Ch 23 config magement and missed Missed

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

CRC (Cyclic Redundancy Check) errors occur when a network device detects a mismatch between the checksum calculated at the transmitting end and the checksum received at the receiving end. This mismatch indicates that the data has been altered during transmission, likely due to errors in the physical layer.

CRC errors are typically indicative of physical layer issues

2
New cards

What is a characteristic of encryption in wireless networks

prevent the interception of data as it transmits a network

3
New cards

What are 2 characteristics of the distribution layer in a 3 tiered network architecture?

A serves as the network aggregation point

B provides a boundary between layer 2 and 3 communication

C designed to meet continuous redundant uptime requirements

D is the backbone for the network topology

E physical connection point for a LAN printer

B provides a boundary between layer 2 and 3 communication

C designed to meet continuous redundant uptime requirements

Not A cuz distribution layer is the ag point in a 2 tiered network this question is about 3.

4
New cards

Makes forwarding decisions based on MAC addresses

What is a characteristic of a Layer 2 switch?

5
New cards

The subset of all collisions that happen after the 64th byte of the frame has been TXed are called late collisions

Typically causes of late collisions are segment cable lengths in excess of the maximum permitted for the cable type. a collision wave is not detected by the transmitting station until after the 64 bytes slot time since it has to travel an excessive distance.

When a late collision wave is detected, the frame is not retransmitted by the MAC sublayer. Upper layer protocols must deduce that something went wrong and implement retransmission of the frame. This takes time and so late transmission can cause excessive delays.

The subset of all collisions that happen after the 64th byte of the frame has been TXed are called late collisions

Typically causes of late collisions are segment cable lengths in excess of the maximum permitted for the cable type. a collision wave is not detected by the transmitting station until after the 64 bytes slot time since it has to travel an excessive distance.

When a late collision wave is detected, the frame is not retransmitted by the MAC sublayer. Upper layer protocols must deduce that something went wrong and implement retransmission of the frame. This takes time and so late transmission can cause excessive delays.

6
New cards
<p>Whats wrong with this output?</p>

Whats wrong with this output?

The output shows a signif number of input errors, CRC error and frame errors. These errors are indicative of physical layer issues like

faulty cable, bad connectors or interference

7
New cards
<p>look at table</p>

look at table

look at table

8
New cards
<p></p><p></p><p>It enables AAA services on the device.</p><p>It is used for configuring RADIUS</p><p>Pgs 754 Ansible, 700 NCM,384 RADIUS, 386 TACACS+</p><p>The new AAA model of Authentication is enabled with a single command, which unlocks all  other AAA commands on the CLI.  Note that this command will break non AAA line and enable passwords</p>

It enables AAA services on the device.

It is used for configuring RADIUS

Pgs 754 Ansible, 700 NCM,384 RADIUS, 386 TACACS+

The new AAA model of Authentication is enabled with a single command, which unlocks all other AAA commands on the CLI. Note that this command will break non AAA line and enable passwords

what doe s this command do?

Router (config)# aaa new-model

9
New cards

1000-Base-SX

The physical layer specification for Gig E over fiber optic over cabling defined in IEEE802.3z.

The SX system operates in full duplex with multimode only.

10
New cards

Advanced Encryption Standard

Cisco Access points provide WPA2-PSK (TKIP), WPA2-PSK (AES) and WPA2-PSK (TKIP/AES) as WPA2 encryption options.

AES is a more secure encryption protocol option introduced with WPA2 and is currently the strongest encryption type with WPA2-PSK

AES

11
New cards

LC to SC

GBIC and SFP are both hot swappable input/output devices that plug into a physical port or a slot. GBIC is commonly used with Gig Ethernet and Fibre Channel. But its applications are not limited to these 2 types. There is FE Fast Ether GNIC, BIDI GBIC, CWDM GBIC, DWDM GBIC. Generally GBC is with the SC connector.

SFP came into existence later then GBIC. SFP transceivers are designed to support SONET, GigE, Fibre Channel, and other commo standards. SFP is usually with LC connectors. SFP is also known as mini-GBIC because it has the same functionality as GBIC but in a smaller form factor.

GBIC uses SC while SFP uses LC.

Which cable type must be used to interconnect one switch using 1000 BASE-SC GBIC modules and another switch using 1000 BASE-SX SFP modules?

LC to SC

LC to LC

SC to ST

12
New cards

a number of runts can show duplex mismatch. Runts can be caused by collisions so check if collisions are incrementing if not suspect duplex mismatch

a number of runts can show duplex mismatch. Runts can be caused by collisions so check if collisions are incrementing if not suspect duplex mismatch

13
New cards

DevOps is a software development approach that emphasizes collaboration between development (Dev) and IT operations (Ops) teams to deliver software faster and more reliably. It combines cultural philosophies, practices, and tools to automate and integrate processes, fostering continuous improvement and faster delivery of value to customers.

DevOps

14
New cards

IaC

practice where infrastructure is managed and provisioned using machine-readable definition files, like code, rather than through manual processes or interactive configuration tools. This allows for automation, consistency, and repeatability in managing infrastructure resources, similar to how software code is managed.

Infrastructure as Code

15
New cards

idempotence

a principal of IaC where the configuration will be applied only to a target environment if it will result in a change.

In essence, idempotence simplifies the development and maintenance of systems by allowing for safe and reliable retries and by ensuring consistent state management, especially in the face of potential errors or network issues

16
New cards

Ansible

Python based config management tool that uses YAML playbooks to push configs to nodes. It is an agentless solution offering wide support for network devices because is uses SSH to reach nodes. Ansible does support both push and pull methods. CCNA book states it only pushes a config…

17
New cards

playbook

set of YAML instructions saying what should be applied to a target device. Used with Ansible.

18
New cards

what are the Pros of Ansible

Easy install and setup

powerful orchestration

supported by most enterprise-grade vendors

supports both push and pull modules

Agentless model is faster and less complicated than the agent model

Sequential execution order makes deployments predictable.

19
New cards

what are the Cons of Ansible

requires root SSH access to Linux nodes

It is not as mature as Puppet or Chef.

Ansible has several scripting components so the syntax can vary

Its focused on orchestration over config management so Ansible does NOT protect against configuration drift.

Troubleshooting can be tricky compared to Chef or Puppet

No native config rollback on failure

20
New cards

agentless mode

A deployment model that does not require agents on target machines, simplifying management and reducing complexity.

21
New cards

anti software

commonly referred to as anti-virus or anti-malware is specifically designed to protect endpoints form attacks.

It prevents, detects and removes malicious software and provides real time protection against threats like viruses, trojans, spyware, and ransomware.

22
New cards

Which protocol does the AP use to draw power from a connected switch?

A Internet Group Management Protocol

B Adaptive Wireless Path Protocol

C Cisco Discovery Protocol

D Network Discovery Protocol

C CDP

explanation

CCNA has trick questions

CDP does not provide power to the AP but CDP is used by AP and WLC to negotiate and monitor Power over Ethernet (PoE) Levels.

so CDP is the most right answer

23
New cards

IaaS

Provides the computing infrastructure , physical or VMs and other resources like virtual-machine disk image library, block and file based storage, FWs, load balancers, IP addresses, virtual LANs

Infrastructure as a Service

ex

Amazon, EC2, Windows Azure, Rackspace, Google Compute Engine.

24
New cards

Paas

provides computing platforms which include OS, programming language execution environment, DB, and webserver

Platform as a Service

ex

AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, and Apache Stratos

25
New cards

SaaS

provided access to application software also called on demand software. You do not have to install, setup and the running of the software. Service providers will do that for you. You will just have to pay and use it through some client.

Software as a service

ex

Google Aps, Windows Office 365

26
New cards

An org has decided to use cloud based services. Which cloud service allows the org to install its own OS on the VM.

IaaS

Infrastructure as a Service

Provides the computing infrastructure , physical or VMs and other resources like virtual-machine disk image library, block and file based storage, FWs, load balancers, IP addresses, virtual LANs

ex

Amazon, EC2, Windows Azure, Rackspace, Google Compute Engine.

27
New cards

FTP uses 2 separate connections, one for control and one for data. Control connection uses port 21 while the data connection uses a different port. Typically port 20 but is dependent on if Active or Passive mode is used.

FTP uses 2 separate connections, one for control and one for data. Control connection uses port 21 while the data connection uses a different port. Typically port 20 but is dependent on if Active or Passive mode is used.

28
New cards

What is an agent in SDN?

an agent is a software component that acts as an intermediary between an SDN controller and network devices. It facilitates communication and translates instructions between the controller and the devices, enabling the controller to manage and configure the network. 

29
New cards

WPA3 Enterprise

Provides additional protections for networks transmitting sensitive data by offering the equivalent of 192 bit cryptographic strength. WPA3 networks use a suite of 192 bit cryptographic tools to ensure consistent protection across network.

Cisco supports 2 WPA3 modes and they are WPA3 Enterprise and WPA3 Personal

30
New cards

WPA3 Personal

allows for better password authentication even when using noncomplex combinations. WPA3 uses Simultaneous Authentication of Equals (SAE) to provide strong defense against password guessing.

SAE is a secure key establishment protocol

Cisco supports 2 WPA3 modes and they are WPA3 Enterprise and WPA3 Personal

31
New cards

What are 2 differences between WPA2 and WPA3.

WPA2 uses 128 bit encryption, while WPA3 supports 128 and 192 bit key encryption

WPA3 uses AES for stronger encryption than WPA2, which uses TKIP.

?

32
New cards

WPA3 introduced several enhancements to improve security over its predecessor, WPA2. The key enhancements include:

1. Forward Secrecy: This ensures that even if a session key is compromised, it cannot be used to decrypt past communications.

2. Simultaneous Authentication of Equals (SAE): This is a new handshake protocol used in personal mode (WPA3-Personal) that replaces the Pre-Shared Key (PSK) exchange. SAE ( Simultaneous Authentication of Equals) provides stronger protection against offline dictionary attacks.

WPA3 introduced several enhancements to improve security over its predecessor, WPA2. The key enhancements include:

1. Forward Secrecy: This ensures that even if a session key is compromised, it cannot be used to decrypt past communications.

2. Simultaneous Authentication of Equals (SAE): This is a new handshake protocol used in personal mode (WPA3-Personal) that replaces the Pre-Shared Key (PSK) exchange. SAE (Simultaneous Authentication of Equals) provides stronger protection against offline dictionary attacks.

33
New cards

Which two components comprise part of a PKI (public Key Infrastructure)? (Choose two)

A RSA token

B Clear-text password that authenticates connections

C One or more CRLs (Certificate Revocation List)

D Preshared key that authenticates connections

E CA that grants certificates

C One or more CRLs (Certificate Revocation List)

E CA that grants certificates

34
New cards

What are two characteristics of a public cloud implementation? (Choose two.)

A It is a data center on the public Internet that maintains cloud services for only one company.

B It provides services that are accessed over the Internet.

C It enables an organization to fully customize how it deploys network resources.

D It is owned and maintained by one party, but it is shared among multiple organizations.

E It supports network resources from a centralized third-party provider and privately-owned virtual resources.

B It provides services that are accessed over the Internet.

D It is owned and maintained by one party, but it is shared among multiple organizations.

35
New cards

Private cloud

The private cloud model refers to cloud computing resources used exclusively by a single business or organization. A private cloud can be located in your on-site data center or hosted in the cloud by a service provider.

36
New cards

Public cloud

When an organization deploys a public cloud model, all hardware, software, and supporting infrastructure is owned and managed by a service provider, which is delivered exclusively over the Internet. You access these services and manage your account through a web browser.

37
New cards

Hybrid cloud

A hybrid cloud computing model combines public and private clouds to share data and applications. Hybrid clouds connect infrastructure and applications between cloud-based resources with existing resources not located in the cloud. This approach gives your business greater flexibility and deployment options.

38
New cards

The ansible.cfg file is entirely optional because if Ansible can’t find the setting, it’ll just use the default values when doing the task.

but…

What is the order Ansible will use to look for the setting file?

By default it will first look in ANSIBLE_CONFIG variable to see if a path is set.

If not then it checks ansible.cfg in the current directory that you are running the playbook from.

Next it will look in the Home directory.

Finally it will look /etc/ansible.

It is recommended to use the /etc/ansible when you can.

39
New cards

The Ansible inventory file tells Ansible which target nodes to connect to and gives it info on how it should make the connection. The file also allows you to group nodes for easier administration. By default Ansible will check the hosts file under /etc/ansible when trying to access a node.

The Ansible inventory file tells Ansible which target nodes to connect to and gives it info on how it should make the connection. The file also allows you to group nodes for easier administration. By default Ansible will check the hosts file under /etc/ansible when trying to access a node.

40
New cards

Running commands without a playbook (usually for troubleshooting) is called Ad-Hoc commands.

Running commands without a playbook (usually for troubleshooting) is called Ad-Hoc commands.

41
New cards

Whitespace is very important in YAML. The TAB key is a huge no no with playbooks…always use the spacebar.

Whitespace is very important in YAML. The TAB key is a huge no no with playbooks…always use the spacebar.

42
New cards

Inventory (Ansible)

Defines the nodes that ansible knows about and groups them so they can be referenced, The inventory also includes connection instructions to be executed.

43
New cards

Playbook (Ansible)

a YAML file that contains a set of instructions to be executed.

44
New cards

Multiple plays can exist in a playbook, which allows the playbook to apply configuration to different nodes in different sections.

Play (Ansible)

45
New cards

Variables (Ansible)

you can customize variables in your playbook

46
New cards

Templates (Ansible)

You can use Python’s Jinja2 templates with your playbooks, which is really helpful for network administration.

47
New cards

Handlers (Ansible)

These are alot like tasks, except they’re only called to an event like service starting.

48
New cards

Roles (Ansible)

Allows you to spread out playbooks across several folders to make the configurations more modular, scalable and flexible.

49
New cards

Modules (Ansible)

Built into Ansible, modules are files that describe how Ansible will achieve a given task and are written in Python. You can write your own. Cisco has 69 modules in the current version of Ansible that cover everything from IOS to their UCS server platform.

Cisco Unified Computing System (UCS) is an integrated data center platform that combines computing, networking, storage access, and management into a single system

50
New cards

Facts (Ansible)

These are global variables that contain a ton of information about the systems, including vital stats like the systems IP address.

51
New cards

Tasks (Ansible)

an action the playbook applies like installing Apache on a Linux box.

52
New cards

Ansible Tower

a paid version via RedHat that adds central management to Ansible that improves security because you can control who can run playbooks through Role Based Access Control (RBAC). Ansible Tower also provides a single point for integration with other tools. RedHat offers a free version that supports 10 hosts.

53
New cards

AWX

The upstream development version of Ansible Tower, that’s kind of like Fedora vs Red Hat Linux. You can use it for free, but there's less reliability since there can be frequent changes with little testing. There is limited support available.

AWX is an open-source, community-developed project that provides a web-based user interface, REST API, and task engine on top of Ansible. It is the upstream project from which Red Hat Ansible Automation Platform's automation controller (formerly Ansible Tower) is derived

54
New cards

Puppet

Puppet is an open-source automation tool that can be used to manage and configure various types of devices. It is more popular than Ansible with sysadmins. Puppet used to require an agent so it could only run on devices that support that like Cisco Nexus. For CCNA know Puppet generally requires an agent even though now the tool supports agentless configuration.

55
New cards

Puppet Pros

Prevents configuration drift through compliance automation and reporting tools because the agent continuously checks in with the Puppet master to make sure it’s compliant with the manifests.

Strong web UI

More mature solution then ANSIBLE

easy set up

56
New cards

Puppet Cons

You have to learn Ruby to get good with Puppet and Ruby is not widely used by the network community.

Lacks a push system so changes only occur when nodes check in

the master-agent architecture complicates redundancy and scalability.

57
New cards

Puppet Master

The Master server that controls the configuration on manged nodes.

58
New cards

Puppet Agent Node

A node controlled by the Puppet Master

59
New cards

Manifest

a File containing instructions to be executed in Puppet.

60
New cards

Resource (Puppet)

Declares a task that needs to be executed and how. For example , if we install Apache on a Linux box, we can declare Apache and make sure it states is set to install

61
New cards

Module (Puppet)

a group of manifests and related files organized nicely to make life easier

62
New cards

Class (Puppet)

You can use classes to organize the manifest file just as you can use programming languages like Python

63
New cards

Facts (Puppets)

Global Puppet variables that contain a ton of info about the system like the systems IP

64
New cards

Services (Puppet)

Used to control services on a node

65
New cards

Cookbook

a file containing a set of instructions to be executed.

a Chef term for file that holds recipes

66
New cards

Recipe

An Action that the cookbook applies, like installing Apache on a Linux box

Chef term

67
New cards

Chef Notes

Computer that Chef Manages

68
New cards

Knife

Command line tool for managing Chef through the server API

69
New cards

Chef Server

The master server that manages all the nodes and cookbooks

70
New cards

Chef Manager

The web interface for Chef Server-the API is used for communication

71
New cards

Workstation (Chef)

A computer you perform configuration related tasks from like when creating a cookbook

72
New cards

Bookshelf

a place to store cookbook content

Used with Chef

73
New cards

Chef server has only a single version, the open source tool we are free to use on any Linux box. Chef workstation can run on both Linux and Windows.

Chef server has only a single version, the open source tool we are free to use on any Linux box. Chef workstation can run on both Linux and Windows.

74
New cards

Chef Pros

very flexible for OS and middleware management

Developer focused

the architect suit large scale deployments

Sequential execution order

great reporting

support hosted cloud offerings

75
New cards

Chef Cons

Steep learning curve

Complicated install and setup

Lacks a push system so changes only occur when nodes check in

76
New cards

Chef

Ruby based configuration tool that uses cookbooks to apply configurations. Chef is the most advanced solution in book and is better suited for programmers because its more structured and has a strong developer focus. It also requires that nodes have an agent deployed for it to be able to manage them. Chef can’t push configurations.

77
New cards

Puppet

a Ruby based configuration management tool that uses custom manifest files to configure devices. It requires an agent to be installed on the nodes, so it has less network support. Puppet also doesn’t support pushing configuration to nodes. Instead, the configuration is applied when the agent checks in. Puppet does support Cisco network devices that can install the Puppet agent.

78
New cards

Which configuration management solutions require agents?

Chef and Puppet both require agents

79
New cards

What does Ansible call the file that holds the configuration that should be applied to nodes.

Playbook is the Ansible file that holds configurations that is applied to the nodes.

80
New cards

Which configuration management solution is best suited for managing Cisco Devices

Ansible

81
New cards

What language does Ansible use in playbooks

Ansible uses YAML in playbooks

82
New cards

Which configuration management solution uses Manifests?

Puppet uses a manifest file

83
New cards

Which configuration management solution uses an inventory file?

Ansiible uses an inventory file

84
New cards

Puppet is based on what language?

Ruby is the language used in both Puppet and Chef

85
New cards

What connection method does Ansible use?

Ansible uses SSH to connect to Linux and network systems and Powershell to manage Windows systems.

86
New cards

Which configuration management solution is best suited for sysadmins?

Puppet is best suited for sysadmins

87
New cards

YAML file cannot contain which type of character

TAB

88
New cards

Which command do you use to run an Ansible playbook?

A Ansible-doc

B Ansible-execute

C Ansible-playbook

D Run-Playbook

C Ansible-playbook

89
New cards

Which command do you use to look up a module in Ansible?

A Ansible-doc

B Ansible-execute

C Ansible-playbook

D Run-Playbook

A Ansible-doc

90
New cards
<p>JSON define element guidelines</p>

JSON define element guidelines

An object is an unordered set of name/value pairs. An object begins with {left brace and ends with }right brace. Each name is followed by :colon and the name/value pairs are separated by ,comma.

An array is an ordered collection of values. An array begins with [left bracket and ends with ]right bracket. Values are separated by ,comma.

A value can be a string in double quotes, or a number, or true or false or null, or an object or an array. These structures can be nested.

A string is a sequence of zero or more Unicode characters, wrapped in double quotes, using backslash escapes. A character is represented as a single character string. A string is very much like a C or Java string.

A key is a string that acts as an identifier for the associated value. 

91
New cards
<p>A 3 Objects, 2 Keys, and 3 JSON list values</p><p>B 1 Object, 3 Keys, and 2 JSON list values</p><p>C 3 Objects, 3 Keys, and 2 JSON list values</p><p>D 1 Object, 3 Keys, and 3 JSON list values</p>

A 3 Objects, 2 Keys, and 3 JSON list values

B 1 Object, 3 Keys, and 2 JSON list values

C 3 Objects, 3 Keys, and 2 JSON list values

D 1 Object, 3 Keys, and 3 JSON list values

D 1 Object, 3 Keys, and 3 JSON list values

The entire JSON structure is a single object.

There are three keys: "Test_Questions", "Test_Exam_Level", and "Test_Response".

Each of the keys maps to a list value.

"Test_Questions" maps to ["Automation", "Configuration"],

"Test_Exam_Level" maps to ["CCNA", "CCNP"].

"Test_Response" maps to ["Correct", "Incorrect"].

Therefore, there is one main object, three keys, and each key corresponds to a list value (3 list values total).

92
New cards

What is the function of the Norhtbound API?

It provides a path of communication between an SDN controller and a network application.

93
New cards

Which components are contained within a virtual machine?

configuration files backed by physical resources from the Hypervisor

Explanation:

"configuration files backed by physical resources from the Hypervisor"

Virtual machines consist of configuration files (such as VMX files for VMware) and virtual disks (such as VMDK files for VMware). These configuration files define the virtual hardware

and settings of the VM, which are then backed by the physical resources (CPU, memory, storage, network) managed by the hypervisor.

94
New cards

Which two events occur automatically when a device is added to Cisco DNA Center? (Choose two.)

A The device is placed into the Provisioned state.

B The device is assigned to the Global site.

C The device is assigned to the Local site.

D The device is placed into the Managed state.

B The device is assigned to the Global site.

D The device is placed into the Managed state.

Explanation:

"When you successfully add, import, or discover a device, DNA Center places the device in the Managed state and assigns it to the Global site by default."

95
New cards

Which REST method updates an object in the Cisco DNA Center Intent API?

A POST

B GET

C PUT

D PATCH

E DELETE

C PUT

In RESTful APIs, the PUT method is used to update an existing resource or object. If the resource exists, it will be updated with the new data provided; if it does not exist, a new resource might be created at that URI, depending on the API's implementation.

96
New cards
<p>What is represented by the word ge3/36 in the JSON schema.</p>

What is represented by the word ge3/36 in the JSON schema.

Explanation:

Value

An array in JSON is a list of values enclosed in square brackets []. The entire structure in the exhibit is an array.

An object in JSON is a collection of key-value pairs enclosed in curly braces {}. Each element within the array is an object

A key in JSON is the name part of a key-value pair, such as "interface". "ge3/36" is the value associated with the key "interface"

97
New cards

Which interface type enables an application running on a client to send data over an IP network to a server?

A Northbound Interface

B Application Programming Interface

C Southbound Interface

D Representational State Transfer Application Programming Interface

B Application Programming Interface

Explanation:

"Application Programming Interface (API)"

APIs provide a set of rules and protocols that allow different software applications to communicate with each other. In the context of the question, an API allows an

application on a client to send data over an IP network to a server. The other options refer to different types of interfaces but are not specifically associated with

application communication over an IP network.

98
New cards

API

An API is a set of rules and specifications that allows different software systems to communicate and interact with each other, enabling them to share data and functionality. APIs act as intermediaries, allowing applications to access and utilize the services or data of other applications without needing to know the intricate details of how those services are implemented

Application Programming Interface

99
New cards

100
New cards