Vol 1 Part 2: Implementing Ethernet LANs Flashcards

1
Q

All interfaces by default reside on which vlan?

A

VLAN 1, also known as the default VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between END and EXIT?

A

End brings you back to enable mode, exit brings you back up one level in the configuration mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 things a switch is responsible for performing?

A

Whether to forward or filter a frame, learning the source MAC address for storage in the CAM table, and forwarding the frame with a layer 2 loop-free environment via the Spanning Tree Protocol (STP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does AAA stand for, what is it used for, and what types of services do we use to obtain AAA?

A

Authentication, authorization, and accounting. It is used for securing credentials for remote access ie. SSH and Telnet. TACACS+ and RADIUS are the most commonly used services for AAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 types of memory in a cisco switch, and what is stored in each memory?

A

RAM- stores working memory and running config
Flash- stores the Cisco IOS
ROM- stores the bootstrap program
NVRAM- stores the startup config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is Telnet considered undesirable?

A

It is unsecure due to plain text input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the IEEE rules for auto negotiation, as well as the Cisco rules (hint, there’s 2 rules for each!)

A

IEEE Rule 1: Use the slowest speed supported
IEEE Rule 2: If speed is 10 or 100, use half duplex. Otherwise, full duplex.
Cisco Rule 1: Sense the speed. If speed cannot be sensed, use slowest speed supported.
Cisco Rule 2: Same as IEEE rule 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Cisco switch is the most commonly used today?

A

The Cisco 2960XR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What commands are used to show the CAM table? (Hint, there are 2, as the second one shows us slightly different information)

A

Show mac-address table and Show mac-address table dynamic. The first one shows all of the MAC addresses and the ports on the switch, while the second one just shows the addresses the switch has learned on its own (dynamically).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the shutdown command do, and what can we learn by examining the status of the interfaces on the switch with respect to the shutdown command?

A

The shutdown command turns off an interface. If we look a the list of interfaces on the switch and see that an interface is administratively down, then we know that someone shutdown the port manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Line VTY used for?

A

Remote access via telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What commands are used in order to configure SSH?

A

Hostname, IP domain-name, Crypto key generate rsa, Username/secret, Line vty 0 15, Login local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens if a switch receives a frame that has a destination MAC address not currently in the CAM table?

A

The frame is forwarded/flooded out on all ports except the source. The port with the corresponding MAC address responds to the switch with the MAC address, and the switch creates a new entry in the CAM table for that MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens to a frame if there is no entry for it on the MAC table and there is no response received from any interface after the switch has sent a flooded broadcast message?

A

It will drop the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a late collision and what does it mean for our network if we are experiencing late collisions?

A

Late collisions are the collisions that occur after the 64th byte has been transmitted. Ideally, collisions occur before the 64th byte, and if we experience late collisions, then we most likely have a duplex mismatch?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command is used to encrypt plain text passwords on the switch?

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the show command used for?

A

To show all available commands that can be utilized with whatever command is typed in after the word show in the CLI. This is helpful in the event that you forget what command you need to use.

18
Q

What does it mean if an engineer is bouncing a port?

A

He is issuing a shutdown command followed by a no shutdown command.

19
Q

What are the two types of modes when accessing a switch and what are the differences?

A

User mode and privileged mode (also known as enable mode). User mode allows a user to view limited items and make no changes. Enable mode allows the user to execute admin level commands and view all settings in the switch.

20
Q

Why is SSH the preferred method for remote access into a switch?

A

The connection is encrypted.

21
Q

What on the switch is used to connect devices? Give BOTH names

A

Ports/Interfaces

22
Q

What 2 commands are used to set up a privileged password for enable mode, and what are the differneces?

A

enable password and enable secret. Enable password is plain text while enable secret is hashed. Remember! enable secret supersedes enable password.

23
Q

What is the default MAC Table time, and how can you change it?

A

300 seconds. Can be changed using the mac address-table agingtime command.

24
Q

How do you store the running config and start up config in the NVRAM?

A

By using the command “copy running-config startup config” or “copy run start” for short

25
Q

What does a switch look at in order to learn new MAC addresses for the CAM table?

A

The source MAC address of the frame it received.

26
Q

How do you configure IPv4 on a layer 2 switch?

A

Interface VLAN 1, ip address, no shutdown, ip default-gateway

27
Q

What is a runt?

A

A frame that is less than 64 bytes. REMEMBER! A switch will pad that frame in order to get it up to 64 bytes.

28
Q

What is the difference between TACACS+ and RADIUS?

A

TACACS+ is Cisco proprietary and utilizes TCP. Radius is vendor neutral and utilizes UDP.

29
Q

Why do we need an IPv4 address on a switch, and where do we usually assign this IP address?

A

To enable management and remote access. It is usually assigned to a VLAN other than the default VLAN.

30
Q

What is a baby giant?

A

A frame that is more than 1518 bytes but less than 1600.

31
Q

What are the three ways to connect to a switch?

A

Telnet, SSH, and Console

32
Q

What is a roll over cable?

A

A cable that allows a person to console into a switch. It utilizes a serial connection on one end and an RJ-45 connection on the other.

33
Q

What does the IP Default-Gateway command enable?

A

A gateway for the switch if it does not know how to handle the packet.

34
Q

How do you erase the NVRAM in order to get a clean switch?

A

Write erase, Erase start, Erase nvram, RELOAD

35
Q

What does the No command do?

A

Removes the configurations you have set on an interface

36
Q

What command is entered in order to access Global Configuration Mode?

A

Configure Terminal, also known as config t or conf t.

37
Q

Explain the logging console commands (hint, there’s 4 of them)

A

Logging console turns on logging. No logging console turns off logging. Logging synchronous sets SYSLOG messages to create new lines for themselves in order to reduce clutter, Exec-timeout sets the timeout time in the console for SYSLOG messages.

38
Q

The console port is known as what in the Command Line Interface (CLI)?

A

Line Con 0

39
Q

What 3 things MUSt we have in order to configure SSH?

A

A unique hostname, an ip domain name, and keys generated with RSA

40
Q

What are the desired settings when using a console emulator?

A

9600bits/second, No hardware flow control, 8-bit ASCII, No parity bits, 1 stop bit