGRP 		170
Static Route 		        1
99
Q
Identify the letter abbreviations for protocol in show ip route?:
I
*
E1
C
S
O
L
E
R
B
IA
E2 
D
M
EX
A
I	IGRP
*	default route
E1	OSPF external type 1
C	connected
S	static
O	OSPF
L	Local host route
E	EGP
R	RIP
B	BGP
IA	OSPF inter area route
E2	OSPF external type 2
D	EIGRP
M	Mobile
EX	EIGRP External
100
Q

What is a EIGRP Feasible successor?

A

Feasible successors are backups routes that can be used if the successor route goes down
They are guaranteed to represent a loop-free path to a destination

Feasible successors has an AD that is less than the Feasible Distance (FD) of the successor. If the AD of a route is greater than the FD of the successor, the route cannot be guaranteed to be free of loops and cannot be chosen as a feasible successor.

101
Q

What is an EIGRP successor?

A

An EIGRP successor is the best route to a destination. The successor is the route with the lowest Feasible Distance (FD), which is the best metric along a path to a destination

102
Q

What is EIGRP Feasible Distance (FD)?

A

The FD is the metric to a neighbor router plus that neighbor router’s AD to the destination network

103
Q

What is the normal OSPF neighbor state for a router that is neither the DR or BDR?

What are the 7 states of OSPF adjacency?

A

2 way

```
Remember 7 states of the IT ELF:
Down
Init
Two-Way
Exstart / Exchange
Loading
Full
~~~

104
Q

If the router ID is not manually set, how is it determined and what is the order?

A

The router will use an interface IP address as its ID

  1. The highest IP address among loopback interfaces
  2. Then by the highest IP among physical interfaces (if no configured loopback exists)
105
Q

What is an OSPF priority value used for, how are they communicated, and what is the default value?

A

The priority value is used for electing Designated Router (DR) and Backup Designated Router (BDR). The DR is typically the router with the highest OSPF priority

Elections happen via Link State Advertisements (LSA)

The default OSPF priority value is 1

Note: If priorities are equal among routers than the DR will become the one with the highest router ID

106
Q

What is the FHRP router priority set to by default for - HSRP?

What is the FHRP router priority set to by default for - VRRP?

A

Both HSRP and VRRP router priority is set to 100 by default

107
Q

What is the difference between RED and WRED?

A

Both are a Congestion Avoidance method to attempt to prevent to prevent Tail Drop and Global Synchronization

RED (Random Early Detection) prevents this by randomly dropping packets based on mark proximity denominator, which is a fraction of packets that should be dropped when a queue reaches its minimum threshold. Red does not care if the packet being drop is high or lower priority, it is random

WRED (Weighted Random Early Detection) congestion avoidance technique is to selectively drop packets when the output queues reach a predefined threshold, called a Service Level. It selects packets to drop based on precedence, so low priority packets are dropped before high priority packets are

108
Q

What is Global Synchronization?

A

Global Synchronization, is an event which occurs when - due to congestion each sender will reduce their transmission rate and RED may start drops packets, causing packet loss; this can sync-up the re-sends and create big “waves” of stopping and starting

109
Q

What is the advantage of a K9 image over other images?

A

K9 images provide cryptographic functionality required to enable SSH ad IPSec

• NPE Image
• WAN image
• Advanced IP Services Package
• Advanced Enterprise IP Services Package
Do not support cryptographic functionality. However, some of these do have K9 versions of these images with the word K9 prefacing the name to indicate that they are K9 images, but NOT NPE, they are for countries with restrictions

110
Q

Are OSPF DR and BDR elections performed on any form of Point to Point or Point to Multi-Point networks?

A

NO

This however, does not directly relate to whether the network needs manual configuration of neighbors!

Point to Point and Point to Multi-Point Broadcast send multicasts and no NOT need manual configuration of neighbors

However, Point to Multi-Point Nonbroadcast DOES need manual configuration of neighbors

111
Q

Which type of OSPF networks use 10/40 hello/dead timers and what are the other hello/dead timers set at?

A

10/40:
Broadcast
Point to Point
Point to Multipoint broadcast

30/120:
NonBroadcast
Point to Multipoint NonBroadcast

112
Q

Do OSPF Process ID’s have to match in order to form neighbor adjacencies?

A

In OSPF the Process ID’s do NOT have to match in order to form neighbor adjacencies
However, in EIGRP they do have to match

113
Q

Do OSPF Router ID’s have to match in order to form neighbor adjacencies?

A

No, they MUST NOT match, they have to be unique

Router ID’s are derived from the HIGHEST loopback address, or in the absence of a loopback address the HIGHEST configured IP address

114
Q

Define EIRGP concepts of Bandwidth and Delay?

A

Bandwidth refers to data throughput of a link

Delay refers to the length of time required to send a packet to a destination

115
Q

What 8 services/protocols does the
ip helper-address
assist with broadcast to reach the desired service?

A
NTP
TACACS
DNS
Bootstrap Protocol (BOOTP) and DHCP Port 67
Bootstrap Protocol (BOOTP) and DHCP Port 68
TFTP
NetBIOS
NetBIOS Datagram
116
Q

How many incidents of
ip helper-address
are allowed?

A

ip helper-address
command is not limited. There can be multiple incidents pointing to multiple different addresses of the same service and/or multiple incidents point to addresses of different services

117
Q

What is MIB, NMS & OID and and what protocol do they interact with?

A

SNMP:

  • Management Information Base (MIB) is a hierarchical database of objects an SNMP agent uses to read and display information
  • Network Management Station (NMS) is used to extract information from an SNMP agent
  • Objects in the MIB are known as Object ID’s (OID)

By using MIB, SNMP can perform complex management tasks, such as automated backups through the network

118
Q

What is NMS & name 4 commands used by NMS?

A

Network Management Station

Get
GetNext
GetBulk
Set

Trap and Inform are NOT used by NMS but are used by SNMP agents to alert the NMS

119
Q

Which is the correct method, to encrypt a password to access privilege level 7?

enable secret level 7 password

enable secret 7 password

A

enable secret level 7 password

120
Q

Which is the only security protocol that can establish a VPN tunnel through and untrusted network?

Name 3 security protocols than can’t

A

IPSec, with the help of IKE, SA

GRE, PPPOE and PPOA cannot establish a tunnel through an untrusted network

121
Q

How do you enter ACL configuration mode for a standard numbered access-list?

How do you enter ACL configuration mode for a extended numbered access-list?

and

How do you enter ACL configuration mode for an standard named access-list?

How do you enter ACL configuration mode for an extended named access-list?

A

access-list {number 1-99 or 1300-1999}

access-list {number 100-199 or 2000-2699}

and

ip access-list standard {name}

ip access-list extended {name}

122
Q

Which should be placed higher in the ACL, less specific or more specific?

A

ACL’s are procced from top to bottom, so it is important to place more specific entries higher than less specific entries so they are processed first

123
Q

All ports have DTP turned off by default on Cisco switches. T or F?

A

False, Layer 2’s Dynamic Trunking Protocol is set to AUTO by default on all Cisco switches to determine whether an interface should be a truck or an access port

124
Q

Manually configuring trunk mode or access mode on a port, effective disables DTP

What other cli command can you issue to disable DTP, and should you still issue it on a port manually configured as trunk or access ports?

A

Cli command
switchport nonegotiate
will disable DTP on a port.

This command should be run even on ports that are manually configured as trunk or access ports

125
Q

What cli command do you issue to enable trunking mode, access mode?

A

TRUNK:
Once in interface configuration mode, to enable trunking manually on a port use the cli command
switchport trunk encapsulation {*protocol} *This protocol will almost always be .dot1q

Then to complete the trunk protocol use the cli command
switchport mode trunk

ACCESS:
Once in interface configuration mode, to enable an access port manually use the cli command switchport access

126
Q

What is the main difference between IPv6 addresses FF02 versus FF05?

A

Both are Multicast Addresses as the fall into the FF00 to FFFF range

BUT - one is routable and the other isn’t

FF02 is a link-local address and is not routable at all, it is only valid on it’s local segment

FF05 is a site local multicast address and is routable within a single site of an organization, not fully within the organization or globally
HOWEVER, Site-local unicast addresses have been deprecated by RFC 3879 and are not used today

***Look closely and don’t confuse FF05 with FF02::5, which is the all OSPF routers multicast address!

127
Q

What are the addresses 127.0.0.0, 169.254.0.0/16, 192.0.2.0/24 and 172.16.0.0 used for?

A
  1. x.x.x is used for loopback addresses
  2. 254.0.0/16 is reserved by IANA for auto-configuration of link-local address when a dynamic IP address can not be obtained from DHCP
  3. 0.2.0/24 one of the address which is reserved for documentation
  4. 16.0.0 through 172.31.255.255 is reserved by RFC 1918 as private IP address space and is not globally routable, along with 10.x.x.x and 192.168.x.x
128
Q

192.0.2.0/24 and 198.51.100.0/24 and 203.0.113.0 are all used for what?

A

IANA has reserved these addresses for documentation and example code.

Also, the domain names example.com and example.net

129
Q

State the prefix for each of the following IPv6 MULTICAST addresses:

Node-local
Link-Local 
Site-Local
Organization-Local
Global

and what is the full prefix range for multi cast address?

A
FF01::/16 - Node-local
FF02::/16 - Link-Local
FF05::/16 - Site-Local
FF08::/16 - Organization-Local
FF0E::/16 - Global

The full range of IPv6 multicast addresses is FF00 to FFFF

130
Q

Cli command
mls qos trust cos
does what?

Cli command 
switchport priority extend cos 
does what?
***********ALERT - this is not the
switchport priority extend trust
command!!!
A

mls qos trust cos
tells the switch to trust both voice and data sent through the IP phone

switchport priority extend cos
tells the phone to override the priority of the data packets it gets from it’s own host and assign new CoS values to those host generated packets. This prevents the computer from utilizing the high-priority queue

131
Q

What is the default mode for VTP?

A

Server mode

132
Q

Which DTP protocol can convey VTP information: CDP or LLDP?

A

The Cisco proprietary protocol CDP will pass VTP information

133
Q

Link Aggregation - PAgP is EtherChannel’s protocol - does it use the terminology

Active and Passive

or

Auto and Desirable

and is the option “on” part of EtherChannel?

A

EtherChannel uses:
Auto, Desirable and On

So “on” IS part of EtherChannel

.

**Remember: LACP is LAG’s protocol so think:
ACtive = lACp
“AC”tive = L“AC”P

134
Q

What is the difference between DTP and VTP?

A

DTP should not be confused with VTP, as they serve different purposes

DTP aids with trunk port establishment

VTP communicates VLAN existence information between switches. It is used to centrally manage virtual local area networks and to propagate changes across all devices in the VTP domain

Think of it like:
DTP = Establish
VTP = Maintain (uniformity)

Neither protocol transmits the actual data frames that the trunks carry

135
Q

What does Loop Guard do?

A

Loop Guard is a Spanning Tree Protocol feature that prevents a switch port from transitioning to the forwarding state when it stops receiving BPDU’s

It places inconsistence ports in to a blocking state within the STP environment

136
Q

Do trunk ports appear in the output of cli command

show vlan?

A

No, only access ports are displayed in the out put of
show vlan

To display trunks, you need the cli command
show interfaces trunk

137
Q

What field in an 802.11 MAC frame is used to indicate whether it is a management frame?

A

The first field, FC or Frame Control

138
Q

What type of 802.11 frames are the following:
beacon,
association request & association response,
probe request,
Power-save poll?

A

Beacon, association response and probe request/response are all MANAGMENT FRAMES. They manage the connection between the AP’s and the wireless clients
**Note: all frames with “authentication” or “association” in the name are management frames

power-save is a CONTROL FRAME - they are used to manage access to the wireless medium, other control frames include, RTC, CTS and ACK (Control Frames are traffic cop managing access on the road)

DATA FRAMES are the data and general exist in two categories, (CF) Contention Free and Contention-Based. Most wireless networks operate in a contention based infrastructure

139
Q

In a Split-MAC environment, what are the WLC’s responsibilities?

A

The WLC handles tasks that are not time-sensitive, such as:

lightweight AP configuration management,
client load balancing,
authentication,
resource reservation
security management

LCARS

Remember:
the AP’s handle the frames and
the WLC handles the management functions

140
Q

In a Split-MAC environment, what are the AP’s responsibilities?

A
Real-time processing of data
Responding to beacons and probe messages
Encryption
Packet prioritization
Sending management information to the WLC

Remember:
the AP’s handle the frames and
the WLC handles the management functions

141
Q

What does
maximum-paths 8
do?

A

maximum-paths 8
is used to override OSPF’s default max of 4 equal cost paths in the routing table so that it can more efficiently support equal cost load balancing

142
Q

Is Root Guard applied Globally or Per Port?

A

spanning-tree guard root

is Root Guard’s cli command and is applied per port ONLY. It is not global command

143
Q

Language and Transport for:
Northbound’s Protocol: REST?
Southboound’s Prorocol: NetConf?

A
Northbound = REST:       XML - JSON - HTTP
Southbound = NetConf: XML - RPC    - SSH
144
Q

Where is
ip arp inspection trust
applied?

A

ip arp inspection trust

is applied in the interface configuration mode - NOT globally

145
Q

Is
RouterA(config)#domain-name example.com
a valid cli command?

A

No, it must be done in interface configuration mode

RouterA(dhcp-config)#domain-name example.com

Note:
ip domain-name example.com
is invalid syntax!

146
Q

What is the frequency that a switch will send LLDP LSA’s?

A

By default a switch will send an LLDP Link State Advertisements (LSA’s) every 30 seconds, and the hold time is 120 seconds

147
Q

Which is correct

switchport port-security 2
or
switchport port-security maximum 2

when attempting to limit the traffic on a port to two MACs?

A

switchport port-security maximum 2

is the correct syntax

148
Q

crypto key generate rsa

will automatically enable ssh on a router. T or F?

A

True

149
Q

What is a switch stack?

A

The switch stack is a feature that allows configuration of multiple Cisco switches in a way that they appear as a single switch and act cooperatively

150
Q

What does an “embedded AP deployment” mean?

A

This simply means that the WLC is not a standalone item, it is (part-of) embedded within a stack of switches that are acting as one

Ultimately, there isn’t much difference between:
a lightweight AP deployment that connects to a standalone WLC
or
a lightweight AP deployment that connects to an embedded WLC within a switch stack

151
Q

What does CAPWAP stand for?

A

Control and Provisioning of Wireless Access Points

152
Q

How many tunnels does CAPWAP use and what do the logical tunnels separate?

A

CAPWAP uses 2 tunnels between AP’s and the WLC:

one for Data
and
one for Control

153
Q

Which are correctly formatted cli commands and which mode must they be entered?

domain-name example.com
ip domain-name example.com
dhcp pool example.com
ip dhcp pool example.com

A

Router1(config) #ip dhcp pool example.com
is correct if issued in global configuration mode. This must come first in order to create the dhcp configuration mode needed for the domain command

Router1(dhcp-config) #domain-name example.com
is correct if issued in dhcp configuration mode

154
Q

What cli command should you issue after entering the dhcp pool name?

Does it take a wildcard mask or a subnet mask?

A

The cli command to specify what network addresses to use in the pool is:

network n.n.n.n s.s.s.s
example:
network 192.168.2.10 255.255.255.240

or

network 192.168.2.10/28
Note: you can use a CIDR notation in the cli for this command

You cannot use a wildcard mask, you must use a subnet

155
Q

What is dhcp manual binding?

A

use of the host command will allow you to specify a specific address for a specific host each and every time it request an address from a dhcp server

An example of the cli is:
host 192.168.1.50/26
client-identifier 0001.oc14.5432

156
Q

What does the cli
ip address dhcp
do?

A

ip address dhcp

configures an interface to become a dhcp client

157
Q

What does the cli command
ip ssh version 2
effectively do?

A

It ensures that the device will only accept connections from SSH version 2 (aka NOT SSH v.1)

158
Q

What 3 tables do EIGRP routers maintain and what do they contain?

A

Routing table - only successors (best routes)

Topology table - successors and feasible successors

Neighbor table - lists all adjacent routes including routes that are not successors or feasible successors

159
Q

Which address is Link Local?

FF02::/16
or
FE80::/10

A

Both are link local!

FE80 is Link Local Unicast
and
FF02 is Link Local Multicast

160
Q

Describe the difference between

Inside Global Address

Inside Local Address

A

Inside Global Address - is an IP address that represents an inside host as seen by host on the outside network. In other words, it is not the REAL IP address of the host

Inside Local Address - is the REAL IP address of the host

161
Q

What encryption values (#) are available to:
enable password
and
enable secret

A

enable password uses 0, 4 and 5
but 0 is no encryption and 4 has been deprecated (so basically, 5)

enable secret uses 0 and 7
0 is no encryption and 7 is a Cisco proprietary encryption (so yea, 7)

162
Q

How many 1’s do these IPv6 addresses start with?:
Unique Local
Link Local
Multicast

A

Link Local - the first 10 bits - 11111111010

Unique Local - the first 7 bits - 11111110

Multicast - the first 8 bits - 11111111

163
Q

SOF stands for what and what field (#) is it in the ethernet frame?

A

Start of Frame comes 2nd (after Preamble) in the ethernet frame

164
Q

Which frame type lists the destination first

Ethernet (802.3) or Wireless Ethernet (802.11)?

A

Ethernet (802.3) is Destination first and then Source (3rd and 4th fields)

Wireless Ethernet (802.11) is Source first and then Destination (in the 3rd and 4th fields)

165
Q

Do the Fabric, Overlay network and Underlay network all lay south of the DNA controller?

A

Yes

166
Q

What are the 4 steps of creating a WLAN using the WLC GUI?

A
  • Type - select the type of WLAN (a standard WLAN is the default for this step, so you would not have to use the drop down box to select it)
  • Profile Name - give it a Profile Name
  • SSID - name the SSID
  • ID - Choose a (VLAN) ID
167
Q

What does PSK stands for and what is it used for?

What are other forms of X* (*the function PSK provides)?

A

Passphrase = PSK (Pre Shared Key)

802.1x uses a RADIUS for keying

CCKM uses Cisco fast rekeying without the need for WLC intervention

168
Q

Does LLDP use LSA’s?

A

NO!!!
LLDP is Link Layer Discovery Protocol
LSA’s (Link State Advertisements) are part of OSPF