Flashcards

(55 cards)

1
Q

Configures global password encryption in a
running configuration. Any passwords that were
not previously encrypted will be encrypted. In
addition, any passwords that are created in the
future, will be encrypted in the running
configuration.

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The content addressable memory table, is
used to record a endpoint mac addresses
and it’
s corresponding switch port location

A

CAM table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advanced Encryption Standard (AES) is used
by both Wi-Fi Protected Access 2 (WPA2) and
WPA3 to provide encryption

A

Wireless Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Every LEAF must be connected to every SPINE

A

Cisco ACI architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application layer protocols that use TCP

A

FTP
HTTP
HTTPS
SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IEEE 802.3ad standard that provides link
aggregation groups (LAGs) to bundle
multiple interfaces into one logical interface

A

Link Aggregation Control Protocol (LACP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication, Authorization, and Accounting (AAA)

A

Authentication – the process of verifying a
user’s identity
Authorization – the process of verifying the
level of access configured for a user
Accounting – the process of recording the
use of resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multiple virtual machines (VMs) can be running
simultaneously on a single host computer. A VM
is an isolated environment running a separate
operating system (OS) while sharing hardware
resources with a host machine

s OS

A

Virtual Machines (VM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Broadcast Addresses

A

L3 Broadcast IP Address - 255.255.255.255
L2 Broadcast Mac Address - FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VTP Default Mode

A

By default VTP is in server mode, which is an
operational mode that enables you to manage
VLANs on the local switch’
s database and use
the information in the database to synchronize
with other switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to set a VLAN as untagged on a trunk port

A

In Cisco speak the Native VLAN is referring to the
one VLAN that will be passed untagged on a trunk
port. The command shown below is used to define
the untagged (native) VLAN.
interface #
switchport trunk native vlan #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Show CDP Neighbor Output

A

Device ID
Local connected interface
Remote connected interface
Product and model information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco proprietary FHRP
Router/L3 Switch with the highest priority
is referred to as the active router

A

Hot Standby Router Protocol (HSRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSPF and Serial Interfaces

A

By default both PPP and HDLC interfaces are
set as the OSPF point-to-point network type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless QoS Levels *Worst to Best

A

Bronze
Silver *Default
Gold
Platinum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSH Requirements

A

Image that supports K9 (crypto)
Hostname and domain-name
Crypto key generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cisco Meraki Devices

A

Deployed via a cloud based solution
Require an internet connection
Automatically register to your cloud account
with serial number association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EIGRP Administrative Distances

A

Internal learned routes - 90
External learned routes - 170
Summary routes - 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSPF and default-information originate

A

Will not advertise to any other routers
without a default route in the routing table.
If the

always
” keyword is added, it will
advertise a default route even if there is no
default route in the routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Configuration Management tools that use Ruby

A

Chef
Puppet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wireless 2.4GHZ Non-Overlapping Channels

A

1
6
11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Used to differentiate the virtual MAC
addresses of the various HSRP groups
Defined by a special virtual MAC address
format where xx is the group
-Version 1: 0000.0007.ACxx
-Version 2: 0000.0C9F.Fxxx

A

HSRP Group Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

File transfer protocol
Uses UDP and port 69

24
Q

Processed sequentially from the first entry
in the list to the last entry
Apply extended ACL near source
Apply standard ACL near destination

A

Access-Lists (ACL)

25
Management Tools that use SSH
Ansible
26
BPDU Guard
Feature used to protect switchports from receiving STP BPDUs, however the port can transmit STP BPDUs. When a STP BPDU is received on a BPDU Guard enabled port, the port is shutdown and the state of the port changes to ErrDis (Error-Disable) state
27
IaaS Service Model
A type of cloud computing service that offers essential compute, storage, and networking resources on demand, on a pay-as-you-go basis The consumer does not have control over the physical infrastructure in the cloud
28
GLBP
A Cisco-proprietary First-Hop Redundancy Protocol (FHRP) that elects an active virtual gateway (AVG) and up to four primary active virtual forwarders (AVFs)
29
Translates domain names to IP addresses to make internet destinations humanly readable. Uses both TCP and UDP *Example: www.cisco.com = 23.7.111.4
Domain Name System (DNS)
30
A 24-bit number that uniquely identifies a vendor, manufacturer, or other organization In the first three octets of the MAC address *Example: C8:E2:65:2D:14:5B C8:E2:65 = Intel Corporate
MAC Address Organizationally Unique Identifier (OUI)
31
Must be unique in each routing topology 32-bit value in dotted decimal notation If not manually configured, it will be the highest loopback IP address. If a loopback IP address is not configured, then it will be the highest IP address among the configured interfaces
Router IDs
32
4 byte field that appears last in an ethernet frame Provides a cyclic redundancy check (CRC) that is intended to enable a frame ' s receiver to determine whether the frame has been corrupted in transit
Frame Check Sequence (FCS)
33
EIGRP Metrics
Bandwidth *Used by default Load Delay *Used by default Reliability MTU
34
IETF Standard based FHRP The virtual MAC address for VRRP groups is in the form of 0000.5E00.01n; where n is a hexadecimal value identifying the VRRP group number
Virtual Router Redundancy Protocol (VRRP)
35
Encode data in both XML and JSON format Northbound APIs are used by an SDN controller to communicate with applications in the application plane Southbound APIs enable an SDN controller to communicate with devices in the data plane
REST APIs
36
Most mature and the most widely used Uses HTTPS with TCP port 8140
Puppet Configuration Management Tool
37
802.1w Natively includes PortFast, UplinkFast, and BackboneFast Faster convergence than 802.1D
Rapid Spanning Tree Protocol (RSTP)
38
If this command is entered on an interface, then the neighbor command is required to establish an OSPF adjacency. This is because it sets the OSPF network type as nonbroadcast.
ip ospf network non-broadcast
39
Collapsed Core
A two-tier network design, the core and distribution layers are combined together into a single layer
40
Cisco DNA Center
Centralized management solution that supports Cisco Software-Defined Access (SDA)
41
spanning-tree guard root
Root guard is used to prevent newly introduced switches from being elected as the new root switch If superior BPDUs are received on a port enabled with root guard, the port enters the root-inconsistent state and stops forwarding
42
Random early detection (RED) and weighted RED (WRED)
RED mitigates the problems caused by global TCP synchronization by randomly dropping packets as congestion increases and before the queue becomes full WRED improves upon RED by adding support for QoS values to assign drop thresholds
43
Route Administrative Distance (AD)
Used in order to select the best routed path when there are two or more different routes to the same destination from two different routing protocols Lowest AD is considered to be the best route *Example: EIGRP AD of 90 is preferred over OSPF AD of 110
44
Floating Static Route
Used as a backup route for when primary routes are removed from the routing table In the example below "Route2" is floating since it has a higher AD than "Route1" Route1 - ip route 0.0.0.0 0.0.0.0 10.0.1.1 5 Route2 - ip route 0.0.0.0 0.0.0.0 10.0.1.2 10
45
Spanning-Tree PortFast
Causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states
46
OSPF 2WAY/DROTHER State
Neighbor routers that are neither the designated router (DR) nor the backup designated router (BDR) remain in the 2-Way state and are considered to be a DROTHER
47
Router Lookup Order
1.Check for the longest prefix match 2.Lowest administrative distance 3.Lowest routing metric
48
OSPF Backbone Area
When all OSPF devices in a topology are connected via networks in area 0 (ID 0.0.0.0) Core of an OSPF network
49
PAT Overload
NAT Overloading or Port Address Translation (PAT) is a modified form of dynamic NAT where more than one inside local address (Private IP)are translated to the same inside global address (Public IP)
50
Full Mesh Topology
When all devices are connected in a network topology
51
What is a primary advantage of using a three-tier architecture for interconnecting buildings on a corporate campus?
It enhances scalability by allowing easy addition of new buildings through a structured hierarchy.
52
What distinguishes Top-of-Rack (ToR) switches in a spine-leaf data center architecture?
They act as leaves, connecting both to servers within the rack and spine switches.
53
Which WAN technology provides dedicated bandwidth and predictable latency for connecting two sites without high bandwidth requirements?
Point-to-Point connection using PPP.
54
What combination of network devices is most appropriate for a small office with a mix of wired and wireless devices?
A wireless router with built-in Ethernet ports, connected to an external cable modem.
55
Which cloud deployment model best fits the objectives of combining flexibility of cloud resources with the security of in-house systems?
Hybrid Cloud.