What is the access list range for extended IP Access list?
The access list range is 100 – 199.
Name a x.25 addressing standard.
X.121 is a x.25 layer 3 add. standard.
List three important properties of IGRP.
It is a composite metric. There are updates every 60 seconds and it is a poison reverse.
Where can the backup configuration file be found?
It is stored in the NVRAM.
Three features of IP Access lists.
There are three different kinds of access lists. These are standard, extended and named.
How can a router be configured?
It can be configured by TFTP, Nvram or Console
Which mechanism takes place in a traffic light?
Flow control
What is Windowing
It is a kind of flow control.
Which filters are used to control SAP Traffic?
input sap filter and output sap filters can be used for the same.
Which hardware component is used to store buffers, tables, etc.?
RAM
Important features of UDP
It is the layer 4 transport protocol and has no handshaking.
What is the number range of IPX access list?
The range is 800-899
Name the OSI Layer which helps ensure packet delivery.
Network layer.
How can you vary the routers boot sequence?
It can be done by boot system commands and config register.
Which hardware is necessary for broadcasts.
switch, repeater and bridge.
Important characteristics of PPP PAP Authentication.
Username and password is sent in clear text and The authentication controls remote node.
Which switching method is used to examine the destination MAC Address.
Cut through is the switching method used to examine it.
An important feature of RARP.
The full form of RARP is Reverse Address Resolution Protocol. It is used to start remote O/S load sequence.
Which protocol helps test the connectivity without configuration of layer 3 protocols?
CDP protocol
What is the use of IPX SAP?
It stands for Service Advertising Protocol and it is used to advertise services.
List the default values in IGRP metric.
The default values are bandwith and delay.
What is the default serial encapsulation?
HDLC is the default serial encapsulation.
What is the use of ARP?
It is used to determine the MAC Address of a workstation.
Use of DLCI
It is used to identify the PVC in frame relay network.
Important features of OSI Layer 3 – network layer.
Determines the path, multiplexing and management of sessions.
List the important characteristics of switches.
The bandwidth is increased and collision domains are created. Also it helps forward traffic using mac address.
Which OSI Layer is used for physical address and network topology?
The Data link layer serves this purpose.
Why do we have to disable CDP?
To save the bandwidth by reducing overhead and to connect to a non cisco router.
Important characteristics of ISDN.
It transports both voice and data, and same as X.25
List the important characteristics of IGRP.
Multiple unequal paths, autonomous system number, etc.
What is the range of extended IP access list?
The range is 100-199
Which hardware component is used to store backup configuration?
NVRAM is used for this.
Which is the IPX Serial encapsulation by default?
HDLC
Important features of PPP CHAP Authentication?
Authentication messages and local router challenges
How many DNS Servers can be specified with one command?
6 DNS Servers can be specified with one command.
What is the use of Cisco IOS Exec command trace?
The “trace [protocol] [destination]” is used to discover routes that packets will travel to their destination hosts. TTL (Time to Live) is used to report destination route information.
What is the use of “IP name-server 255.255.255.255?
It sets the domain name lookup to be a local broadcast.
WHich format is useful for configuring the subnet mask for an IP Address?
dotted decimal, hexadecimal and bit count formats can be used.
Which process is used to find an IP address from a MAC Address?
RARP Process
What is source Quench?
It is the condition when the router lacks any more buffer space.
ICMP Protocol
It is used to carry messages like destination unreachable, source quench, parameter problem, time exceeded, timestamp, address reply and address request.
Name any two protocols which can exist in the protocol field of an IP Packet.
These are TCP and UDP Protocols.
Which field in the IP Packet has network testing?
The network testing is found in IP Options field.
How does the Internet layer know how to handle an IP Packet?
The type of service tells it.
Identification, flags and frag offset fields of an IP Packet enable differing MTUs by fragmenting datagrams.
What is the use of DDR on Cisco Routers?
It is used for dial on demand routing. DDR provides routing for low volume and periodic traffic.
Cisco router has two types of access lists.
Standard and Extended
What do you know about the UDP Datagram format?
Source Port – 16 bits, Destination Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data
When using access lists, what does a Cisco router check first?
The cisco routers checks whether the packet is routable or bridgeable
How many access lists are allowed per interface?
One Access list per port, per protocol is allowed.
What happens if we set a wildcard mask bit to 0 in cisco routers?
The router checks the corresponding bit value.
Which abbrevation is used to tell the router to check all numbers?
*host
Which service is used to get data from multiple sources and allocate bandwidth on one?
TDM or Time Domain Multiplexing
How can we convert the user data from DTE to WAN service form?
We can use the Modem, CSU/DSU and TA/NT1 for this.
Which are the different forms of WAN Services accessed by Cisco Routers?
These are Switched services, Using protocols connecting peer to peer devices and Interface front end to IBM Enterprise Data center computers.
CISCO HDLC Protocol.
It contains the Flag, Address, Control, Proprietary, Data, FCS and Flag.
What is the Quality Protocol?
It monitors data dropped on a link.
What is magic number?
It helps avoid frame looping.
What is the use of Multilink Protocol MP?
It is used to provide load balancing across multiple links.
Which authentication method is preferred to set up a session?
CHAP
Which compression protocols are used for PPP?
Stac and Predictor
Name and explain the phases of PPP Session establishment.
These are link establishment phase, authentication phase and the network layer protocol phase.
Name the default IPX Ethernet encapsulation.
Novell-Ether is the default IPX Ethernet encapsulation.
Création des Logiciels de gestion d'Entreprise, Création et référencement des sites web, Réseaux et Maintenance, Conception