click below
click below
Normal Size Small Size show me how
CCNA - Routing
| Question | Answer |
|---|---|
| What 3 things are loaded when the router is initialized? | 1. Bootstrap 2. The Operating System 3. Configuration File |
| What does a router do if it cannot find a configuration file? | Enters setup mode |
| Where is the backup copy of the new configuration from setup mode stored? | NVRAM |
| What is the test called that the router performs when it powers up? | POST |
| After verifying Hardware functions what does the router do next? | Software initialization |
| Where is the bootstrap program loaded | Rom |
| What is the definition of Bootstrap | A bootstrap is a simple preset operation to load instructions that in turn cause other instructions to be loaded into memory |
| Where are three places where the Cisco IOS can be found? | 1. Flash 2. TFTP Server 3. ROM |
| Where is the configuration file saved? | NVRAM |
| What 3 things does the POST Diagnostics from ROM verify. | 1. Basic CPU operation 2. Memory 3. Network Interface ports |
| How are configuration files loaded into main memory? | one line at a time |
| what do configuration commands do? | 1. Start routing 2. Supply addresses for interfaces 3. set media charachteristics and so on |
| If no valid configuration file exists in NVRAM | the OS executes a question driven configuration routine. What is this called |
| What command shows the backup config files | Show startup-config |
| What command shows the active config files | Show running-config |
| What command deletes the backup configuration file in NVRAM | Erase startup-config |
| What is the reboot command | reload |
| What is the command used to enter setup mode from the privledged exec prompt | setup |
| What is the purpose of setup mode? | to bring up |
| How do default answers appear in setup mode | in brackets [] |
| what command can be pressed at any time to terminate the process and start over | Control + C |
| If you want to use the new configuration and you enter yes where will it be saved | NVRAM |
| What should you do if the MORE promp appears | press space bar to continue |
| What is the first global parameter you should enter? | Host name |
| What password is encrypted by Cisco proprietary software? | Enable Secret |
| How does the enable secret password appear on the config file? | meaningless string of charachters |
| If you answer yes to the setup configuration what will happen to the configuration file? | it will be executed and saved to NVRAM |
| if you want to change the setup configuration after you save it what must be done. | You must configure it manually |
| The script file generated by setup is additive. What does this mean? | You can turn features on with setup but you can not turn them off. |
| What 3 places can you load configuration files from? | 1. Console 2. NVRAM 3. TFTP server |
| What five pieces of information does the router use from the configuration files when it starts up? | 1. Cisco IOS Software version 2. Router Identification 3. Boot File Locations 4. Protocol Information 5. Interface Configuration |
| If there is no configuration file in the router | what mode do you enter to configure one? |
| What command will allow you to configure from a virtual terminal | a modem |
| What command configures manually from the console terminal. | configure terminal |
| What command displays the current configuration in RAM? | Show running-config |
| What command displays the saved configuration | which is the contents of NVRAM? |
| What command erases the contents of NVRAM? | erase startup-config |
| What does the command copy running-config tftp allow you to do? | store a current copy of the configuration on a TFTP server. |
| In copying a running-config to a host do you need to key the IP address of the host? | Yes |
| Do you need to name a config file copied to a TFTP server? | Yes |
| What mode do you need to be in | in order to manage the contents of NVRAM |
| What command erases the contents of NVRAM | erase startup-config |
| Where is the runnning config stored? | RAM |
| Where is the startup or backup configuration file stored? | NVRAM |
| What command stores the current configuration into NVRAM? | copy running-config startup-config |
| What command displays the saved configuration? | show startup-config |
| If the screen prompt shows Router(config-if)# what are you configuring? | the interface |
| If the screen prompt shows Router(config-subif)# what are you configuring? | the subinterface |
| What mode are you in when you apply commands that affect the system as a whole? | Global configuration |
| What do you type to enter global configuration mode from the terminal | Configure Terminal or Config T |
| What command do you key to configure a routing protocol? | Router "protocol" for example to configure RIP you type Router RIP |
| What mode are all router interfaces automatically in? | administratively down mode |
| What is the clocking signal on a serial link? | DCE |
| What tyoe of devices are | by default |
| what command sets the clockrate? | clockrate |
| What command establishes a password on the console terminal? | line console 0 or line con 0 |
| What command establishes password protection on incoming telnet sessions? | line vty 0 4 |
| What command uses Cisco proprietary encryption process to alter the password character string? | enable secret password |
| If you do not configure a router name | what is the default name? |
| What mode must you be in to change the routers name? | Global Config |
| What does the command banner motd allow you to do? | Configure a message-of-the-day banner to be displayed on all connected terminals at login |
| What delivery method does IP use? | Best Effort |
| What are three reasons data may fail to reach its destination? | 1. Hardware Failure 2. Improper configuration 3. Incorrect routing info |
| What does IP use to notify the sender that the message couldnt be delivered? | ICMP |
| What type of message provides information or configuration parameters to hosts? | Control messages |
| What component of TCP/IP notifies the sender that a data transmission has failed? | ICMP |
| What is the acronym for Internet Control Message Protocol? | ICMP |
| Does a router know the exact path a datagram took to get to the router? | No |
| What is the ONLY information a router has about a datagram? | Only the source and destination IP address of the datagram |
| Does ICMP correct network problems? | No |
| Does ICMP notify the intended receiver that there was a problem delivering the packet? | No |
| Why dont error created by ICMP messages generate their own ICMP message? | error reports could generate more error reports |
| What 3 addresses are needed in TCP/IP configuration if datagrams are to travel outside the local network | 1. IP Address 2. Subnet mask 3. Default gateway |
| What two things must a router have in order to send datagrams? | 1. TCP/IP properly configured on it's interfaces 2. An appropriate routing protocol |
| What is the term that is used when a destination network is not accessable? | Unreachable network |
| What happens if the destination device recieves the ICMP echo request? | It formulates an echo reply message to send back to the source of the echo request |
| What command initiates an echo request? | ping |
| If an echo request is succesful between the source and destination what does that mean. | This confirms ip connectivity betweeen the two devices |
| What would be created if two routers continually route a datagram back and forth? | Loop - travels in circles |
| What is the maximum hop count for RIP? | 15 |
| What does TTL stand for? | Time to Live |
| What 3 fields are common to all ICMP messages? | 1. Type 2. Code 3. Checksum |
| What are four reasons datagrams might not make it to their destination? | 1. Hardware failures 2. Improper protocol configuration 3. down interfaces 4. Incorrect routing information |
| If a "3" appears in the type field what does that mean? | Destination Unreachable |
| What does the "code value" indicate? | The reason a packet could not be delivered |
| What is usually needed to forward a datagram from a token-ring to an ethernet network? | Packet fragmentation |
| If a datagram header has an error what will a device like a router do? | It sends an ICMP type 12 parameter problem message to the source |
| When the code value of teh problem message reaches 0 | what will the pointer field indicate? |
| Why is a control message sent? | To inform hosts of conditions such as network congestion or a better gateway. |
| How are ICMP control messages sent? | Inside IP datagrams |
| What is another term for "gateway" | router |
| What is the only device that can initiate a Redirect/Change request message? | router |
| How is a redirect/change configured on a Cisco router? | It's the default |
| What allows a host to ask for the current time according to the remote host? | The ICMP timestamp message request |
| What are the 2 type fields on an ICMP time stamp message? | 13 (Timestamp request) or 14 (Timestamp reply) The code field value is always set to 0 |
| What 3 things are contained in the ICMP timestamp reply message | 1. the originate timestamp 2. the receive timestamp 3. transmit timestamp |
| What 2 things affect true transit time? | 1. Traffic 2. Congestion on the network |
| What 2 protocls are now used to allow a host to find its network number? | 1. BOOTP 2. DHCP |
| What type of message is sent out when a host doesnt know the network address? | Address mask request |
| What is the mulicast address for router discovery? | 224.0.0.2 |
| What happens if a router receives a multicast request but isnt configured for multicasting? | It doesnt answer the request |
| If the default gateway is missing | what message is genereated by the host? |
| What happens when there is too much congestion on a network? | Packets are dropped |
| Why dont Cisco routers send source quench messages(by default)? | because the source-quench message may itself add to the network congestion |
| What type of offices might use source quench messages | SOHO small office home office |
| What is the standard for internetwork communications? | TCP/IP |
| What is the transport protocol for the internet? | TCP/IP |
| What is the function of the TCP/IP protocol suite? | Responsible for the reliable transport and regulation of data flow from source to destination |
| Prior to data transmission | the 2 communicating hosts go through a synchronization process to establish a virtual connection for each session between hosts. This process is called what? |
| Describe the process of a three way hand shake? | 1. The source host sends the destination host a request for communication. This is done by sending a sequence number 2. The destination host sends back and Acknowledgement of the sequence number and then adds a 1 to it and sends it back. 3. The source hos |
| DoS stands for? | Denial of Service attack |
| Describe SYN flooding? | SYN flooding exploits the normal three way handshake and causes targeted devices to acknowledge to source addresses that will not complete the handshake |
| Describe DoS attack? | the hacker initiates a SYN but spoofs the source IP address. Spoofing is a term used when the receiving device replies to a non-existant |
| What are some defense mesures for SYN flooding and DoS attacks? | system administrators may decrease the connection timeout period and increase the connection queue size. Software also exists that can detect these type of attacks and initiate defensive measures |
| Describe how windows provides flow control? | data must be broken into smaller pieces to allow for proper data transmission |
| What is the purpose of TCP applying sequence numbers to segments? | so that the recieving node can reassemble bytes in the correct order |
| What does TCP do if a sequence number is missing in a series? | That segment is retransmitted |
| TCP uses positive acknowledgement and retransmission (PAR) for what? | to control data flow and confirm data delivery |
| Name the field responsible for trancking of transmitted and received bytes? | the Acknowledgment Number field |
| What two protocols does the Transport layer provide? | 1. TCP 2. UDP |
| What layer 3 protocol is connectionless? | IP |
| Which protocol is a connection oriented reliable protocol? | TCP |
| What protocol is connectionless and unreliable? | UDP |
| What advantage does UDP provide over TCP? | Speed |
| TCP provides services for what applications? | 1. FTP 2. HTTP 3. SMTP 4. DNS |
| UDP is the transport layer protocol used by what applications? | 1. DNS 2. TFTP 3. SNMP 4. DHCP |
| UDP is unreliable - so what layer provides error detection? | UDP does not use windowing or ACK's so APPLICATION LAYER protocols must provide error detection |
| What are port numbers used to keep track of? | the different conversations that cross the network at the same time |
| Both TCP and UDP use _________ to pass information to upper layers? | port or socket numbers |
| What port is used for FTP application? | 21 |
| What port numbers are used for public applications? | Below 255 |
| What is port number 53 used for? | DNS |
| What is the port used for telnet? | 23 |
| The IP address gets the packet to the _______? The TCP or UDP port number guarantees that the packet is passed to the correct ___________? | correct server application |
| Port numbers in the range of 0 - 1023 used to select proper applications are considered public port numbers and are controlled by ___________? | Internet Assigned Numbers Authority (IANA) |
| IP addresses gets the packet to the correct server but ___________ GUARANTEES the packet is passed to the correct application? | TCP or UDP |
| Be able to determine the difference between TCP segments and UDP segments What information do UDP segments not contain? | No sequence numbers or Acknowledgement fields |
| The Network layer assigns the logical address or ____________ | and is then serviced by the Data Link layer |
| What is a sequential list of permit or deny statements that apply to addresses or upper layer protocols? | An ACL |
| What are two things a router can do with a packet? | Accept or Deny |
| How are ACL's defined? | On a per-protocol |
| What happens to packets if an ACL is not configured on a router? | all packets passing through the router will be allowed on all parts of the network. |
| Where are packets either accepted or rejected due to an ACL? | at the interface |
| How does a router read an ACL? | From top to bottom |
| What happens to the ACL statements once a match is found in the list? | the accept or reject action is performed and no other ACL statements are checked |
| What happens if additional condition statements are needed in an access list. | The entire ACL must be deleted and recreated with new condition statements. |
| What is placed at the end of EVERY ACL? | Implicit Deny Any statement |
| What mode must you be in to create an ACL? | Global Config |
| What are the 2 steps in creating an ACL | 1. Create the ACL 2. Apply it to an Interface |
| What are 2 directions ACL's can be placed? | In Out |
| Where should a standard ACL be placed? | Closest to the destination |
| Where should an extended ACL be placed | Closest to the source |
| What happens if no match is found on an ACL list? | The packet is denied |
| What does a 1 mean in wildcard masking? | Ignore |
| What does a 0 mean in wildcard masking? | Check |
| What IP Address and subnet mask will the word any substitute for? | 0.0.0.0 255.255.255.255 |
| What command shows ALL the ACLs on a router | show access-lists |
| What do standard ACL's check? | Source IP address |
| What is the default wildcard mask? | 0.0.0.0 |
| What 4 things can an Extended ACL check? | 1. Source Address 2. Destination Packet Address 3. protocol 4. Port number |
| What type of echo packet is sent to the sender if the packet is discarded? | destination was unreachable |
| Can you use the wildcard host or any keywords in the command? | Yes |
| What does the ip access-group command link? | an existing extended ACL to an interface |
| What version of CISCO IOS allowed for named ACL's? | 11.2 |
| What mode must you be in to configure a named ACL? | Global Config |
| Where do you place Extended ACLs? | As close to the source as possible |
| Where do you place standard ACLs? | As close to the destination as possible |
| Who does a firewall try to keep out the intranet? | intruders that come from the global internet |
| Where are most firewalls placed? | between the internal network and an external network |
| What are routers that are situated on the boundries of a network? | Border routers |
| What 2 types of ACLs are used on packets traveling through a router? | Standard Extended |
| What are the numbers of the virtual ports on a router | 0 |
| Why should identical restrictions be placed on all vty lines? | Its impossible to control which line a user will connect on |
| What does a router do when it determines that a route is the best path to a destination? | It adds that route to its routing table. |
| What are the 2 most time consuming jobs of a network administrator? | Network testing and troubleshooting |
| What type of equipment causes the most difficult network problems? | Routers |
| What is the function of a router? | To determine the best path from a source to a destination |
| What do routers read to make packet forwarding decisions? | Contents of their IP routing table |
| What does the command show ip route display? | The contents of their IP routing table |
| What is a manually configured route called? | Static Route |
| What is a route that can change automatically as neighboring routes update each other with new information? | Dynamic Route |
| What is used when the router is unable to match a destination network with an entry in its routing table? | Default route |
| What command establishes a default route in networks using dynamic routing protocols? | ip route 0.0.0.0 0.0.0.0 or ip default-network |
| What layer determines the best path for a packet? | Network Layer (Layer 3) |
| What device determines the best path and forwards the packet from an incoming interface to an outgoing interface | router |
| what address is used to get packets from source to destination? | Layer 3 Address |
| What address never changes no matter how many hops a packet takes? | Source and Destination IP Address |
| What address changes at each hop or router? | MAC Address |
| What metric does rip v1 use? | Hop Count |
| What metric is better higher or lower | Lower |
| What layer should you start with when testing network problems? | Layer 1 |
| What is the most common problem on IP networks? | Errors in the addressing scheme |
| What is the most important part of troubleshooting? | Documentation |
| What layer would a transciever problem be at? | Layer 1 |
| What layer would an improperly configured serial interface be at? | Layer 2 |
| What layer would an incorrect IP address be? | Layer 3 |
| What command is used to test connectivity | Ping |
| What is another name for the "indicator" light on a NIC card that indicates a valid connection | Link Light |
| What should you do if the interface has indicator lights that do not show a valid connection? | Check for faulty or incorrect cabling |
| What 3 things are displayed when a ping packet finds a specified system and returns? | Minimum |
| What will the command show ip protocol show? | Shows the current state of the active routing protocols |
| What does IGRP use to balance the load on multiple links? | Variance |
| What 3 things are displayed when a ping packet finds a specified system and returns? | Minimum |
| What does 5 exclamation points indicate when performing a ping? !!!!! | A successful connection |
| What command would you use to perform more extensive ping tests? | Extended Ping |
| Which ICMP message type notifies the source host that a receiving host or network is not available? | Destination Unreachable |
| What layer does Telnet test | All Layers |
| What line from show interfaces output would indicate a layer 2 problem? | The line that says Interface UP Line protocol DOWN |
| What would an Increasing number of Carrier transitions counts on a serial link indicate? | Bad Link or defective CSU/DSU |
| What are messages sent by one network device to inform another network device that the virtual circuit between the two is still active? | Keepalives |
| Who does CDP allow you to discover information about? | Directly connected Cisco devices |
| What command is used to discover routes that packets take when traveling to their destination? | traceroute |
| What command shows the entries for all known networks and subnetworks | and how that information was learned |
| what commadn would identify a router that is delivering bad router information? | Show IP protocols |
| What command would allow you to check a cable connection if you were in LA and a router was in New York? | Show controllers |
| What command will turn off all diagnostic output? | no debug all or undebug all |
| What command will show what is being examined by a debug command? | show debugging |
| MAC Addresses are how many bits in Length? | 24 |
| Describe communicaton between 2 devices on a LAN | The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it but the devices with non matching addresses otherwise ignore the frame. |
| What are some functions associated with Frames | 1. Identifies which computers are communicating with one another 2. Signals when communication between individual computers begins and when it ends 3. Flags corrupted Frames |
| Media Access Control Refers to what? | Rules that determine which computer on a shared-medium is allowed to transmit the data |
| How do you describe CSMA/CD networks? | One node's transmission traverses the entire network and is received and examined by every node. |
| What are the important Data Link Layer (Layer 2) functions? | Logical Link Control Addressing Media Access Control |
| What is true of a deterministic MAC protocol? | It allows hosts to "take turns" sending data |
| Fast Ethernet Supports up to what transfer rate? | 100 Mbps |
| What are the 2 Gigabit over fiber cable specifications? | 1000Base-LX 1000Base-SX |
| What is the transmission medium for 1000BASE-SX? | Short-wave laser over multimode fiber |
| 4D-PAM5 encoding method is used in which Gigabit ethernet? | 802.3ae |
| What happens when 1000BASE-T sends and receives data in full-duplex mode on the same conductor? | A permanent collision on the wire |
| What is the maximum transmission distance supported by 10 Gigabit Ethernet? | 40 Kilometers |
| What are 3 features of microsegmentation? | 1. It enables dedicated access 2. It supports multiple conversations at any given time 3. It increases the capacity for each workstation connected to the network |
| What do LAN switches use to make forwarding decisions? | MAC Addresses |
| What best describes one function of Layer 3 | the network layer |
| What function allows routers to evaluate available routes to a destination and to establish the preferred handling of a packet? | Path Determination |
| How does the network layer forward packets from the source to the destination? | By using A routing table |
| What 2 parts of a network layer address do routers use to forward traffic through a network? | Network address and destination IP address |
| What best describes a routed protocol? | Its address provides enough information to allow a packet to be forwarded from host to host. |
| What best describes a routING protocol? | A protocol that accomplishes routing throgh the implementation of an algorithm |
| Whats an advantage of distance vector algorithms? | They are computationally simple |
| What describes Link State algorithms | It recreates the exact topology of the entire network |
| Why do routing loops occur? | Slow convergence occurs after a modification to the internetwork. |
| Describe the concept describing EIGRP as a balanced hybrid routing protocol? | Being that EIGRP is a distance vector routing protocol |
| What is a network with only one path to a router called | Stub network |
| What best describes a default route? | Route used when the destination network is not listed explicitly in the routing table |
| What kind of entries does a router initally refer to? | Entries about networks or subnets that are directly connected |
| What are exterior routing protocols used for? | To communicate between autonomous systems. |
| If you suspect that one of the routers connected to your network is sending bad routing information what command would you use to check? | router> show ip protocol |
| Why would you display the routing table? | To identify destination network addresses and next-hop pairs |
| If you want to learn which routing protocl a router was configured with what command structure should you use? | router> show ip protocol |
| An administrative distance of 15 indicates what? | The routing information source is relatively trustworthy |
| If you wanted to see RIP routing updates as they are sent and received what command would you use? | router# debug ip rip |
| Most NICs have what type of lights that show whether there is a valid connection? | Indicator |
| What best describes TCP/IP? | Its a suite of protocols that can be used to communicate across any set of interconnected networks. |
| Why is sequence numbering in the TCP 3 way handshake open connections used? | To ensure lost data can be recovered if problems occur later |
| What is teh function of ARP? | It is used to map an unknown IP address to a known MAC address? |
| What best describes window size? | The number of bytes that can be transmitted while awaiting an acknowledgement |
| What does a TCP sliding window do? | Its a method of flow control for network data transfers using the receiver's window size. |
| What command displays contents of the IP routing table? | Show IP route |
| Why are default routes used? | Defaults are used when the router is unable to match a destination network with a more specific routing table entry. |
| What is a metric? | The measurement used by a router to determine the best route. |
| When a router receives an incoming packet | what does it do? |
| What are the most common type of problems that occur on IP networks? | Errors in the addressing scheme. |
| What is the most important part of the troubleshooting process? | Documentation |
| What layer of OSI would these errors occur? Broken Cables DTE Device Problems Transciever problems | Layer 1 |
| What layer of OSI model would you find these errors? Incorrect IP address Incorrect Subnet mask | Layer 3 |
| What does TX and RX stand for. | These are the link lights on a device. TX = Transmitting Data RX = Receiving Data |
| What is ping used for? | Ping is used to test network connectivity |
| What does a succesful telnet indicate? | That all layers of the OSI model are functioning properly. |
| What is the single most important tool to discover Layer 1 and Layer 2 problems with the router? | The show command |
| What are 3 possible causes of an interface being up and the line protocol being down | 1. No Keepalives 2. No Clockrate 3. Mismatch Encapsulation |
| Should you use debug during peak network times? | No |
| What troubleshooting utility is used to discover the routes packets take when traveling to their destination? | Traceroute |
| What is the synchronization process called that TCP uses to prepare for data transmission? | 3 way handshake |
| What does DoS stand for and what is it designed to do? | DoS means Denial of Service attack. Designed to bring down a server maliciously |
| What does window size determine? | window size determines the amount of data that can be transmitted at one time before a destination responds with an ACK |
| What are sequence numbers used for? | To help recieving nodes reassemble data that was received in the right order. |
| What provides error detection in UDP? | Application Layer Protocols |
| What are the 2 types of routes | Static Dynamic |
| When specifying a static route | the administrator has two options for indicating the gateway. What are they? |
| What command is used to configure a static route | ip route "address" "subnet mask" "next hop" |
| What types of routes are used to route packets with destinations that do not match any of the other routes in a routing table? | Default routes |
| What is the command to setup a default route? | IP route 0.0.0.0 0.0.0.0 |
| What command do you use to view the routing table? | show IP route |
| What is a routing protocol? | A routing protocol is used by routers to update routing tables. |
| What is a routed protocol? | A routed protocol is used by routers to direct traffic. |
| What is an Autonomous system? | An Autonomous system is a collection of networks under a common administration that share a routing strategy. These may be run by one or more operators. |
| What is the goal of a routing protocol? | The goal of a routing protocol is to build and maintain routing tables. |
| List the 2 categories of routing protocols? | Distance Vector Link State |
| Using distance vector routing | where does a router get its routing table updates? |
| What does the network command do when configuring routing protocols? | Determines which interface sends and receives router table updates |
| When using RIP what happens to a packet if the hop count is greater than 15? | The packet is discarded |
| What type of routing is Border Gateway Protocol (BGP)? | Exterior Routing Protocol Used from ISP to ISP |
| What types of routing protocols have Fast convergence? | Link State |
| What types of routing protocols have Slow convergence? | Distance Vector |
| Distance Vector Algorithms call for each router to send __________________ to each of its adjacent neighbors? | entire routing table |
| What can occur if slow convergence occurs on the network as a result of changes to the network causing inconsistant routing entries? | Routing Loops |
| Describe Route Poisoning? | This is the notification given to a router that a route is down by giving it a number that represents an Infinate number of hops. |
| When is a triggered update sent? | Every 30 seconds on RIP or whenever a routing table changes |
| What are the 4 charachteristics of RIP? | 1. Distance Vector Protocol 2. Metric is Hop Count 3. If Hop Count > 15 packet is discarded 4. updates sent every 30 seconds |
| what command enables RIP? | router rip |
| What does configuring "ip classless" do on a router? | It allows router to ignore classful boundries of networks in its routing table and route to the default route. |
| What does RIP use to reduce routing loops and count to infinity? | 1. Split Horizon 2. Poison Reverse 3. Hold down Counters 4. Triggered updates |
| List 2 common ways to verify RIP is configured properly. | 1. Show IP route 2. Show IP protocols |
| What does using the passive interface command prevent? | It prevents an interface from sending routing updates |
| What is IGRP? | A distance vector routing protocol that was developed by Cisco. |
| RIP Sends routing updates every 30 seconds. How often does IGRP send updates? | Every 90 Seconds |
| What are the 4 Metrics used by IGRP? | Bandwidth Delay Reliability Load |
| What command do you use to configure IGRP? | router igrp "Autonomous system number" |
| Which routing protocol converges faster RIP or IGRP? | IGRP |
| What is ICMP and what does it do? | ICMP - Internet Control Message Protocol ICMP is used to notify sender that there was an error in a delivery address |
| How are ICMP messages delivered? | Encapsulated in datagrams and transferred just like other data. |
| What does TTL stand for? | TTL = Time to live |
| When a destination is unreachable what does ICMP do? | It assigns a code as to why the destination is unreachable (field code) |
| What are control messages used for? | Control messages are used for informing hosts of network congestion or existance of a better gateway to a remote network. |