Module 6 Quiz Flashcards
Match the OSPF neighbour state with its description.
The routers have established adjacency.
Answer 1
Full
No information received yet.
Answer 2
Down
The information exchange is finalising.
Answer 3
Loading
Router share information about their links.
Answer 4
Exchange
The process-related values in the state field may be one of the following:
- Down: No information received yet.
- Init: Received a hello packet from this neighbour but has not started bidirectional communication.
- 2-Way: There is bidirectional communication with a neighbour.
- ExStart: Routers decide on an information sequence number. The sequence number is used to guide the exchange process.
- Exchange: Router share information about their links.
- Loading: The information exchange is finalising.
- Full: The routers are now full neighbours (referred to as becoming adjacent or having adjacency).
A Cisco ISR may also be configured to act as a DHCPv6 server. Communication between the host and the router are based on the messages of the Neighbor Discovery Protocol (NDP). When a host device comes on-line, it sends a Router Solicitation (RS) message; the router will then respond with a Router Advertisement (RA) message. Using this communication process, a host device may be assigned an address in one of three ways. Match the assignment process with its description.
The local router provides a network prefix, which the hosts use to allocate themselves an address based on their MAC address, using EUI-64, but also provides additional information such as a DNS-server address or domain name.
Answer 1
Stateless DHCPv6
The local router provides a network prefix, which the hosts use to allocate themselves an address based on their MAC address, using EUI-64.
Answer 2
SLAAC
The router keeps track of a pool of addresses and all information that the host requires, including addresses, are provided by the router (DHCPv6 server).
Answer 3
Stateful DHCPv6
A Cisco ISR may also be configured to act as a DHCPv6 server. Communication between the host and the router are based on the messages of the Neighbor Discovery Protocol (NDP). When a host device comes on-line, it sends a Router Solicitation (RS) message; the router will then respond with a Router Advertisement (RA) message. Using this communication process, a host device may be assigned an address in one of three ways:
- Stateless Address Auto-configuration (SLAAC): The local router provides a network prefix, which the hosts use to allocate themselves an address based on their MAC address, using EUI-64.
- Stateless DHCPv6: The local router provides a network prefix, which the hosts use to allocate themselves an address based on their MAC address, using EUI-64, but also provides additional information such as a DNS-server address or domain name.
- Stateful DHCPv6: This is the IPv6 equivalent of DHCPv4. The router keeps track of a pool of addresses and all information that the host requires, including addresses, are provided by the router (DHCPv6 server).
*
OSPF can be used in a multi-vendor environment.
Select one:
True
False
OSPF is a hierarchical protocol that works on the principle of areas. Devices only need to become neighbours of devices in the same area.
Issuing the following commands is enough to enable SLAAC on a Cisco ISR.
True
False
Which of the following statements is not true regarding IPv6 ACLs?
Select one:
a.
IPv6 ACLs do not use wildcard masks, they use a IPv6 prefix / prefix length syntax, similar to configuring IPv6 on an interface.
b.
They are assigned to an interface using an IPv6 traffic-filter command, instead of an ip access-group command.
c.
All IPv6 ACLs are numbered, standard ACLs.
It is also possible to declare IPv6 ACLs. IPv6 ACLs have the following key features:
- All IPv6 ACLs are named, extended ACLs.
- IPv6 ACLs do not use wildcard masks, they use a IPv6 prefix / prefix length syntax, similar to configuring IPv6 on an interface.
- They are assigned to an interface using an IPv6 traffic-filter command, instead of an ip access-group command.
LLDP was defined in IEEE standard 802.1AB in order to provide a standardised means to provide the same information and features as CDP.
Select one:
True
False
CDP was defined before there were any standardised means of communicating device information among neighbours. LLDP was defined in IEEE standard 802.1AB in order to provide a standardised means to provide the same information and features as CDP.
Which one of the following is not information that can be provided by DHCP?
Select one:
a.
Subnet mask
b.
DNS server address
c.
Default gateway address
d.
MAC address
e.
IP address
DHCP may be used to provide some or all of the following information to a host device:
- IP address
- Subnet mask / prefix
- Default gateway address
- DNS server address
- Time server address
- Domain name
*
Which of the following is not a benefit of VLANs?
Select one:
a.
Improved security.
b.
Improved IP address maintenance.
c.
Improved usage of office space.
d.
Improved resource usage.
VLAN 787 is considered a normal range VLAN.
True
False
Cisco switches support 2 ranges of VLANs:
- Normal range: 1 – 1005
- Extended range: 1006 – 4094
Given the following output:
Which command(s) are necessary to generate this output?
R1# show ip nat translations
map pat tcp translations ip nat show view
R1# show ip nat translations
Which commands are required to configure gig0/0 to carry traffic for VLANs 10 and 20? The subinterfaces should be numbered to match the VLAN they are associated with. VLAN 10 should be associated with the network 192.168.10.0 /24 and VLAN 20 with 192.168.20.0 /24.
KRS (config)# int gig0/0.10
KRS (config-subif)# encapsulation dot1q 10
KRS (config-subif)# ip address 192.168.10.1 255.255.255.0
KRS (config-subif)# int gig0/0.20
KRS (config-subif)# encapsulation dot1q 20
KRS (config-subif)# ip address 192.168.20.1 255.255.255.0
KRS (config-subif)# exit
KRS (config)# int gig0/0
KRS (config-if)# no shutdown
vlan no gig0/0.10 shutdown 192.168.20.1 gig0/0 gig0/0.20 encapsulation ip 192.168.10.1 192.168.20.0 192.168.10.0 dot1q
KRS (config)# int gig0/0.10
KRS (config-subif)# encapsulation dot1q 10
KRS (config-subif)# ip address 192.168.10.1 255.255.255.0
KRS (config-subif)# int gig0/0.20
KRS (config-subif)# encapsulation dot1q 20
KRS (config-subif)# ip address 192.168.20.1 255.255.255.0
KRS (config-subif)# exit
KRS (config)# int gig0/0
KRS (config-if)# no shutdown
Given the following topology:
Which commands are necessary to configure DHCPv4 for the 192.168.50.0 /27 network? The DHCP server should
Exclude addresses as necessary.
Provide devices with an IPv4 address and subnet mask.
Provide devices with the default gateway address.
R1 (config)# ip dhcp excluded‑address 192.168.50.1 192.168.50.2
R1 (config)# ip dhcp pool MY_POOL
R1 (config-dhcp)# network 192.168.50.0 255.255.255.224
R1 (config-dhcp)# default‑router 192.168.50.1
192.168.50.2 255.255.255.0 default‑gateway pool default‑router address dns‑server 255.255.255.224 excluded‑address 192.168.50.1 network
R1 (config)# ip dhcp excluded‑address 192.168.50.1 192.168.50.2
R1 (config)# ip dhcp pool MY_POOL
R1 (config-dhcp)# network 192.168.50.0 255.255.255.224
R1 (config-dhcp)# default‑router 192.168.50.1
Match the type of NAT with its description.
Multiple private / local addresses are mapped to one or more public or global addresses, but with the addition of port numbers to create unique socket-based tracking of specific conversations.
Answer 1
Port address translation
One specific private / local address always maps to the same public / global address.
Answer 2
Static NAT
Multiple private / local addresses are mapped to one or more public / global addresses.
Answer 3
Dynamic NAT
Given the following topology:
Which commands are required to set up static NAT for the private address 192.168.10.55 to the public address 200.50.70.2?
R1 (config)# ip nat inside source static 192.168.10.55 200.50.70.2
R1 (config)# int s0/0/0
R1 (config-if)# ip nat outside
R1 (config-if)# int gig0/0
R1 (config-if)# ip nat inside
in static 200.50.70.2 101 2 inside 192.168.10.55 list 102 outside 1 source out
R1 (config)#ip nat inside source static 192.168.10.55 200.50.70.2
R1 (config)# int s0/0/0
R1 (config-if)# ip nat outside
R1 (config-if)# int gig0/0
R1 (config-if)# ip nat inside
An organisation is running OSPF in their network. They have 4 routers in a single area. The priorities of the 4 routers are set as follows:
Router A: Default priority
Router B: 10
Router C: 20
Router D: 0
Once the DR / BDR elections have concluded, which one of the following statements is true regarding this configuration?
Select one:
a.
Router D is a DROTHER.
b.
Router B is DR.
c.
Router C is the BDR.
d.
Router A has a priority of 0.
Given the following output:
Which command(s) are necessary to generate the given output?
S1# show cdp neighbors
neighbors translations show dhcp display cdp
S1# show cdp neighbors
The output provided by the command includes the following:
- Legend: The legend at the top of the output indicates what the capability codes are.
- Device ID: The hostname of the neighbour.
- Local interface: The interface on the current device (S1) on which the information was learned.
- Holdtime: A countdown timer. If this timer expires, the CDP neighbour is taken out of the list.
- Capability: What type of device it is (read using the legend).
- Platform: The model number of the device.
- Port ID: The interface on the remote device (neighbour) out of which the advertisement was sent, i.e. to which the local device is connected.
This configuration is an example of stateful DHCPv6:
Select one:
True
False
With stateless DHCPv6 in place, the configuration can be upgraded to stateful DHCPv6 by performing the following steps:
Expand the DHCPv6 pool to include address information, i.e. a prefix.
Setting a configuration flag, which tells the device to use “managed” configuration information for IPv6 addressing. This “managed” information now comes exclusively from the pool assigned to the interface, i.e. DHCPv6 takes care of managing all aspects related to assigning information related to addressing to hosts. SLAAC will no longer be used and even if the “other” flag is configured, the device ignores this setting since the “managed” flag supersedes it.
NAT is widely used in IPv6, but because of the great abundance of IPv4 addresses, it is not used in IPv4. A form of NAT is, however, used as a transitory mechanism for networks in the process of switching from IPv6 to IPv4.
Select one:
True
False
NAT is widely used in IPv4, but because of the great abundance of IPv6 addresses, it is not used in IPv6. A form of NAT is, however, used as a transitory mechanism for networks in the process of switching from IPv4 to IPv6.
What does the following image represent?
Select one:
a.
Router-on-a-stick
b.
Three-tier design
c.
Layer 3 switching
d.
Legacy inter-VLAN routing
Standard ACLs may filter traffic based on source and destination IP addresses.
Select one:
True
False
ACLs may be broadly classified as standard or extended:
- Standard: A standard ACL may only permit or deny traffic based on a source IP address. It cannot filter on protocols, so it filters the entire protocol suite.
- Extended: An extended ACL may filter on
Source and destination IP addresses
Source and destination TCP and UDP ports
Protocol type, such as IP, TCP, UDP, ICMP or a specific protocol number
Which of the following is not an advantage of employing NAT in a network?
Select one:
a.
It was designed as a security feature.
b.
It helps to prevent the depletion of IPv4 addresses.
c.
It keeps the internal network addressing scheme consistent.
There are a few advantages in employing NAT in a network:
- It helps to prevent the depletion of IPv4 addresses.
- Although NAT was not designed as a security feature, it does have the added benefit of providing security, since outsiders are unaware of the original source address associated with a message.
- It provides flexibility when connecting to the public Internet, since it allows for more than one device to connect using the same public addresses.
- It allows an administrator to keep the internal network addressing scheme consistent, by using private addressing. When the need arises to change Internet Service Providers (ISPs), there is no need to change the internal network addressing scheme, only the public (external) IP address(es).
Standard ACLs are placed closest to the destination of the traffic to be denied. Extended ACLs are generally placed closest to the source of the traffic to be denied.
destination source
Standard ACLs are placed closest to the destination of the traffic to be denied. Extended ACLs are generally placed closest to the source of the traffic to be denied.
To facilitate communication between VLANs a layer 2 device is necessary.
Select one:
True
False
VLANs allow network resources to be much more effectively maintained by allowing the same networks to exist on multiple switches across the enterprise. Since every VLAN constitutes a network, devices on different VLANs, even on the same switch, are unable to communicate. To facilitate communication between VLANs (networks), a layer 3 device is required. Routing traffic between VLANs is referred to as inter-VLAN routing. There are three main ways in which inter-VLAN routing may be accomplished, namely by legacy inter-VLAN routing, using layer 3 switches and configuring a router-on-a-stick.
Which command(s) are necessary to configure FastEthernet interfaces 0/10 to 0/20 as access ports for VLAN 20?
KRS (config)# int fast range 0/10 - 20
KRS (config-if-range)# switchport mode access
KRS (config-if-range)# switchport switchport vlan 20
mode 5 range trunk se network switchport vlan 10 fast access 20
KRS (config)# int range fast 0/10 - 20
KRS (config-if-range)# switchport mode access
KRS (config-if-range)# switchport access vlan 20