Shared Flashcard Set

Details

CCNA 200-125
Practice for Cisco 200-125
14
Computer Networking
Professional
08/30/2018

Additional Computer Networking Flashcards

 


 

Cards

Term

What are three benefits of GLBP? (Choose three)

 

  1. GLBP supports up to eight virtual forwarders per GLBP group
  2. GLBP supports clear text and MD5 password authentication between GLBP group members
  3. GLBP is an open source standardized protocol that can be used with multiple vendors.
  4. GLBP supports up to 1024 virtual routers
  5. GLBP can load share traffic across a maximum of four routers
  6. GLBP elects two AVGs and two standby AVGs for redundancy
Definition
  1. GLBP supports up to eight virtual forwarders per GLBP group
  2. GLBP supports clear text and MD5 password authentication between GLBP group members
  3. GLBP is an open source standardized protocol that can be used with multiple vendors.
  4. GLBP supports up to 1024 virtual routers
  5. GLBP can load share traffic across a maximum of four routers
  6. GLBP elects two AVGs and two standby AVGs for redundancy
Term

What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two)

 

  1. hello packets
  2. SAP messages sent by other routers
  3. LSAs from other routers
  4. beacons received on point-to-point links
  5. routing tables received from other link-state routers
  6. TTL packets from designated routers
Definition
  1. hello packets
  2. SAP messages sent by other routers
  3. LSAs from other routers
  4. beacons received on point-to-point links
  5. routing tables received from other link-state routers
  6. TTL packets from designated routers

Explanation: Neighbor discover is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain. After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA is copied and forwarded to every neighbor except the one that sent the LSA.

Term

What command visualizes the general NetFlow data on the command line?

 

  1. show ip flow export
  2. show ip flow top-talkers
  3. show ip cache flow
  4. show mls sampling
  5. show mfs netflow ip
Definition
  1. show ip flow export
  2. show ip flow top-talkers
  3. show ip cache flow
  4. show mls sampling
  5. show mfs netflow ip

Explanation: The 'show ip cache flow' command displays a summary of the NetFlow

Term

A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning with the lowest layer, place these steps in order.

 

  1. verify URL
  2. verify NIC operation
  3. verify Ethernet cable connection
  4. verify IP configuration
Definition
  1. verify Ethernet cable connection
  2. verify NIC operation
  3. verify IP configuration
  4. verify URL
Term

Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over FastEthernet?

 

  1. 802.3ad
  2. 802.1w
  3. 802.1Q
  4. 802.1d
Definition
  1. 802.3ad
  2. 802.1w
  3. 802.1Q
  4. 8 02.1d
Term

What authentication type is used by SNMPv2?

 

  1. HMAC-MD5
  2. community strings
  3. username and password
  4. HMAC-SHA
Definition
  1. HMAC-MD5
  2. community strings
  3. username and password
  4. HMAC-SHA
Term

While troubleshooting a GRE tunnel interface issue, show interface command output displays tunnel status up, but line protocol is down. Which reason for this problem is the most likely?

 

  1. The next hop server is misconfigured
  2. The route to the tunnel destination address is through the tunnel itself
  3. The tunnel was just reset
  4. The interface has been administratively shut down
Definition
  1. The next hop server is misconfigured
  2. The route to the tunnel destination address is through the tunnel itself
  3. The tunnel was just reset
  4. The interface has been administratively shut down
Term

Under which circumstance should a network administrator implement one-way NAT?

 

  1. when the network must route UDP traffic
  2. when traffic that originates outside the network must be routed to internal hosts
  3. when traffic that originates inside the network must be routed to internal hosts
  4. when the network has few public IP addresses and many private IP addresses require outside access
Definition
  1. when the network must route UDP traffic
  2. when traffic that originates outside the network must be routed to internal hosts
  3. when traffic that originates inside the network must be routed to internal hosts
  4. when the network has few public IP addresses and many private IP addresses require outside access

Explanation: NAT operation is typically transparent to both the internal and external hosts. Typically, the internal host is aware of the true IP address and TCP or UDP port of the external host. Typically, the NAT device may function as the default gateway for the internal host. However, the external host is only aware of the public IP address for the NAT device and the particular port being used to communicate on behalf of a specific internal host.

NAT and TCP/UDP: "Pure NAT", operating on IP alone, may or may not correctly parse protocols that are totally concerned with IP information, such as ICMP, depending on whether the payload is interpreted by a host on the "inside" or "outside" of translation. As soon as the protocol stack is traversed, even with such basic protocols as TCP and UDP, the protocols will break unless NAT takes action beyond the network layer. IP packets have a checksum in each packet header, which provides error detection only for the header. IP datagrams may become fragmented and it is necessary for a NAT to reassemble these fragments to allow correct recalculation of higher-level checksums and correct tracking of which packets belong to which connection. The major transport layer protocols. TCP and UDP, have a checksum that covers all the data they carry, as well as the TCP/UDP header, plus a "pseudo-header" that contains the source and destination IP addresses of the packet carry the TCP/UDP header. For an originating NAT to pass TCP or UDP successfully, it must recognize the TCP/UDP header checksum based on the translated IP addresses, not the original ones, and put that checksum into the TCP/UDP header of the first packet of the fragmented set of packets. The receiving NAT must compute the IP checksum on every packet it passes to the destination host, and also recognize and recompute the TCP/UDP header using the retranslated addresses and pseudo-header. This is not a completely solved problem. One solution is for the receiving NAT to reassemble the entire segment and then recompute a checksum calculated across all packets

The originating host may perform Maximum transmission unit (MTU) path discovery to determine the packet size that can be transmitted without fragmentation and set the don't fragment (DF) bit in the appropriate packet header field. Of course, this is only a one-way solution, because the responding host can send packets of any size, which may be fragment before reaching the NAT

Term

Which IPv6 routing protocol uses multicast group FF02::9 to send updates?

 

  1. static
  2. RIPng
  3. OSPFv3
  4. IS-IS for IPv6
Definition
  1. static
  2. RIPng
  3. OSPFv3
  4. IS-IS for IPv6
Term

Which statement about unicast frame forwarding on a switch is true?

 

  1. The TCAM table stores destination MAC addresses
  2. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on
  3. The CAM table is used to determine whether traffic is permitted or denied on a switch
  4. The source address is used to determine the switch port to which a frame is forwarded
Definition
  1. The TCAM table stores destination MAC addresses
  2. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on
  3. The CAM table is used to determine whether traffic is permitted or denied on a switch
  4. The source address is used to determine the switch port to which a frame is forwarded
Term

Which three options are the major components of a network virtualization architecture? (Choose three)

 

  1. virtual network services
  2. policy enforcement
  3. network access control
  4. network resilience
  5. authentication services
  6. path isolation
Definition
  1. virtual network services
  2. policy enforcement
  3. network access control
  4. network resilience
  5. authentication services
  6. path isolation
Term

Refer to the exhibit. An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?

 

ACL 102

access-list 102 deny tcp 172.21.1.1 0.0.0.255 any eq 80

access-list 102 deny ip any any

RouterA# show ip int

FastEthernet0/0 is up, line protocol is up

Internet address is 192.168.1.144/20

Broadcast address is 255.255.255.255

Address determined by DHCP

MTU is 1500

Helper address is not set

Directed broadcast forwarding is enabled

Outgoing access list is 102

Inbound access list is not set

Proxy ARP is enabled

 

  1. no ip access-class 102 in
  2. no ip access-class 102 out
  3. no ip access-group 102 in
  4. no ip access-group 102 out
  5. no ip access-list 102 in

 

Definition
  1. no ip access-class 102 in
  2. no ip access-class 102 out
  3. no ip access-group 102 in
  4. no ip access-group 102 out
  5. no ip access-list 102 in
Term

How does a DHCP server dynamically assign IP addresses to hosts?

 

  1. Addresses are permanently assigned so that the host uses the same address at all times
  2. Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned
  3. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease
  4. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement
Definition
  1. Addresses are permanently assigned so that the host uses the same address at all times
  2. Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned
  3. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease
  4. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement
Term

Which address block identifies all link-local addresses?

 

  1. FC00::/7
  2. FC00::/8
  3. FE80::/10
  4. FF00::/8
Definition
  1. FC00::/7
  2. FC00::/8
  3. FE80::/10
  4. FF00::/8
Supporting users have an ad free experience!