click below
click below
Normal Size Small Size show me how
CCNA - Routing
Question | Answer |
---|---|
What 3 things are loaded when the router is initialized? | 1. Bootstrap 2. The Operating System 3. Configuration File |
What does a router do if it cannot find a configuration file? | Enters setup mode |
Where is the backup copy of the new configuration from setup mode stored? | NVRAM |
What is the test called that the router performs when it powers up? | POST |
After verifying Hardware functions what does the router do next? | Software initialization |
Where is the bootstrap program loaded | Rom |
What is the definition of Bootstrap | A bootstrap is a simple preset operation to load instructions that in turn cause other instructions to be loaded into memory |
Where are three places where the Cisco IOS can be found? | 1. Flash 2. TFTP Server 3. ROM |
Where is the configuration file saved? | NVRAM |
What 3 things does the POST Diagnostics from ROM verify. | 1. Basic CPU operation 2. Memory 3. Network Interface ports |
How are configuration files loaded into main memory? | one line at a time |
what do configuration commands do? | 1. Start routing 2. Supply addresses for interfaces 3. set media charachteristics and so on |
If no valid configuration file exists in NVRAM | the OS executes a question driven configuration routine. What is this called |
What command shows the backup config files | Show startup-config |
What command shows the active config files | Show running-config |
What command deletes the backup configuration file in NVRAM | Erase startup-config |
What is the reboot command | reload |
What is the command used to enter setup mode from the privledged exec prompt | setup |
What is the purpose of setup mode? | to bring up |
How do default answers appear in setup mode | in brackets [] |
what command can be pressed at any time to terminate the process and start over | Control + C |
If you want to use the new configuration and you enter yes where will it be saved | NVRAM |
What should you do if the MORE promp appears | press space bar to continue |
What is the first global parameter you should enter? | Host name |
What password is encrypted by Cisco proprietary software? | Enable Secret |
How does the enable secret password appear on the config file? | meaningless string of charachters |
If you answer yes to the setup configuration what will happen to the configuration file? | it will be executed and saved to NVRAM |
if you want to change the setup configuration after you save it what must be done. | You must configure it manually |
The script file generated by setup is additive. What does this mean? | You can turn features on with setup but you can not turn them off. |
What 3 places can you load configuration files from? | 1. Console 2. NVRAM 3. TFTP server |
What five pieces of information does the router use from the configuration files when it starts up? | 1. Cisco IOS Software version 2. Router Identification 3. Boot File Locations 4. Protocol Information 5. Interface Configuration |
If there is no configuration file in the router | what mode do you enter to configure one? |
What command will allow you to configure from a virtual terminal | a modem |
What command configures manually from the console terminal. | configure terminal |
What command displays the current configuration in RAM? | Show running-config |
What command displays the saved configuration | which is the contents of NVRAM? |
What command erases the contents of NVRAM? | erase startup-config |
What does the command copy running-config tftp allow you to do? | store a current copy of the configuration on a TFTP server. |
In copying a running-config to a host do you need to key the IP address of the host? | Yes |
Do you need to name a config file copied to a TFTP server? | Yes |
What mode do you need to be in | in order to manage the contents of NVRAM |
What command erases the contents of NVRAM | erase startup-config |
Where is the runnning config stored? | RAM |
Where is the startup or backup configuration file stored? | NVRAM |
What command stores the current configuration into NVRAM? | copy running-config startup-config |
What command displays the saved configuration? | show startup-config |
If the screen prompt shows Router(config-if)# what are you configuring? | the interface |
If the screen prompt shows Router(config-subif)# what are you configuring? | the subinterface |
What mode are you in when you apply commands that affect the system as a whole? | Global configuration |
What do you type to enter global configuration mode from the terminal | Configure Terminal or Config T |
What command do you key to configure a routing protocol? | Router "protocol" for example to configure RIP you type Router RIP |
What mode are all router interfaces automatically in? | administratively down mode |
What is the clocking signal on a serial link? | DCE |
What tyoe of devices are | by default |
what command sets the clockrate? | clockrate |
What command establishes a password on the console terminal? | line console 0 or line con 0 |
What command establishes password protection on incoming telnet sessions? | line vty 0 4 |
What command uses Cisco proprietary encryption process to alter the password character string? | enable secret password |
If you do not configure a router name | what is the default name? |
What mode must you be in to change the routers name? | Global Config |
What does the command banner motd allow you to do? | Configure a message-of-the-day banner to be displayed on all connected terminals at login |
What delivery method does IP use? | Best Effort |
What are three reasons data may fail to reach its destination? | 1. Hardware Failure 2. Improper configuration 3. Incorrect routing info |
What does IP use to notify the sender that the message couldnt be delivered? | ICMP |
What type of message provides information or configuration parameters to hosts? | Control messages |
What component of TCP/IP notifies the sender that a data transmission has failed? | ICMP |
What is the acronym for Internet Control Message Protocol? | ICMP |
Does a router know the exact path a datagram took to get to the router? | No |
What is the ONLY information a router has about a datagram? | Only the source and destination IP address of the datagram |
Does ICMP correct network problems? | No |
Does ICMP notify the intended receiver that there was a problem delivering the packet? | No |
Why dont error created by ICMP messages generate their own ICMP message? | error reports could generate more error reports |
What 3 addresses are needed in TCP/IP configuration if datagrams are to travel outside the local network | 1. IP Address 2. Subnet mask 3. Default gateway |
What two things must a router have in order to send datagrams? | 1. TCP/IP properly configured on it's interfaces 2. An appropriate routing protocol |
What is the term that is used when a destination network is not accessable? | Unreachable network |
What happens if the destination device recieves the ICMP echo request? | It formulates an echo reply message to send back to the source of the echo request |
What command initiates an echo request? | ping |
If an echo request is succesful between the source and destination what does that mean. | This confirms ip connectivity betweeen the two devices |
What would be created if two routers continually route a datagram back and forth? | Loop - travels in circles |
What is the maximum hop count for RIP? | 15 |
What does TTL stand for? | Time to Live |
What 3 fields are common to all ICMP messages? | 1. Type 2. Code 3. Checksum |
What are four reasons datagrams might not make it to their destination? | 1. Hardware failures 2. Improper protocol configuration 3. down interfaces 4. Incorrect routing information |
If a "3" appears in the type field what does that mean? | Destination Unreachable |
What does the "code value" indicate? | The reason a packet could not be delivered |
What is usually needed to forward a datagram from a token-ring to an ethernet network? | Packet fragmentation |
If a datagram header has an error what will a device like a router do? | It sends an ICMP type 12 parameter problem message to the source |
When the code value of teh problem message reaches 0 | what will the pointer field indicate? |
Why is a control message sent? | To inform hosts of conditions such as network congestion or a better gateway. |
How are ICMP control messages sent? | Inside IP datagrams |
What is another term for "gateway" | router |
What is the only device that can initiate a Redirect/Change request message? | router |
How is a redirect/change configured on a Cisco router? | It's the default |
What allows a host to ask for the current time according to the remote host? | The ICMP timestamp message request |
What are the 2 type fields on an ICMP time stamp message? | 13 (Timestamp request) or 14 (Timestamp reply) The code field value is always set to 0 |
What 3 things are contained in the ICMP timestamp reply message | 1. the originate timestamp 2. the receive timestamp 3. transmit timestamp |
What 2 things affect true transit time? | 1. Traffic 2. Congestion on the network |
What 2 protocls are now used to allow a host to find its network number? | 1. BOOTP 2. DHCP |
What type of message is sent out when a host doesnt know the network address? | Address mask request |
What is the mulicast address for router discovery? | 224.0.0.2 |
What happens if a router receives a multicast request but isnt configured for multicasting? | It doesnt answer the request |
If the default gateway is missing | what message is genereated by the host? |
What happens when there is too much congestion on a network? | Packets are dropped |
Why dont Cisco routers send source quench messages(by default)? | because the source-quench message may itself add to the network congestion |
What type of offices might use source quench messages | SOHO small office home office |
What is the standard for internetwork communications? | TCP/IP |
What is the transport protocol for the internet? | TCP/IP |
What is the function of the TCP/IP protocol suite? | Responsible for the reliable transport and regulation of data flow from source to destination |
Prior to data transmission | the 2 communicating hosts go through a synchronization process to establish a virtual connection for each session between hosts. This process is called what? |
Describe the process of a three way hand shake? | 1. The source host sends the destination host a request for communication. This is done by sending a sequence number 2. The destination host sends back and Acknowledgement of the sequence number and then adds a 1 to it and sends it back. 3. The source hos |
DoS stands for? | Denial of Service attack |
Describe SYN flooding? | SYN flooding exploits the normal three way handshake and causes targeted devices to acknowledge to source addresses that will not complete the handshake |
Describe DoS attack? | the hacker initiates a SYN but spoofs the source IP address. Spoofing is a term used when the receiving device replies to a non-existant |
What are some defense mesures for SYN flooding and DoS attacks? | system administrators may decrease the connection timeout period and increase the connection queue size. Software also exists that can detect these type of attacks and initiate defensive measures |
Describe how windows provides flow control? | data must be broken into smaller pieces to allow for proper data transmission |
What is the purpose of TCP applying sequence numbers to segments? | so that the recieving node can reassemble bytes in the correct order |
What does TCP do if a sequence number is missing in a series? | That segment is retransmitted |
TCP uses positive acknowledgement and retransmission (PAR) for what? | to control data flow and confirm data delivery |
Name the field responsible for trancking of transmitted and received bytes? | the Acknowledgment Number field |
What two protocols does the Transport layer provide? | 1. TCP 2. UDP |
What layer 3 protocol is connectionless? | IP |
Which protocol is a connection oriented reliable protocol? | TCP |
What protocol is connectionless and unreliable? | UDP |
What advantage does UDP provide over TCP? | Speed |
TCP provides services for what applications? | 1. FTP 2. HTTP 3. SMTP 4. DNS |
UDP is the transport layer protocol used by what applications? | 1. DNS 2. TFTP 3. SNMP 4. DHCP |
UDP is unreliable - so what layer provides error detection? | UDP does not use windowing or ACK's so APPLICATION LAYER protocols must provide error detection |
What are port numbers used to keep track of? | the different conversations that cross the network at the same time |
Both TCP and UDP use _________ to pass information to upper layers? | port or socket numbers |
What port is used for FTP application? | 21 |
What port numbers are used for public applications? | Below 255 |
What is port number 53 used for? | DNS |
What is the port used for telnet? | 23 |
The IP address gets the packet to the _______? The TCP or UDP port number guarantees that the packet is passed to the correct ___________? | correct server application |
Port numbers in the range of 0 - 1023 used to select proper applications are considered public port numbers and are controlled by ___________? | Internet Assigned Numbers Authority (IANA) |
IP addresses gets the packet to the correct server but ___________ GUARANTEES the packet is passed to the correct application? | TCP or UDP |
Be able to determine the difference between TCP segments and UDP segments What information do UDP segments not contain? | No sequence numbers or Acknowledgement fields |
The Network layer assigns the logical address or ____________ | and is then serviced by the Data Link layer |
What is a sequential list of permit or deny statements that apply to addresses or upper layer protocols? | An ACL |
What are two things a router can do with a packet? | Accept or Deny |
How are ACL's defined? | On a per-protocol |
What happens to packets if an ACL is not configured on a router? | all packets passing through the router will be allowed on all parts of the network. |
Where are packets either accepted or rejected due to an ACL? | at the interface |
How does a router read an ACL? | From top to bottom |
What happens to the ACL statements once a match is found in the list? | the accept or reject action is performed and no other ACL statements are checked |
What happens if additional condition statements are needed in an access list. | The entire ACL must be deleted and recreated with new condition statements. |
What is placed at the end of EVERY ACL? | Implicit Deny Any statement |
What mode must you be in to create an ACL? | Global Config |
What are the 2 steps in creating an ACL | 1. Create the ACL 2. Apply it to an Interface |
What are 2 directions ACL's can be placed? | In Out |
Where should a standard ACL be placed? | Closest to the destination |
Where should an extended ACL be placed | Closest to the source |
What happens if no match is found on an ACL list? | The packet is denied |
What does a 1 mean in wildcard masking? | Ignore |
What does a 0 mean in wildcard masking? | Check |
What IP Address and subnet mask will the word any substitute for? | 0.0.0.0 255.255.255.255 |
What command shows ALL the ACLs on a router | show access-lists |
What do standard ACL's check? | Source IP address |
What is the default wildcard mask? | 0.0.0.0 |
What 4 things can an Extended ACL check? | 1. Source Address 2. Destination Packet Address 3. protocol 4. Port number |
What type of echo packet is sent to the sender if the packet is discarded? | destination was unreachable |
Can you use the wildcard host or any keywords in the command? | Yes |
What does the ip access-group command link? | an existing extended ACL to an interface |
What version of CISCO IOS allowed for named ACL's? | 11.2 |
What mode must you be in to configure a named ACL? | Global Config |
Where do you place Extended ACLs? | As close to the source as possible |
Where do you place standard ACLs? | As close to the destination as possible |
Who does a firewall try to keep out the intranet? | intruders that come from the global internet |
Where are most firewalls placed? | between the internal network and an external network |
What are routers that are situated on the boundries of a network? | Border routers |
What 2 types of ACLs are used on packets traveling through a router? | Standard Extended |
What are the numbers of the virtual ports on a router | 0 |
Why should identical restrictions be placed on all vty lines? | Its impossible to control which line a user will connect on |
What does a router do when it determines that a route is the best path to a destination? | It adds that route to its routing table. |
What are the 2 most time consuming jobs of a network administrator? | Network testing and troubleshooting |
What type of equipment causes the most difficult network problems? | Routers |
What is the function of a router? | To determine the best path from a source to a destination |
What do routers read to make packet forwarding decisions? | Contents of their IP routing table |
What does the command show ip route display? | The contents of their IP routing table |
What is a manually configured route called? | Static Route |
What is a route that can change automatically as neighboring routes update each other with new information? | Dynamic Route |
What is used when the router is unable to match a destination network with an entry in its routing table? | Default route |
What command establishes a default route in networks using dynamic routing protocols? | ip route 0.0.0.0 0.0.0.0 or ip default-network |
What layer determines the best path for a packet? | Network Layer (Layer 3) |
What device determines the best path and forwards the packet from an incoming interface to an outgoing interface | router |
what address is used to get packets from source to destination? | Layer 3 Address |
What address never changes no matter how many hops a packet takes? | Source and Destination IP Address |
What address changes at each hop or router? | MAC Address |
What metric does rip v1 use? | Hop Count |
What metric is better higher or lower | Lower |
What layer should you start with when testing network problems? | Layer 1 |
What is the most common problem on IP networks? | Errors in the addressing scheme |
What is the most important part of troubleshooting? | Documentation |
What layer would a transciever problem be at? | Layer 1 |
What layer would an improperly configured serial interface be at? | Layer 2 |
What layer would an incorrect IP address be? | Layer 3 |
What command is used to test connectivity | Ping |
What is another name for the "indicator" light on a NIC card that indicates a valid connection | Link Light |
What should you do if the interface has indicator lights that do not show a valid connection? | Check for faulty or incorrect cabling |
What 3 things are displayed when a ping packet finds a specified system and returns? | Minimum |
What will the command show ip protocol show? | Shows the current state of the active routing protocols |
What does IGRP use to balance the load on multiple links? | Variance |
What 3 things are displayed when a ping packet finds a specified system and returns? | Minimum |
What does 5 exclamation points indicate when performing a ping? !!!!! | A successful connection |
What command would you use to perform more extensive ping tests? | Extended Ping |
Which ICMP message type notifies the source host that a receiving host or network is not available? | Destination Unreachable |
What layer does Telnet test | All Layers |
What line from show interfaces output would indicate a layer 2 problem? | The line that says Interface UP Line protocol DOWN |
What would an Increasing number of Carrier transitions counts on a serial link indicate? | Bad Link or defective CSU/DSU |
What are messages sent by one network device to inform another network device that the virtual circuit between the two is still active? | Keepalives |
Who does CDP allow you to discover information about? | Directly connected Cisco devices |
What command is used to discover routes that packets take when traveling to their destination? | traceroute |
What command shows the entries for all known networks and subnetworks | and how that information was learned |
what commadn would identify a router that is delivering bad router information? | Show IP protocols |
What command would allow you to check a cable connection if you were in LA and a router was in New York? | Show controllers |
What command will turn off all diagnostic output? | no debug all or undebug all |
What command will show what is being examined by a debug command? | show debugging |
MAC Addresses are how many bits in Length? | 24 |
Describe communicaton between 2 devices on a LAN | The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it but the devices with non matching addresses otherwise ignore the frame. |
What are some functions associated with Frames | 1. Identifies which computers are communicating with one another 2. Signals when communication between individual computers begins and when it ends 3. Flags corrupted Frames |
Media Access Control Refers to what? | Rules that determine which computer on a shared-medium is allowed to transmit the data |
How do you describe CSMA/CD networks? | One node's transmission traverses the entire network and is received and examined by every node. |
What are the important Data Link Layer (Layer 2) functions? | Logical Link Control Addressing Media Access Control |
What is true of a deterministic MAC protocol? | It allows hosts to "take turns" sending data |
Fast Ethernet Supports up to what transfer rate? | 100 Mbps |
What are the 2 Gigabit over fiber cable specifications? | 1000Base-LX 1000Base-SX |
What is the transmission medium for 1000BASE-SX? | Short-wave laser over multimode fiber |
4D-PAM5 encoding method is used in which Gigabit ethernet? | 802.3ae |
What happens when 1000BASE-T sends and receives data in full-duplex mode on the same conductor? | A permanent collision on the wire |
What is the maximum transmission distance supported by 10 Gigabit Ethernet? | 40 Kilometers |
What are 3 features of microsegmentation? | 1. It enables dedicated access 2. It supports multiple conversations at any given time 3. It increases the capacity for each workstation connected to the network |
What do LAN switches use to make forwarding decisions? | MAC Addresses |
What best describes one function of Layer 3 | the network layer |
What function allows routers to evaluate available routes to a destination and to establish the preferred handling of a packet? | Path Determination |
How does the network layer forward packets from the source to the destination? | By using A routing table |
What 2 parts of a network layer address do routers use to forward traffic through a network? | Network address and destination IP address |
What best describes a routed protocol? | Its address provides enough information to allow a packet to be forwarded from host to host. |
What best describes a routING protocol? | A protocol that accomplishes routing throgh the implementation of an algorithm |
Whats an advantage of distance vector algorithms? | They are computationally simple |
What describes Link State algorithms | It recreates the exact topology of the entire network |
Why do routing loops occur? | Slow convergence occurs after a modification to the internetwork. |
Describe the concept describing EIGRP as a balanced hybrid routing protocol? | Being that EIGRP is a distance vector routing protocol |
What is a network with only one path to a router called | Stub network |
What best describes a default route? | Route used when the destination network is not listed explicitly in the routing table |
What kind of entries does a router initally refer to? | Entries about networks or subnets that are directly connected |
What are exterior routing protocols used for? | To communicate between autonomous systems. |
If you suspect that one of the routers connected to your network is sending bad routing information what command would you use to check? | router> show ip protocol |
Why would you display the routing table? | To identify destination network addresses and next-hop pairs |
If you want to learn which routing protocl a router was configured with what command structure should you use? | router> show ip protocol |
An administrative distance of 15 indicates what? | The routing information source is relatively trustworthy |
If you wanted to see RIP routing updates as they are sent and received what command would you use? | router# debug ip rip |
Most NICs have what type of lights that show whether there is a valid connection? | Indicator |
What best describes TCP/IP? | Its a suite of protocols that can be used to communicate across any set of interconnected networks. |
Why is sequence numbering in the TCP 3 way handshake open connections used? | To ensure lost data can be recovered if problems occur later |
What is teh function of ARP? | It is used to map an unknown IP address to a known MAC address? |
What best describes window size? | The number of bytes that can be transmitted while awaiting an acknowledgement |
What does a TCP sliding window do? | Its a method of flow control for network data transfers using the receiver's window size. |
What command displays contents of the IP routing table? | Show IP route |
Why are default routes used? | Defaults are used when the router is unable to match a destination network with a more specific routing table entry. |
What is a metric? | The measurement used by a router to determine the best route. |
When a router receives an incoming packet | what does it do? |
What are the most common type of problems that occur on IP networks? | Errors in the addressing scheme. |
What is the most important part of the troubleshooting process? | Documentation |
What layer of OSI would these errors occur? Broken Cables DTE Device Problems Transciever problems | Layer 1 |
What layer of OSI model would you find these errors? Incorrect IP address Incorrect Subnet mask | Layer 3 |
What does TX and RX stand for. | These are the link lights on a device. TX = Transmitting Data RX = Receiving Data |
What is ping used for? | Ping is used to test network connectivity |
What does a succesful telnet indicate? | That all layers of the OSI model are functioning properly. |
What is the single most important tool to discover Layer 1 and Layer 2 problems with the router? | The show command |
What are 3 possible causes of an interface being up and the line protocol being down | 1. No Keepalives 2. No Clockrate 3. Mismatch Encapsulation |
Should you use debug during peak network times? | No |
What troubleshooting utility is used to discover the routes packets take when traveling to their destination? | Traceroute |
What is the synchronization process called that TCP uses to prepare for data transmission? | 3 way handshake |
What does DoS stand for and what is it designed to do? | DoS means Denial of Service attack. Designed to bring down a server maliciously |
What does window size determine? | window size determines the amount of data that can be transmitted at one time before a destination responds with an ACK |
What are sequence numbers used for? | To help recieving nodes reassemble data that was received in the right order. |
What provides error detection in UDP? | Application Layer Protocols |
What are the 2 types of routes | Static Dynamic |
When specifying a static route | the administrator has two options for indicating the gateway. What are they? |
What command is used to configure a static route | ip route "address" "subnet mask" "next hop" |
What types of routes are used to route packets with destinations that do not match any of the other routes in a routing table? | Default routes |
What is the command to setup a default route? | IP route 0.0.0.0 0.0.0.0 |
What command do you use to view the routing table? | show IP route |
What is a routing protocol? | A routing protocol is used by routers to update routing tables. |
What is a routed protocol? | A routed protocol is used by routers to direct traffic. |
What is an Autonomous system? | An Autonomous system is a collection of networks under a common administration that share a routing strategy. These may be run by one or more operators. |
What is the goal of a routing protocol? | The goal of a routing protocol is to build and maintain routing tables. |
List the 2 categories of routing protocols? | Distance Vector Link State |
Using distance vector routing | where does a router get its routing table updates? |
What does the network command do when configuring routing protocols? | Determines which interface sends and receives router table updates |
When using RIP what happens to a packet if the hop count is greater than 15? | The packet is discarded |
What type of routing is Border Gateway Protocol (BGP)? | Exterior Routing Protocol Used from ISP to ISP |
What types of routing protocols have Fast convergence? | Link State |
What types of routing protocols have Slow convergence? | Distance Vector |
Distance Vector Algorithms call for each router to send __________________ to each of its adjacent neighbors? | entire routing table |
What can occur if slow convergence occurs on the network as a result of changes to the network causing inconsistant routing entries? | Routing Loops |
Describe Route Poisoning? | This is the notification given to a router that a route is down by giving it a number that represents an Infinate number of hops. |
When is a triggered update sent? | Every 30 seconds on RIP or whenever a routing table changes |
What are the 4 charachteristics of RIP? | 1. Distance Vector Protocol 2. Metric is Hop Count 3. If Hop Count > 15 packet is discarded 4. updates sent every 30 seconds |
what command enables RIP? | router rip |
What does configuring "ip classless" do on a router? | It allows router to ignore classful boundries of networks in its routing table and route to the default route. |
What does RIP use to reduce routing loops and count to infinity? | 1. Split Horizon 2. Poison Reverse 3. Hold down Counters 4. Triggered updates |
List 2 common ways to verify RIP is configured properly. | 1. Show IP route 2. Show IP protocols |
What does using the passive interface command prevent? | It prevents an interface from sending routing updates |
What is IGRP? | A distance vector routing protocol that was developed by Cisco. |
RIP Sends routing updates every 30 seconds. How often does IGRP send updates? | Every 90 Seconds |
What are the 4 Metrics used by IGRP? | Bandwidth Delay Reliability Load |
What command do you use to configure IGRP? | router igrp "Autonomous system number" |
Which routing protocol converges faster RIP or IGRP? | IGRP |
What is ICMP and what does it do? | ICMP - Internet Control Message Protocol ICMP is used to notify sender that there was an error in a delivery address |
How are ICMP messages delivered? | Encapsulated in datagrams and transferred just like other data. |
What does TTL stand for? | TTL = Time to live |
When a destination is unreachable what does ICMP do? | It assigns a code as to why the destination is unreachable (field code) |
What are control messages used for? | Control messages are used for informing hosts of network congestion or existance of a better gateway to a remote network. |