Review Questions Flashcards

1
Q

Switches are ______________ based and utilize ______________ to help them make filtering decisions.

A

hardware based
ASIC (Application Specific Integrated Circuits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switches move frames of information at the ______________ Layer of the OSI model.

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a hub and switch?

A

Hubs transmit messages out of every interface other than the one it was received on, and switches break up a network into collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allows direct local access to configure a switch using a terminal, or a computer using terminal emulation software for initial configuration. DoD policy states this must be password protected to prevent unauthorized changes.

A

Console Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This part of the switch is where end devices such as computers and printers are connected. The number of interfaces can vary depending on the model.

A

Network Interfaces or switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is where the operating system is saved. Every time that the switch boots up, the ____ _____ will be accessed to load the OS into the running memory.

A

Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Contains information such as the diagnostics and bootup routines. Cannot be accessed or changed.

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Running memory that the switch uses for operations. Changes to the current configuration are stored in the “running-configuration”.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Holds the startup-configuration, which is loaded to the RAM upon bootup and then becomes the running-config.

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishes communication directly between two network devices without relying on any host or network system. Is a data link layer protocol that operates over a point-to-point link.

A

PPP (Point to Point) Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a loop-prevention protocol that allows switches to communicate to prevent loops in a network. Defined by IEEE 802.1D.

A

STP (Spanning Tree Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Occurs when traffic in one of two directions fail on a link.

A

UDLD (Unidirectional Link Detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vendor neutral neighbor discovery protocol.

A

LLDP (Link Layer Discovery Protcol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cisco proprietary neighbor discovery protocol that shares information of connected Cisco devices.

A

CDP (Cisco Discovery Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two VLAN trunking methods for encapsulating frames? _____________________. Which one is non-proprietary? __________.

A

ISL and 802.1q
802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______________ switches store the entire frame in internal memory and check the frame for errors before forwarding the frame to its destination.

A

Store and forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__________ switching reduces latency; however, bad frames are forwarded, and the destination will ultimately have to request the source send the frame again.

A

Cut through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_________ Switching is a hybrid of Store-and-Forward and Cut-Through
switching. It stores the first 64 bytes before forwarding.

A

Fragment Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When two system transmissions occur at the same time, on shared bandwidth, the result is a ______________.

A

collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_______ is defined as a “logical” grouping of network devices into a single broadcast domain or flat network.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three benefits of VLANs?

A

increased security, flexibility and scalability, removes geographical barrier limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What command do you use to determine what VLAN a port is a member of?

A

show vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What type of VLAN is used for SNMP, management, and syslog?

A

Management VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a layer 3 networking device that use IP addressing to forward packets between networks?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

___ ___ allows you to configure the router remotely using a modem. This port must be configured before you can use it

A

Auxillary port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This is where the diagnostic and boot up routines are stored

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Manufacture memory that holds the Internetwork Operating Systems (IOS)

A

Flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is used to store the startup-configuration file

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is the working memory for the router. It contains the running configuration file, a copy of the IOS, the routing tables, and any associated data required by the routing process.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a router that directs packets inside a LAN?

A

Interior Gateway Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a router that directs packets between two separate LANS?

A

Exterior Gateway Routers

32
Q

In today’s terminology, the term ______________ often refers to a device that converts information or data from one protocol or format to another.

A

gateway

33
Q

is a connected group of one or more IP prefixes run by one or more
network operators which has a SINGLE and CLEARLY DEFINED routing policy

A

Autonomous System

34
Q

What are some internetworking challenges?

A

connectivity, reliable service, network management, flexibility

35
Q

What do routers break up and is defined as a potion of a network limited by its router connection to a specific group of host computers in a common LAN segment.

A

Broadcast domain

36
Q

What is the world’s most popular open- system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected networks.

A

TCP/IP

37
Q

What is used to send information from one Layer 2 interface to another Layer 2 interface?

A

physical or MAC address

38
Q

What is used to send information from one network to another network?

A

network or logical addresses

39
Q

What is the difference between dynamic and static routing?

A

Static routes are established by the network administrator and do not change until the network administrator changes them. Information takes the same route every time. Dynamic routing happens when routers learn about other networks and calculate the best path.

Static routes are manually created by network administrators, and dynamic routes enable the router to calculate the best route
automatically

40
Q

Routing involved two basic activities: ______________________ and ___________________.

A

Path Determination and Packet Switching

41
Q

Routers populate their routing tables by learning network destinations using what three types of routes.

A

Static, dynamic or default routes

42
Q

When given multiple routes to the same destination routers use what is called ________________________to determine the most trustworthy route.

A

Administrative Distance

43
Q

are routes that have been manually configured by the network or system administrator as the only path to a destination.

A

Static routes

44
Q

are routes that have been learned and maintained in a routers routing table from other internetwork routers using network layer protocols and routing algorithms such as RIP, IGRP, OSPF, EIGRP, and BGP.

A

Dynamic routes

45
Q

____ ____ or as it can also be called as, a gateway of last resort, is a specific type of static route that has been manually configured by a system administrator to act as a path when there is no known destination for a route to follow.

A

Default routes

46
Q

The following describes the advantages of which algorithm?

simple to understand and configure
Less expensive
Less processor demand to maintain routing table

A

Distance Vector algorithms

47
Q

The following describes the disadvantages of which algorithm?

limited by hop count
does not support variable length subnet masking
updates via broadcasts and builds routing tables from neighbors tables

A

Distance Vector algorithms

48
Q

The following describes the advantages of which algorithm?

  1. Fast convergence times.
  2. Support for variable length subnet masks (VLSM)
  3. Complete topological picture, non-reliant on neighbors for information.
  4. Less prone to routing loops.
A

Link State algorithms

49
Q

The following describes the disadvantages of which algorithm?

  1. Higher CPU/Memory requirements.
  2. More expensive.
A

Link State algorithms

50
Q

Routing Information Protocol, or RIP, is a ________________algorithm and uses ______________ for its algorithm metrics.

A

distance vector
hop count

51
Q

Open Shortest Path First, or OSPF, is a ____________algorithm and is based on ________________________ for its algorithm.

A

link state
Dijkstra’s Shortest Path First

52
Q

OSPF networks operate best when used within a ____________ due to their use of multi-area configurations.

A

hierarchy

53
Q

This area within an OSPF network is responsible for distributing routing information between areas. It consists of all area border routers, networks not wholly contained in any area and their attached routers.

A

Backbone

54
Q

Routers utilizing OSPF use the ________________to acquire neighbors and maintain link-state awareness.

A

Hello protocol

55
Q

The following describes the advantages of which algorithm?

  1. Hierarchical routing supports very large networks.
  2. Shortest Path First algorithm allows for fast convergence.
  3. Does not suffer from the routing loop issues (unlike distant vector protocols).
  4. Supports classless routing (VLSM reduces routing protocol overhead).
  5. Smaller routing updates and, they only occur when there is a topology change (less bandwidth and CPU utilization).
A

OSPF

56
Q

The following describes the disadvantages of which algorithm?

  1. Complex. Requires a structured topology (otherwise efficiency will be reduced)
  2. Requires highly trained staff to understand and configure a large OSPF network due to complete configurations.
  3. Link State database requires considerable memory due to numerous tables and databases.
  4. SPF algorithm utilizes more processing power as the size of the topology database increases.
A

OSPF

57
Q

Enhanced Interior Gateway Routing Protocol (EIGRP) is a ______________ protocol created as a Cisco proprietary protocol that later became open standard.

A

balanced hybrid

58
Q

EIGRP networks combine both advantages and disadvantages from Distance Vector and Link State algorithms. What concept is utilized in OSPF networks is missing from EIGRP.

A

Area concept

59
Q

Border Gateway Protocol (BGP) is considered a ______________protocol.

A

path vector

60
Q

Cisco’s hierarchical internetworking model is a _________ model for _________ design first proposed by Cisco.

A

three-layer
Network

61
Q

The three layers of the Cisco Hierarchical internetworking model, from top to bottom, are the __________, __________, and __________ layers.

A

Core, Distribution, Access

62
Q

The core layer is often called a ____________ backbone.

A

high-speed

63
Q

The primary function of the distribution layer is to provide __________, __________, __________ and ______________________________________.

A

routing, filtering, WAN access, determine how packets can access the core when necessary

64
Q

The distribution layer of the Cisco hierarchical internetworking model is where __________ should be implemented.

A

policies

65
Q

The access layer is the aggregation point and includes hubs and switches to ______________such as ____________ to the network.

A

connect nodes
workstations

66
Q

The access layer is sometimes referred to as the __________ layer because the majority of devices connected to the access switch are ____________________.

A

desktop
desktop computers

67
Q

A ______________is a logical division of a network of connected network devices based on the IP address.

A

subnet

68
Q

An IP address is made of three components, a/an ______________, ______________, and ______________.

A

network part, subnet part, host part

69
Q

_____ are used to differentiate the network component of an IP address by dividing the IP address into __________________and __________________.

A

subnet masks
network address
host address

70
Q

Classless Internet Domain Routing (CIDR) is used to represent IP addresses. The concept is to adapt subnetting to the entirety of the Internet, because of this it is also often referred to as ______.

A

supernetting

71
Q

When an IP network is assigned more than one subnet mask, it is said to have a _____.

A

Variable Length Subnet Mask (VLSM)

72
Q

When designing and configuring a simple network, what two things should you take into consideration?

A

How many subnets needed and/or how many hosts needed

73
Q

A late collision indicates that another system attempted to transmit after a host has transmitted at least the first __ ___ ___ __ ___.

A

64 bytes of its frame

74
Q

What is the default VLAN that is automatically assigned to interfaces on switches?

A

VLAN 1

75
Q

BGP is an exterior gateway protocol and uses what for it’s metrics?

A

Manual input from network administrators.