dragndrop Flashcards Preview

CCNA > dragndrop > Flashcards

Flashcards in dragndrop Deck (25)
Loading flashcards...
1

Place the Ethernet frame fields into the correct order.

FCS
type
preamble
destination address
source adress
data and pad

1 preamble
2 destination address
3 source address
4 type
5 data and pad
6 FCS

2

Drag and drop the steps in the process of upgrading the IOS on a Cisco router.

Update the boot statement Step
Reboot and verify the IOS running version
Verify the available flash memory on the device
Verify the checksum of the new IOS version Step
Use FTP or TFTP to copy the new IOS to the device Step

Step 1: Verify the available flash memory on the device
Step 2: Use FTP or TFTP to copy the new IOS to the device Step
3: Verify the checksum of the new IOS version Step
4: Update the boot statement Step
5: Reboot and verify the IOS running version

3

Drag and drop the steps to configure EIGRP IPv6 into the appropriate order.

ipv6 eigrp as-number (under interface mode)
router id
configure terminal
enable
ipv6 router eigrp as-number

Step 1: enable
Step 2: configure terminal
Step 3: ipv6 router eigrp as-number
Step 4: router id
Step 5: ipv6 eigrp as-number (under interface mode)

4

Drag the “show” commands on the left to their proper locations on the right

+ show ip route eigrp:
+ show ip eigrp interface:
+ show ip eigrp traffic:
+ show ip eigrp neighbors:
+ show ip eigrp topology:

shows the routes known to a router‟s EIGRP routing process. Confirm what EIGRP learning. Show what does it learned

show EIGRP routing tables in routing table / confirm what is actually being used / does routing

Displays the neighbor discovered by EIGRP. Show what is learned

show the number of EIGRP packets sent and received

show information about interface configured for EIGRP / Verify the routing of specific interface / show what being used

+ show ip route eigrp: show EIGRP routing tables in routing table / confirm what is actually being used / does routing

+ show ip eigrp interface: show information about interface configured for EIGRP / Verify the routing of specific interface / show what being used

+ show ip eigrp traffic: show the number of EIGRP packets sent and received

+ show ip eigrp neighbors: Displays the neighbor discovered by EIGRP. Show what is learned

+ show ip eigrp topology: shows the routes known to a router‟s EIGRP routing process. Confirm what EIGRP learning. Show what does it learned

5

Drag drop about characteristics of a cloud environment.

+ Multitenancy:

+ Scalability:

+ Workload movement:

+ On-demand:

+ Resiliency:

Resources can be added and removed as needed to support current workload and tasks

Tasks and data residing on a failed server can be seamlessly migrated to other physical resources

One or more clients can be hosted with the same physical or virtual infrastructure

Tasks can be migrated to different physical locations to increase efficiency or reduce cost

Resources are dedicated only when necessary instead of on a permanent basis

+ Multitenancy: One or more clients can be hosted with the same physical or virtual infrastructure

+ Scalability: Resources can be added and removed as needed to support current workload and tasks

+ Workload movement: Tasks can be migrated to different physical locations to increase efficiency or reduce cost

+ On-demand: Resources are dedicated only when necessary instead of on a permanent basis

+ Resiliency: Tasks and data residing on a failed server can be seamlessly migrated to other physical resources

6

Drag and drop the items on the right to the correspondent definitions on the left.

BPDU Filter:
BPDU guard:
PortFast:
Root guard:
UplinkFast:

prevents the port from becoming a locked port

enables quick convergence when a direct link to a non-end device fails

drops all BPDU received on the switch port

forces the switch to transition directly from the blocking state to the forwarding state

disables the switch port when it receives a BPDU

+ BPDU Filter: drops all BPDU received on the switch port

+ BPDU guard: disables the switch port when it receives a BPDU

+ PortFast: forces the switch to transition directly from the blocking state to the forwarding state

+ Root guard: prevents the port from becoming a locked port
+ UplinkFast: enables quick convergence when a direct link to a non-end device fails

7

Drag and drop the extended traceroute options from the left onto the correct description on the right.

+ Maximum time to live:
+ Minimum time to live:
+ Numeric display:
+ Source address:
+ Timeout:
+ Timestamp, verbose:

suppresses the display of known hops

IP header options

value that, when reached, terminates the traceroute command

sets the interval for which the probe waits for a response

suppresses the display of hostnames

overrides the router selection of an outbound interface

+ Maximum time to live: value that, when reached, terminates the traceroute command
+ Minimum time to live: suppresses the display of known hops
+ Numeric display: suppresses the display of hostnames
+ Source address: overrides the router selection of an outbound interface
+ Timeout: sets the interval for which the probe waits for a response
+ Timestamp, verbose: IP header options

8

Drag the term on the left to its definition on the right (not all options are used)

+ poison reverse:
+ LSA:
+ split horizon:
+ holddown timer:

For a given period, this causes the router to ignore any updates with poorer metrics to a lost network

A router learns from its neighbor that a route is down and the router sends an update back to the neighbor with an infinite metric to that route

The packets flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes

This prevents sending information about a route back out the same interface that originally learned about the route

+ poison reverse: A router learns from its neighbor that a route is down and the router sends an update back to the neighbor with an infinite metric to that route
+ LSA: The packets flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes
+ split horizon: This prevents sending information about a route back out the same interface that originally learned about the route
+ holddown timer: For a given period, this causes the router to ignore any updates with poorer metrics to a lost network

9

Drag and drop the DHCP client states from the left into the standard order in which the client passes through them on the right.

rebinding
binding
initializing
renewing
selecting
requesting

initializing – first
selecting – second
requesting – third
binding – fourth
renewing – fifth
rebinding – sixth

10

Drag drop about QoS.

+ Committed Access Rate (CAR):
+ Best effort:
+ Soft QoS:
+ Hard QoS:
+ PBR:
+ NBAR:

service level that provides preferred handling

policies traffic based on its bandwidth allocation

service level that provides reserved network resources

service level that provides basic connectivity without differentiation

identification tool ideal for handling web applications

uses route maps to match traffic criteria

Answer:
+ CAR: policies traffic based on its bandwidth allocation
+ Best effort: service level that provides basic connectivity without differentiation
+ Soft QoS: service level that provides preferred handling
+ Hard QoS: service level that provides reserved network resources
+ PBR: uses route maps to match traffic criteria
+ NBAR: identification tool ideal for handling web applications

Note:
+ Committed Access Rate (CAR)
+ Network-based application recognition (NBAR)
+ Policy-based routing (PBR)
+ Soft QoS: also known as Differentiated Services (Diffserv), which ensures resources for applications based on available bandwidth
+ Hard QoS: Differentiated Service (DiffServ) is an appropriate example for this type of QoS service

11

Drag the options below unto the planes they operate
Control Plane and Data Plane

1. QoS
2. Filtering
3. Routing state exchange
4. Establishes telnet session
5. Device access
6. Data Encapsulation

Control Plane:
3. Routing state exchange
4. Establishes telnet session
5. Device access

Data Plane:
1. QoS
2. Filtering
6. Data Encapsulation

12

Drag drop about BGP

iBGP
eBGP
Prefix
Private AS range
Public AS range
Autonomous System

separate network operating within one administrative domain

relationship between peers in same autonomous system

block of IP addresses

relationship between peers in different autonomous system

Value between 1 and 64,511

Value between 64,512 and 65,535

iBGP relationship between peers in same autonomous system
eBGP relationship between peers in different autonomous system
Prefix block of IP addresses
Private AS range Value between 64,512 and 65,535
Public AS range Value between 1 and 64,511
Autonomous System separate network operating within one administrative domain

13

Drag and Drop on Wireless LAN Controller

+ Dynamic RF Feature:
+ Easy Deployment Process:
+ Optimized user performance:
+ Easy upgrade process:

Controller provides centralized management of users and VLANs

Access points auto adjust signal strength

Controller uses loadbalancing to maximize throughput

Controller image auto deployed to access Points

+ Dynamic RF Feature: Access points auto adjust signal strength
+ Easy Deployment Process: Controller provides centralized management of users and VLANs
+ Optimized user performance: Controller uses loadbalancing to maximize throughput
+ Easy upgrade process: Controller image auto deployed to access Points

14

Drag and drop the PPPoE message types from the left into the sequence in which PPPoE messages are sent on the right.

PADO
PADR
PADI
PADS

1. PADI 2. PADO 3. PADR 4. PADS

15

Drag and drop the PPPoE packet type on the left to the corresponding description on the right.

+ PADI (PPPoE Active Discovery Initiation)
+ PADO (PPPoE Active Discovery Offer)
+ PADR (PPPoE Active Discovery Request)
+ PADS (PPPoE Active Discovery Session Confirmation)
+ PADT (PPPoE Active Discovery Termination)


– A packet that is sent to terminate the PPPoE session

– A packet that is sent with the destination_addr set to the broadcast address. The packet indicates the type of service requested.

– A packet that is sent from the PPPoE client with the destination_addr set to the chosen access concentrator. The packet contains a session request from the client

– A packet that is sent as confirmation to the client. The packet contains the unique PPPoE session ID

– A packet that is sent with the destination_addr set to the unicast address of the PPPoE client. The packet contains an offer for the client

+ PADI – A packet that is sent with the destination_addr set to the broadcast address. The packet indicates the type of service requested.
+ PADO – A packet that is sent with the destination_addr set to the unicast address of the PPPoE client. The packet contains an offer for the client
+ PADR – A packet that is sent from the PPPoE client with the destination_addr set to the chosen access concentrator. The packet contains a session request from the client
+ PADS – A packet that is sent as confirmation to the client. The packet contains the unique PPPoE session ID
+ PADT – A packet that is sent to terminate the PPPoE session.

16

Drag and Drop on MAC addresses.

+ Dynamic MAC address:
+ MAC ACL: + MAC address table:
+ MAC learning:
+ MAC aging:
+ Static MAC:

adding a previously unknown MAC into the address table

associates a learned MAC address with its connected interface

removing an inactive MAC after a specified time

MAC that is learned by the switch through normal traffic

feature that determines whether incoming traffic will be allowed

MAC address that remains in the MAC address table after reboot

+ Dynamic MAC address: MAC that is learned by the switch through normal traffic
+ MAC ACL: feature that determines whether incoming traffic will be allowed
+ MAC address table: associates a learned MAC address with its connected interface
+ MAC learning: adding a previously unknown MAC into the address table
+ MAC aging: removing an inactive MAC after a specified time
+ Static MAC: MAC address that remains in the MAC address table after reboot

17

Drag and drop the IPv6 addresses from the left onto the correct types on the right

+ Modified EUI-64:
+ multicast:
+ unicast:
+ unspecified:

- 2020:10D8:0:0:85:800:52:7348
- FF01::1
- DB:FC:93:FF:FE:D8:05:0A
- ::

+ Modified EUI-64: DB:FC:93:FF:FE:D8:05:0A
+ multicast: FF01::1
+ unicast: 2020:10D8:0:0:85:800:52:7348
+ unspecified: ::

18

Below lists some reserved and well-known IPv6 multicast address in the reserved multicast address range: match

FF01::1
FF01::2
FF02::1
FF02::2
FF02::5
FF02::6
FF02::9
FF02::A
FF02::D
FF02::1:2
FF05::2
FF02::1:FF00:0/104

All DHCPv6 agents (servers and relays) within the link-local scope

All EIGRP routers within the link-local scope

IPv6 solicited-node multicast address within the link-local scope

All OSPFv3 routers within the link-local scope

All IPv6 nodes within the node-local scope

All EIGRP routers within the link-local scope

All RIPng routers within the link-local scope

All IPv6 nodes within the link-local scope

All IPv6 routers within the node-local scope

All IPv6 routers within the link-local scope

All IPv6 routers within the site-local scope

All PIM routers within the link-local scope

All OSPFv3 designated routers within the link-local scope



FF01::1 All IPv6 nodes within the node-local scope
FF01::2 All IPv6 routers within the node-local scope
FF02::1 All IPv6 nodes within the link-local scope
FF02::2 All IPv6 routers within the link-local scope
FF02::5 All OSPFv3 routers within the link-local scope
FF02::6 All OSPFv3 designated routers within the link-local scope
FF02::9 All RIPng routers within the link-local scope
FF02::A All EIGRP routers within the link-local scope
FF02::D All PIM routers within the link-local scope
FF02::1:2 All DHCPv6 agents (servers and relays) within the link-local scope
FF05::2 All IPv6 routers within the site-local scope
FF02::1:FF00:0/104 IPv6 solicited-node multicast address within the link-local scope

19

Arrange in the order of creation of GRE tunnel

Step 1:
Step 2:
Step 3:
Step 4:

Specify passenger protocol (IPv4 or IPv6)
Specify carrier protocol (like tunnel GRE)
Add source and destination on tunnel interface
Create tunnel interface

Answer:
Step 1: Create tunnel interface
Step 2: Specify carrier protocol (like tunnel GRE)
Step 3: Specify passenger protocol (IPv4 or IPv6)
Step 4: Add source and destination on tunnel interface

20

Drag drop about DNS related commands.

+ ip dns-server:
+ ip domain list:
+ ip domain lookup:
+ ip domain name:
+ ip host:
+ ip name-server:


specifies the default domain to append to unqualified host name.
identified a DNS server to provide lookup service
enable dns lookup
enable the DNS server on the device
statically map on ip address to host name
specifies a sequence of domain names.

+ ip dns-server: enable the DNS server on the device
+ ip domain list: specifies a sequence of domain names.
+ ip domain lookup: enable dns lookup
+ ip domain name: specifies the default domain to append to unqualified host name.
+ ip host: statically map on ip address to host name
+ ip name-server: identified a DNS server to provide lookup service

21

Drag drop about STP port roles.

+ alternate:
+ designated:
+ disable:
+ root:

port that is excluded from the spanning-tree process
path to the root bridge that excludes the root port
elect port for an individual LAN segment
elected port for the spanning tree topology as a whole

+ alternate: path to the root bridge that excludes the root port
+ designated: elect port for an individual LAN segment
+ disable: port that is excluded from the spanning-tree process
+ root: elected port for the spanning tree topology as a whole

22

Drag drop about DNS services

+ cache:
+ DNS:
+ no ip domain-lookup:
+ name resolver:
+ domain:

in response to client requests, queries a name server for IP address information

component of a URL that indicates the location or organization type, such as .com or .edu

service that maps hostnames to IP addresses

local database of address mappings that improves name-resolution performance

disables DNS services on a Cisco device

+ cache: local database of address mappings that improves name-resolution performance
+ DNS: service that maps hostnames to IP addresses
+ no ip domain-lookup: disables DNS services on a Cisco device
+ name resolver: in response to client requests, queries a name server for IP address information
+ domain: component of a URL that indicates the location or organization type, such as .com or .edu

23

Drag drop about SDN

+ HTTPS:
+ JSON:
+ OpenFlow:
+ RBAC:
+ REST:

token-based security mechanism

data-structure format that passes parameters for API calls

call to the APIC-EM API from a library

southbound API

northbound API

+ HTTPS: call to the APIC-EM API from a library
+ JSON: data-structure format that passes parameters for API calls
+ OpenFlow: southbound API
+ RBAC: token-based security mechanism
+ REST: northbound API

24

Drag drop about RADIUS & TACACS+

RADIUS:

TACACS:

+ Multi-vendors
+ Proprietary
+ Encrypts the entire body
+ Combines authentication and authorization
+ Encrypts only the password
+ UDP
+ Separate AAA
+ TCP

RADIUS:
+ Multi-vendors
+ UDP
+ Combines authentication and authorization
+ Encrypts only the password

TACACS+:
+ Proprietary
+ Separate AAA
+ Encrypts the entire body
+ TCP

25

Drag and drop the CSMA components from the left onto the correct descriptions on the right

+ 1-persistent:
+ CSMA/CA:
+ CSMA/CD:
+ O-peristent:
+ P-persistent:

Access mode used in the controlled area network

Rules that define the system response when a collision occurs on an Ethernet network

Access mode used for Ethernet network

Rules that define the system response when a collision occurs on a Wi-fi network

Access mode used for Wi-fi networks

+ 1-persistent: Access mode used for Ethernet network
+ CSMA/CA: Rules that define the system response when a collision occurs on a Wi-fi network
+ CSMA/CD: Rules that define the system response when a collision occurs on an Ethernet network
+ O-peristent: Access mode used in the controlled area network
+ P-persistent: Access mode used for Wi-fi networks