Network Flashcards
What fields are changed with a dot1q tag?
FCS and tag
What VLAN is automatically created as the native VLAN on cisco routers?
vlan 1
What VLANs are used for token ring and fiber distributed data interface?
1002 - 1005
When converting hexidecimal to decimal, characters are seperated into ____.
pairs
When converting hexidecimal to decimal, what formula can be used to convert the pair?
x*16+y
A severity level of 7 will display _________.
every type of log message
A severity level of 4 will display _________.
warnings, errors, critical, alert, emergencies
A severity level of 2 will display _________.
critical, alert, emergencies
Which transport layer protocol does DNS use?
TCP and UDP
What are three protocols that use TCP?
HTTP, SNMP, FTP
What are three protocols that use UDP?
TFTP, DHCP, SNMP
What is automatic 6to4 tunneling?
tunnels IPv6 traffic across IPv4 networks
What is 4to6 tunneling?
tunnels IPv4 traffic over IPv6 network
What stacks do IPv6 border routers require?
IPv4 and IPv6
What stacks do IPv4 border routers require?
IPv4
What command can be used to view vlans, duplex, speed, and type for interfaces?
show interfaces status
What is the function of the FIB table?
forwarding information base - contains prefixes for ip routing
If a route of 0.0.0.0 is configured, what packets are sent to this address?
any packets that are not specified to use another route
Which port-security violation will place the interface into error-disabled?
shutdown
Which port-security violation will create syslog messages and counters?
restrict and shutdown
What is the datagram size of extended ping?
100 bytes
What is the default timeout for ping?
2 seconds
What is the default repeat count for ping?
5
What command can be used to display IP addresses and MAC addresses of routers?
show interfaces
When a packet is sent from Host A from inside your network to Host B which is outside of your network, what are the local and global address steps?
inside local, outside local, inside global, outside global
When a packet is received from Host B which is outside of your network to Host A which is inside of your network, what are the local and global address steps?
inside global, outside global, inside local, outside local
If CEF and an ACL log are enabled, which logging takes precedent?
ACL, fast-switch
If an IP address is statically configured but also exists within the DHCP pool range, what occurs when the static IP address is assigned to a client?
conflict detection, remove address from DHCP
What is required to be configured in order to allow a DHCP server on router A to communicate with devices connected to router B?
ip helper-address
What command can be used to identify the lease time set for a DHCP server?
show run
What command can be used to identify the default gateway?
show ip route
What command can be used to view DHCP information?
show ip dhcp pool
What field indicates the next ip-address that will be leased?
current index
Port-security limits traffic sent _____ dynamic or static _____ addresses.
from, MAC
What is the first step in password recovery for Cisco devices?
boot in rommon mode
The number of networks in binary refer to the amount of ___ bits.
“on” or 1
The number of hosts in binary refer to the amount of ___ bits.
“off” or 0
What type of NAT is used when translating addresses to a pool of public IP addresses?
dynamic NAT
What type of NAT is used when translating a single private address into a single public IP address?
static NAT
What is the difference between RIPv1 and RIPv2?
v1 is classful, v2 is classless
How do baby giants occur?
encapsulation or features that add to a frame to exceed 1,500 bytes
What authentication can be configured for voice VLAN?
802.1X
Voice VLAn is enabled by default. True or False.
False
What are protocol works on both IPv4 and IPv6?
DNS and OSPF
Using a ping command, what do periods and exclamation marks mean?
period - timeout
exclamation - successful ping
What does ROAS usually consist of?
single router with trunk link to subinterfaces
When is outbound ACL checked?
after received and routed to interface
When is inbound ACL checked?
after received but before routed to outbound
What is required when configuring remote management to a switch?
ip address
ip domain-name
ip default-gateway
crypto key generate rsa
What would produce u.u.u from ping?
unreachable error
network is not on routing table
gateway of last resort is not configured