Term
These are the set of rules and algorithms used by routers with the purpose of learning neighbor routes. |
|
Definition
|
|
Term
It is a routing protocol that only runs in one autonomous system. |
|
Definition
|
|
Term
It is a routing protocol that runs in multiple different autonomous systems. |
|
Definition
|
|
Term
________________ transmit the whole routing table to their directly connected neighbors after a specific period. |
|
Definition
Distance Vector Routing Protocols |
|
|
Term
Routing Information Protocol Version 1 (RIPv1), Routing Information Version 2 and Interior Gateway Routing Protocol (IGRP) are examples of _____________. |
|
Definition
Distance Vector Routing Protocols |
|
|
Term
________ uses the information received from the neighbors to construct a map of the network. Adjacencies are formed with the neighbor routers that run the same protocol and information is sent to the adjacent routers. |
|
Definition
|
|
Term
Open Shortest Path First (OSPF), Intermediate System-to-Intermediate System (IS-IS) are example of ________________. |
|
Definition
|
|
Term
These protocols have features of both distance vector and link state protocols. |
|
Definition
|
|
Term
What type of routing protocol is EIGRP? |
|
Definition
|
|
Term
What type of routing protocol is BGP? |
|
Definition
|
|
Term
This is a technique used by the routing protocols to prevent routing loops. The main principle behind this protocol is that an interface will not forward routing information to an interface from which the same information was received. This technology can create problems in a hub-and-spoke topology and may need to be disabled. |
|
Definition
|
|
Term
When a route fails the router running distance vector protocol advertises the failed route with an infinite metric in order to make that route unreachable. What is this called? |
|
Definition
|
|
Term
What is the infinity metric in RIP? |
|
Definition
|
|
Term
In case of ______________ the route that has failed or down can be forwarded from the same interface from which it was received. |
|
Definition
|
|
Term
It does not wait for the periodic update in case the route fails but it initiates the update as soon the route is down or unreachable. |
|
Definition
|
|
Term
This timer tells the router to ignore the information about the failed route for a specific time called the holddown time. The main reason behind it is that when a route fails routers do not disclose this information to other routers instantly. Instead, they give other routers time so that everyone in the network knows about the failed route. |
|
Definition
|
|
Term
There can be different routing protocols used in a network. For example if there is a merger between two companies one company is running RIP and other is running OSPF. IOS chooses the best route in this case on the basis of ________________. |
|
Definition
|
|
Term
Every routing protocol has an administrative distance, the _________ the better. |
|
Definition
|
|
Term
What is the administrative distance of a directly connected route? |
|
Definition
|
|
Term
What is the administrative distance of a static route? |
|
Definition
|
|
Term
What is the administrative distance of a BGP(External route)? |
|
Definition
|
|
Term
What is the administrative distance of a EIGRP (internal route)? |
|
Definition
|
|
Term
What is the administrative distance of a IGRP route? |
|
Definition
|
|
Term
What is the administrative distance of a OSPF route? |
|
Definition
|
|
Term
What is the administrative distance of a IS-IS route? |
|
Definition
|
|
Term
What is the administrative distance of a RIP route? |
|
Definition
|
|
Term
What is the administrative distance of a EIGRP (External route)? |
|
Definition
|
|
Term
What is the administrative distance of a BGP (Internal route)? |
|
Definition
|
|
Term
What is the administrative distance of an unreachable route? |
|
Definition
|
|
Term
At what interval are broadcast "hello" messages sent? |
|
Definition
|
|
Term
Examples of ____________ routing protocols are RIPv1 and IGRP. |
|
Definition
|
|
Term
Examples of ________ routing protocols are OSPF and RIPv2. |
|
Definition
|
|
Term
Classful routing protocols use the feature of _______________ while sending the routing updates across the network boundary. |
|
Definition
|
|
Term
__________ routing protocols send the subnet mask information in their routing updates. |
|
Definition
|
|
Term
In _______ hello packets are used to form neighbor relationships. It uses the Dijkstra algorithm to produce shortest path tree for each destination. |
|
Definition
|
|
Term
OPSF uses the multicast address _____________ to send hello SPF (Shortest Path First) packers to routers running OSPF |
|
Definition
|
|
Term
OSPF uses the multicast address of _________ to send hello to the Designated Router (DR) and the Backup Designated Router. |
|
Definition
|
|
Term
OSPF uses the concept of___________. It is a 32 bit decimal identifier. |
|
Definition
|
|
Term
What are the five types of OSPF messages encapsulated in IP packets? |
|
Definition
1) Hello 2) Database Description 3) Link State Request 4) Link State Update 5) Link State Acknowledgement |
|
|
Term
This OSPF packet is used to discover neighbors. |
|
Definition
|
|
Term
This packet is used for database synchronization between routers. |
|
Definition
Database Description (DD or DBD): |
|
|
Term
This packet is sent by the router to its neighbors to request more details about the LSAs. |
|
Definition
|
|
Term
This packet is sent by the router to whom the LSR is sent. It contains more detailed information about the LSA contained in the LSR. |
|
Definition
|
|
Term
This packet is sent to confirm that the LSU message has been received. |
|
Definition
Link State Acknowledgement (LSAck) |
|
|
Term
Router R2 receives the multicast address and the router R1 as its neighbor. This is the _____________. |
|
Definition
|
|
Term
R2 sends a unicast response via hello packet to router R1. Router R1 receives the Hello packet and sees its name is listed in the unicast hello packet. It knows that now it has a two way neighbor relationship with Router R2. This is called as _________________. |
|
Definition
|
|
Term
After the DR and BDR are elected and they both form adjacency with each router on the segment a master-slave relationship is formed. The master is elected on the basis of the highest router ID. This is the ______________. |
|
Definition
|
|
Term
The master and slave routers now exchange Database Description packets. This state represents the _______________. |
|
Definition
|
|
Term
Routers exchange the DBD and see if the DBD contains newer information of the network. It sends an LSR to the routers that has sent the DBD. The router updates the LSR sending router with a LSU which is then acknowledges by the LSU receiving router. This state is called as ______________. |
|
Definition
|
|
Term
After the routers have exchanges the DBD the finally go to the _____________. |
|
Definition
|
|
Term
Issuing the ________________ command in the global mode takes us to the OSPF configuration mode. |
|
Definition
|
|
Term
Issue the ____________ subcommand for configuring the router ID. |
|
Definition
|
|
Term
Configure the network that need to run OSPF with the ______________ command. |
|
Definition
network ip-address wildcard-mask area area-id |
|
|
Term
What OSPF command allows you to change the hello interval? |
|
Definition
ip ospf hello-interval time |
|
|
Term
To change the OSPF network type, issue the _______________ interface level command. |
|
Definition
ip ospf network [network_type] |
|
|
Term
The default OSPF network type on a multipoint Frame-Relay interfaces is _______________. |
|
Definition
|
|
Term
the OSPF election does not support __________. This means that once a device is elected the DR no other device may assumes this status unless the DR goes down. |
|
Definition
|
|
Term
This also implies that the only way to ensure that a device is elected as the DR is to remove all other devices from the election process by setting their priority to __. |
|
Definition
|
|
Term
OSPF supports both clear text and ________ authentication. |
|
Definition
|
|
Term
To enable OSPF area authentication, issue the routing process subcommand ______________. |
|
Definition
area 0 authentication [message-digest] |
|
|
Term
What does EIGRP stand for? |
|
Definition
Enhanced Interior Gateway Routing Protocol |
|
|
Term
What multicast address is used by EIGRP to send hello packets? |
|
Definition
|
|
Term
This EIGRP packet is used to send routing updates. This packet requires acknowledgement |
|
Definition
|
|
Term
This EIGRP packet is used to establish neighbor relationships. |
|
Definition
|
|
Term
This EIGRP packet queries neighbors about routing information. This packet also requires acknowledgement. |
|
Definition
|
|
Term
With this packet EIGRP replies to queries. This packet also requires acknowledgement. |
|
Definition
|
|
Term
This EIGRP packet is used to acknowledge reliable packets. |
|
Definition
|
|
Term
EIGRP uses ___________ Protocol to send EIGRP multicast updates. |
|
Definition
|
|
Term
What three tables does EIGRP build? |
|
Definition
Neighbor table, topology table and IP routing table. |
|
|
Term
_____________ keep the information of the states of neighbors. |
|
Definition
|
|
Term
What command will allow us to see the EIGRP neighbor table? |
|
Definition
|
|
Term
EIGRP ___________ table contains all routes in the network. It contains the best path as well as the worst path. |
|
Definition
|
|
Term
On the basis of __________ EIGRP chooses the best possible routes to a network these routes form the IP routing table. |
|
Definition
|
|
Term
The 5 metric values used in EIGRP are: |
|
Definition
Bandwidth Delay Reliability Load MTU |
|
|
Term
As the update received in the EIGRP contains the metric of the route forwarder i.e. the router that send the route. Thus receiving router can calculate the metric of the sending neighbor router which is called as the _____________. |
|
Definition
|
|
Term
In the routing table the route that is the best route to reach a particular network among the all available routes is called as the ______________. |
|
Definition
|
|
Term
The route that contains the best feasible distance is called as the ______________. |
|
Definition
|
|
Term
The routes that are the second best match to the destination are called the _____________ they are used to as the best path in case the successor route fails. |
|
Definition
|
|
Term
This ICMP message specifies to the host that there is problem in the delivery of packet. |
|
Definition
|
|
Term
This ICMP message specifies that the time intended for the packet to be delivered to the destination has been expired. |
|
Definition
|
|
Term
This ICMP message specifies to the sender that there is a best path available to send packet to the destination. |
|
Definition
|
|
Term
These messages are used by the ping command to verify connectivity. |
|
Definition
Echo Request and Echo Reply |
|
|
Term
What additional capabilities does extended ping have? |
|
Definition
In this we can even specify the source IP address and the destination IP address |
|
|
Term
With the help of the ___________ command we can know the exact place from where the network connectivity is broken. |
|
Definition
|
|
Term
___________ is a method to access remote devices from a host. |
|
Definition
|
|
Term
This command displays the various interfaces on which EIGRP is running. |
|
Definition
|
|
Term
This command displays the contents configured with the network command. |
|
Definition
|
|
Term
This command displays the various interfaces on which EIGRP is running. |
|
Definition
Sh ip eigrp interface brief |
|
|
Term
This command displays the neighbors running EIGRP and their state. |
|
Definition
|
|
Term
For checking any authentication problems in the network or if EIGRP routers are not becoming neighbors due to authentication problem issue ________________ command. |
|
Definition
|
|
Term
To check neighbor relationship problems in OSPF the most important command is ______________. |
|
Definition
|
|
Term
To check the router‘s memory size and IOS image issue the command ____________. |
|
Definition
|
|
Term
This command displays various processes that are running on the Cisco router. |
|
Definition
|
|
Term
This command displays the routers memory statistics. |
|
Definition
|
|
Term
This command displays the buffer pools on the router. |
|
Definition
|
|
Term
This command monitors the stack use of the processors and interrupt routines. |
|
Definition
|
|
Term
This command displays the active configuration of the router. |
|
Definition
|
|
Term
This command displays the configuration stored in the router. |
|
Definition
|
|
Term
This command display the hardware interface on the router and their status. |
|
Definition
|
|
Term
It is recommended to use the ___________ command as it is much more secure than the enable password command. |
|
Definition
|
|
Term
If the password is encrypted no one will be able to see the actual password in the configuration output. This is done with the _______________ command. |
|
Definition
service password encryption |
|
|
Term
Privilege level 1 is commonly referred to as ____________. |
|
Definition
|
|
Term
Privilege level 15 is commonly referred to as __________. |
|
Definition
|
|