Past Questions Flashcards

1
Q

What’s packet internet groper?

A

Ping!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Best way to test an internet connection?

A

Ping using ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a zero subnet

A

The first subnet address obtained after subnetting a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What modes are you unable to change anything involving direct traffic

A

BOTH user and exec modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a 802.1Q trunk

A

A ROAS or Router on a Stick, dot1q holds a vlan ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a code 200?

A

Code 200 refers to the meaning “OK” and is sending the data requested back to the source. Error 404 is referring to web page no found as you would likely see when browsing the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the best procedure for replacing the running-config with a pre-programed startup-config file?

A

Erase the startup-configuration file and then reload the switch or router.
To prevent the merging of the running-configuration file with the startup-configuration file you will need to erase the startup-config file and then reload the switch or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between core, access, trunk, and distribution switches?

A

Core layer: This layer is considered the backbone of the network and includes the high-end switches and high-speed cables such as fiber cables. This layer of the network does not route traffic at the LAN. In addition, no packet manipulation is done by devices in this layer. Rather, this layer is concerned with speed and ensures reliable delivery of packets.
Distribution layer: This layer includes LAN-based routers and layer 3 switches. This layer ensures that packets are properly routed between subnets and VLANs in your enterprise. This layer is also called the Workgroup layer.
Access layer: This layer includes hubs and switches. This layer is also called the desktop layer because it focuses on connecting client nodes, such as workstations to the network. This layer ensures that packets are delivered to end user computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLANS can split up

A

broadcasting domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a subnet number identify

A

The subnet aka subnet id aka subnet address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What command configures the Telnet password on a router?

A

The “vty line 0 4” command will configure the Telnet password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a Host-A is using a network that utilizes a stateful DHCPv6 server, which of the following is NOT likely to be learned from that DHCPv6 server?

A

Stateful DHCPv6 servers do not supply the default router address; addresses come from the use of NDP messages communicated between hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which command currently stores the enable secret [password]?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routing protocol performs all of the following functions except:

A

If two routes exist for the same destination subnet, the router will remove the first entry.
If two or more routes exist for the same destination subnet, then the router will decide on which route to use based on a metric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consider SW1 and SW2 share the same link and have at least one configured VLAN. Which of the following would prevent trunking between SW1 and SW2?

A

Both interfaces get configured with Switchport mode dynamic auto.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is another term that references Port Address Translation?

A

NAT Overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The two protocols an AAA server typically utilizes are what?

A

RADIUS and TACACS+ are protocols used to create secure communication between a host and the AAA server by encrypting the information getting transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This type of NDP message is sent when a particular neighbor requests the MAC address of a target host.

A

NA - Neighbor Advertisement - inform their presence to other hosts present on the same network as well as send them their link-layer addresses.
NS - Neighbor Solicitation IPv6 nodes send NS messages so that the link-layer address of a specific neighbor can be found. There are three operations in which this message is used:

▪ For detecting duplicate address

▪ Verification of neighbor reachability

▪ Layer 3 to Layer 2 address resolution (for ARP replacement) 
ARP is not included in IPv6 as a protocol but rather the same functionality is integrated into ICMP as part of neighbor discovery. NA message is the response to an NS message.
DAD - Duplicate Address Detection
RA - Router Advertisement Message - In order to inform hosts about the IPv6 prefixes used on the link and also to inform hosts that the router is available as default gateway the IPv6 routers send periodic RA messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What port is FTP

A

TCP 20, 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port is SSH

A

TCP UDP 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What port is Telnet

A

TCP UDP 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What port is SMTP

A

TCP UDP 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port is DNS

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port is HTTP

A

80, 81

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When using 10 Base T and 100 Base T, what devices transmit on Pin positions 3,6?

A

Switches and Hubs

NIC transmitters use pair connected to pins 1 and 2 NIC receivers use 3 and 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Whats the purpose of a bridge

A

Separate devices into collision domains and forward frames between two interfaces; they can also queue and buffer frames which allow the frames to be sent to the dest once it’s no longer busy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What component of VPN technology ensures data can be ready only by the intended device

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When using 10 base T and 100 base T, devices transmit on pin positions 3 and 6

A

Ethernet NIC transmitters use the pair connected to pins 1 and 2, NIC receivers use a pair of wires at positions 3 and 6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What’s the range of a standard numbered ACL

A

1-99

30
Q

What’s the range of a expanded standard number ACL

A

1300-1999

31
Q

What’s the range of a extended number ACL

A

100-199

32
Q

What’s the range of an expanded extended numbered ACL

A

2000-2699

33
Q

What does a solicited-node multicast address entail

A

A neighbor solicitation message will only reach hosts that contain the same last 6 hex digits of the address being targeted

34
Q

TCP 3 Way Handshake

A

Client must first send a request with its desired port number, once the server acknowledges the port number and agrees the server will send back the same information; once the client receives the segment it then sends its acknowledgement back to the server

35
Q

What is line status

A

the first part of the ethernet status, representing the physical layer

36
Q

What is line protocol

A

the second part of the ethernet status representing the data layer

37
Q

What does CSU and DSU stand for

A

Channel Service Unit

Data Service Unit

38
Q

CSU and DSU clocking

A

Tells the router exactly when to send each bit through the serial cable

39
Q

What does the command ip route address mask address mask 210 entail

A

Administrative distance of 210 instead of 1 from statically configured

40
Q

What does the command ip route address mask address mask 210 entail

A

Administrative distance of 210 instead of 1 from statically configured

41
Q

EIGRP finds path based on

A

the best (fastest) route

42
Q

Connected routing

A

allows for a router to automatically learn the route of the subnet connected to each interface

43
Q

Connected routing

A

allows for a router to automatically learn the route of the subnet connected to each interface

44
Q

What does CSMA/CD stand for

A

Carrier sense multiple access with collision detection

45
Q

In what devices is CSMA/CD used

A

LAN hubs because they all share one collision domain

46
Q

LAN switches receive ethernet frames. What is the first step they do in their decision process

A

Decide when to forward a frame or when to filter (not forward) a frame based on Mac address

47
Q

Name the components of an ethernet frame

A

Preamble Start Frame Delimiter Destination Mac Address Source Mac Address Type Data and Pad Frame Check Sequence

48
Q

How does a VLAN make use of a router

A

Connect the router to a layer 2 switch

49
Q

802.3u

A

defines a protocol that allows two linked ethernet nodes to agree on a determined speed and duplex setting

50
Q

What does a switch use to build its mac address table

A

Source Mac Address of a frame

51
Q

What’s the minimum and maximum size of an 802.3 frame

A

Minimum of 46 bytes and maximum of 1500 bytes

52
Q

Singlemode fiber cabling has __ distance and ___ cost

A

greater distance at greater cost

53
Q

Tell me about access switches

A

It provides a connection to end users but can’t forward frames to itself

54
Q

Tell me about core switches

A

These switches typically can forward large amounts of traffic and forward between distribution switches

55
Q

Tell me about distribution switches

A

These switches do not connect to the end user but provide a means of access for access switches to forward traffic to each other

56
Q

What counter observes a duplex mismatch

A

Late Collisions (after 64th byte has been transferred)

57
Q

What are the components of a socket

A

Transport Protocol, IP Address, and Port Number

58
Q

What happens to routes on a routing table if an interface fails on R1

A

The route will be removed

59
Q

What does TCP have that UDP does not have

A

UDP is connectionless and misses the flag bits

60
Q

What does the command service password-encryption do?

A

It encrypts all passwords on your router

61
Q

Serial x is up, line protocol is down

A

indicates a clocking problem

62
Q

Serial x is down, line protocol is down

A

indicates a cabling problem

63
Q

Input Errors indicate

A

physical layer issues, bad hardware, bad connection, incorrect equipment

64
Q

Output Drops

A

Output drops appear in the output of the show interfaces serial command when the system is attempting to hand off a packet to a transmit buffer but no buffers are available.

65
Q

Input Drops

A

Input drops appear in the output of the show interfaces serial EXEC command when too many packets from that interface are still being processed in the system.

66
Q

What does AAA stand for

A

Authentication Authorization Accounting

67
Q

What are the components of SNMP

A

manager, agent, and MIB

68
Q

What must be configured before EIGRPv6 can run

A

A network id

69
Q

What happens in a DHCP address conflict

A

The addresses on that list (displayed with show ip dhcp conflict) are not used in the future (similar to the addresses configured with the ip dhcp excluded-addresses command). To reuse a conflicting address, the network operator has to remove it from the list with the clear ip dhcp conflict address (or * for all addresses) command.

70
Q

What type of path needs at least 2x variance

A

unequal cost path

71
Q

How does EIGRP work?

A

When a change occurs, only routing table changes are propogated, uses hop count like rip as it’s a distance vector