Looks like no one added any tags here yet for you.
Switches use _______ ______ _______ ______ to build and maintain MAC address tables, which is used to help make forwarding decisions.
Application Specific Integrated Circuits (ASICs)
______ learn each connected physical device identified by a unique 48-bit MAC address and breaks up collision domains.
Switches
Each ____ on a switch is a separate collision domain.
Port
A ______ ______ is when devices share same bandwidth.
Collision domain
Hardware-based switching performance uses ______ to form multiple internal connections
ASICS
Which switching performance adjusts speed/bandwidth and interface may support up to 1GB bandwidth, but a device NIC may only support 100Mbps?
Wire speed
Which switching performance is fast?
Low latency
Which switching performance segment networks?
Broadcast control
Which external component allows local access to initially configure ‘blank’ switch?
Console Port
According to DoD policy the console port should be _______ protected
Password
Which layer 2 protocol establishes communication between two network devices without relying on any host or network system?
PPP (Point to Point)
______ layer protocol operates over a point-to-point link.
Data link
Which layer 2 protocol prevent loops in Ethernet networks to maintain a loop-free topology and ensures efficient and reliable data transmission.
Spanning Tree Protocol (STP)
The Spanning Tree Protocol is standardized by IEEE _____.
802.1D
The Spanning Tree Protocol is layer ____ switching loop-prevention protocol
2
What describes the switching method Store-and-Foward?
• Stores entire frame in memory and checks frame for errors.
• Error checking is done with CRC (Cyclic Redundancy Check).
• Frame is discarded if error is found.
• Ensures high level of error-free traffic.
Loops are _____ paths to the same direction
Multiple
Switches are ______ to other switches allowing multiple paths.
Connected
What are 3 things that loops can cause?
Broadcast strorms
Multiple frame copies
Multiple loops
Loops can occur within loops consuming _______.
Bandwidth
Spanning Tree Protocol IEEE 802.1D used for _____ _______.
Loop avoidance
What is a logical grouping of network devices into a single broadcast domain?
VLAN
Communication between VLANs requires a _______ routing process.
Layer 3
Communication between VLANs requires a _______ routing process.
Layer 3
VLANs are created on a switch and can span _____ switches.
Multiple
Switches are configured with default _____ by manufactures.
VLAN 1
Ports must be assigned ________ to create VLANs
Membership
What is a trunk port or trunk link?
Connection that carries multiple VLANs
VLAN ____ are applied to frames identifying individual VLANs
Tags
What does the IEEE 802.1q do?
Encapsulates and tags a VLAN frame by utilizing existing space in a data frame header
What is open standard VLAN trunking?
IEEE 802.1q
Unused ports should be shut down and assigned to an ______ VLAN
Inactive
All ports are assigned to VLAN 1 _________
Automatically
Ports should _____ be assigned to the default VLAN on any network for security.
Never
What is the Management VLAN used for?
Telnet, SSH, SNMP, and Syslog
The management VLAN should never be assigned to VLAN __
1
What forwards IP packets between networks using IP address?
Routers
Routers operate at what layer of the OSI model?
Network (Layer 3)
Routers connect ___ or more lines from different networks
Two
When routers connect two or more lines from different networks, the connections form a ________.
Internetwork
_______ refers to taking a packet from one device on one network and sending it to another device on a different network.
Routing
_____ _____ allows configuration using a modem. (often disabled due to its inherent security risk)
Auxiliary Port
____ interfaces used for WAN connections
Serial
_____ interfaces used for LAN connections
Ethernet
______ _____ stores the startup configuration and loads it into RAM
Non-Volatile(NVRAM)
Non-Volatile means it will hold informations even with __ power
No
_____ contains running configuration and is used for operations
RAM
______ ______ routers serves as an access point to and from a specific subnet or network
Default Gateway
IP is a ____ _____
Routed protocol
IP provides _________ best effort delivery of packets
Connectionless
IP provides ________ and _______ of packets if necessary
Fragmentation and reassembly
What is the ICMP?
Internet Control Message Protocol
The ICMP can be used to ______ packets for destination arrival
Monitor
ICMP examples include :
Destination Unreachable
Time Exceeded
Router Advertisement
Echo Request and Echo Reply known as Packet Internet Groper (PING)
What are routing protocols?
Protocols responsible for path determination and packet switching
Routing Protocols are used by networks to learn about _____ and calculate best path
Networks
Routers may know about the same path from ______ sources
Different
What is routing decisions?
Routers use routing tables to determine the best path. Routers populate their routing tables by learning paths to network
destinations. The paths can be learned from static routes, default routes or dynamic routes.
Path with lowest Administrative Distance (AD) is chosen when it knows about the ____ ____ destination from one or more routing sources.
Same exact
The lower the (AD) Metric the more ______ the route.
Trustworthy
_____ _____ are manually configured by system administrator
Static routes
What are the characteristics of a Default Route?
Type of static route
Used by router if no path to destination is known
Also known as the ‘Gateway of Last Resort’
Gives all traffic a path out of router
Routing algorithms use _____ to determine best route
Metrics
The Path Length routing algorithm is the ____ _____ ____ _____.
Most relied upon metric
In the Path Length routing algorithm, cost is calculated as the sum of all ____ associated with each link traversed
Costs
____ ____ is the number of Internet working devices from source to destination
Hop Count
What is the definition of the routing algorithm Reliability?
Up time
What is the definition of the routing algorithm Delay?
Length of time required to move packet from source to location
What is the definition of the routing algorithm Bandwidth?
Available capacity of link.(More bandwidth may not be the better path if link is at capacity)
What is the definition of the routing algorithm Load?
Degree to which a network resource is busy
RIPv2 allows _______ length subnet masking
Variable
In the Routing Information Protocol (Distance Vector), The metric hop count is limited to ___ hops.
15
The Border Gateway Protocol(BGP) exchanges routing information between _________ systems
Autonomous
The only purpose of the core layer is to _______ large amounts of traffic quickly and reliably.
Transport
The Spanning Tree Protocol is layer ____ switching loop-prevention protocol
2
What are the characteristics of the design considerations Speed?
Core layers are designed with speed in mind
Don’t slow down traffic such as applying access control lists, routing, and packet filtering when possible
What is the primary function of the Distribution Layer?
Providing routing, filtering, WAN access and determining how packets can access the core layer.
The distribution layer is the place to _______ polices for your network
Implement
The access layer is the _______ _____ and includes hubs and switches to connect nodes such as workstations and other end-user devices to the network.
Aggregation point
What are the functions in Client Connections?
Shared bandwidth devices
Switched bandwidth devices
Layer 2 functions such as VLAN membership
Traffic filtering based on MAC
What are the 3 device layers?
Core layer
Distribution layer
Access layer
A Subnet is a network within a ______
Network
What are two characteristics of a Subnet?
Logical division of a network of connected devices based on the IP address
Separate and identifiable portion of an orginization network
What are the 3 parts of an IP address?
Network portion, Subnet mask, Host portion
_______ is when the networking portion borrows bits from the host portion
Subnetting
Provides most available subnets because class __ has more host bits to borrow from
A
Variable Length Subnet Masking(VLSM) is used when _______ a network(Based on network needs)
Subnetting
Any one subnet can be _____ _____ into further subnets
Broken down
______ ______ ______ ______ allows efficient use of IP addressing by allowing each subnet to have a different number of host, depending on their requirements.
Variable Length Subnet Masking
Variable Length Subnet Masking results in ______ the number of wasted addresses
Reducing