Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CCNA - Routing

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
What 3 things are loaded when the router is initialized?   1. Bootstrap 2. The Operating System 3. Configuration File  
🗑
What does a router do if it cannot find a configuration file?   Enters setup mode  
🗑
Where is the backup copy of the new configuration from setup mode stored?   NVRAM  
🗑
What is the test called that the router performs when it powers up?   POST  
🗑
After verifying Hardware functions what does the router do next?   Software initialization  
🗑
Where is the bootstrap program loaded   Rom  
🗑
What is the definition of Bootstrap   A bootstrap is a simple preset operation to load instructions that in turn cause other instructions to be loaded into memory  
🗑
Where are three places where the Cisco IOS can be found?   1. Flash 2. TFTP Server 3. ROM  
🗑
Where is the configuration file saved?   NVRAM  
🗑
What 3 things does the POST Diagnostics from ROM verify.   1. Basic CPU operation 2. Memory 3. Network Interface ports  
🗑
How are configuration files loaded into main memory?   one line at a time  
🗑
what do configuration commands do?   1. Start routing 2. Supply addresses for interfaces 3. set media charachteristics and so on  
🗑
If no valid configuration file exists in NVRAM   the OS executes a question driven configuration routine. What is this called  
🗑
What command shows the backup config files   Show startup-config  
🗑
What command shows the active config files   Show running-config  
🗑
What command deletes the backup configuration file in NVRAM   Erase startup-config  
🗑
What is the reboot command   reload  
🗑
What is the command used to enter setup mode from the privledged exec prompt   setup  
🗑
What is the purpose of setup mode?   to bring up  
🗑
How do default answers appear in setup mode   in brackets []  
🗑
what command can be pressed at any time to terminate the process and start over   Control + C  
🗑
If you want to use the new configuration and you enter yes where will it be saved   NVRAM  
🗑
What should you do if the MORE promp appears   press space bar to continue  
🗑
What is the first global parameter you should enter?   Host name  
🗑
What password is encrypted by Cisco proprietary software?   Enable Secret  
🗑
How does the enable secret password appear on the config file?   meaningless string of charachters  
🗑
If you answer yes to the setup configuration what will happen to the configuration file?   it will be executed and saved to NVRAM  
🗑
if you want to change the setup configuration after you save it what must be done.   You must configure it manually  
🗑
The script file generated by setup is additive. What does this mean?   You can turn features on with setup but you can not turn them off.  
🗑
What 3 places can you load configuration files from?   1. Console 2. NVRAM 3. TFTP server  
🗑
What five pieces of information does the router use from the configuration files when it starts up?   1. Cisco IOS Software version 2. Router Identification 3. Boot File Locations 4. Protocol Information 5. Interface Configuration  
🗑
If there is no configuration file in the router   what mode do you enter to configure one?  
🗑
What command will allow you to configure from a virtual terminal   a modem  
🗑
What command configures manually from the console terminal.   configure terminal  
🗑
What command displays the current configuration in RAM?   Show running-config  
🗑
What command displays the saved configuration   which is the contents of NVRAM?  
🗑
What command erases the contents of NVRAM?   erase startup-config  
🗑
What does the command copy running-config tftp allow you to do?   store a current copy of the configuration on a TFTP server.  
🗑
In copying a running-config to a host do you need to key the IP address of the host?   Yes  
🗑
Do you need to name a config file copied to a TFTP server?   Yes  
🗑
What mode do you need to be in   in order to manage the contents of NVRAM  
🗑
What command erases the contents of NVRAM   erase startup-config  
🗑
Where is the runnning config stored?   RAM  
🗑
Where is the startup or backup configuration file stored?   NVRAM  
🗑
What command stores the current configuration into NVRAM?   copy running-config startup-config  
🗑
What command displays the saved configuration?   show startup-config  
🗑
If the screen prompt shows Router(config-if)# what are you configuring?   the interface  
🗑
If the screen prompt shows Router(config-subif)# what are you configuring?   the subinterface  
🗑
What mode are you in when you apply commands that affect the system as a whole?   Global configuration  
🗑
What do you type to enter global configuration mode from the terminal   Configure Terminal or Config T  
🗑
What command do you key to configure a routing protocol?   Router "protocol" for example to configure RIP you type Router RIP  
🗑
What mode are all router interfaces automatically in?   administratively down mode  
🗑
What is the clocking signal on a serial link?   DCE  
🗑
What tyoe of devices are   by default  
🗑
what command sets the clockrate?   clockrate  
🗑
What command establishes a password on the console terminal?   line console 0 or line con 0  
🗑
What command establishes password protection on incoming telnet sessions?   line vty 0 4  
🗑
What command uses Cisco proprietary encryption process to alter the password character string?   enable secret password  
🗑
If you do not configure a router name   what is the default name?  
🗑
What mode must you be in to change the routers name?   Global Config  
🗑
What does the command banner motd allow you to do?   Configure a message-of-the-day banner to be displayed on all connected terminals at login  
🗑
What delivery method does IP use?   Best Effort  
🗑
What are three reasons data may fail to reach its destination?   1. Hardware Failure 2. Improper configuration 3. Incorrect routing info  
🗑
What does IP use to notify the sender that the message couldnt be delivered?   ICMP  
🗑
What type of message provides information or configuration parameters to hosts?   Control messages  
🗑
What component of TCP/IP notifies the sender that a data transmission has failed?   ICMP  
🗑
What is the acronym for Internet Control Message Protocol?   ICMP  
🗑
Does a router know the exact path a datagram took to get to the router?   No  
🗑
What is the ONLY information a router has about a datagram?   Only the source and destination IP address of the datagram  
🗑
Does ICMP correct network problems?   No  
🗑
Does ICMP notify the intended receiver that there was a problem delivering the packet?   No  
🗑
Why dont error created by ICMP messages generate their own ICMP message?   error reports could generate more error reports  
🗑
What 3 addresses are needed in TCP/IP configuration if datagrams are to travel outside the local network   1. IP Address 2. Subnet mask 3. Default gateway  
🗑
What two things must a router have in order to send datagrams?   1. TCP/IP properly configured on it's interfaces 2. An appropriate routing protocol  
🗑
What is the term that is used when a destination network is not accessable?   Unreachable network  
🗑
What happens if the destination device recieves the ICMP echo request?   It formulates an echo reply message to send back to the source of the echo request  
🗑
What command initiates an echo request?   ping  
🗑
If an echo request is succesful between the source and destination what does that mean.   This confirms ip connectivity betweeen the two devices  
🗑
What would be created if two routers continually route a datagram back and forth?   Loop - travels in circles  
🗑
What is the maximum hop count for RIP?   15  
🗑
What does TTL stand for?   Time to Live  
🗑
What 3 fields are common to all ICMP messages?   1. Type 2. Code 3. Checksum  
🗑
What are four reasons datagrams might not make it to their destination?   1. Hardware failures 2. Improper protocol configuration 3. down interfaces 4. Incorrect routing information  
🗑
If a "3" appears in the type field what does that mean?   Destination Unreachable  
🗑
What does the "code value" indicate?   The reason a packet could not be delivered  
🗑
What is usually needed to forward a datagram from a token-ring to an ethernet network?   Packet fragmentation  
🗑
If a datagram header has an error what will a device like a router do?   It sends an ICMP type 12 parameter problem message to the source  
🗑
When the code value of teh problem message reaches 0   what will the pointer field indicate?  
🗑
Why is a control message sent?   To inform hosts of conditions such as network congestion or a better gateway.  
🗑
How are ICMP control messages sent?   Inside IP datagrams  
🗑
What is another term for "gateway"   router  
🗑
What is the only device that can initiate a Redirect/Change request message?   router  
🗑
How is a redirect/change configured on a Cisco router?   It's the default  
🗑
What allows a host to ask for the current time according to the remote host?   The ICMP timestamp message request  
🗑
What are the 2 type fields on an ICMP time stamp message?   13 (Timestamp request) or 14 (Timestamp reply) The code field value is always set to 0  
🗑
What 3 things are contained in the ICMP timestamp reply message   1. the originate timestamp 2. the receive timestamp 3. transmit timestamp  
🗑
What 2 things affect true transit time?   1. Traffic 2. Congestion on the network  
🗑
What 2 protocls are now used to allow a host to find its network number?   1. BOOTP 2. DHCP  
🗑
What type of message is sent out when a host doesnt know the network address?   Address mask request  
🗑
What is the mulicast address for router discovery?   224.0.0.2  
🗑
What happens if a router receives a multicast request but isnt configured for multicasting?   It doesnt answer the request  
🗑
If the default gateway is missing   what message is genereated by the host?  
🗑
What happens when there is too much congestion on a network?   Packets are dropped  
🗑
Why dont Cisco routers send source quench messages(by default)?   because the source-quench message may itself add to the network congestion  
🗑
What type of offices might use source quench messages   SOHO small office home office  
🗑
What is the standard for internetwork communications?   TCP/IP  
🗑
What is the transport protocol for the internet?   TCP/IP  
🗑
What is the function of the TCP/IP protocol suite?   Responsible for the reliable transport and regulation of data flow from source to destination  
🗑
Prior to data transmission   the 2 communicating hosts go through a synchronization process to establish a virtual connection for each session between hosts. This process is called what?  
🗑
Describe the process of a three way hand shake?   1. The source host sends the destination host a request for communication. This is done by sending a sequence number 2. The destination host sends back and Acknowledgement of the sequence number and then adds a 1 to it and sends it back. 3. The source hos  
🗑
DoS stands for?   Denial of Service attack  
🗑
Describe SYN flooding?   SYN flooding exploits the normal three way handshake and causes targeted devices to acknowledge to source addresses that will not complete the handshake  
🗑
Describe DoS attack?   the hacker initiates a SYN but spoofs the source IP address. Spoofing is a term used when the receiving device replies to a non-existant  
🗑
What are some defense mesures for SYN flooding and DoS attacks?   system administrators may decrease the connection timeout period and increase the connection queue size. Software also exists that can detect these type of attacks and initiate defensive measures  
🗑
Describe how windows provides flow control?   data must be broken into smaller pieces to allow for proper data transmission  
🗑
What is the purpose of TCP applying sequence numbers to segments?   so that the recieving node can reassemble bytes in the correct order  
🗑
What does TCP do if a sequence number is missing in a series?   That segment is retransmitted  
🗑
TCP uses positive acknowledgement and retransmission (PAR) for what?   to control data flow and confirm data delivery  
🗑
Name the field responsible for trancking of transmitted and received bytes?   the Acknowledgment Number field  
🗑
What two protocols does the Transport layer provide?   1. TCP 2. UDP  
🗑
What layer 3 protocol is connectionless?   IP  
🗑
Which protocol is a connection oriented reliable protocol?   TCP  
🗑
What protocol is connectionless and unreliable?   UDP  
🗑
What advantage does UDP provide over TCP?   Speed  
🗑
TCP provides services for what applications?   1. FTP 2. HTTP 3. SMTP 4. DNS  
🗑
UDP is the transport layer protocol used by what applications?   1. DNS 2. TFTP 3. SNMP 4. DHCP  
🗑
UDP is unreliable - so what layer provides error detection?   UDP does not use windowing or ACK's so APPLICATION LAYER protocols must provide error detection  
🗑
What are port numbers used to keep track of?   the different conversations that cross the network at the same time  
🗑
Both TCP and UDP use _________ to pass information to upper layers?   port or socket numbers  
🗑
What port is used for FTP application?   21  
🗑
What port numbers are used for public applications?   Below 255  
🗑
What is port number 53 used for?   DNS  
🗑
What is the port used for telnet?   23  
🗑
The IP address gets the packet to the _______? The TCP or UDP port number guarantees that the packet is passed to the correct ___________?   correct server application  
🗑
Port numbers in the range of 0 - 1023 used to select proper applications are considered public port numbers and are controlled by ___________?   Internet Assigned Numbers Authority (IANA)  
🗑
IP addresses gets the packet to the correct server but ___________ GUARANTEES the packet is passed to the correct application?   TCP or UDP  
🗑
Be able to determine the difference between TCP segments and UDP segments What information do UDP segments not contain?   No sequence numbers or Acknowledgement fields  
🗑
The Network layer assigns the logical address or ____________   and is then serviced by the Data Link layer  
🗑
What is a sequential list of permit or deny statements that apply to addresses or upper layer protocols?   An ACL  
🗑
What are two things a router can do with a packet?   Accept or Deny  
🗑
How are ACL's defined?   On a per-protocol  
🗑
What happens to packets if an ACL is not configured on a router?   all packets passing through the router will be allowed on all parts of the network.  
🗑
Where are packets either accepted or rejected due to an ACL?   at the interface  
🗑
How does a router read an ACL?   From top to bottom  
🗑
What happens to the ACL statements once a match is found in the list?   the accept or reject action is performed and no other ACL statements are checked  
🗑
What happens if additional condition statements are needed in an access list.   The entire ACL must be deleted and recreated with new condition statements.  
🗑
What is placed at the end of EVERY ACL?   Implicit Deny Any statement  
🗑
What mode must you be in to create an ACL?   Global Config  
🗑
What are the 2 steps in creating an ACL   1. Create the ACL 2. Apply it to an Interface  
🗑
What are 2 directions ACL's can be placed?   In Out  
🗑
Where should a standard ACL be placed?   Closest to the destination  
🗑
Where should an extended ACL be placed   Closest to the source  
🗑
What happens if no match is found on an ACL list?   The packet is denied  
🗑
What does a 1 mean in wildcard masking?   Ignore  
🗑
What does a 0 mean in wildcard masking?   Check  
🗑
What IP Address and subnet mask will the word any substitute for?   0.0.0.0 255.255.255.255  
🗑
What command shows ALL the ACLs on a router   show access-lists  
🗑
What do standard ACL's check?   Source IP address  
🗑
What is the default wildcard mask?   0.0.0.0  
🗑
What 4 things can an Extended ACL check?   1. Source Address 2. Destination Packet Address 3. protocol 4. Port number  
🗑
What type of echo packet is sent to the sender if the packet is discarded?   destination was unreachable  
🗑
Can you use the wildcard host or any keywords in the command?   Yes  
🗑
What does the ip access-group command link?   an existing extended ACL to an interface  
🗑
What version of CISCO IOS allowed for named ACL's?   11.2  
🗑
What mode must you be in to configure a named ACL?   Global Config  
🗑
Where do you place Extended ACLs?   As close to the source as possible  
🗑
Where do you place standard ACLs?   As close to the destination as possible  
🗑
Who does a firewall try to keep out the intranet?   intruders that come from the global internet  
🗑
Where are most firewalls placed?   between the internal network and an external network  
🗑
What are routers that are situated on the boundries of a network?   Border routers  
🗑
What 2 types of ACLs are used on packets traveling through a router?   Standard Extended  
🗑
What are the numbers of the virtual ports on a router   0  
🗑
Why should identical restrictions be placed on all vty lines?   Its impossible to control which line a user will connect on  
🗑
What does a router do when it determines that a route is the best path to a destination?   It adds that route to its routing table.  
🗑
What are the 2 most time consuming jobs of a network administrator?   Network testing and troubleshooting  
🗑
What type of equipment causes the most difficult network problems?   Routers  
🗑
What is the function of a router?   To determine the best path from a source to a destination  
🗑
What do routers read to make packet forwarding decisions?   Contents of their IP routing table  
🗑
What does the command show ip route display?   The contents of their IP routing table  
🗑
What is a manually configured route called?   Static Route  
🗑
What is a route that can change automatically as neighboring routes update each other with new information?   Dynamic Route  
🗑
What is used when the router is unable to match a destination network with an entry in its routing table?   Default route  
🗑
What command establishes a default route in networks using dynamic routing protocols?   ip route 0.0.0.0 0.0.0.0 or ip default-network  
🗑
What layer determines the best path for a packet?   Network Layer (Layer 3)  
🗑
What device determines the best path and forwards the packet from an incoming interface to an outgoing interface   router  
🗑
what address is used to get packets from source to destination?   Layer 3 Address  
🗑
What address never changes no matter how many hops a packet takes?   Source and Destination IP Address  
🗑
What address changes at each hop or router?   MAC Address  
🗑
What metric does rip v1 use?   Hop Count  
🗑
What metric is better higher or lower   Lower  
🗑
What layer should you start with when testing network problems?   Layer 1  
🗑
What is the most common problem on IP networks?   Errors in the addressing scheme  
🗑
What is the most important part of troubleshooting?   Documentation  
🗑
What layer would a transciever problem be at?   Layer 1  
🗑
What layer would an improperly configured serial interface be at?   Layer 2  
🗑
What layer would an incorrect IP address be?   Layer 3  
🗑
What command is used to test connectivity   Ping  
🗑
What is another name for the "indicator" light on a NIC card that indicates a valid connection   Link Light  
🗑
What should you do if the interface has indicator lights that do not show a valid connection?   Check for faulty or incorrect cabling  
🗑
What 3 things are displayed when a ping packet finds a specified system and returns?   Minimum  
🗑
What will the command show ip protocol show?   Shows the current state of the active routing protocols  
🗑
What does IGRP use to balance the load on multiple links?   Variance  
🗑
What 3 things are displayed when a ping packet finds a specified system and returns?   Minimum  
🗑
What does 5 exclamation points indicate when performing a ping? !!!!!   A successful connection  
🗑
What command would you use to perform more extensive ping tests?   Extended Ping  
🗑
Which ICMP message type notifies the source host that a receiving host or network is not available?   Destination Unreachable  
🗑
What layer does Telnet test   All Layers  
🗑
What line from show interfaces output would indicate a layer 2 problem?   The line that says Interface UP Line protocol DOWN  
🗑
What would an Increasing number of Carrier transitions counts on a serial link indicate?   Bad Link or defective CSU/DSU  
🗑
What are messages sent by one network device to inform another network device that the virtual circuit between the two is still active?   Keepalives  
🗑
Who does CDP allow you to discover information about?   Directly connected Cisco devices  
🗑
What command is used to discover routes that packets take when traveling to their destination?   traceroute  
🗑
What command shows the entries for all known networks and subnetworks   and how that information was learned  
🗑
what commadn would identify a router that is delivering bad router information?   Show IP protocols  
🗑
What command would allow you to check a cable connection if you were in LA and a router was in New York?   Show controllers  
🗑
What command will turn off all diagnostic output?   no debug all or undebug all  
🗑
What command will show what is being examined by a debug command?   show debugging  
🗑
MAC Addresses are how many bits in Length?   24  
🗑
Describe communicaton between 2 devices on a LAN   The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it but the devices with non matching addresses otherwise ignore the frame.  
🗑
What are some functions associated with Frames   1. Identifies which computers are communicating with one another 2. Signals when communication between individual computers begins and when it ends 3. Flags corrupted Frames  
🗑
Media Access Control Refers to what?   Rules that determine which computer on a shared-medium is allowed to transmit the data  
🗑
How do you describe CSMA/CD networks?   One node's transmission traverses the entire network and is received and examined by every node.  
🗑
What are the important Data Link Layer (Layer 2) functions?   Logical Link Control Addressing Media Access Control  
🗑
What is true of a deterministic MAC protocol?   It allows hosts to "take turns" sending data  
🗑
Fast Ethernet Supports up to what transfer rate?   100 Mbps  
🗑
What are the 2 Gigabit over fiber cable specifications?   1000Base-LX 1000Base-SX  
🗑
What is the transmission medium for 1000BASE-SX?   Short-wave laser over multimode fiber  
🗑
4D-PAM5 encoding method is used in which Gigabit ethernet?   802.3ae  
🗑
What happens when 1000BASE-T sends and receives data in full-duplex mode on the same conductor?   A permanent collision on the wire  
🗑
What is the maximum transmission distance supported by 10 Gigabit Ethernet?   40 Kilometers  
🗑
What are 3 features of microsegmentation?   1. It enables dedicated access 2. It supports multiple conversations at any given time 3. It increases the capacity for each workstation connected to the network  
🗑
What do LAN switches use to make forwarding decisions?   MAC Addresses  
🗑
What best describes one function of Layer 3   the network layer  
🗑
What function allows routers to evaluate available routes to a destination and to establish the preferred handling of a packet?   Path Determination  
🗑
How does the network layer forward packets from the source to the destination?   By using A routing table  
🗑
What 2 parts of a network layer address do routers use to forward traffic through a network?   Network address and destination IP address  
🗑
What best describes a routed protocol?   Its address provides enough information to allow a packet to be forwarded from host to host.  
🗑
What best describes a routING protocol?   A protocol that accomplishes routing throgh the implementation of an algorithm  
🗑
Whats an advantage of distance vector algorithms?   They are computationally simple  
🗑
What describes Link State algorithms   It recreates the exact topology of the entire network  
🗑
Why do routing loops occur?   Slow convergence occurs after a modification to the internetwork.  
🗑
Describe the concept describing EIGRP as a balanced hybrid routing protocol?   Being that EIGRP is a distance vector routing protocol  
🗑
What is a network with only one path to a router called   Stub network  
🗑
What best describes a default route?   Route used when the destination network is not listed explicitly in the routing table  
🗑
What kind of entries does a router initally refer to?   Entries about networks or subnets that are directly connected  
🗑
What are exterior routing protocols used for?   To communicate between autonomous systems.  
🗑
If you suspect that one of the routers connected to your network is sending bad routing information what command would you use to check?   router> show ip protocol  
🗑
Why would you display the routing table?   To identify destination network addresses and next-hop pairs  
🗑
If you want to learn which routing protocl a router was configured with what command structure should you use?   router> show ip protocol  
🗑
An administrative distance of 15 indicates what?   The routing information source is relatively trustworthy  
🗑
If you wanted to see RIP routing updates as they are sent and received what command would you use?   router# debug ip rip  
🗑
Most NICs have what type of lights that show whether there is a valid connection?   Indicator  
🗑
What best describes TCP/IP?   Its a suite of protocols that can be used to communicate across any set of interconnected networks.  
🗑
Why is sequence numbering in the TCP 3 way handshake open connections used?   To ensure lost data can be recovered if problems occur later  
🗑
What is teh function of ARP?   It is used to map an unknown IP address to a known MAC address?  
🗑
What best describes window size?   The number of bytes that can be transmitted while awaiting an acknowledgement  
🗑
What does a TCP sliding window do?   Its a method of flow control for network data transfers using the receiver's window size.  
🗑
What command displays contents of the IP routing table?   Show IP route  
🗑
Why are default routes used?   Defaults are used when the router is unable to match a destination network with a more specific routing table entry.  
🗑
What is a metric?   The measurement used by a router to determine the best route.  
🗑
When a router receives an incoming packet   what does it do?  
🗑
What are the most common type of problems that occur on IP networks?   Errors in the addressing scheme.  
🗑
What is the most important part of the troubleshooting process?   Documentation  
🗑
What layer of OSI would these errors occur? Broken Cables DTE Device Problems Transciever problems   Layer 1  
🗑
What layer of OSI model would you find these errors? Incorrect IP address Incorrect Subnet mask   Layer 3  
🗑
What does TX and RX stand for.   These are the link lights on a device. TX = Transmitting Data RX = Receiving Data  
🗑
What is ping used for?   Ping is used to test network connectivity  
🗑
What does a succesful telnet indicate?   That all layers of the OSI model are functioning properly.  
🗑
What is the single most important tool to discover Layer 1 and Layer 2 problems with the router?   The show command  
🗑
What are 3 possible causes of an interface being up and the line protocol being down   1. No Keepalives 2. No Clockrate 3. Mismatch Encapsulation  
🗑
Should you use debug during peak network times?   No  
🗑
What troubleshooting utility is used to discover the routes packets take when traveling to their destination?   Traceroute  
🗑
What is the synchronization process called that TCP uses to prepare for data transmission?   3 way handshake  
🗑
What does DoS stand for and what is it designed to do?   DoS means Denial of Service attack. Designed to bring down a server maliciously  
🗑
What does window size determine?   window size determines the amount of data that can be transmitted at one time before a destination responds with an ACK  
🗑
What are sequence numbers used for?   To help recieving nodes reassemble data that was received in the right order.  
🗑
What provides error detection in UDP?   Application Layer Protocols  
🗑
What are the 2 types of routes   Static Dynamic  
🗑
When specifying a static route   the administrator has two options for indicating the gateway. What are they?  
🗑
What command is used to configure a static route   ip route "address" "subnet mask" "next hop"  
🗑
What types of routes are used to route packets with destinations that do not match any of the other routes in a routing table?   Default routes  
🗑
What is the command to setup a default route?   IP route 0.0.0.0 0.0.0.0  
🗑
What command do you use to view the routing table?   show IP route  
🗑
What is a routing protocol?   A routing protocol is used by routers to update routing tables.  
🗑
What is a routed protocol?   A routed protocol is used by routers to direct traffic.  
🗑
What is an Autonomous system?   An Autonomous system is a collection of networks under a common administration that share a routing strategy. These may be run by one or more operators.  
🗑
What is the goal of a routing protocol?   The goal of a routing protocol is to build and maintain routing tables.  
🗑
List the 2 categories of routing protocols?   Distance Vector Link State  
🗑
Using distance vector routing   where does a router get its routing table updates?  
🗑
What does the network command do when configuring routing protocols?   Determines which interface sends and receives router table updates  
🗑
When using RIP what happens to a packet if the hop count is greater than 15?   The packet is discarded  
🗑
What type of routing is Border Gateway Protocol (BGP)?   Exterior Routing Protocol Used from ISP to ISP  
🗑
What types of routing protocols have Fast convergence?   Link State  
🗑
What types of routing protocols have Slow convergence?   Distance Vector  
🗑
Distance Vector Algorithms call for each router to send __________________ to each of its adjacent neighbors?   entire routing table  
🗑
What can occur if slow convergence occurs on the network as a result of changes to the network causing inconsistant routing entries?   Routing Loops  
🗑
Describe Route Poisoning?   This is the notification given to a router that a route is down by giving it a number that represents an Infinate number of hops.  
🗑
When is a triggered update sent?   Every 30 seconds on RIP or whenever a routing table changes  
🗑
What are the 4 charachteristics of RIP?   1. Distance Vector Protocol 2. Metric is Hop Count 3. If Hop Count > 15 packet is discarded 4. updates sent every 30 seconds  
🗑
what command enables RIP?   router rip  
🗑
What does configuring "ip classless" do on a router?   It allows router to ignore classful boundries of networks in its routing table and route to the default route.  
🗑
What does RIP use to reduce routing loops and count to infinity?   1. Split Horizon 2. Poison Reverse 3. Hold down Counters 4. Triggered updates  
🗑
List 2 common ways to verify RIP is configured properly.   1. Show IP route 2. Show IP protocols  
🗑
What does using the passive interface command prevent?   It prevents an interface from sending routing updates  
🗑
What is IGRP?   A distance vector routing protocol that was developed by Cisco.  
🗑
RIP Sends routing updates every 30 seconds. How often does IGRP send updates?   Every 90 Seconds  
🗑
What are the 4 Metrics used by IGRP?   Bandwidth Delay Reliability Load  
🗑
What command do you use to configure IGRP?   router igrp "Autonomous system number"  
🗑
Which routing protocol converges faster RIP or IGRP?   IGRP  
🗑
What is ICMP and what does it do?   ICMP - Internet Control Message Protocol ICMP is used to notify sender that there was an error in a delivery address  
🗑
How are ICMP messages delivered?   Encapsulated in datagrams and transferred just like other data.  
🗑
What does TTL stand for?   TTL = Time to live  
🗑
When a destination is unreachable what does ICMP do?   It assigns a code as to why the destination is unreachable (field code)  
🗑
What are control messages used for?   Control messages are used for informing hosts of network congestion or existance of a better gateway to a remote network.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: doogie
Popular Computers sets