Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Discovery 2 - Review Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Question #1 Define and give examples of the following: Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 IGP protocols Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 IGP protocols Interior Gateway Protocols RIP (V1 and 2) EIGRP (IGRP) OSPF Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 EGP protocols Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 EGP protocols Exterior Gateway Protocols BGP - facilitates the exchange of routing information between different autonomous systems Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Static Routing Routers manually configured ip route 192.168.40.0 255.255.255.224 s0/0/0 or ip route 192.168.40.0 255.255.255.224 192.168.1.1 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Dynamic Routing router rip version 2 network 192.168.1.0 network 172.16.0.0 network 10.0.0.0 It is automatically updated and maintained by routing protocols. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 Describe the characteristics of each of the following routing protocols. RIP Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Describe the characteristics of each of the following routing protocols. RIP Distant Vector Routing Protocol Has a hop count limit of 15 Version 1 - Does not include subnet mask information in routing updates Sends routing table contents every 30 seconds Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Describe the characteristics of each of the following routing protocols. EIGRP Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Describe the characteristics of each of the following routing protocols. EIGRP Cisco-proprietary Enhanced distance vector routing protocol Uses a variety of metrics 224 hop count limit topology and neighbor table DUAL – Diffused Update Algorithm Builds topology table based on advertisements Little information about distant networks and none about distant routers Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 Describe the characteristics of each of the following routing protocols. OSPF Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Describe the characteristics of each of the following routing protocols. OSPF Maintains a full database of distant routers and the methods by which they are interconnected Does not send periodic updates of the entire routing table Provides fast convergence and route authentication Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 Describe the characteristics of each of the following routing protocols. BGP Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 Describe the characteristics of each of the following routing protocols. BGP Border Gateway Protocol Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 Fill in the blank - Network devices installed at the customer location are called _______ _________ __________and include devices such as routers, modems, and switches. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 Fill in the blank - Network devices installed at the customer location are called Customer Premise Equipment and include devices such as routers, modems, and switches. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 Define the following routing table terms: Administrative distance – Vector – Metric – Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21 Define the following routing table terms: Administrative distance - trustworthiness – RIP 120, EIGRP 90, OSPF 110 Vector – Direction Metric – Calculation based on algorithm Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22 Define Static NAT - Dynamic NAT PAT - Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23 Define Static NAT - allows hosts on the public network to access selected hosts on a private network. A one-to-one mapping is created between an inside local and outside global address. Dynamic NAT - allows hosts on a private network that have private IP addresses to access a public network, such as the Internet. Occurs when a router assigns an outside global address from a pre-defined address, or pool of addresses, to an inside private network device. PAT - When an organization has a very small registered IP address pool, or perhaps even just a single IP address, it can still enable multiple users to simultaneously access the public network with a mechanism called NAT overload, or Port Address Translation (PAT). PAT translates multiple local addresses to a single global IP address Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 What subnet mask is needed to support up to 30 hosts? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25 What subnet mask is needed to support up to 30 hosts? 255.255.255.224 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26 What is the broadcast address for 192.168.1.64/27? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27 What is the broadcast address for 192.168.1.64/27? 192.168.1.95 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28 If an enable password is configured and an enable secret password is configured. Which will be used? What are the commands for enabling secret? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29 If an enable password is configured and an enable secret password is configured. Which will be used? What are the commands for enabling secret? enable secret will be used enable password passw0rd1 enable secret passw0rd2 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30 What command creates a default route? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31 What command creates a default route? ip route 0.0.0.0 0.0.0.0 serial 0/0/0 (exit interface) ip route 0.0.0.0 0.0.0.0 192.168.1.1 (next hop) Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32 What is the default “layer 2” encapsulation on a Serial line? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33 What is the default “layer 2” encapsulation on a Serial line? hdlc Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34 What addresses does a switch use? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35 What addresses does a switch use? Source and Destination MAC Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36 What are the results of a ping command and a traceroute command? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37 Describe the router’s process for loading a start-up config file. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38 Describe the router’s process for loading a start-up config file. NVRAM TFTP Server Console – start-up Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39 Write a static route to the network 192.168.4.0/24 if the next hop is 10.1.1.2/30 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40 Write a static route to the network 192.168.4.0/24 if the next hop is 10.1.1.2/30 ip route 192.168.4.0 255.255.255.0 10.1.1.2 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41 Describe the process of an ICMP ping. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42 Describe the process of an ICMP ping. Sends an ICMP echo request packet to the destination address Destination sends an echo reply. Tests the connectivity of an IP address Depends on IP to function and work Measures time that elapses between when the request packet is sent and the response packet is received Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43 Describe the uses of a straight through, crossover and console cables. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44 Describe the uses of a straight through, crossover and console cables. Straight-through - Connects dissimilar devices, such as a switch and a computer, or a switch and a router. Crossover - Connects similar devices, such as two switches or two computers. Console (or Rollover) - Connects a computer to the console port of a router or switch to do initial configuration. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45 Define the characteristics of TCP and UDP. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46 Define the characteristics of TCP and UDP. UDP is a very simple protocol connectionless unreliable delivery protocol – no guarantee message has been received by destination host does not provide sophisticated retransmission, sequencing, and flow control mechanisms of TCP lower overhead Presentation_ID Application Layer protocols that do use UDP include: Domain Name System (DNS) Simple Network Management Protocol (SNMP) Dynamic Host Configuration Protocol (DHCP) RIP routing protocol Trivial File Transfer Protocol (TFTP) Online games © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47 Define the characteristics of TCP and UDP. TCP Uses a flow control mechanism Uses windowing Provides acknowledgment of receipt of data Guarantees the sequential arrival of data packets Verification process adds more transmissions during the file transfer Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49 Describe the speed of the following WAN connections: T3, T1, DSL, Cable Modem Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50 Describe the speed of the following WAN connections: T3, T1, DSL, Cable Modem T3 - 44.736Mbps T1 - 1.544Mbps DSL – 128Kbps Cable - 128Kbps Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51 Define the following WAN connections: point-to-point, circuitswitched, packet-switched. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52 Define the following WAN connections: point-to-point, circuitswitched, packet-switched. Point-to-Point - dedicated circuit with fixed bandwidth available at all time, often called leased lines, example of a point-topoint WAN connection is a T1 or E1 link Circuit-Switched - functions similarly to the way a phone call is made over a telephone network, example of a circuit-switched WAN connection is an ISDN or dialup connection Packet-Switched - networks have connections into a switched network, many customers share the network, each customer has its own virtual circuit, a logical path between the sender and receiver, example is Frame Relay Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53 What are the purpose of the following protocols: Syslog – SNMP – HTTP – FTP – Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54 What are the purpose of the following protocols: Syslog – logs system events, system comprised of syslog servers and clients SNMP – network management protocol that enables administrators to gather data about the network and corresponding devices, four main components (management station, agent, information base, management protocol) HTTP – Hypertext Transfer Protocol – used to transfer or convey information on the World Wide Web FTP – File Transfer Protocol Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55 Describe an SLA? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56 Describe an SLA? Service Level Agreement – documents the expectations and obligations of both parties Outlines the management, monitoring, and maintenance of a network. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57 Describe encapsulation using the OSI model. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58 Describe encapsulation using the OSI model. Application – DATA – initiates the process Presentation – DATA – Format, encode, encrypt, compress Session – DATA – Establishes and monitors session with destination Transport – SEGMENT – Add TCP/UDP port numbers Network – PACKETS – Assign IP (logical) Addresses Data Link – FRAMES – Adds hardware addresses (MAC) Physical – BITS – Generate signals and timing Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59 What are some of the common protocols and technologies that operate at layer 2. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60 What are some of the common protocols and technologies that operate at layer 2. . Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61 What are some of the common protocols and technologies that operate at layer 2. Ethernet, HDLC, PPP, Frame-Relay Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62 Write the configuration for a dhcp pool called exampool. The network that is to used for DHCP is the 192.168.10.0 / 24. The router has an ip address of 192.168.10.1 and the dns server is 192.168.10.2. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63 Write the configuration for a dhcp pool called exampool. The network that is to used for DCHCP is the 192.168.10.0 / 24. The router has an ip address of 192.168.10.1 and the dns server is 192.168.10.2. ip dhcp pool exampool network 192.168.10.0 255.255.255.0 dns-server 192.168.10.2 default-router 192.168.10.1 ip dhcp excluded-address 192.168.10.1 192.168.10.2 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64 What is the function of the “service password-encryption” command? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65 What is the function of the “service password-encryption command? Prevents passwords in configuration files from being easily read Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66 Explain how FTP works. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67 Explain how FTP works. Passes control information on port 21 Transfer segments on port 22 closes connection automatically when the file transfer is complete Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68 What does AAA stand? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69 What does AAA stand? Explain the purpose of each A. Authentication, Authorization, Accounting prevents unauthorized access to a network Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70 What purpose does a server running the RADIUS protocol have? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71 What purpose does a server running the RADIUS protocol have? Authentication databases are typically stored on servers that use the Radius protocols Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72 How does DNS work? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73 How does DNS work? DNS relies on the hierarchy of decentralized servers to maintain records. The root DNS server may not know exactly where the host H1.cisco.com is located, but it does have a record for the .com top-level domain. Likewise, the servers within the .com domain may not have a record for H1.cisco.com either, but they do have a record for the cisco.com domain. The DNS servers within the cisco.com domain do have the record for H1.cisco.com and can resolve the address. The root servers maintain records about how to reach top-level domain servers. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74 How does DNS work? Resource Record - data record in the database file of a DNS zone Domain Name System Servers – maintain the databases Resolver – When a domain name is used, the resolver queries the DNS server to translate that name of an IP address Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75 Explain the 3 troubleshooting methods. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76 Explain the 3 troubleshooting methods. Top-down Bottom-up Divide and conquer Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77 Explain Distant Vector Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78 Explain Distant Vector The distance vector algorithm evaluates the route information it receives from other routers using two basic criteria: Distance - How far away is the network from this router? Vector - In which direction should the packet be sent to reach this network? Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79 Why might a serial connection appear – STATUS UP and PROTOCOL DOWN Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80 Why might a serial connection appear – STATUS UP and PROTOCOL DOWN Serial connections may experience problems caused by packet errors, configuration errors, or mismatches in encapsulation and timing. Because serial WAN connections usually rely on a CSU/DSU or modem for timing, these devices must be considered when troubleshooting. Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81 Explain the results of the following Show/Debug commands: Show ip protocols – Show ip route – Debug ip rip – Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82 Explain the results of the following Show commands: Show ip protocols – verifies routing protocol configured and what networks are being advertised Show ip route – shows the routing table Debug ip rip – observe the networks advertised and the routing updates as they are sent and received Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 86 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 91 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 92 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 93 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 94 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 95 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 96 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 97 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 98 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 99 Q and A Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 100 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 101 Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 102