Presentation is loading. Please wait.

Presentation is loading. Please wait.

What are the two types of routes used by network administrators?

Similar presentations


Presentation on theme: "What are the two types of routes used by network administrators?"— Presentation transcript:

1 What are the two types of routes used by network administrators?
Static Dynamic What are default routes used for? Default routes are special kind of static routes used to route packets with destinations that do not match any of the other routes in the routing table.

2 What are the two classes of routing protocol?
Distance Vector Link State Give one example of Link State routing protocol? Open Shortest Path First.

3 List three examples of distance vector routing protocol?
RIP IGRP EIGRP What is the maximum hop count used by RIP? 15

4 What does EIGRP stand for?
Enhanced interior gateway routing protocol What does RIP stand for? Routing information protocol

5 What does IGRP stand for?
Interior gateway routing protocol What are the default metrics used by EIGRP? Bandwidth delay

6 What is the default metrics used by RIP?
Hop count What are the default metrics used by IGRP? Bandwidth delay

7 How often does RIP updates its routing information?
30 seconds How often does IGRP updates its routing protocol? 90 seconds

8 List the advantages of link-state routing
Fast convergence Robustness against routing loops Router knows the topology Packets are sequenced and aged Database size can be minimised with careful design

9 List the disadvantages of link-state routing
Significant demands on memory and processing resources Requires strict network design Requires knowledgeable network administrator Initial flooding can impede network performance

10 Define routed protocol
Routed protocol is used to direct user traffics Define routing protocol Routing protocol is used for communication between routers

11 Name 4 examples of routing protocols
RIP IGRP EIGRP OSPF Name 2 examples of routed protocol IP IPX Apple Talk

12 What is the command used to save running-configuration file to startup-configuration file?
Copy running-configuration startup-configuration

13 Name and describe the 2 basic functions of a router
Path determination enables a router to evaluate the paths to a destination and to establish the preferred handling of a packet Switching internal process used by a router to accept a packet on one interface and forward it to a second interface on the same router

14 What are the four attributes that can be obtained from the CISCO filename?
Hardware platform Feature sets File format Version number

15 What does ICMP stand for?
Internet Control Message Protocol Which protocol is an error reporting protocol for IP? ICMP

16 Name and describe the two classes of routing protocol?
Distance vector determines the direction (vector) and distance to any link in the internetwork Link state recreates the exact topology of the entire internetwork

17 State and describe the two level of access for router
user EXEC Allow user to view configuration of router privileged EXEC Allow user to change configuration of router

18 State and describe the two protocols used in the transport layer
TCP Connection-oriented reliable protocol UDP Connectionless unreliable protocol

19 State the reserved port number for the following applications:
DNS 53 HTTP 80 FTP 21 SNMP 161 SMTP 25 TFTP 69 telnet 23

20 What are the 3 commands used for network troubleshooting and which layers that operate on?
Traceroute network layer telnet application layer Ping network layer

21 Name 4 common internal components of a router
RAM NVRAM Flash ROM

22 CLI What are the 3 stages of the router boot up sequence
Check Hardware Find and load IOS image file Find and apply configuration file

23 WAN List the main difference between LAN and WAN
LAN connected devices within the same building while WAN connect devices across large geographical areas. Name 4 common devices used in WAN Router Switch Communication server modem

24 WAN Name any two organizations that define and manage WAN standards.
International Telecommunication Union-Telecommunication Standardization Sector (ITU-T), International Organization for Standardization (ISO). Internet Engineering Task Force (IETF). Electronic Industries Association (EIA).

25 WAN List 2 WAN protocol used in the data link layer Frame relay ISDN
PPP HDLC

26 Router Fundamentals What memory is used to store RAM NVRAM
Running-configuration Startup-configuration IOS image file RAM NVRAM Flash memory

27 Router Fundamentals Which internal memory of a router loses its contents when the router is turned off? RAM Which 2 internal memory of the router retain its content when power is turned off? NVRAM ROM

28 Router Fundamentals What are the 2 types of management ports commonly found in a router? Console port Auxiliary port List the 2 main functions of the management ports. Configuration troubleshooting

29 CLI What are the 2 level of access in the CLI command User EXEC
Privileged EXEC What is the maximum size of the command history buffer? 256 What is the default size of the command history buffer? 10

30 CLI List the key stroke for the various IOS command line editing commands: Move cursor to beginning of line Move cursor back 1 character Move cursor to end of line Move cursor forward 1 character Move back 1 word Move forward 1 word Ctrl-a Ctrl-b Ctrl-e Ctrl-f Esc-b Esc-f

31 IP address How many bits are there in an IP address? 32
How many bits are there in an subnet mask? What are the 2 parts of an IP address? Host ID Network ID

32 IP address What is the maximum numbers of bits that can be borrowed from a class C IP address for subnetting? 6 What is the default subnet mask for a class C IP address? What is the range of a class C IP address? hhh to hhh

33 IP address What is the maximum numbers of bits that can be borrowed from a class B IP address for subnetting? 14 What is the default subnet mask for a class B IP address? What is the range of a class B IP address? hhh.hhh to hhh.hhh

34 IP address What is the maximum numbers of bits that can be borrowed from a class A IP address for subnetting? 22 What is the default subnet mask for a class A IP address? What is the range of a class A IP address? 001.hhh.hhh.hhh to 127.hhh.hhh.hhh

35 CDP Device configure with CDP sent out periodic messages. What are these messages known as? Advertisements List any 2 information that can be obtained from device configured with CDP. Device type connected Interface used to make the connection Interface devices are connected to Model numbers of devices

36 CDP What are the 3 common commands used for troubleshooting of network connectivity issue? telnet Ping traceroute Write the command used to connect to a remote router telnet

37 CDP What are the tasks perform by the POST during router’s startup?
The router executes diagnostics from ROM on all hardware modules. These diagnostics verify the basic operation of the CPU, memory, and network interface ports.

38 CLI Complete the following CLI command to configure a fastethernet interface F0 with IP address /24. Router> _________ ; privileged mode Router# ____________ ;global configuration mode Router(config)# __________ ;interface configuration mode Router(config-if)# _________________________________ Router(config-if)# ___________ ;enable interface Router(config-if)# ____ ;back to global configuration mode Router(config)# _____ ; back to privileged mode Router# enable config terminal interface F0 ip address no shutdown exit exit

39 CLI Complete the following CLI command to configure a serial interface S0 with IP address /16. Router> _________ ; privileged mode Router# ____________ ;global configuration mode Router(config)# __________ ;interface configuration mode Router(config-if)# _____________________________ Router(config-if)# _______________ ;set clock Router(config-if)# ____________;enable interface Router(config-if)# ____ ;back to global configuration mode Router(config)# _____ ; back to privileged mode Router# enable config terminal interface S0 ip address clock rate 56000 no shutdown exit exit

40 Complete the following CLI command to change the router name.
Router> _________ ; privileged mode Router# ____________ ;global configuration mode Router(config)# _____________ ;change hostname GAD(config)# ____________ enable config terminal hostname GAD

41 Complete the following CLI command to set the console password.
GAD> _________ ; privileged mode GAD# ________________ ;global configuration mode GAD(config)# _____________ ;enter line config mode GAD(config-line)# ____________; set password GAD(config-line)# ______; enable passwordchecking enable config terminal line con 0 password cisco login

42 Complete the following CLI command to set the vty password.
GAD> _________ ; privileged mode GAD# ________________ ;global configuration mode GAD(config)# _____________ ;enter line config mode GAD(config-line)# ____________; set password GAD(config-line)# ______; enable password checking enable config terminal line vty 0 4 password class login

43 Complete the following CLI command to set the enable and secret passwords.
GAD> _________ ; privileged mode GAD# ________________ ;global configuration mode GAD(config)# _________________ ;set enable password GAD(config)# __________________; set secret password enable config terminal enable password second enable secret first

44 IP address Given a class C network address , you are required to create 10 different subnets. Determine the following: How many bits are needed for subnetting? 4 bits How many useable host does each subnet has? 14 What is the subnet mask for the subnets?

45 What are the ranges of the Standard and Extended ACL?
Explain what is an ACL ACLs are lists of conditions that are applied to traffic traveling across a router's interface. What are the ranges of the Standard and Extended ACL? Standard – 1 to 99 Extended – 100 to 199

46 What is the technique used to distribute load between two or more computers?
Load balancing What hardware connects to a network to provide maximum network security? firewall

47 What are the advantages of named ACL as compared to standard or extended ACL?
Intuitively identify an ACL using an alphanumeric name. Eliminate the limit of 798 simple and 799 extended ACLs provide the ability to modify ACLs without deleting and then reconfiguring them

48 Write the ACL to deny a specific host 192.168.17.3
Router(config)# access-list 1 deny Write the ACL command to permit hosts from network Router(config)# access-list 1 permit

49 Write the ACL command to deny hosts from 192.168.7.0 network
Router(config)# access-list 1 deny Assign access-list 1 to the fastethernet interface FA0/0 Router(config)# interface FA0/0 Router(config-if)# ip access-group 1 in

50 Router Serial S0 Serial S1 Fastethernet F0 Apple - Orange Pear Pear S1 S0 F0 F0 S1 S0 Orange Apple

51 Pear(config)# router rip Pear(config-router)# network 192.168.16.0
Serial S0 Serial S1 Fastethernet F0 Apple - Orange Pear Pear(config)# router rip Pear(config-router)# network Pear(config-router)# network

52 Router Serial S0 Serial S1 Fastethernet F0 Alpha - Bravo Charlie Alpha S0 S1 F0 F0 S0 S0 Charlie Bravo

53 Alpha(config)# router rip Alpha(config-router)# network 172.17.0.0
Serial S0 Serial S1 Fastethernet F0 Alpha - Bravo Charlie Alpha(config)# router rip Alpha(config-router)# network Alpha(config-router)# network

54 Router Serial S0 Serial S1 Fastethernet F0 Central - East West East S0 S1 F0 F0 S1 S1 West Central

55 East(config)# router rip East(config-router)# network 192.168.15.0
Serial S0 Serial S1 Fastethernet F0 Central - East West East(config)# router rip East(config-router)# network East(config-router)# network

56 Router Serial S0 Serial S1 Fastethernet F0 First - Second Third First S1 S0 F0 F0 S0 S1 Third Second

57 First(config)# router rip First(config-router)# network 192.168.13.0
Serial S0 Serial S1 Fastethernet F0 First - Second Third First(config)# router rip First(config-router)# network First(config-router)# network

58 Complete the CLI to create a standard ACL to stop traffic from 192. 15
Complete the CLI to create a standard ACL to stop traffic from and allow all other traffic configure terminal Router# ___________________________ ; enter global configuration mode Router(config)# ___________________________________ ; commands for ACL Router(config)# __________________________________ ; commands for ACL access-list 1 deny access-list 1 permit any Complete the ACL below to assign the ACL to serial interface S0/0 in the inbound direction interface S0/0 Router(config)# _______________________ ; change to serial interface Router(config-if)# _________________________ ; assign ACL ip access-group 1 in

59 Complete the CLI to assign the ACL to fastethernet interface FA0/0
Complete the CLI to create a standard ACL to deny hosts from network but permit a specific host and permit any other hosts. configure terminal Router# ___________________________ ; enter global configuration mode Router(config)# __________________________________ ; commands for ACL access-list 1 permit access-list 1 deny access-list 1 permit any Complete the CLI to assign the ACL to fastethernet interface FA0/0 interface FA0/0 Router(config)# _______________________ ; change to fastethernet interface Router(config-if)# _________________________ ; assign ACL ip access-group 1 in

60 Complete the CLI to create a standard ACL to permit hosts from 172. 15
Complete the CLI to create a standard ACL to permit hosts from network but deny a specific host and deny hosts from all other network configure terminal Router# ___________________________ ; enter global configuration mode Router(config)# ___________________________________ ; commands for ACL Router(config)# __________________________________ ; commands for ACL access-list 1 deny access-list 1 permit access-list 1 deny any Complete the ACL below to assign the ACL to serial interface S0/0 in the outbound direction interface S0/0 Router(config)# _______________________ ; change to serial interface Router(config-if)# _________________________ ; assign ACL ip access-group 1 out


Download ppt "What are the two types of routes used by network administrators?"

Similar presentations


Ads by Google