Review Questions Flashcards
Switches are ______________ based and utilize ______________ to help them make filtering decisions.
hardware based
ASIC (Application Specific Integrated Circuits)
Switches move frames of information at the ______________ Layer of the OSI model.
Data Link
What is the difference between a hub and switch?
Hubs transmit messages out of every interface other than the one it was received on, and switches break up a network into collision domains.
Allows direct local access to configure a switch using a terminal, or a computer using terminal emulation software for initial configuration. DoD policy states this must be password protected to prevent unauthorized changes.
Console Port
This part of the switch is where end devices such as computers and printers are connected. The number of interfaces can vary depending on the model.
Network Interfaces or switch ports
This is where the operating system is saved. Every time that the switch boots up, the ____ _____ will be accessed to load the OS into the running memory.
Flash Memory
Contains information such as the diagnostics and bootup routines. Cannot be accessed or changed.
ROM
Running memory that the switch uses for operations. Changes to the current configuration are stored in the “running-configuration”.
RAM
Holds the startup-configuration, which is loaded to the RAM upon bootup and then becomes the running-config.
NVRAM
Establishes communication directly between two network devices without relying on any host or network system. Is a data link layer protocol that operates over a point-to-point link.
PPP (Point to Point) Protocol
Is a loop-prevention protocol that allows switches to communicate to prevent loops in a network. Defined by IEEE 802.1D.
STP (Spanning Tree Protocol)
Occurs when traffic in one of two directions fail on a link.
UDLD (Unidirectional Link Detection)
Vendor neutral neighbor discovery protocol.
LLDP (Link Layer Discovery Protcol)
Cisco proprietary neighbor discovery protocol that shares information of connected Cisco devices.
CDP (Cisco Discovery Protocol)
What are the two VLAN trunking methods for encapsulating frames? _____________________. Which one is non-proprietary? __________.
ISL and 802.1q
802.1q
______________ switches store the entire frame in internal memory and check the frame for errors before forwarding the frame to its destination.
Store and forward
__________ switching reduces latency; however, bad frames are forwarded, and the destination will ultimately have to request the source send the frame again.
Cut through
_________ Switching is a hybrid of Store-and-Forward and Cut-Through
switching. It stores the first 64 bytes before forwarding.
Fragment Free
When two system transmissions occur at the same time, on shared bandwidth, the result is a ______________.
collision domain
_______ is defined as a “logical” grouping of network devices into a single broadcast domain or flat network.
VLAN
What are the three benefits of VLANs?
increased security, flexibility and scalability, removes geographical barrier limitations
What command do you use to determine what VLAN a port is a member of?
show vlan
What type of VLAN is used for SNMP, management, and syslog?
Management VLAN
What is a layer 3 networking device that use IP addressing to forward packets between networks?
Router
___ ___ allows you to configure the router remotely using a modem. This port must be configured before you can use it
Auxillary port
This is where the diagnostic and boot up routines are stored
ROM
Manufacture memory that holds the Internetwork Operating Systems (IOS)
Flash memory
is used to store the startup-configuration file
NVRAM
is the working memory for the router. It contains the running configuration file, a copy of the IOS, the routing tables, and any associated data required by the routing process.
RAM
What is a router that directs packets inside a LAN?
Interior Gateway Routers
What is a router that directs packets between two separate LANS?
Exterior Gateway Routers
In today’s terminology, the term ______________ often refers to a device that converts information or data from one protocol or format to another.
gateway
is a connected group of one or more IP prefixes run by one or more
network operators which has a SINGLE and CLEARLY DEFINED routing policy
Autonomous System
What are some internetworking challenges?
connectivity, reliable service, network management, flexibility
What do routers break up and is defined as a potion of a network limited by its router connection to a specific group of host computers in a common LAN segment.
Broadcast domain
What is the world’s most popular open- system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected networks.
TCP/IP
What is used to send information from one Layer 2 interface to another Layer 2 interface?
physical or MAC address
What is used to send information from one network to another network?
network or logical addresses
What is the difference between dynamic and static routing?
Static routes are established by the network administrator and do not change until the network administrator changes them. Information takes the same route every time. Dynamic routing happens when routers learn about other networks and calculate the best path.
Static routes are manually created by network administrators, and dynamic routes enable the router to calculate the best route
automatically
Routing involved two basic activities: ______________________ and ___________________.
Path Determination and Packet Switching
Routers populate their routing tables by learning network destinations using what three types of routes.
Static, dynamic or default routes
When given multiple routes to the same destination routers use what is called ________________________to determine the most trustworthy route.
Administrative Distance
are routes that have been manually configured by the network or system administrator as the only path to a destination.
Static routes
are routes that have been learned and maintained in a routers routing table from other internetwork routers using network layer protocols and routing algorithms such as RIP, IGRP, OSPF, EIGRP, and BGP.
Dynamic routes
____ ____ or as it can also be called as, a gateway of last resort, is a specific type of static route that has been manually configured by a system administrator to act as a path when there is no known destination for a route to follow.
Default routes
The following describes the advantages of which algorithm?
simple to understand and configure
Less expensive
Less processor demand to maintain routing table
Distance Vector algorithms
The following describes the disadvantages of which algorithm?
limited by hop count
does not support variable length subnet masking
updates via broadcasts and builds routing tables from neighbors tables
Distance Vector algorithms
The following describes the advantages of which algorithm?
- Fast convergence times.
- Support for variable length subnet masks (VLSM)
- Complete topological picture, non-reliant on neighbors for information.
- Less prone to routing loops.
Link State algorithms
The following describes the disadvantages of which algorithm?
- Higher CPU/Memory requirements.
- More expensive.
Link State algorithms
Routing Information Protocol, or RIP, is a ________________algorithm and uses ______________ for its algorithm metrics.
distance vector
hop count
Open Shortest Path First, or OSPF, is a ____________algorithm and is based on ________________________ for its algorithm.
link state
Dijkstra’s Shortest Path First
OSPF networks operate best when used within a ____________ due to their use of multi-area configurations.
hierarchy
This area within an OSPF network is responsible for distributing routing information between areas. It consists of all area border routers, networks not wholly contained in any area and their attached routers.
Backbone
Routers utilizing OSPF use the ________________to acquire neighbors and maintain link-state awareness.
Hello protocol
The following describes the advantages of which algorithm?
- Hierarchical routing supports very large networks.
- Shortest Path First algorithm allows for fast convergence.
- Does not suffer from the routing loop issues (unlike distant vector protocols).
- Supports classless routing (VLSM reduces routing protocol overhead).
- Smaller routing updates and, they only occur when there is a topology change (less bandwidth and CPU utilization).
OSPF
The following describes the disadvantages of which algorithm?
- Complex. Requires a structured topology (otherwise efficiency will be reduced)
- Requires highly trained staff to understand and configure a large OSPF network due to complete configurations.
- Link State database requires considerable memory due to numerous tables and databases.
- SPF algorithm utilizes more processing power as the size of the topology database increases.
OSPF
Enhanced Interior Gateway Routing Protocol (EIGRP) is a ______________ protocol created as a Cisco proprietary protocol that later became open standard.
balanced hybrid
EIGRP networks combine both advantages and disadvantages from Distance Vector and Link State algorithms. What concept is utilized in OSPF networks is missing from EIGRP.
Area concept
Border Gateway Protocol (BGP) is considered a ______________protocol.
path vector
Cisco’s hierarchical internetworking model is a _________ model for _________ design first proposed by Cisco.
three-layer
Network
The three layers of the Cisco Hierarchical internetworking model, from top to bottom, are the __________, __________, and __________ layers.
Core, Distribution, Access
The core layer is often called a ____________ backbone.
high-speed
The primary function of the distribution layer is to provide __________, __________, __________ and ______________________________________.
routing, filtering, WAN access, determine how packets can access the core when necessary
The distribution layer of the Cisco hierarchical internetworking model is where __________ should be implemented.
policies
The access layer is the aggregation point and includes hubs and switches to ______________such as ____________ to the network.
connect nodes
workstations
The access layer is sometimes referred to as the __________ layer because the majority of devices connected to the access switch are ____________________.
desktop
desktop computers
A ______________is a logical division of a network of connected network devices based on the IP address.
subnet
An IP address is made of three components, a/an ______________, ______________, and ______________.
network part, subnet part, host part
_____ are used to differentiate the network component of an IP address by dividing the IP address into __________________and __________________.
subnet masks
network address
host address
Classless Internet Domain Routing (CIDR) is used to represent IP addresses. The concept is to adapt subnetting to the entirety of the Internet, because of this it is also often referred to as ______.
supernetting
When an IP network is assigned more than one subnet mask, it is said to have a _____.
Variable Length Subnet Mask (VLSM)
When designing and configuring a simple network, what two things should you take into consideration?
How many subnets needed and/or how many hosts needed
A late collision indicates that another system attempted to transmit after a host has transmitted at least the first __ ___ ___ __ ___.
64 bytes of its frame
What is the default VLAN that is automatically assigned to interfaces on switches?
VLAN 1
BGP is an exterior gateway protocol and uses what for it’s metrics?
Manual input from network administrators.