Block 3 Highlights

studied byStudied by 53 people
5.0(1)
Get a hint
Hint

Switches use _______ ______ _______ ______ to build and maintain MAC address tables, which is used to help make forwarding decisions.

1 / 89

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

90 Terms

1

Switches use _______ ______ _______ ______ to build and maintain MAC address tables, which is used to help make forwarding decisions.

Application Specific Integrated Circuits (ASICs)

New cards
2

______ learn each connected physical device identified by a unique 48-bit MAC address and breaks up collision domains.

Switches

New cards
3

Each ____ on a switch is a separate collision domain.

Port

New cards
4

A ______ ______ is when devices share same bandwidth.

Collision domain

New cards
5

Hardware-based switching performance uses ______ to form multiple internal connections

ASICS

New cards
6

Which switching performance adjusts speed/bandwidth and interface may support up to 1GB bandwidth, but a device NIC may only support 100Mbps?

Wire speed

New cards
7

Which switching performance is fast?

Low latency

New cards
8

Which switching performance segment networks?

Broadcast control

New cards
9

Which external component allows local access to initially configure ‘blank’ switch?

Console Port

New cards
10

According to DoD policy the console port should be _______ protected

Password

New cards
11

Which layer 2 protocol establishes communication between two network devices without relying on any host or network system?

PPP (Point to Point)

New cards
12

______ layer protocol operates over a point-to-point link.

Data link

New cards
13

Which layer 2 protocol prevent loops in Ethernet networks to maintain a loop-free topology and ensures efficient and reliable data transmission.

Spanning Tree Protocol (STP)

New cards
14

The Spanning Tree Protocol is standardized by IEEE _____.

802.1D

New cards
15

The Spanning Tree Protocol is layer ____ switching loop-prevention protocol

2

New cards
16

What describes the switching method Store-and-Foward?

• Stores entire frame in memory and checks frame for errors.

• Error checking is done with CRC (Cyclic Redundancy Check).

• Frame is discarded if error is found.

• Ensures high level of error-free traffic.

New cards
17

Loops are _____ paths to the same direction

Multiple

New cards
18

Switches are ______ to other switches allowing multiple paths.

Connected

New cards
19

What are 3 things that loops can cause?

  1. Broadcast strorms

  2. Multiple frame copies

  3. Multiple loops

New cards
20

Loops can occur within loops consuming _______.

Bandwidth

New cards
21

Spanning Tree Protocol IEEE 802.1D used for _____ _______.

Loop avoidance

New cards
22

What is a logical grouping of network devices into a single broadcast domain?

VLAN

New cards
23

Communication between VLANs requires a _______ routing process.

Layer 3

New cards
24

Communication between VLANs requires a _______ routing process.

Layer 3

New cards
25

VLANs are created on a switch and can span _____ switches.

Multiple

New cards
26

Switches are configured with default _____ by manufactures.

VLAN 1

New cards
27

Ports must be assigned ________ to create VLANs

Membership

New cards
28

What is a trunk port or trunk link?

Connection that carries multiple VLANs

New cards
29

VLAN ____ are applied to frames identifying individual VLANs

Tags

New cards
30

What does the IEEE 802.1q do?

Encapsulates and tags a VLAN frame by utilizing existing space in a data frame header

New cards
31

What is open standard VLAN trunking?

IEEE 802.1q

New cards
32

Unused ports should be shut down and assigned to an ______ VLAN

Inactive

New cards
33

All ports are assigned to VLAN 1 _________

Automatically

New cards
34

Ports should _____ be assigned to the default VLAN on any network for security.

Never

New cards
35

What is the Management VLAN used for?

Telnet, SSH, SNMP, and Syslog

New cards
36

The management VLAN should never be assigned to VLAN __

1

New cards
37

What forwards IP packets between networks using IP address?

Routers

New cards
38

Routers operate at what layer of the OSI model?

Network (Layer 3)

New cards
39

Routers connect ___ or more lines from different networks

Two

New cards
40

When routers connect two or more lines from different networks, the connections form a ________.

Internetwork

New cards
41

_______ refers to taking a packet from one device on one network and sending it to another device on a different network.

Routing

New cards
42

_____ _____ allows configuration using a modem. (often disabled due to its inherent security risk)

Auxiliary Port

New cards
43

____ interfaces used for WAN connections

Serial

New cards
44

_____ interfaces used for LAN connections

Ethernet

New cards
45

______ _____ stores the startup configuration and loads it into RAM

Non-Volatile(NVRAM)

New cards
46

Non-Volatile means it will hold informations even with __ power

No

New cards
47

_____ contains running configuration and is used for operations

RAM

New cards
48

______ ______ routers serves as an access point to and from a specific subnet or network

Default Gateway

New cards
49

IP is a ____ _____

Routed protocol

New cards
50

IP provides _________ best effort delivery of packets

Connectionless

New cards
51

IP provides ________ and _______ of packets if necessary

Fragmentation and reassembly

New cards
52

What is the ICMP?

Internet Control Message Protocol

New cards
53

The ICMP can be used to ______ packets for destination arrival

Monitor

New cards
54

ICMP examples include :

  1. Destination Unreachable

  2. Time Exceeded

  3. Router Advertisement

  4. Echo Request and Echo Reply known as Packet Internet Groper (PING)

New cards
55

What are routing protocols?

Protocols responsible for path determination and packet switching

New cards
56

Routing Protocols are used by networks to learn about _____ and calculate best path

Networks

New cards
57

Routers may know about the same path from ______ sources

Different

New cards
58

What is routing decisions?

Routers use routing tables to determine the best path. Routers populate their routing tables by learning paths to network

destinations. The paths can be learned from static routes, default routes or dynamic routes.

New cards
59

Path with lowest Administrative Distance (AD) is chosen when it knows about the ____ ____ destination from one or more routing sources.

Same exact

New cards
60

The lower the (AD) Metric the more ______ the route.

Trustworthy

New cards
61

_____ _____ are manually configured by system administrator

Static routes

New cards
62

What are the characteristics of a Default Route?

  1. Type of static route

  2. Used by router if no path to destination is known

  3. Also known as the ‘Gateway of Last Resort’

  4. Gives all traffic a path out of router

New cards
63

Routing algorithms use _____ to determine best route

Metrics

New cards
64

The Path Length routing algorithm is the ____ _____ ____ _____.

Most relied upon metric

New cards
65

In the Path Length routing algorithm, cost is calculated as the sum of all ____ associated with each link traversed

Costs

New cards
66

____ ____ is the number of Internet working devices from source to destination

Hop Count

New cards
67

What is the definition of the routing algorithm Reliability?

Up time

New cards
68

What is the definition of the routing algorithm Delay?

Length of time required to move packet from source to location

New cards
69

What is the definition of the routing algorithm Bandwidth?

Available capacity of link.(More bandwidth may not be the better path if link is at capacity)

New cards
70

What is the definition of the routing algorithm Load?

Degree to which a network resource is busy

New cards
71

RIPv2 allows _______ length subnet masking

Variable

New cards
72

In the Routing Information Protocol (Distance Vector), The metric hop count is limited to ___ hops.

15

New cards
73

The Border Gateway Protocol(BGP) exchanges routing information between _________ systems

Autonomous

New cards
74

The only purpose of the core layer is to _______ large amounts of traffic quickly and reliably.

Transport

New cards
75

The Spanning Tree Protocol is layer ____ switching loop-prevention protocol

2

New cards
76

What are the characteristics of the design considerations Speed?

  1. Core layers are designed with speed in mind

  2. Don’t slow down traffic such as applying access control lists, routing, and packet filtering when possible

New cards
77

What is the primary function of the Distribution Layer?

Providing routing, filtering, WAN access and determining how packets can access the core layer.

New cards
78

The distribution layer is the place to _______ polices for your network

Implement

New cards
79

The access layer is the _______ _____ and includes hubs and switches to connect nodes such as workstations and other end-user devices to the network.

Aggregation point

New cards
80

What are the functions in Client Connections?

  1. Shared bandwidth devices

  2. Switched bandwidth devices

  3. Layer 2 functions such as VLAN membership

  4. Traffic filtering based on MAC

New cards
81

What are the 3 device layers?

  1. Core layer

  2. Distribution layer

  3. Access layer

New cards
82

A Subnet is a network within a ______

Network

New cards
83

What are two characteristics of a Subnet?

  1. Logical division of a network of connected devices based on the IP address

  2. Separate and identifiable portion of an orginization network

New cards
84

What are the 3 parts of an IP address?

Network portion, Subnet mask, Host portion

New cards
85

_______ is when the networking portion borrows bits from the host portion

Subnetting

New cards
86

Provides most available subnets because class __ has more host bits to borrow from

A

New cards
87

Variable Length Subnet Masking(VLSM) is used when _______ a network(Based on network needs)

Subnetting

New cards
88

Any one subnet can be _____ _____ into further subnets

Broken down

New cards
89

______ ______ ______ ______ allows efficient use of IP addressing by allowing each subnet to have a different number of host, depending on their requirements.

Variable Length Subnet Masking

New cards
90

Variable Length Subnet Masking results in ______ the number of wasted addresses

Reducing

New cards

Explore top notes

note Note
studied byStudied by 58 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(2)
note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
4.0(1)
note Note
studied byStudied by 8118 people
... ago
4.8(53)

Explore top flashcards

flashcards Flashcard (200)
studied byStudied by 30 people
... ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 72 people
... ago
5.0(3)
flashcards Flashcard (38)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 21 people
... ago
5.0(2)
flashcards Flashcard (33)
studied byStudied by 3 people
... ago
5.0(1)
robot