Switching Flashcards

1
Q

What is the ID used to elect the Root Bridge

A

Bridge ID, priority value + MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the ID used to elect the Root Bridge

A

Bridge ID, priority value + MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three types of BPDU

A

Configuration
TCN (Notification)
TCA (Ack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of a VTEP

A

The VTEP encaps/decaps traffic on VXLAN tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is required for L3 operations not to be interrupted when using SSO?

A

NSF is required. With NSF+SSO CEF entries are not purged so the L3 flap occuring when a sup reloads is covered and operations can continue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 2 tables used by CEF for its decisions

A

The FIB and the Adjacency Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What QoS component can have an impact on how a packet is handled on a network?

A

Marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the FIB populated with?

A

A copy of the forwarding information in the IP routing table.
When routing or topology changes occur in the network, the route processor updates the RIB and CEF updates the FIB. There is a one-to-one correlation between FIB & RIB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the adjacency table populated with?

A

The adjacency table is populated each time an adjacency entry is created (ex: ARP), a link-layer header for that adjacent node is stored in the adjacency table. Once a route is determined, the link-layer header points to a next hop and corresponding adjacency entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a Bridge ID?

A

The criteria for root bridge election.
Prio+Mac
Lowest wins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two methods of SGT tags propagation

A

Inline Tagging
SXP Propagation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three phases of Trustsec

A

Classification (ingress)
Propagation
Enforcement (egress)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is included in NGFW

A

Standard FW functions including stateful inspection
IPS
Application level inspection
External Intelligence to mitigate new threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 2 new capacities of Cisco NGFW

A

Advanced malware detection
Application-layer attack detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens with this configuration:

Line vty 0 4
Login
Password cisco
Transport input telnet

A

If no local account is defined the password will always be ignored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens with the configuration

line vty 0 4
password cisco
transport input all

A

On telnet, no promps and straight up enable access.

17
Q

What happens with:

line vty 0 4
password cisco
login local
transport input all

A

Password is ignored.
Local user enforced

18
Q

What will happen here?

line vty 0 4
login
transport input all

A

No password is defined and the login command asks for a password, so access is never granted