CCNP 350-401

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

To only permit even IP address would should the mask end with in dot decimal

0

What VPN IDs are reserved in Cisco SD-WAN?

0 for underlay network and 512 OoBM

What are the first 24 bits of a multicast MAC address?

01:00:5E

What is the destination MAC BPDUs are sent to?

01:80:c2:00:00:00

OSPF 10 Gigabit Ethernet Cost

1

OSPF FastEthernet Interface Cost

1

OSPF GigabitEthernet Interface Cost

1

To only permit odd IP address would should the mask end with in dot decimal

1

LSA Types

1 Router 2 Network 3 Summary 4 ASBR Summary 5 AS External (redistributed) 7 NSSA (redistributed NSSA)

What is the TTL for eBGP packets?

1 by default packets will be dropped if a multi-hop session is attempted.

How many VXLAN tunnels are established by a fabric AP?

1 to the local fabric edge node

OSPF Ethernet Interface Cost

10

What bandwidth reference cost does OSPF use?

100MB

EIGRP uses a reference bandwidth of ____ with the default metrics.

10Gbps

How many different attributes are used in BGP path selection?

13

Using default settings, how long does port stay in the listening state?

15 seconds

Whats the minimum MTU that should be used with GRE?

1524 to accommodate the GRE header

What functionality is provided by VXLAN GPO

16bits are allocated to identify the SGT tag Policy Applied Bit(A Bit) is used to signal that the policy has either already been applied or that the policy has not yet been applied to the packet

What TCP port does BGP use?

179

LSA Age Timeout

1800 seconds (30min) Once the time is passed it's purged from LSDB.

If an IPv4 route consumes a TCAM slot, how many slots will an IPv6 route consume?

2

NBAR2

2 modes protocol discovery and Modular QoS CLI deep packet inspection. can recognize over 1000apps

What privilege levels can you customize?

2 thru 14

Multicast Local network control block

224.0.0.0/24 Used for protocol traffic that is not forwarded out a broadcast domain.

IANA assigned what range for multicast

224.0.0.0/4 includes 224.0.0.0 to 239.255.255.255

GLBP multicast address

224.0.0.102

multicast address for VRRP

224.0.0.18

Multicast Interntwork control block

224.0.1.0/24 Used for protocol traffic that may be forwarded to the internet

Source-Specific Multicast (SSM)

232.0.0.0/8 RFC 4607 forwards traffic to receivers who expressed interest. 1-many applications

GLOP block

233.0.0.0/8 RFC 3180 method for publishers/ISPs that wish to source content to the internet

Administratively scoped block

239.0.0.0/8 RFC 2365 similar to the reserved IP unicast. Limited to a local group or organization

How many bits are in a VXLAN Network Identifier?

24

What is the TTL for iBGP packets?

255 which allows for multi-hop sessions

The default EIGRP hello timer for a high-speed interface is?

5 seconds

What is the default TCP MSS setting for a Cisco router?

536 bytes

Using the minimum values how fast can an AP detect a WLC failure

6 seconds

OSPF T1 Interface Cost

64

ECN bits included how many bits of the TOS bye are used by DSCP?

8

MACsec

802.1AE standards-based Layer 2 link encryption technology used by TrustSec to encrypt Secure Group Tag (SGT) frames on Layer 2 links between switches and between switches and endpoints.

Layer 2 Marking

802.1Q standard defines two 2-byte fields TPID/TCI which follow the source address field of a frame

What protocol number does EIGRP use to identify it's packets?

88

What protocol number does OSPF use

89

What protocol number does OSPF use to identify is't packets?

89

Which components are part of the ETA(Encrypted Traffic Analytics) solution?

9Ks StealthWatch and ISE

What are the NETCONF operations

<get> <get-config> <edit-config> <copy-config> <delete-config>

System ID Extension

A 12-bit value that indicates the VLAN that the BPDU correlates to.

VXLAN Network Identifier VNI

A 24-bit field in the VXLAN header that enables up to 16 million Layer 2 and/or Layer 3 VXLAN segments to coexist within the same infrastructure.

System Priority

A 4-bit value that indicates the preference for a switch to be root bridge. A 16-bit binary number.

AS_PATH

A BGP attribute used to track the autonomous systems a network has been advertised through as a loop-prevention mechanism.

Well-Known Discretionary

A BGP path attribute recognized by all BGP implementations that may or may not be advertised to other peers.

Well-Known Mandatory

A BGP path attribute recognized by all BGP implementations that must be advertised to other peers.

Optional Transitive

A BGP path attribute that might be recognized by a BGP implementation that is advertised between autonomous systems.

Optional Non-Transitive

A BGP path attribute that might be recognized by a BGP implementation that is not advertised between autonomous systems.

Atomic Aggregate

A BGP path attribute which indicates that a prefix has been summarized, and not all of the path information from component routes was included in the aggregate.

eBGP Session

A BGP session maintained with BGP peers from a different autonomous system.

iBGP Session

A BGP session maintained with BGP peers from the same autonomous system.

cookbooks

A Chef container that holds recipes.

Control Plane Policing (CoPP)

A Cisco IOS-wide feature designed to enable users to restrict the amount of traffic handled by the route processor of their network devices.

Stealthwatch

A Cisco collector and aggregator of network telemetry data (NetFlow data) that performs network security analysis and monitoring to automatically detect threats that manage to infiltrate a network as well as threats that originate within a network.

Cisco Advanced Malware Protection (AMP)

A Cisco malware analysis and protection solution that goes beyond point-in-time detection and provides comprehensive protection for organizations across the full attack continuum: before, during, and after an attack.

NetFlow

A Cisco network protocol for exporting flow information generated from network devices in order to analyze traffic statistics.

Cisco ISE

A Cisco security policy management platform that provides highly secure network access control to users and devices across wired, wireless, and VPN connections.

Cisco Umbrella

A Cisco solution that blocks requests to malicious Internet destinations (domains, IP addresses, URLs) using Domain Name System (DNS).

IPSec (Internet Protocol Security)

A Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions. IPSec is an enhancement to IPv4 and is native to IPv6. IPSec is unique among authentication methods in that it adds security information to the header of all IP packets.

module

A Puppet container that holds manifests.

pillar

A SaltStack value store that stores information that a minion can access from the master.

Cisco AnyConnect Secure Mobility Client

A VPN client that is an 802.1x supplicant that can perform posture validations and that provides web security, network visibility into endpoint flows within Stealthwatch, and roaming protection with Cisco Umbrella.

Local Bridge Identifier

A combination of the advertising switch's bridge system MAC, the system ID extension, and the system priority of the local bridge.

Root Bridge Identifier

A combination of the root bridge system MAC address, system ID extension, and system priority of the root bridge.

Datagram Transport Layer Security (DTLS)

A communications protocol designed to provide authentication, data integrity, and confidentiality for communications between two applications, over a _____ transport protocol such as UDP

band

A contiguous range of frequencies.

Orthogonal Frequency Division Multiplexing (OFDM)

A data transmission method that sends data bits in parallel over multiple frequencies within a single 20 MHz wide channel. Each frequency represents a single subcarrier.

wireless LAN controller (WLC)

A device that controls and manages multiple lightweight APs.

map server/map resolver (MS/MR)

A device that performs MS and MR functions. MS function learns EID-to-prefix mapping entries from an ETR. MR function receives LISP-encapsulated map requests from an ITR.

NTP Client

A device that queries a time server by using Network Time Protocol so that it can synchronize its time to the server.

NTP Peer

A device that queries another peer device using Network Time Protocol so that the two devices can synchronize and adjust their time to each other.

Yagi antenna

A directional antenna made up of several parallel wire segments that tend to amplify an RF signal to each other.

patch antenna

A directional antenna that has a planar surface and is usually mounted on a wall or column.

building block

A distinct place in the network (PIN) such as the campus end-user, the WAN edge, the Internet edge, or the network services block.

Pooled NAT

A dynamic one-to-one mapping of a local IP address to a global IP addresses. After a certain amount of idle NAT time, the global IP address is returned to the pool.

Route Map

A feature used in BGP (and other IGP components) that allows for filtering or modification of routes using a variety of conditional matching.

container image

A file created by a ____ engine that includes application code along with its dependencies. ____become ____ when they are run by a _____ engine.

ISAKMP (Internet Security Association and Key Management Protocol)

A framework for authentication and key exchange between two peers to establish, modify, and tear down SAs that is designed to support many different kinds of key exchanges. uses UDP port 500 to communicate between

Autonomous System (AS)

A group of routers that is under a single administrative authority.

MST region

A group of switches running compatible MST configurations, in the same MST domain.

Ternary Content Addressable Memory (TCAM)

A high-performance table or tables that can evaluate packet forwarding decisions based on policies or access lists.

Content Addressable Memory (CAM)

A high-performance table used to correlate MAC addresses to switch interfaces that they are attached to.

parabolic dish antenna

A highly directional antenna that uses a passive dish shaped like a parabola to focus an RF signal into a tight beam.

distribute list

A list used for filtering routes with an ACL for a specific BGP neighbor.

decibel (dB)

A logarithmic function that compares one absolute measurement to another.

mobility domain

A logical grouping of all mobility groups within an enterprise.

mobility group

A logical grouping of one or more MCs between which efficient roaming is expected.

EtherChannel bundle

A logical interface that consists of physical member links to increase a link's bandwidth while preventing forwarding loops.

Overlay Network

A logical or virtual network built over a physical transport network referred to as an underlay network.

Cisco Threat Grid

A malware sandbox solution.

gain

A measure of how effectively an antenna can focus RF energy in a certain direction.

signal-to-noise ratio (SNR)

A measure of received signal quality, calculated as the difference between the signal's RSSI and the noise floor. A higher _____ is preferred.

Phase

A measure of shift in time relative to the start of a cycle; ranges between 0 and 360 degrees.

beamwidth

A measure of the angle of a radiation pattern in both the E and H planes, where the signal strength is 3 dB below the maximum value.

dynamic rate shifting (DRS)

A mechanism used by an 802.11 device to change the modulation coding scheme (MCS) according to dynamic RF signal conditions.

Cisco Express Forwarding (CEF)

A method of forwarding packets in hardware through the use of the FIB and adjacency tables. CEF is much faster than process switching.

BGP multihoming

A method of providing redundancy and optimal routing that involves adding multiple links to external autonomous systems.

prefix list

A method of selecting routes based on binary patterns, specifically the high-order bit pattern, high-order bit count, and an optional prefix length parameter.

transmit beamforming (T×BF)

A method of transmitting a signal over multiple antennas, each having the signal phase carefully crafted, so that the multiple copies are all in phase at a targeted receiver.

RF fingerprinting

A method used to accurately determine wireless device location by applying a calibration model to the location algorithm so that the RSS values measured also reflect the actual environment.

yang model

A model that represents anything that can be configured or monitored, as well as all administrative actions that can be taken on a device.

quadrature amplitude modulation (QAM)

A modulation method that combines QPSK phase shifting with multiple amplitude levels to produce a greater number of unique changes to the carrier signal. The number preceding the ____ name designates how many carrier signal changes are possible.

Web Authentication (WebAuth)

A network access control technique that enables access control by presenting a guest web portal requesting a username and password. It is typically used as a fallback mechanism to 802.1x and MAB.

MAC Authentication Bypass (MAB)

A network access control technique that enables port-based access control using the _____ of an endpoint and is typically used as a fallback mechanism to 802.1x.

Map Server

A network device (typically a router) that learns EID-to-prefix mapping entries from an ETR and stores them in a local EID-to-RLOC mapping database.

map resolver

A network device (typically a router) that receives LISP-encapsulated map requests from an ITR and finds the appropriate ETR to answer those requests by consulting the map server. If requested by the ETR, the MS can reply on behalf of the ETR.

Designated Port (DP)

A network port that receives and forwards BPDUs to other downstream switches.

Cisco TrustSec

A next-generation access control enforcement solution developed by Cisco that performs network enforcement by using Security Group Tags (SGTs) instead of IP addresses and ports. In SD-Access, Cisco ____ Security Group Tags are referred to as Scalable Group Tags.

Stratum

A number that defines a time sources' accuracy. The lower the stratum the more accurate the source.

radiation pattern

A plot that shows the relative signal strength in dBm at every angle around an antenna.

inside local

A private IP address referencing an inside device

Segmentation

A process that enables a single network infrastructure to support multiple Layer 2 or Layer 3 overlay networks.

NETCONF

A protocol defined by the IETF for installing, manipulating, and deleting the configuration of network devices.

SNMP (Simple Network Management Protocol)

A protocol that can send alerts when something fails on a device as well as when certain events happen on a device (for example, power supply failure).

first-hop redundancy protocol

A protocol that creates a virtual IP address on a router or a multi-layer device to ensure continuous access to a gateway when there are redundant devices.

VLAN Trunking Protocol (VTP)

A protocol that enables the provisioning of VLANs on switches.

Internet Key Exchange

A protocol that performs authentication between two endpoints to establish security associations (SAs). Used by ISAKMP.

Unidirectional Link Detection

A protocol that provides bidirectional monitoring of fiber-optic cables. Tracks if fiber a broken and traffic no longer going both ways.

Nonce

A random or pseudo-random number issued in an authentication protocol that can be used just once to prevent replay attacks.

Polar Plot

A round graph that is divided into 360 degrees around an antenna and into concentric circles that represent decreasing dB values. The antenna is always placed at the center of the plot.

tunnel router xTR

A router that performs ingress tunnel router (ITR) and egress tunnel router (ETR) functions (which is most routers).

proxy xTR (PxTR)

A router that performs proxy ITR (PITR) and proxy ETR (PETR) functions.

LISP router

A router that performs the functions of any or all of the following: ITR, ETR, PITR, and/or PETR.

Location/ID Separation Protocol (LISP)

A routing architecture and data and control plane protocol that was created to address routing scalability problems on large networks.

Tcl

A scripting language that can be run on Cisco IOS devices to automate tasks such as ping scripts.

Broadcast Domain

A set of all devices that receive broadcast frames originating from any device within the set. Devices in the same VLAN are in the same broadcast domain.

application programming interface (API)

A set of functions and procedures used for configuring or monitoring computer systems, network devices, or applications that involves programmatically interacting through software.

DevNet

A single place to go to enhance or increase skills with APIs, coding, Python, and even controller concepts.

LISP site

A site where LISP routers and EIDs reside.

virtual switch

A software-based switch that provides functionality similar to physical switches, and is used for connecting virtual systems to form a network.

Extensible Authentication Protocol (EAP)

A standardized authentication framework defined by RFC 4187 that provides encapsulated transport for authentication parameters.

CAPWAP (Control and Provisioning of Wireless Access Points)

A standards-based tunneling protocol that defines communication between a lightweight AP and a wireless LAN controller.

Static NAT

A static one-to-one mapping of a local IP address to a global IP address.

Recursive Static Route

A static route that specifies the next-hop IP address and requires the router to recursively locate the outbound interface for the next-hop device.

Static Null Route

A static route that specifies the virtual null interface as the next hop as a method of isolating traffic or preventing routing loops. Reduces load on CPU.

Trunk Port

A switch port that is configured for multiple VLANs and generally connects a switch to other switches or to other network devices, such as firewalls or routers.

Mobility Controller (MC)

A switch providing mobility management services for group roaming events. The _____ controller provides a central point of contact for management and policy-based control protocols.

MAC Address Table

A table of forwarding information held by a Layer 2 switch, built dynamically by listening to incoming frames and used by the switch to match frames to make decisions about where to forward the frame.

Network Address Translation (NAT)

A technique that allows private IP addresses to be used on the public Internet.

Security Group Access Control List (SGACL)

A technology that provides filtering based on source and destination SGT tags.

CLI

A text-based user interface for configuring network devices individually by inputting configuration commands.

SPAN (Switched Port Analyzer)

A tool for capturing local network traffic on a switch and sending a copy of the network traffic to a local port that would be attached to some sort of traffic analyzer.

ERSPAN Encapsulated Remote Switched Port Analyzer

A tool for capturing network traffic on a remote device and sending the traffic to the local system via Layer 3 (routing) toward a local port that would be attached to some sort of traffic analyzer.

RSPAN (Remote Switched Port Analyzer)

A tool for capturing network traffic on a remote switch and sending a copy of the network traffic to the local switch via Layer 2.

omnidirectional antenna

A type of antenna that propagates an RF signal in a broad range of directions in order to cover a large area.

directional antenna

A type of antenna that propagates an RF signal in a narrow range of directions.

Hertz (Hz)

A unit of frequency equaling one cycle per second.

integrated antenna

A very small omnidirectional antenna that is set inside a device's outer case.

Path Trace

A visual troubleshooting tool in Cisco DNA Center Assurance that is used to trace a route and display the path throughout the network between wired or wireless hosts.

BGP Community

A well-known BGP attribute that allows for identification of routes for later actions such as identification of source or route filtering/modification.

Autonomous AP

A wireless AP operating in a standalone mode, such that it can provide a fully functional BSS and connect to the DS.

Split MAC Architecture

A wireless AP strategy based on the idea that normal AP functions are split or divided between a wireless LAN controller and lightweight APs.

Lightweight AP

A wireless AP that performs real-time 802.11 functions to interface with wireless clients, while relying on a wireless LAN controller to handle all management functions.

direct sequence spread spectrum (DSSS)

A wireless LAN method in which a transmitter uses a single fixed, wide channel to send data.

centralized WLC deployment

A wireless network design that places a WLC centrally within a network topology.

unified WLC deployment

A wireless network design that places a WLC centrally within a network topology.

Mobility Express WLC deployment

A wireless network design that places a WLC co-located with a lightweight AP.

embedded WLC deployment

A wireless network design that places a WLC in the access layer, co-located with a LAN switch stack, near the APs it controls.

Differentiated Services (DiffServ)

Addresses the limitations of IntServa nd Best Effort. Doesn't need a signaling protocol or RSVP. Highly scalable. Not an end to end QoS solution. Manages hop to hop.

What three tables does BGP use to maintainthe network prefix and path attributes?

Adj-RIB-In( contains NLRIs before inbound route policies are applied) Loc-RIB Adj-Rib-Out( contains NLRIs after outbound route policies are applied)

OSPF Default Route Advertisement

Advertises the default route into the OSPF domain. Under OSPF process default-information originate

NFVI

All the hardware and software components that comprise the platform environment in which virtual network functions (VNFs) are deployed.

Protocol Discovery

Allows NBAR2 to discover and get real-time stats on apps currently running. Used to define QoS classes and policies using MQC.

Virtual LAN (VLAN)

Allows scattered users to be logically grouped together even though they may be attached to different switches.

Dynamic Trunking Protocol (DTP)

Allows switches to dynamically negotiate trunk links.

Open authentication

An 802.11 authentication method that requires clients to associate with an AP without providing any credentials at all.

Maximal Ratio Combining (MRC)

An 802.11n technique that takes multiple copies of a signal, received over multiple antennas, and combines them to reconstruct the original signal.

authentication server

An 802.1x entity that authenticates users or clients based on their credentials, as matched against a user database. In a wireless network, a RADIUS server is an AS.

Authenticator

An 802.1x entity that exists as a network device that provides access to the network. In a wireless network, a WLC acts as an authenticator.

supplicant

An 802.1x entity that exists as software on a client device and serves to request network access on behalf of the client.

AS path access control list (ACL)

An ACL based on regex for identifying BGP routes based on the AS path and used for direct filtering or conditional matching in a route map.

Playbook

An Ansible container that holds plays.

How does an EIGRP router indicate that a path computation is required for a specific route?

An EIGRP query is sent out with the delay set to infinity.

proxy ETR

An ETR but for LISP sites that sends traffic to destinations at non-LISP sites.

RestCONF

An IETF draft that describes how to map a YANG specification to a RESTful interface.

Network Configuration Protocol (NETCONF)/YANG

An IETF standard protocol that uses the YANG data models to communicate with the various devices on the network. NETCONF runs over SSH, TLS, or Simple Object Access Protocol (SOAP).

routing locator (RLOC)

An IPv4 or IPv6 address of an ETR that is Internet facing or network core facing.

proxy ITR

An ITR but for a non-LISP site that sends traffic to EID destinations at LISP sites.

BPDU Guard

An STP feature that disables a switch port if any BPDU is received there.

BPDU Filter

An STP feature that filters BPDUs from being advertised/received across the configured port.

STP Loop Guard

An STP feature that prevents a configured alternative or root port from becoming a designated port toward a downstream switch.

Address Family

An address family is a group of network protocols whose network addresses share a common format.

Load-balancing Hash

An algorithm for balancing network traffic across member links.

Web Security Appliance (WSA)

An all-in-one web gateway that includes a wide variety of protections that can block hidden malware from both suspicious and legitimate websites.

channel

An arbitrary index that points to a specific frequency within a band

LACP interface priority

An attribute assigned to a switch port on an LACP master switch to identify which member links are used when there is a maximum link.

LACP system priority

An attribute in an LACP packet that provides priority to one switch over another to control which links are used when there is a maximum link.

RADIUS Server

An authentication server used with 802.1x to authenticate wireless clients.

XLAN Group Policy Option (GPO)

An enhancement to the VXLAN header that adds new fields to the first 4 bytes of the VXLAN header in order to support and carry up to 64,000 SGT tags.

Virtual Tunnel Endpoint VTEP

An entity that originates or terminates a VXLAN tunnel. It maps Layer 2 and Layer 3 packets to the VNI to be used in the overlay network.

isotropic antenna

An ideal, theoretical antenna that radiates RF equally in every direction.

spatial stream

An independent stream of data that is sent over a radio chain through free space. One ______ is separate from others due to the unique path it travels through space.

Layer 3 roaming

An intercontroller roam where the WLANs of the two controllers are configured for different VLAN IDs; also known as a local-to-foreign roam. Tunnel built to allow communication between current and former controller.

Layer 2 roaming

An intercontroller roam where the WLANs of the two controllers are configured for the same Layer 2 VLAN ID; also known as a local-to-local roam.

container

An isolated environment where ____applications run.

dipole

An omnidirectional antenna composed of two wire segments.

Embedded Event Manager (EEM)

An on-box automation tool that allows scripts to automatically execute, based on the output of an action or an event on a device.

VXLAN

An overlay data plane encapsulation scheme. Extends Layer 2 and Layer 3 overlay networks over a Layer 3 underlay network, using MAC-in-IP/UDP tunneling. Each overlay is termed a ______ segment.

Segment

An overlay network.

Native VLAN

An untagged VLAN on a switch that will automatically receive all untagged frames.

Agentless automation tools

Ansible, PuppetBolt, SaltStack SSH

NTP Server

Any device that uses Network Time Protocol (NTP) to help synchronize time-of-day clocks for other devices by telling other devices its current time.

MST Region Boundary

Any switchport that connects to a switch in a different MST Region or to a 802.1D/W STP instance

PAgP Port Modes

Auto and Desirable Cisco

What is AAA in SDA?

Automation, Analytics, and Assurance

Which two cloud vendors are supported with OnRamp for IaaS

Azure AWS

What protocol is used to track latency and jitter out WAN circuits?

BFD Bi-directional Forwarding Detection

Does BGP advertise every path to it's peers?

BGP only advertises the best path.

K Values

Bandwidth, Delay, Load, Reliability

QoS Models

Best effort, integrated services, and differentiated services

Traffic Shapers

Buffer and delay egress traffic that exceeds defined rates until they no longer do.

Forwarding Information Base (FIB)

Built directly from the routing table and contains the next-hop IP address for each destination in the network.

How are anycast gateways assigned in an SD-Access fabric?

By mapping a host pool

How do regional hubs distribute VQoE information to remote sites?

By sending to the vSmart

In NTP what is root dispersion?

Calculated error of the clock attached to the server

Why and how would you clear a BGP connection?

Certain route manipulation techniques can only take place after a refresh. A hard reset can be done with clear ip bgp "ip-address" and a soft reset done with clear ip bgp "ip-address" soft

What type of hardware is used for the DNA Center appliance?

Cisco UCS M5 server

Cisco Email Security Appliance (ESA)

Cisco solution that enables users to communicate securely via email and helps organizations combat email security threats with a multilayered approach across the attack continuum.

Auto-RP

Cisco tech that automates the distro of group to RP mapping in a PIM network.

Types of per-hop behavior

Class selector: first 3 bits of DSCP used as CS bits make it compatible w/ IP precedence Default Forwarding: Used for best effort Assured Forwarding: Used to guarantee bandwidth Expedited Forwarding: Used for low-delay

intracontroller roaming

Client roaming that occurs between two APs joined to the same controller.

intercontroller roaming

Client roaming that occurs between two APs that are joined to two different controllers.

QoS Trust boundary

Close to the endpoint, verifies the CoS or DSCP value to determine if the packet should proceed. 0 values are discarded.

What traffic descriptors are used at the Data Link Layer?

CoS, Frame Relay DE, ATM CLP, 802.1q PRI

Access Port

Configured for a single VLAN and usually connects to end device (pc, phone, server, AP)

authentication

Confirms identity

What causes packet loss and how can it be prevented?

Congestion on an interface. Can be remedied by increasing link speed, QoS congestion avoidance and management. traffic policing traffic shaping

service chaining

Connecting VNFs together to provide an NFV service or solution.

HTTP response code 201 result and reason for response

Created. creating resources by using a REST API call

STP Portfast

Cuts down time for a port to become active. Goes directly to forwarding state and disables TCN.

What two entities are apart of Cisco SD-Access

DNA Center and Campus Fabric

DR Election

DR is chosen by the router with highest interface priority for that segment. Priority is 1 to 255

What traffic descriptors are used at the Network Layer?

DSCP, IP Precedence, ToS

OSPF Non-broadcast Network

Default in OPSF Frame-Relay main interface or multipoint sub-interfaces. DR/BDR in hellos Hello: 30 Wait: 120 Dead: 120

How often do APs send keepalives

Default is every 30 seconds

OSPF loopback network

Default on OSPF enabled loopback interfaces. Advertised as host route. /32

OSPF point-to-point Network

Default on OSPF-enabled Frame Relay point-point subinterfaces. No DR/BDR in hellos Hello: 10 Wait: 40 Dead: 40

OSPF Broadcast Network

Default setting on OSPF-enabled Ethernet links. DR/BDR field in OSPF Hello: 10 Wait: 40 Dead: 40

Variable network latency issues

Delay variation

Point of Presence

Demarcation point between different controllers or clients

What are the 5 PIM operating modes?

Dense, Sparse, Sparse Dense, Source Specific Multicast, and Bidirectional

What are the four steps in the Management Workflow for SDA?

Design, policy, provision, assurance

hen a fabric edge node forwards a packet to the underlay, what is the destination IP address?

Destination RLOC

network block

Devices that provide network services reside here. WLCs, ISE, and CUCM

What are the 802.1D port states?

Disabled - admin shut down Blocking - enabled but not forwarding Listening - can send/receive BDPUs cant send traffic Learning - can modify MAC table, still cant send traffic Forwarding - can send traffic and update MAC table Broken - issue detected, packets discarded until fixed

spatial multiplexing

Distributing streams of data across multiple radio chains with _____ diversity.

Traffic Policer

Drop or re-mark traffic that goes beyond desired rate

Port Address Translation (PAT)

Dynamic one to many IP mapping that uses port numbers to specify a device.

By default in an SDA Fabric, which device replies to the map-request message?

Egress Fabric Node

VPN (Virtual Private Network)

Encrypted connection over the Internet between a computer or remote network and a private network.

OSPF Neighbor States

Establishing neighbor adjacencies: 1. Down State - no hello packets received = down 2. Init State - hello packets recieved 3. Two-Way state - elect a DR and BDR Synchronize OSPF Databases: 4. ExStart state - negotiate master-slave relationship and DBD packet seq. number. Master initiates the DBD exchange 5. Exchange state - routers exchange DBD packets. If additional info needed, go to loading. If not, full. 6. Loading state - LSRs and LSUs used to gain additional info. Routes processed. 7. Full state - convergence reached

Which original packet header is left out of tunnel mechanisms that only extend L3?

Ethernet

NFV

European standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers.

Which type of border node is consider the default gateway of the SDA fabric?

External

OSPFv3 AllSPFRouters address

FF02::05

OSPFv3 AllDRouters designated router (DR) address

FF02::06

What are the CEF data plane tables

FIB and adjacency

Which type of node connects directly to network endpoints?

Fabric edge

If 2 VMs share the same virtual host and are on they same vSwitch does traffic have to pass through the physical host/LAN True or False?

False

In a centralized switching architecture, an ingress packet can be switched by a line card if the destination is on the same line card. True or false?

False

In a distributed model, line cards manage OSPF adjacencies themselves. True or false?

False

Processing Delay

Fixed amount of time it takes a network device to take the packet from input interface to output interface. Affected by CPU speed, load, packet switching mode, interface features.

Upon receiving a BPDU with a topology change flag, how do the down stream switches react?

Flush out all old MAC addresses from the MAC address table.

HTTP response code 403 result and reason for response

Forbidden. Access not granted based on supplied credentials

Which VPN is designed to go over an MPLS WAN circuit?

GET VPN

Topology Change Notification (TCN)

Generated by switch when it detects topology change

EIGRP Packet Types

Hello, Request, Update, Query, Reply

XML

Human and device readable way of writing data in a tree-structured form by enclosing it in tags.

Zone-Based Firewall

IOS integrated firewall that has 2 zones. Self and default

What are the 6 parameters used by Cisco SD-WAN to identify packets when DPI isn't an option?

IP Protocol #, S&D IP address, DSCP, S&D Port

Outside Local

IP address of an outside host as it appears to the inside network. The IP address does not have to be reachable by the outside but is considered private and must be reachable by the inside network.

What are Cisco's recommendations for underlay configuration?

IS-IS, L3, 50BMTU increase

The 3 steps of building QoS

Identify( Class Map), how you're going to treat it( policy map), where you're going to apply it (service policy)

BGP Neighbor States

Idle Connect Active OpenSent OpenConfirm Established

play

In Ansible, the code to be executed that is contained within playbooks.

recipe

In Chef, the code to be executed that is contained within cookbooks.

manifest

In Puppet, the code to be executed that is contained within modules.

grain

In SaltStack, code that runs on nodes to gather system information and report back to the master.

Reverse Path Forwarding (RPF) interface

Interface with lowest-cost path( based on AD/metric) to the source SPT or RP. Tie breaker goes to highest IP address.

Which type of border node registers subnets with the control plane node?

Internal

Traffic Descriptors

Internal: Qos groups locally significant Layer 1: Physical interface subinterface port Layer 2: MAC 802.1Q/p class of service bits Layer 2.5: MPLS Experimental bits Layer 3: Differentiated Services Code Points, IP precedence and source/destination IP Layer 4: TCP or UDP ports Layer 7: Next gen network based application recognition (NBAR2)

Marking Descriptors

Internal: Qos groups locally significant Layer 2: MAC 802.1Q/p class of service bits Layer 2.5: MPLS Experimental bits Layer 3: Differentiated Services Code Points, IP precedence and source/destination IP

What 2 protocols does multicast use and what layer is each used at?

Internet Group Management Protocol(IGMP) Layer 2 Protocol Independent Multicast(PIM) Layer 3

The three Well-Known BGP communities

Internet, No_Advertise, and No_Export

OSPF Path Selection

Intra-area Interarea External Routes

What happens when an ETR receives a packet destined for a host that has migrated to a different ETR?

It tells the ITR to get a new entry and forwards the packet to the new ETR.

Why does BGP use TCP?

It's capable of crossing network boundaries and it can form also form an adjacency that are multiple hops away.

Which 2 authentication methods did Cisco create?

LEAP and EAP-FAST

Leading causes of quality loss

Lack of Bandwidth Latency and Jitter Packet loss

Syslog

Logging of messages that can be sent to a collector server or displayed on the console or stored in the logging buffer on the local device.

Which authentication method should be used for phones and printers?

MAB(MAC Authentication Bypass)

What happens when a switch receives a BPDU with the topology flag change set

MAC addresses that haven't communicated in the past 15secs are flushed The MAC address aging timer is set to the forwarding delay

BGP optional non-transitive attributes

MED, cluster, originator ID

In which SD-Access layer would we find the REST-APIs?

Management

What command would you use to limit captured vlan traffic while using Switched Port Analyzer(SPAN)

Monitor session session-id filter vlan vlan-id

Source Tree/Shortest Path Tree

Multicast distribution tree where the source is the root and branches form a network all the way to the receivers. Shortest path is used to get to the receivers.

Shared Tree/RP Tree

Multicast distribution where the source is a designated router(rendezvous point). Forwarded to group with address G, regardless of source.

(*,G)

Multicast group where traffic is forwarded in a Shared Tree distribution.

What does RESTCONF use as a proxy server when configured to use HTTPS on a Cisco device?

NGINX

OSPF Neighbor State Fields

Neighbor ID: RID of neighbor PRI: Priority of neighbor interface State: Stage of OSPF process/DR, BDR, DROTHER Dead time: Time left until router declared unreachable Address interface: Local interface where OSPF neighbor is attached

core layer

Network backbone that provides high speed connections between distribution layers

What can be referenced in a TCAM that can't be referenced in a CAM?

Network mask

What is stored in the fast switching cache?

Next-hop MACs Egress Interfaces

Do BGP network statements enable BGP for a specific interface?

No, they identify specific network prefixes to be installed into the Loc-RIB table.

OSPF point-to-multipoint network

Not default. interface is a host route /32 next hop is set to outbound interface. Used mainly for hub-spoke

HTTP response code 404 result and reason for response

Not found. Page at HTTP URL location does not exist or is hidden

JSON

Notation used to store data in key/value pairs that is said to be easier to work with and read than XML.

Hypervisors sit between which two layers?

OS & hardware

HTTP response code 200 result and reason for response

Ok. using GET or Post to echnge data with an API

How does EIGRP summarize network prefixes?

On an interface basis

5 characteristics of cloud computing

On-demand Self-service, broad network access, resource pooling, rapid elasticity, and metered service

What is the name of Cisco SD-WAN's cloud services suite?

OnRamp

Interarea Route

Only learned from an ABR, contains information about another area. Contains LSA type 3 information.

Accumulated Interior Gateway Protocol(AIGP)

Optional path attribute that allows BGP to maintain and calculate a path metric for multiple ASs

What are the 3 well-known mandatory BGP attributes

Origin, Next-hop, AS_Path

What are the 4 types of CEF load balancing?

Original, Universal, Tunnel, Include ports

What are the 4 load sharing algorithms for CEF

Original, universal(default), tunnel, include ports.

What is the SDA Architecture made of?

Overlay/Underlay, controllers(DNA Center), ISE

At the network level what network types does OSPFv3 use?

P2P, broadcast, point to multipoint, nonbroadcast

Which HTTP method will create new data?

POST

Address Resolution Protocol (ARP)

Part of the TCP/IP protocol for determining the MAC address based on the IP address.

LACP Port Modes

Passive and Active

4 Layers of SDA

Physical, Network(underlay/overlay), controllers(ISE,DNA Center), management(GUI&Rest APIs)

Wireless QoS Policy Categories and markings

Platinum/voice/802.1p tag 5/ 46(EF) DSCP value Gold/video/tag 4/34(AF41) Silver/best effort/0/0 Bronze/background/1/10(AF11)

What settings need to match on member interfaces of an EtherChannel?

Port type, Port mode, Native VLAN, Allowed VLAN, Speed, Duplex, MTU, Load Interval, Storm Control

802.1x

Port-based network access control

personal mode

Pre-Shared Key authentication as applied to WPA, WPA2, or WPA3.

What are the 3 components of Path Selection?

Prefix length, Administrative Distance, Metrics

What is HAGLE

Process by which IKEv1 sets up tunnel Hash Auth Group(DH) lifetime encryption

PVST Simulation Check

Process of ensuring MST Region is the STP root bridge for all VLANs or none of the VLANs. If MST Region is partial RB the port is shut down.

Fixed network latency issues

Propagation delay, serialization delay, and processing delay

Root Guard

Protects against a rogue switch taking over the root switch

IGMP (Internet Group Management Protocol)

Protocol receivers use to join a multicast groups and start receiving traffic from those groups. There are 3 versions.

Outside Global

Public IP address assigned to a host on the outside network by the owner of the host. This IP address must be reachable by the outside network.

Agent based automation tools

Puppet, Chef, SaltStack

Marking

QoS mechanism that 'colors' a packet by changing a field within a packet/frame header w/ a traffic descriptor to distinguish from others.

spread spectrum

RF signals that spread the information being sent over a wide range of frequencies.

narrowband

RF signals that use a very narrow range of frequencies.

IGMPv2

RFC 2236 Most common in multicast environments. Sent with a TTL of 1 so it's processed by the local router and not forwarded.

IGMPv3

RFC 3376 Supports source filtering unlike v2. Has 2 new modes: include/exclude. Those that want traffic and those that don't.

IGMP Snooping

RFC 4551 Most widely used method for examining IGMP joins sent by receivers and maintaining a table]e of interfaces to IGMP joins.

What RFC defines the new features of Multiprotocol BGP for IPv6?

RFC 4760 and it defines a new address family identifier BGPv4 optional and non-transitive attributes : multiprotocol reachable/unreachable NLRI(Network Layer Reachability Information)

PIM Bootstrap Router

RFC 5059 vendor neutral. Provides a fault-tolerant automated RP discovery and distribution solution.

Which 2 tables are used to populate the FIB?

RIB and ARP

OSPF neighbor adjacency requirements

RIDs must be unique Interfaces share common subnet MTUs must match Area ID must match DR enablement must match Hello and dead timers same Authentication the same Area type flags must match (Stub, NSSA)

Viptela Quality of Experience, VQoE

Rated from 0 to 10. Tracks application quality in OnRamp for SaaS and vAnalytics on WAN circuit

Mobility Agent (MA)

Resides in the access switch or edge switch that the WAP is directly connected to. CAPWAP tunnels of directly connected access points and maintaining client mobility state machine.

Root Bridge

Responsible for controlling STP timers, creating configuration BPDUs, and processing topology change BPDUs. All ports on a root bridge are designated ports that are in a forwarding state.

Intra-area Route

Routes in the same area, made of type 1 and 2 LSAs

What is PIM(Protocol Independent Multicast)?

Routes multicast traffic between networks. Can use any unicast routing protocol to identify path between source and receivers.

regular expressions (regex)

Search patterns that use special key characters for parsing and matching.

Feasible Successor (FS)

Second optimal route, determined by Feasible Distance and Advertised Distance

Modular QoS CLI

Separates different applications into their own traffic class by matching the different network protocols being used.

Multiple Spanning Tree Instance (MSTI)

Single spanning-tree instance for a specified set of VLANs in the MST protocol

Common Spanning Tree (CST)

Single spanning-tree instance for the entire network

DHCPv6 client request process

Solicit, advertise, request, reply

Summarization of Routes

Splitting a large OSPF domain into multiple smaller areas.

next generation firewall

Stateful inspection as well as integrated intrusion prevention, application-level inspection, along with advanced malware detection and application layer attacks

What must a collector do to attain data via streaming telemetry in SDA?

Subscribe to the flow

TACACS+

TCP 49 encrypts entire payload and preferred for network access control

Which method would you use at the Transport Layer to categorize traffic?

TCP/UDP Ports

When you connect redundant vEdges in a U shape what is the link called?

TLOC Extension which is the underlay IP of the WAN

H plane

The "azimuth" plane, which passes through an antenna that shows a top-down view of the radiation pattern.

E-plane

The "elevation" plane, which passes through an antenna that shows a side view of the radiation pattern.

Internal Spanning Tree (IST)

The 1st MSTI, instance 0. Builds a CST across all VLANs. Contains advertisements for other MSTIs

Configuration BPDU

The BPDU that is responsible for switches electing a root bridge and communicating the root path cost so that a hierarchy can be built.

Cisco Talos

The Cisco threat intelligence organization.

endpoint identifier EID

The IP address of an endpoint within a LISP site.

host pool

The IP subnet, SVI, and VRF information assigned to a group of _____ that share the same policies.

What is 802.1s

The MSTP standard

sensitivity level

The RSSI threshold (in dBm) that divides unintelligible RF signals from useful ones. the Minimum signal strength that a receiver must have in order to properly interpret data

transit routing

The act of allowing traffic to flow from one external autonomous system through your autonomous system to reach a different external autonomous system.

Forward Delay

The amount of time that a port stays in a listening and learning state. Default 15 seconds

noise floor

The average power level of noise measured at a specific frequency.

carrier signal

The basic, steady RF signal that is used to carry other useful information.

If a client was already connected to an AP and moves to a new one what method will it use to do that

The client will send a reassociation request to the new AP since it was already connected

out of phase

The condition when the cycles of one signal are shifted in time in relation to another signal.

in phase

The condition when the cycles of two identical signals are in sync with each other.

Root Path Cost

The cumulative cost of all the links leading to the root bridge.

Link budget

The cumulative sum of gains and losses measured in dB over the complete RF signal path; a transmitter's power level must overcome the ____ so that the signal can reach a receiver effectively.

foreign controller

The current controller that a client is associated with after a Layer 3 intercontroller roam. Traffic is tunneled from the foreign controller back to an anchor controller so that the client retains connectivity to its original VLAN and subnet.

Layer 3 Forwarding

The forwarding of packets based on the packets' destination IP addresses.

Layer 2 Forwarding (L2F)

The forwarding of packets based on the packets' destination Layer 2 addresses, such as MAC addresses.

network function

The function performed by a physical appliance, such as a firewall function or a router function.

amplitude

The height from the top peak to the bottom peak of a signal's waveform; also known as the peak-to-peak amplitude

Equal-cost multipathing

The installation of multiple best paths from the same routing protocol with the same metric that allows for load-balancing of traffic across the paths.

Unequal-cost Load Balancing

The installation of multiple paths that include backup paths from the same routing protocol. Load balancing across the interface uses a traffic load in a ratio to the interface's route metrics.

Loc-RIB Table

The main BGP table that contains all the active BGP prefixes and path attributes that is used to select the best path and install routes into the RIB.

Designated Router (DR)

The main router in an OSPF network that relays information to all other routers in the area.

Feasible Distance

The metric value for the lowest-metric path to reach a destination.

Root Port

The most preferred switch port that connects a switch to the root bridge. Often this is the switch port with the lowest root path cost.

access layer

The network layer that gives endpoints and users direct access to the network.

distribution layer

The network layer that provides an aggregation point for the access layer and acts as a services and control boundary between the access layer and the core layer.

Frequency

The number of times a signal makes one complete up and down cycle in 1 second.

Polarization

The orientation (horizontal, vertical, circular, and so on) of a propagating wave with respect to the ground.

Anchor Controller

The original controller a client was associated with before a Layer 3 intercontroller roam. Also used to tunnel clients on guest WLAN or with a static anchor.

wavelength

The physical distance that a wave travels over one complete cycle.

Member Links

The physical links that make up an EtherChannel bundle

Collision Domain

The portion of an Ethernet network in which collisions could occur if two nodes transmit data at the same time.

radio frequency (RF)

The portion of the frequency spectrum between 3 kHz and 300 GHz.

Process Switching

The process of forwarding traffic by software and processing by the general CPU. It is typically slower than hardware switching.

inside global

The public IP address that represents one or more inside local IP addresses to the outside.

bandwidth

The range of frequencies used by a single channel or a single RF signal.

demodulation

The receiver's process of interpreting changes in the carrier signal to recover the original information being sent.

received signal strength indicator (RSSI)

The relative measure of signal strength (0 to 255), as seen by the receiver.

effective isotropic radiated power (EIRP)

The resulting signal power level, measured in dBm, of the combination of a transmitter, cable, and an antenna, as measured at the antenna.

Backup Designated Router (BDR)

The router with the second highest priority on a broadcast segment of a link-state network. The BDR allows service to be restored quickly in the event of an outage affecting the DR.

received signal strength (RSS)

The signal strength level in dBm that an AP receives from a wireless device.

Routing Information Base (RIB)

The software database of all the routes, next-hop IP addresses, and attached interfaces. Also known as a routing table.

WPA Version 3 (WPA3)

The third version of a Wi-Fi Alliance standard, introduced in 2018, that requires Pre-Shared Key or 802.1x authentication, GCMP, SAE, and forward secrecy.

Max Age

The timer that controls the maximum length of time that passes before a bridge port saves its BPDU information. Default 20 seconds

Underlay Network

The traditional physical networking infrastructure that uses an IGP or a BGP.

modulation

The transmitter's process of altering the carrier signal according to some other information source.

Hello Time

The value of a field in a BPDU frame that specifies how frequently BPDUs are transmitted. The default is 2 seconds.

place in the network (PIN)

The various blocks that make up a network. WAN edge, data center, end user, and network services

virtual network function

The virtual version of an NF, typically run on a hypervisor as a VM (for example, a virtual firewall such as the ASAv or a virtual router such as the ISRv).

Propagation delay

Time it takes for a packet to travel from source to destination.

Serialization Delay

Time it takes to place all bits of a packet onto a link. Fixed value that depends on link speed. Faster link= less delay

What is the purpose of the MED(Multi-Exit Discriminator)?

To influence traffic flows inbound from a different AS

What's the purpose of BGP communities?

To provide additional capability for tagging routes and modifying BGP routing policy and can transverse between AS to AS.

What is the primary mechanism used to create overlay networks?

Tunnels

Which hypervisor type should be deployed into data centers?

Type 1 bare metal

What port does NTP use

UDP 123

HSRPv1 port, groups MAC, and multicast address

UDP 1985, 256 groups, 0000.0C07.Axxx, 224.0.0.2

HSRPv2 port, groups MAC, and multicast address

UDP 1985, 4096 groups, 0000.0C9F.Fxxx, 224.0.0.102

HSRPv6 port, groups MAC, and multicast address

UDP 2029, 4096 groups, 0005.73A0.0xxx

HTTP response code 401 result and reason for response

Unauthorized. Client not authenticated to access site or API call

Resource Reservation Protocol (RSVP)

Used by IntServ to reserve resources for a specific real-time application.

Bridge Protocol Data Unit (BPDU)

Used by switches to share information with other switches that are participating in the Spanning-Tree Protocol

Integrated Services (IntServ)

Used for real-time applications like voice and video. Provides predictable and guaranteed service levels.

IP SLA

Used to generate traffic to measure network performance between two networking devices, multiple network locations, or across multiple network paths.

PIM Sparse Mode (PIM-SM)

Used when multicast receivers a thinly scattered throughout the network.

PIM Dense Mode (PIM-DM)

Used when receivers of a multicast group are on every subnet in the network. Hence the dense name.

Best Effort

Used with traffic that doesn't require special treatment. Won't try harder than it has to, to make sure packets reach destination.

Packet Classification

Uses traffic descriptors to categorize an IP packet within a specific class. Should happen close to the network edge and close to the source.

PIM Forwarder

Uses unicast routing protocols to prevent multicast routing loops.

When must you use v3 VRRP

Using IPv6

Where are policies typically defined in traditional networks?

VLAN/Subnet

A Virtual Network equates to what type of traditional network construct?

VRF

What type of network segmentation closest resembles a Cisco SD-WAN VPN?

VRF

What makes up the Campus Fabric?

VXLAN, LISP ISE

virtual network

Virtualization at the device level, using virtual routing and forwarding (VRF) instances to create multiple Layer 3 routing tables.

What wireless security method uses AES-CCMP for encryption

WPA2

In order what are the first 7 attributes BGP uses for path selection?

Weight Local Preference Local originated( network statement, redistribution, or aggregation) AIGP Shortest AS_Path Origin Type Lowest MED

The Law of Halves

When you divide a mW there is a decrease of 3db. 100mW 50mW 25mW halved twice so -3db + -3db= -6db decrease

FlexConnect technology is useful in what scenario?

When you have a slow WAN link to a branch office.

Point of Attachment

Where roaming client connects to another controller

WPA Version 2 (WPA2)

Wi-Fi Alliance standard that requires Pre-Shared Key or 802.1x authentication, TKIP or CCMP, and dynamic encryption key management.

WiFi Protected Access (WPA)

Wi-Fi Alliance standard that requires pre-shared key or 802.1x authentication, TKIP, and dynamic encryption key management; based on portions of 802.11i before its ratification.

What does python use to in close a list

[ ] brackets

Delay Variation

aka Jitter difference in latency between packets in the same flow. Queuing delay, dejitter buffers and variable packet sizes all affect delay variation.

Where in the network are anycast gateways deployed?

all fabric edge nodes

What must match for OSPFv3 routers to form an adjacency?

area IDs instance IDs

How do you keep BGP path history?

as-set keyword combined with aggregate-address

HTTP response code 400 result and reason for response

bad Request. Request failed due to client-side issue

What are the BGP optional transitive attributes

community, aggregator

authorization

confirms that you have permission to access

fabric edge node

connect end devices to fabric

fabric border node

connects external L3 networks to fabric

What does EIGRP advertise in a route by default?

cumulative delay and minimum bandwidth

What debug command will show GRE keepalives?

debug tunnel keepalive

What are the 3 states of RSTP

discarding, learning, forwarding

Why is IS-IS used over OSPF in network overlay?

doesn't depend on Ip connectivity to establish neighbors and fully supports routing for IP, IPv6, and other non-IP protocols

How would encrypt a password to a a specific access level

enable secret [level/level-number] {password} | [encryption type]

If platform is capable what 2 roles can be shared on a single device?

fabric border node and control plane node

What are the two types of network latency?

fixed and variable

What are the BGP well known discretionary attributes

local preference, atomic aggregate

What are valid modes for a lightweight AP

local(default) monitor(just a sensor receive only), bridge

Which OSPF network types require manual configure of neighbor routers?

nonbroadcast point to multipoint

When using Flexible NetFlow how many flow can you configure per destination

one

What are three reasons for using Quality of Service (QoS)?

prevent packet loss, temporary bandwidth congestion, provide consistent packet delay

What is used to exchange segmentation policies between ISE and other systems?

pxGrid

Which Lightweight AP (LAP) modes do not provide client connectivity

rogue detector mode, sniffer mode and monitor mode

egress tunnel router (eTR)

router that receives packets from the LISP tunnel

ingress tunnel router (iTR)

router that sends packets into the LISP tunnel

Types of policing algorithms

single rate 2-color marking single rate 3-color (srTCM) two rate 3-color (trTCM)

virtual machine

software emulation of a physical server with an operating system.

When CEF is enabled on a router what table is primarily used to when making L3 decisions?

the FIB

What is 802.3ad

the etherchannel standard

dBd

the gain of an antenna, measured in dB, as compared to a simple dipole antenna.

dBi

the gain of an antenna, measured in dB, as compared to an isotropic reference antenna.

dBm

the power level of a signal measured in dB, as compared to a reference signal power of 1 milliwatt.

accounting

tracks and logs user activity

What VTP modes allow for creation, modification and deletion of a vlans on a switch

transparent and server

Which ESP mode should be used if the original IP header needs to be seen by the transit network?

transport

TLOC extension

transport locator uses the underlay ip address to form vxlan tunnels in SD-WAN for edge redundancy

RADIUS

udp encrypts only the password preferred for secure network access

What challenge is associated with bare metal servers?

underutilized resources

What authenticates vSmart and vEdge devices in SD-WAN?

vBond

Which SD-WAN component is vAnalytics integrated?

vManage

hypervisor

virtualization software that creates VMs and performs the hardware abstraction that allows multiple VMs to run concurrently.

What is the SDA feature that allows for switches to be automatically configured upon installation?

zero touch provisioning

What does python use to in close a dictionary

{ } curly brackets

How much bandwidth can a single WiFi 6 AP produce?

~10G


संबंधित स्टडी सेट्स

Chapter 20 The Imperial republic

View Set

Communication and the nursing process

View Set

A&P Chapter 10 Practice Quiz - Gross Anatomy

View Set

GI-L18: Malabsorption and Maldigestion (AIDS and GI Tract)

View Set

Nurs 232 PREP -U ASSIGNMENT : Documenting and reporting

View Set

Assignment #10 (Chapters 16 & 17)

View Set