-
1.
How do you configure the default gateway for the switch to 172.16.31.1
conf t
ip default-gateway 172.16.31.1
-
2.
In regards to QoS, describe the function of Policing.
To limit the amount of traffic being placed into high-priority queues (LLQ)
-
3.
What is Adminisrative Distance?
It’s an indicator of how ‘believable’ a given route/path is
-
4.
Describe the Full state
When the routers have matching databases, they have entered the full state. Full is a stable neighbor state for a multi-point network.
-
5.
DNS server list
DNS server listA list of IP addresses of DNS servers, known to an IP host, used by a host when sending DNS name resolution requests.
-
6.
What command is used to enable daylight savings time as recurring with a name of “MyClock”?
clock summer-time MyClock recurring
-
7.
What is the year, wireless band, and max data range used by the 802.11n standard?
Released in 2009Uses a 2.4 & 5 GHz band600 Mbps max
-
8.
What is the name of the feature that allows a device to automatically adjust which RJ45 pin pairs it uses to transmit and receive data?
Auto MDI-X
-
9.
What is the size of the flag field in the layer 4 header?
2 bits
-
10.
Comment modifie t-on la distance administrative d’une route ? Comment est le terme de ces routes?
(config)#ipv6 route 2011:db8:1111:2::/64 S0/0 2011:db8:1111:2::3 130 ou 130 représente la valeur que l’on veut assigner a route
Floating static route
-
11.
List the OSI Model
Application
Presentation
Session
Transport
Network
Data Link
Physical
-
12.
Give an example of stateful filtering
A website cannot just reach out and talk to your internal network without being invited (lower security zone to higher security zone). However, it can respond back if the network initiated the contact (higher security zone to lower security zone)
-
13.
What feature of NDP allows an IPv6 host to learn the MAC address of other hosts in the LAN?
Neighbor MAC Discovery.
-
14.
IEEE 802.1Q
The IEEE standard VLAN trunking protocol. 802.1Q includes the concept of a native VLAN, for which no VLAN header is added, and a 4-byte VLAN header is inserted after the original frame’s Type/Length field.
-
15.
What protocol negotiates trunking
Dynamic Trunking Protocol
-
16.
URI
Universal Resource Identifiers
-
17.
IPv6 Link-Local Address Prefix
fe80::/10
-
18.
Describe how SGTs are processed on a VXLAN.
Edge nodes will communicate with Catalyst Center to identify and tag user traffic with SGTs:* If two SGTs are allowed to communicate, the VXLAN tunnel is built* If two SGTs are not alloved to communicate, the tunnel is not built
-
19.
In a Fast Ethernet connection, a router transmits data on which pins?
1 & 2
-
20.
Qu’est-ce que EF définie par Diffserv?
C’est une valeur suggérée (decimal 46) pour les paquets qui ont besoin d’une jigue,delay,perte faible.Souvent utilisée pour la voix
-
21.
What state are routers R1 and R2 in after they have completing sharing their LSUs?
Full.
-
22.
Ethernet header “destination” = ___ byte(s)
6
-
23.
Host A is connected to SW1 on the SD-Access network. Host A wants to send traffic to Host B (192.168.40.3), but SW1 does not know where to forward the traffic.
What are the steps required for SD-Access forward this frame?
Host A’s frame arrives at SW1
SW1 queries the LISP server (how do I reach 192.168.40.3?)
LISP server responds with the RLOC for SW8 (172.12.1.2)
SW1 queries SW8 (do you have an EID for 192.168.40.3?)
SW8 confirms
SW1 encapsulates the original frame into a VXLAN frame and packet with a destination of 172.12.1.2 and forwards it onto the overlay
SW8 receives the frame, de-encapsulates it, then forwards it to Host B
-
24.
What is the switch port configuration for a Centralized AP vs. Standalone AP?
Centralized AP - The switchport is configured as an access port with the ‘AP VLAN’.
Standalone AP - The switchport is configured as a trunk port with allowed VLANs. You also need to configure a native vlan on
the trunk for the AP to properly be managed. [Example - Switch1 (config-if)#switchport trunk native vlan 12]
-
25.
What key field in the TCP/UDP header identifies what type of application port the data will be received on?
The destination port.
-
26.
Description of Syslog Severity:
System is unusabl
e. A panic condition
Emergency
-
27.
Description of Syslog Severity:
Error Conditions
Error
-
28.
What is the total size of the Ethernet header + trailer? = ___ bytes
26
-
29.
If you wanted to delete the configuration stored in NVRAM, what command would you use?
erase startup-config
This command deletes the configuration stored in NVRAM.
-
30.
What would be the command to check if a port had a valid VLAN assigned and was able to communicate normally?
Switch# show interfaces Ethernet0/1 switchport
If you see any of the VLANs marked as (Inactive), then you need to either create that VLAN on the switch or assign the interface to a valid VLAN already on the switch.
Example in screenshot.
-
31.
Broadcast /
Adresse multicast pour les routeurs DR et BDR ?
224.0.0.6
-
32.
What is the Layer 3 Routing Process
Frame arrives into R1 and a FCS check is completed
Assuming the frame is not discarded, Discard the old datalink header & trailer, leaving the ip packet
Compare dest IP address to the routing table and choose the best route, matching the dst address. The route will identify the outgoing interface (Host of Next Hop)
Encapsulate the IP packet inside datalink header & trailer. Forward the frame
-
33.
Quel commande pour configurer une ipv6?
Sur l’interface :Router(config-if)#ipv6 address x:x:x:x:x:x:x:x /64
/!\ Routage IPV6 désactivée de base
-
34.
Routers have […] network interfaces than switches.
fewer
-
35.
What type of message does a router send when it wants additional LSA from neighbor?
A Link-State Request (LSR).
-
36.
Combien de host représente une link local adresse ?
Un seul
-
37.
Data plane
How data is sent from 1 node to the next (infrastructure)
-
38.
What ha the maximum value for a binary octet?
1111 1111
255
-
39.
DRAG DROPDrag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right
Configure BPDU guar
d. Configure dynamic ARP inspection. Configure root guar
d. Configure VACL.
802.1q double taggingARP spoofingUnwanted superior BPDUs unwanted BPDUs on PortFast-enabled interfaces
Configure BPDU guard- unwanted BPDUs on portfast -Configure VACL.
Configure dynamic ARP inspection- ARP spoofing
Configure root guard- Unwanted superior BPDUs -Unwanted superior BPDUs
Configure VACL- 801.q double tagging - unwanted BPDUs on PortFast-enabled interfaces
-
40.
Which ports does STP place into forwarding state
All the root switch’s ports
Each nonroot switch’s root port
Each LAN’s designated port
-
41.
What is the Class C Range
192 - 223
-
42.
network interface card (NIC)
A computer card, sometimes an expansion card and sometimes integrated into the motherboard of the computer, that provides the electronics and other functions to connect to a computer network. Today, most NICs are specifically Ethernet NICs, and most have an RJ-45 port, the most common type of Ethernet port.
-
43.
What 2 types of Routing Protocols make up IGP?
Distance Vector Routing Protocol and Link State Routing Protocol
-
44.
Router(config‑router)#network [n.n.n.n]
Router(config‑router)#network [n.n.n.n] [w.w.w.w]
Identifies a network that participates in the routing process. Networks can be specified with or without the wildcard mask. If you do not use a wildcard mask, the network address you add is automatically truncated based on classful network boundaries. You must use a wildcard mask to identify VLSM subnets.
-
45.
What are the commands to check the status of trunking-related facts
show interfaces trunk and show interfaces switchport
-
46.
Define the Media Access Control (MA
C) layer
defines specifications for controlling access to the media.
-
47.
Describe the default switch console port settings.
9600 bits per second
No flow control
8-bit ASCII
No parity bits
1 stop bit
-
48.
show ip route
Lists the routers entire routing table
-
49.
What RSTP state replaces the Blocking state in regular STP?
Discarding
-
50.
Describe the Source quench from the ICMP protocol
The source quench message is sent by a receiving device to indicate that the flow of packets is too fast. When a sending device receives a source quench message, it slows its rate of transmission.
-
51.
Describe VRRPv3
This provides the capability to support IPv4 and IPv6 addresses. VRRPv3 works in multi-vendor environments and is more scalable than VRRPv2.
-
52.
Router to Switch?
Crossover
-
53.
Describe the STP convergence Hello timer and its default value
The time period between Hellos created by the root
-
54.
Defines the format and organization of data. Includes encryption.
Layer 6 Presentation
-
55.
Which function does the range of private IPv4 address perform?
Allows multiple companies to each use the same address without conflicts.
-
56.
LAN Switching decision
Deciding when to forward a frame or when to filter (not forward) a frame, based on the destination MAC address
Preparing to forward frames by learning MAC addresses by examining the source MAC address of each frame received by the switch
Preparing to forward only one copy of the frame to the destination by creating a (Layer 2) loop-free environment with other switches by using Spanning Tree Protocol (STP)
-
57.
What is the Process if PC1 wants to send a frame to PC2? - but it doesnt know its MAC address
PC1 Needs PC2’s MAC Address
- PC1 knows PC2’s IP, but needs its MAC address.
ARP Request
- PC1 broadcasts an ARP request to find PC2’s MAC address.
ARP Reply
- PC2 responds with its MAC address.
PC1 Updates ARP Cache
- PC1 stores PC2’s MAC address in its ARP cache.
PC1 Sends Frame
- PC1 sends the frame to PC2 now that it knows PC2’s MAC address.
Switch Forwards Frame
- Switch forwards the frame based on PC2’s MAC address in its table.
Summary
- ARP resolves IP to MAC addresses, allowing PC1 to send a frame and the switch to forward it.
-
58.
What is stored in the ROM
stores a bootstrap program that is loaded when the switch first powers on
-
59.
show ip protocols
to view OSPF configuration information, such as:
The OSPF process ID.
The OSPF router ID for the current router.
Configured networks and areas for the process.
IP addresses of neighbor routers.
-
60.
Spine Leaf Architecture
Normally used at data centers
spine and leaf (leaf spine) is a two-layer network topology composed of leaf switches and spine switches. … Leaf switches mesh into the spine, forming the access layer that delivers network connection points for servers.
Spine is a backbone-only, servers connected to the leaf
Connections everywhere-full mesh between spine and leaf
Goal: Lightning-fast east-west traffic flow; combine traffic
▢ ▢ Spine
| \ /|
| \ / |
| / \ |
▢ ▢ Leaf
All Spines are connected to all leafs, though there is no connection between spines. Because all spines are connected to all leafs, this allows for load balancing between connected spines.
-
61.
forwarding state
An STP and RSTP port state in which an interface operates unrestricted by STP.
-
62.
When creating an extended ACL, what is the command to identify a DHCP client as the application port to match?
eq bootpc
Port 68/UDP
-
63.
In a FastEthernet connection, a router receives data on which pins?
3 and 6
-
64.
How does STP/RSTP prevent loops
STP/RSTP prevents loops by placing each switch port in either a forwarding state or a blocking
state.
Interfaces in the forwarding state act as normal, forwarding and receiving frames.
However, interfaces in a blocking state do not process any frames except STP/RSTP messages
(and some other overhead messages).
Interfaces that block do not forward user frames,
do not learn MAC addresses of received frames, and do not process received user frames.
-
65.
What is Protocol Data Unit (PDU)?
A generic term referring to the header defined by some layer of a networking model, and the data encapsulated by the header (and possibly trailer) of that layer, but specifically not including any lower-layer headers and trailers.
-
66.
What are the four types of memory found in switches
RAMFlashROM NVRAM
-
67.
autonomous AP
autonomous APA wireless AP operating in a standalone mode, such that it can provide a fully functional BSS and connect to the DS.
-
68.
Why would ‘show running-config’ command show 3 different routes to the same destination when ‘show ip route’ shows only 1 route to the given destination?
IP Routing Tables pull only the best route available with Administrative Distance being the tie breaker
-
69.
trunk
In campus LANs, an Ethernet segment over which the devices add a VLAN header that identifies the VLAN in which the frame exists.
-
70.
Which RIR covers North America?
ARIN (American Registry for Internet Numbers)
-
71.
You need to implement and manage a wireless network consisting of approximately 150 accesspoints and thousands of clients. Which of the following would be the most helpful in theconfiguration and management of the access points in this network?
B. WLC
-
72.
The most specific match in the routing table is the match with the longest ___.
Prefix length
-
73.
What are two fundamentals of virtualization? (Choose two?
A and DA - it allows multiple operating systems and applications to run independently on one physical serverD - it allows logical network devices to move traffic between virtual machines and the rest of the physical network
-
74.
What are the 3 available commands that can be used to listing CDP neighbor information?
show cdp neighborshow cdp neighbor detailshow cdp entry entryname
-
75.
show interfaces vlan (number)
Lists the interface status, the switch’s IPv4 address and mask, and much more.
-
76.
What are the 3 ways /connector types for a console connection to a switch.
Serial port to RJ-45 console via rollover cable
Usb cable to usb converter to RJ-45 console via Rollover cable.
Usb cable to usb console via USB cable.
-
77.
____________ is used to refer to any message defined by a protocol.
PDU or Protocol Data Unit
-
78.
What is the second step in verifying ospf configuration
show ip ospf interface command to determine whether the router enabled ospf on the correct interfaces or not based on the configuration
-
79.
Name the layer: ICMP
Network
-
80.
What does DWDM stand for and what does it do?
Dense Wavelength Division Multiplexing
Combines multiple optical signals into one signal transmitted over a single fiber strand
-
81.
What command can be used on a Windows command line to display and configure network settings?
netsh
-
82.
Why use LLDP
Not Cisco Proprietary
-
83.
What does CDP stand for
Cisco Discovery Protocol
-
84.
What is the fifth step in password recovery
Save updated configuration.
-
85.
What does MAC stand for?
Media Access Control
-
86.
HTTP uses which port?
TCP 80
-
87.
login
Line (console and vty) configuration mode. Tells IOS to prompt for a password (no username).
-
88.
___ fiber cables allow multiple angles (modes
) of light waves to enter the fiberglass core.
Multimode
-
89.
Router#show ip eigrp neighbors
Displays neighboring routers from which EIGRP routes can be learned. Lists the IP address of the connected router.
-
90.
OSPF is able to split whole AS (autonomous systems
) into smaller groupings. How are those groups called?
Areas
-
91.
What is a frame?
A datalink header, trailer, and the encapsulated data in between at Layer 2 of the TCP/IP model
-
92.
TACACS +
Cisco standard— works better with Cisco devices
Encrypted communication, used TCP
protocol used when the AAA clients communicate with the server (active directory)
Terminal Access Controller Access Control System
-
93.
What is the range for the first octet values of a Class E network?
240 to 255
-
94.
What type of routing protocols available to be used in the following areas of the MPLS?:* Between the Customer and the Provider networks* Within the Provider’s network
Between the CE and PE multiple routing protocols are supported. For example: OSPF, EIGRP, RIP, eBGP, etc….
However, the service provider will typically use Multiprotocol BGP (MP-BGP).
-
95.
Qu’est-ce que l’ether channel ?
Combine des liens parallèle sur un switch comme un seul lien.
-
96.
What layer do Distribution Layer Switches connect downstream to?
Access Layer
-
97.
What is the system ID extension used by RSTP in the BID?
0000.0000.0000 since RSTP does not create a tree for each VLAN.
-
98.
What command will you use to send status messages of 3 and lower to a syslog server?
logging trap errors
-
99.
What are the three layers in a LAN Network?
Access, Distribution and Core
-
100.
This type of queuing is just CBWFQ but with a priority value
LLQ (Low Latency Queuing)
-
101.
What is another name for a MAC address?
BIA (Burned-In Address)
-
102.
APs supported en modèle de déploiement autonomous?
Le système autonome est autonome.
-
103.
Describe a Threat actor
a person or organization that poses a threat to an organization’s security. This can be an internal or an external threat. Some threats aren’t even malicious; they can be caused by internal negligence.
-
104.
Late collisons
The subset of all collisions that happen after the 64th byte of the frame has been transmitted
-
105.
Describe the pinout of a UTP rollover cable
Pin 1 to Pin 8Pin 2 to Pin 7Pin 3 to Pin 6Pin 4 to Pin 5
-
106.
Switches remove MAC entries that have not been used for ___ seconds by default.
300
-
107.
Qu’est ce qu’une URI ?
Uniform ressource identifier , ID d’une variable disponible via REST
-
108.
A switch operates at Layer 2 - why is this an advantage over a hub?
It understands a frame and can look at the data-link header and trailer. It can transmit to a specific destination.
-
109.
Describe Ping host Troubleshooting Ping host D Task
If you cannot contact a specific remote host, try pinging another host in the same remote network. If the ping is successful, then the problem is with the remote host, such as a misconfiguration, broken link, or it is unavailable.
-
110.
What is a firewall?
a software-based or hardware-based network security system that allows or denies network traffic according to a set of rules.
-
111.
The OSI model is divided into ___ layers.
7
-
112.
What would be the correct JSON formatting for an object that has 3 string key-value pairs?* address1 is 123 4th St* address2 is 456 6th St* addresss is 789 10th St.
{
"address1": "123 4th St",
"address2": "456 6th St",
"address3": "789 10th St"
}
-
113.
What is Link State Routing Protocol?
It is a dynamic routing algorithm in which each router shares knowledge of its neighbors with every other router in the network.
-
114.
What phase of IPsec configuration is this?
The VPN devices negotiate an IPsec security policy to protect IPsec data. Negotiating the settings and algorithms that are going to be used for the encryption of the actual data
Phase 2
-
115.
What is a Default Route in a routing table?
It’s an optional route that is used when no explicit path to a destination is found
-
116.
Name and purpose of the two main Cisco IOS config files and where they are stored .
Startup-config : stores the initial configuration used anytime the switch reloads Cisco IOS. This is stored in NVRAM.
Running-config : stores currently used configuration commands. This file changes dynamically when someone enters commands in configuration mode.
-
117.
When using IPv6, how does a host send information to its default gateway when trying to reach an exterior subnet?
The host will create a default route to its gateway using the routers LLA.
-
118.
In regards to 802.1X, describe the function of the authentication server.
The device that contains the network credentials and will determine network access for the supplicant based on its policies or user database.
-
119.
When creating an extended ACL, what is the command to identify FTP data as the application port to match?
eq ftp-data
Port 20/TCP
-
120.
What RFC strongly recommends using a random Global ID for your unique local address?
RFC 4193
-
121.
What is UDP used for?
Real time communication such as video conferencing, gaming, phone calls, etc.
-
122.
A specific type of DoS attack when an attacker only sends Syn and receives SynAcks but never sends back an Ack…
TCP Syn Flood Attack
-
123.
What is the theoretical maximum number of VLANs
2^12 = 4096 - 2 reserved = 4094
-
124.
What does the Link Layer do in the TCP/IP model
It gets the data that is packaged onto the network
Standardized data format
-
125.
What does it mean when two ospf neighboring routers have reached the full state
They have fully exchanged the contents of their LSDBs
-
126.
In ___ duplex mode, an interface cannot send and receive data at the same time.
half
-
127.
Where can the setting for the VLAN mapping to the WLAN configured?
Add Policy Profile > Access Policies > VLAN.
-
128.
Eompls
Ethernet over multiprotocol labeling service. This will use the 802.3 Ethernet protocol
-
129.
router(config-router)#router-id [a.b.c.d]
Configures the router ID for the OSPF process.
-
130.
IPv6 Global Unicast Address Prefix
2000::/3
-
131.
What are the two ways to disable DTP negotiaion
switchport mode access
switchport nonegotiate
-
132.
Which layers of the OSI model provides path selection between the source and destination?
Layer 3 - Network
-
133.
Sur quel couche agit CDP ? Quel est le comportement d’un équipement recoit un message CDP?
Couche liaison , CDP envoit des paquet sur l’adresse MAC 0100.0CCC.CCCC. Un équipement qui recoit un paquet avec des adresse MAC destination, lit le paquet mais ne le forward pas, il le discard.
-
134.
a 128-bit address assigned to hosts using TCP/IP. Addresses use different formats, commonly using a routing prefix, subnet, and interface ID, subnet, and host parts of an address.
IPv6 Address
-
135.
What are the commands to revert to the default settings for each interface
no duplexno speed no description
-
136.
IEEE standard ___ = 10 Gbps Ethernet (10GBASE-T)
802.3an
-
137.
trunk interface
trunk interfaceA switch interface configured so that it operates using VLAN trunking (either 802.1Q or ISL).
-
138.
Describe the purpose of the Ternary Content-Addressable Memory (TCAM)
To store a switches MAC address table.
-
139.
What 2 netshell commands can be used to display the routing table for a Windows PC?
netstat -rn
or
netsh interface ip show route
-
140.
Which class of IP address provides 15 bits for subnetting?
B
Class B provides 16 bits, but only 14 are available for subnetting.
-
141.
Que représente le control plane ?
Tous les protocols permettant de de donnée des informations qui vont permettre a la data plane de fonctionner
-
142.
What is the expected outcome when an EUI-64 address is generated?
A - The seventh bit of the original MAC address of the interface is inverted.
-
143.
What terminology best describes the following?:
A tool or method to take advantage of a vulnerability to gain access to a privileged system.
An exploit
-
144.
What is VTP transparent mode?
VTP transparent mode is a configuration mode in which a switch does not participate in VTP advertisements and can create, modify, or delete VLANs locally without affecting other switches.
-
145.
What type of server should you use to back up a Cisco IOS software and configuration files
TELNET FTP server
-
146.
What is the address 0.0.0.0 used for and what RFC defined this?
RFC 5735
0.0.0.0 indicates the host in “this” network and only used as a source address.
A common use is during the DHCP assignment process before the host has a valid IPv4 address.
-
147.
What services(s
) does Cryptography provide to data?
Authenticity (Proof of Source)Confidentiality (Privacy & Secrecy)Integrity (Data not changed during transit)Non-Repudiation (Non-Deniability)
-
148.
DHCP server
Software that waits for DHCP clients to request to lease IP addresses, with the server assigning a lease of an IP address as well as listing other important IP settings for the client.
-
149.
SFP ports
Small Form Pluggable transceiver - moreable modules, commonly, you will see fiber cables as there are many different types of these cables.
Switch to switch communication, long distance using fiber.
-
150.
Sur quoi se base RIPv2 pour choisir la meilleur route ?
Hop , nombre de routeur traversé jusqu’a destination
-
151.
Multiple-Input, Multiple-Output (MIMO)
MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas. The benefit of adding additional antennas declines as the number increases; going above 3x3 provides a negligible performance increase.
-
152.
Switch(config-if)#channel-group [1-8] mode active
Switch(config-if)#channel-group [1-8] mode passive
Selects the LACP mode on the interface.
-
153.
What is a duplex mismatch
when one side is set to half duplex and the other side is full duplex
-
154.
_____________ supports combining multiple physical systems into a single virtual system
Clustering
-
155.
10 Gbps, common name, Informal and formal IEEE names. Cable Type and max distance
10 Gig Ethernet, 10GBase-T, 802.3an, copper, 100 meters
-
156.
Router#show cdp neighbors
Checks for the status of CDP and shows a list of neighboring devices.
-
157.
AAA server
AAA serverA server that holds security information and provides services related to user login, particularly authentication (is the user who he says he is?), authorization (once authenticated, what do we allow the user to do?), and accounting (tracking the user).
-
158.
What is the max speed supported on a CAT 3 cable @ 100 meters?
10 Mbps
-
159.
What are the 5 fields of an Ethernet Headed?
Preamble, SFD, Destination, Source, Type/Length
-
160.
Mobility/ RF Group Name
Helps clients remain connected while moving through different APs
“AP to AP roaming capability”
An RF Group, also known as an RF domain, is a cluster of WLCs for which Radio Resource Management (RRM) calculations are done on a whole. RF Groups also help you to discover Rogue APs. An RF Group is formed dynamically.
-
161.
1000BASE-T
A name for the IEEE Gigabit Ethernet standard that uses four-pair copper cabling, a speed of 1000 Mbps (1 Gbps), and a maximum cable length of 100 meters.
-
162.
In terms of ACL placement within the network. Where are ACLs recommended to be configured?
Extended ACLs should be as close to the source as possible to conserve bandwidth
Standard ACLs should be configured towards the edge of the network to avoid matching too many packets which will cause alot of traffic to be dropped or permitted.
-
163.
UTP
Unshielded twisted pair. The most common type of ethernet cable
-
164.
What can happen without STP
Any flooded frame would loop for an indefinite amount in ethernet networks with redundant links
-
165.
What command would you use to auto recover from a port being disabled by a port security violation?
errdisable recovery cause psecure-violationerrdisable recovery interval 600
-
166.
How do you clear all MAC table entries for VLAN 3
clear mac address-table dynamic vlan 3
-
167.
What is the command used on a router to enable the use of DNS servers for resolving hostnames?
ip domain lookup
-
168.
Switch(config)#spanning-tree vlan [1-4094] cost [1 - 200000000]
Sets the cost manually. The cost range value depends on the path-cost calculation method:
-
169.
What layer does the term frame refer to
link layer
-
170.
Switch#show ip cef
Displays brief information of all Forwarding Information Base (FIB) entries.
-
171.
Which layer encapsulates data with both a Header and sometimes a Trailer
Data Link
-
172.
What is the command to set an allowed static MAC address for an interface with port security enabled?
switchport port-security mac-address mac-address
-
173.
Layer 3 PDU?
Packet
-
174.
Identify the topology based on the scenario:
Removes the single point of failure by adding another hub to the topology, yet all traffic from other sites still flow these centralized hubs
Redundant Hub and Spoke
-
175.
An interface that is not elected to be a root port or designated port is put into a _____ state.
Blocking
-
176.
Switch#show ip adjacency
Verifies that an adjacency exists for a connected device, that the adjacency is valid, and that the MAC header rewrite string is correct. The information displayed by the show adjacency commands includes the following:
Protocol
Interface
Type of routed protocol traffic using this adjacency
Next hop address
-
177.
Media Access Control (MAC)
6-byte-long binary numbers. For convenience, most computers list MAC addresses as 12-digit hexadecimal numbers. Cisco devices typically add some periods to the number for easier readability as well (0000.0C12.3456)
-
178.
What is the range of dynamic ports?
49152-65535
-
179.
An admin configures four switches for local authentication using hashed passwords. The four switches must also support SSH access for admins to manage the network infrastructur
e. Which switch is configured correctly?
the switch with username secretline vty 0 15login local
-
180.
A network administrator must configure SSH for remote access to router R1. The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client.
Which configuration, when applied, meets the requirements?
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate ec keysize 2048
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate rsa modulus 2048
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate ec keysize 1024
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key encrypt rsa name myKey
R1#enableR1#configure terminalR1(config)#ip domain-name cisco.comR1(config)#crypto key generate ec keysize 1024
-
181.
Qu’est-ce que NBAR ?
Cisco network based applicaiton recognition
-
182.
List the parts of a 802.1Q tag
Type PriorityFlagVLAN ID (12 bits)
-
183.
T1, speed
This is a leased line
1.544 Mbps
-
184.
What does the protocol LLDP do
allows a network engineer to discover non-Cisco devices in the network
-
185.
network part
The portion of an IPv4 address that is either 1, 2, or 3 octets/bytes long, based on whether the address is in a Class A, B, or C network.
-
186.
The AP and members of the BSS all must use the same ____ to communicate properly
Channel.
-
187.
What is the default interface rate limit for Dynamic ARP Inspection by default?
15 messages over a 1 second burst.
-
188.
IPv4 header: the “ECN” field is ___ bits in length.
2
-
189.
What is the middle layer of a fiber cable called?
Buffer
-
190.
Is RSTP a Cisco Proprietary Version or Open Standard?
Open Standard
-
191.
This type of VPN configuration is used between Cisco devices, often site to site VPNs and is Cisco proprietary and supports multicast
IPSec VTI (Virtual Tunnel Interface)
-
192.
A weakness that compromises the security or functionality of a system…
Vulnerability
-
193.
Hello BPDU
Hello BPDUThe STP and RSTP message used for the majority of STP communications, listing the root’s bridge ID, the sending device’s bridge ID, and the sending device’s cost with which to reach the root.
-
194.
What are protocols of the Data link and physical layer
Ethernet, 802.11
-
195.
What three different levels are there for basic line level security?
Console
Virtual Terminal VTY
Privileged Exec Mode
-
196.
Late collisions
The subset of all collisions that happen after the 64th byte of the frame has been transmitted. (Usually points to a duplex mismatch)
-
197.
Hexadecimal A = Decimal ___
10
-
198.
Which AP modes serve wireless traffic? (Choose 2)
Local, FlexConnect
The two AP-Modes listed that can serve wireless traffic are local and flexconnect.
-
199.
How would you verify an IPv6 address?
show ipv6 int brief
-
200.
What is sent out by default when a global unicast address is configured on a router interface?
Router advertisements that advertise the network prefix
-
201.
What is the binary value of 1
00000001
-
202.
Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate?
OSPF Process IP
OSPF area
-
203.
An attack where the attacker has connectivity to a login window, they can attempt to gain access to the system behind it…
Password Attack
-
204.
When an untagged port (Access Port
) receives a Tagged Packet (Containing a VLAN Tag
) the switch will do what?
Send it out the port with that VLAN tag or it will drop the packet if the VLAN tag on the packet is not the same as the VLAN configured on that port
-
205.
Describe Manual Network Summarization
an administrator identifies the summarized route to advertise.
-
206.
Which flavor of NAT is a home router and why?
PAT -
Because the ISP assigns one IP to the router, and then the routers assigns multiple private IPs.
-
207.
The maximum distance for 1000Base-Lx is
5000m over Fiber
-
208.
MAC address
A standardized data-link layer address that is required for every device that connects to a LAN. Ethernet MAC addresses are 6 bytes long and are controlled by the IEEE. Also known as a hardware address, a MAC layer address, and a physical address.
-
209.
The Top of Rack switch acts as a(n
) ____While the End of Row switch acts as a(n
) ____
ToR: AccessEoR: Distribution
-
210.
Router R1 Fa0/0 cannot ping router R3 FA0/1. How to fix?
Configure a static route with 10.10.10.2 as the next hop to reach 20.20.20.0/24.
-
211.
Describe the purpose of the additional core layer in a 3-tier network.
To connect together the distribution switches, without having to connect all distribution switches directly together.
Core switches also provide a backplane for higher traffic volume due to their faster speeds
-
212.
An Ethernet frame whose destination MAC address is not listed in a switch’s MAC address table, so the switch must flood the frame.
unknown unicast frame
-
213.
The connector for typical copper ethernet cabling is called?
RJ-45
-
214.
Which layer of the OSI model would an L6PDU be referring to?
Layer 6 - Presentation
-
215.
In regards to PoE, describe the function of power classification.
Determining how much power the PSE can safely provide to the PD
-
216.
embedded wireless controller (EWC)
A WLC function that is co-located within an AP.
-
217.
Pourquoi utiliser traceroute ?
Permet de savoir a quel niveau se situe le problème entre l’hote et la destination.
-
218.
Devices which transmit on Pins 3,6
Hubs
Switches
-
219.
A device detects two stations transmitting frames at the same tim
e. This condition occurs after the first 64 bytes of the frame is receive
d. Which interface counter increments?
late collision
-
220.
What is a disadvantage of half-duplex
If a device is currently receiving a frame it cannot send.
-
221.
Why is Router with Separate Interfaces considered bad practice?
Because you’ll quickly run out of interfaces to use on the router
-
222.
Packets live at this layer
Layer 3 - Network
-
223.
In a FastEthernet connection, a firewall receives data on which pins?
3 and 6
-
224.
How does a Cisco Unified Wireless Network respond to Wi-Fi channel overlap?
It analyzes client load and background noise and dynamically assigns a channel.
-
225.
What commands would you use to set it to multiple MAC Addresses allowed for Port Security?
int {int}switchport port-security maximum 2 (or greater)
-
226.
A network administrator has configured a public web server with an internal IP address of10.10.4.8 to be translated to 100.10.4.8 for all incoming web requests. Which type of NetworkAddress Translation (NAT
) has been configured?
A. Static NAT
-
227.
Drag and drop the characteristics of networking from the left onto the correct networking types:
focused on network
focused on devices
user input is a configuration
user input is a police
uses white list security model
uses black list security model
Controller-Based Networking
focused on network
user input is a policy
uses white list security model
Traditional Networking
focused on devices
user input is a configuration
uses black list security model
-
228.
Quel commande est utilisée pour crée un echange de table de routage entre OSPF et RIP ?
route redistribution
-
229.
Sur quoi ce base quel attribut présent dans le format d’un paquet DHCP se base le DHCP Snooping ? Que représente t-il?
Lors de l’envoi d’une requete DHCP on retrouve dans la trame en mac source la mac de l’équipement et un champs chaddr basé sur cette même mac. Le serveur DHCP se base sur ce chaddr pour renvoyer sa requête. Un attaquant peut donc envoyé full requette en modifiant ce chaddr ce qui va avoir faire que le serveur dhcp verra chaque requete comme venant d’un device différent (car chaddr différent)DHCP Snooping se base sur le chaddr (client hardware IP address)Pour eviter ce genre d’attaque le dhcp snooping compare le chaddr des paquets Discover DHCP avec le mac adresse dans le paquet Ethernet , si ca match le paquet est forward sinon il est discard.
-
230.
What AP Which AP mode describes the following?
“An AP that is dedicated to performing spectrum analysis on all wireless channels”
SE-Connect.
-
231.
How would you copy the file test.1 to /home/bin
cp test.1 /home/bin
-
232.
What is a command to show which access groups are applied to an interface?
show ip int {int} | include access-list
-
233.
Que répresente le 0 a coté de password lors d’un show running conf ?
Le password est en claire
-
234.
Wireless LANs
Defined by the IEEE using standards that begin with 802.11, use radio waves to send the bits from one node to the next
-
235.
Describe how a frame sent by a host is processed and forwarded on a Cisco SD-Access Overlay.
Host sends a frame which is received by a fabric edge node
The edge node encapsulates the original frame into an additional VXLAN frame and passed it onto the overlay
The other fabric nodes forward the frame based on the information in the VXLAN frame
The frame arrives at another fabric edge node and the VXLAN details are removed; leaving the original frame.
-
236.
What are the 3 types of EtherChannel Protocols?
LACP (Link Aggregation Contol Protocol)PAgP (Port Aggregation Protocol)Static Ether Channel
-
237.
Ethernet Frame Header - Preamble
Synchronization (7 bytes)
-
238.
Which three commands can be used to save the configuration?Router# ___Router# ___Router# ___
writewrite memorycopy running-config startup-config
-
239.
What are the reasons the OSI model is useful for?
Provides a common language or reference point between network professionals.
Divides networking tasks into logical layers for easier comprehension.
Allows specialization of features at different levels.
Aids in troubleshooting.
Promotes standards and interoperability between networks and devices.
Provides modularity in networking features. Developers can change features without changing the entire approach.
-
240.
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
different nonoverlapping channels
-
241.
Describe the Listening port state
The listening state is a transitory state between blocking and learning. The port remains in the listening state for a specific period of time. This time period allows network traffic to settle down after a change has occurred. For example, if a bridge goes down, all other bridges go to the listening state for a period of time. During this time the bridges redefine their roles.
-
242.
EXEC Command Reference
disable
Moves the user from enable mode to user mode.
-
243.
Router(config)#ip access-list standard 1
Creates or edits a standard access list using an ID number of 1.
-
244.
This type of WAN connection has T1, T2, T3 and T4
Leased Line
-
245.
The IP address 10.0.0.43 is an example of what
DDN - Dotted-Decimal Notation
-
246.
How many pairs of wires does the 1000BASE-T require
four pairs
-
247.
What is STP convergence
The process by which the switches collectively realize that something has changed in the LAN topology and determine whether they need to change which ports block and which ports forward
-
248.
If you set an interface to a speed 10 command, how fast will the interface transmit data?
10Mbps
-
249.
What does DHCP do?
It automatically allocates and IP address to a device that requests one from a given pool of IP addresses
-
250.
Router(config)#ip route network-address subnet-mask { ip-address | exit-intf [ip-address]} [distance]
Configures a floating static route on an IPv4 network. You must increase the administrative distance of the floating route to ensure that it is higher than your default static route and that it is used only as a backup.
-
251.
adjacent-layer interaction
The general topic of how, on one computer, two adjacent layers in a networking architectural model work together, with the lower layer providing services to the higher layer.
-
252.
Commande assignation IPV6 EUI-64?
Router(config-if)#ipv6 address 2001:DB8:1111:4::/64 eui-64