Podcast
Questions and Answers
What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?
What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?
- forward the packet out GigabitEthernet0/0 (correct)
- forward the packet out Serial0/0/0
- forward the packet out GigabitEthernet0/1
- drop the packet
Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?
Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?
- ip route 10.10.0.0 255.255.0.0 209.165.200.226 100
- ip route 10.10.0.0 255.255.0.0 209.165.200.225 100
- ip route 10.10.0.0 255.255.0.0 Serial 0/0/0 100
- ip route 10.10.0.0 255.255.0.0 209.165.200.225 50 (correct)
How should the static route on R1 be changed to allow user traffic from the LAN to reach the Internet?
How should the static route on R1 be changed to allow user traffic from the LAN to reach the Internet?
- Add the next-hop neighbor address of 209.165.200.226.
- Add an administrative distance of 254.
- Change the destination network and mask to 0.0.0.0 0.0.0.0 (correct)
- Change the exit interface to S0/0/1.
Which option shows a correctly configured IPv4 default static route?
Which option shows a correctly configured IPv4 default static route?
Which static route command can be entered on R1 to forward traffic to the LAN connected to R2?
Which static route command can be entered on R1 to forward traffic to the LAN connected to R2?
What is a method to launch a VLAN hopping attack?
What is a method to launch a VLAN hopping attack?
Which type of LAN attack is the analyst targeting during this evaluation?
Which type of LAN attack is the analyst targeting during this evaluation?
Which statement explains the reason that the number of active clients is 0?
Which statement explains the reason that the number of active clients is 0?
Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?
Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?
Match the forwarding characteristic to its type.
Match the forwarding characteristic to its type.
Which statement is correct about how a Layer 2 switch determines how to forward frames?
Which statement is correct about how a Layer 2 switch determines how to forward frames?
Which statement describes a result after multiple Cisco LAN switches are interconnected?
Which statement describes a result after multiple Cisco LAN switches are interconnected?
Match the link state to the interface and protocol status.
Match the link state to the interface and protocol status.
How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?
How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?
Why were VLANs 10 and 100 not removed after the administrator used the command erase startup-config?
Why were VLANs 10 and 100 not removed after the administrator used the command erase startup-config?
Match the description to the correct VLAN type.
Match the description to the correct VLAN type.
What will STP do in the situation where two switches are connected using redundant links?
What will STP do in the situation where two switches are connected using redundant links?
What is a secure configuration option for remote access to a network device?
What is a secure configuration option for remote access to a network device?
Which wireless encryption method is the most secure?
Which wireless encryption method is the most secure?
What type of network device includes all of the described features?
What type of network device includes all of the described features?
What will be the source MAC and IP addresses on the packet when it arrives at host B?
What will be the source MAC and IP addresses on the packet when it arrives at host B?
What is the purpose of the command ip route 0.0.0.0 0.0.0.0 serial 0/1/1?
What is the purpose of the command ip route 0.0.0.0 0.0.0.0 serial 0/1/1?
Which two VTP modes allow for the creation, modification, and deletion of VLANs on the local switch? (Choose two.)
Which two VTP modes allow for the creation, modification, and deletion of VLANs on the local switch? (Choose two.)
Which three steps should be taken before moving a Cisco switch to a new VTP management domain? (Choose three.)
Which three steps should be taken before moving a Cisco switch to a new VTP management domain? (Choose three.)
What action takes place when a frame entering a switch has a multicast destination MAC address?
What action takes place when a frame entering a switch has a multicast destination MAC address?
What should be done or checked when a traceroute to a device on the new network revealed a wrong path and unreachable status?
What should be done or checked when a traceroute to a device on the new network revealed a wrong path and unreachable status?
Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?
Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?
Which two protocols are used to provide server-based AAA authentication? (Choose two.)
Which two protocols are used to provide server-based AAA authentication? (Choose two.)
Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients?
Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients?
Which protocol or technology uses source IP to destination IP as a load-balancing mechanism?
Which protocol or technology uses source IP to destination IP as a load-balancing mechanism?
What action takes place when a frame entering a switch has a unicast destination MAC address that is not in the MAC address table?
What action takes place when a frame entering a switch has a unicast destination MAC address that is not in the MAC address table?
What protocol or technology manages trunk negotiations between switches?
What protocol or technology manages trunk negotiations between switches?
What does the command 'ip dhcp snooping limit rate 6' do?
What does the command 'ip dhcp snooping limit rate 6' do?
Flashcards
IPv6 Default Route
IPv6 Default Route
Compressed form of IPv6 default route ::/0, used when a more specific route is absent.
Floating Static Route
Floating Static Route
A backup route that becomes active if the primary EIGRP learned route fails.
Correcting Static Route
Correcting Static Route
Change the destination network and mask to 0.0.0.0 0.0.0.0 to correct a static route.
IPv4 Default Static Route
IPv4 Default Static Route
Signup and view all the flashcards
Macof Attack
Macof Attack
Signup and view all the flashcards
Show IPv6 DHCP Pool shows 0 active clients
Show IPv6 DHCP Pool shows 0 active clients
Signup and view all the flashcards
Hosts and HSRP
Hosts and HSRP
Signup and view all the flashcards
Layer 2 Switch Forwarding
Layer 2 Switch Forwarding
Signup and view all the flashcards
Interconnected Cisco LAN Switches
Interconnected Cisco LAN Switches
Signup and view all the flashcards
A frame sent from PCA forwarded to PCC
A frame sent from PCA forwarded to PCC
Signup and view all the flashcards
VLANs still exist on switch
VLANs still exist on switch
Signup and view all the flashcards
Data VLAN
Data VLAN
Signup and view all the flashcards
STP will block one of the redundant links
STP will block one of the redundant links
Signup and view all the flashcards
Secure Configuration
Secure Configuration
Signup and view all the flashcards
The source MAC and IP addresses on the packet when it
arrives at host B
The source MAC and IP addresses on the packet when it arrives at host B
Signup and view all the flashcards
Command Purpose
Command Purpose
Signup and view all the flashcards
Command Purpose
Command Purpose
Signup and view all the flashcards
Protocol
Protocol
Signup and view all the flashcards
VLAN 99 missing
VLAN 99 missing
Signup and view all the flashcards
PaGP Channel
PaGP Channel
Signup and view all the flashcards
Rounting table
Rounting table
Signup and view all the flashcards
DHCPv4 relay agent
DHCPv4 relay agent
Signup and view all the flashcards
First
First
Signup and view all the flashcards
Ethernet 0/1
Ethernet 0/1
Signup and view all the flashcards
The static route
The static route
Signup and view all the flashcards
Credential
Credential
Signup and view all the flashcards
Study Notes
- The following are detailed study notes for students preparing for the CCNA 2: Switching, Routing, and Wireless Essentials (Version 7.00) exam.
IPv6 Addressing and Routing
- Router R1 forwards IPv6 packets with destination address 2001:db8:cafe:5::1 via Serial0/0/0.
- ::/0 signifies the IPv6 default route used when no specific route is found.
EIGRP and Floating Static Routes
- A floating static route provides a backup path when the primary EIGRP route fails.
- A floating static route must have an administrative distance higher than EIGRP's (90).
- The floating static route to network 10.10.0.0/16 uses 209.165.200.225 as the next hop IP addresses.
Static Route Configuration
- A default static route is configured using 0.0.0.0/0 as the destination.
- An incorrectly configured static route can prevent LAN users from reaching the internet.
- Correct the wrong destination network and mask on R1 by configuring IP Route 0.0.0.0 0.0.0.0.
IPv4 Default Static Route
- The correct configuration for an IPv4 default static route is ip route 0.0.0.0 0.0.0.0 [exit interface].
- IPv6 static route forwards traffic to a LAN connected to R2 with S0/0/1 and fe80::2.
VLAN Hopping Attacks
- VLAN hopping attacks can be launched by introducing rogue switches and enabling trunking or sending spoofed native VLAN information.
MAC Address Table Overflow
- Analysts use the macof tool to check switches that are vulnerable to MAC address table overflow attacks.
DHCPv6 Server Configuration
- A DHCPv6 server must have in IPv6 pools, an IPv6 address range specified, for active Clients
HSRP Configuration
- Hosts send ARP requests to the virtual IP address.
- HSRP routers respond with the virtual MAC address for HSRP group 1, for Hosts to gain connectivity to Internet
Layer 2 Switching and Frame Forwarding
- Frame forwarding decisions on Layer 2 switches rely on MAC addresses and port mappings stored in the CAM table.
- Microsegmentation allows each Cisco LAN port to represent a separate collision domain
Cisco LAN Switches
- Interconnected Cisco LAN switches, do not filter broadcast frames which creates one large broadcast domain
- MAC address table is built by examining source MAC addresses of incoming frames.
- Switches forward frames out all ports except the ingress port if the destination MAC address is unknown
VLAN Configuration
- An erased startup-config will not remove VLANs in flash memory, vlan.dat file must be manually deleted from flash memory
VLAN Types
- Data VLANs carry user- generated traffic
- Management VLANs use an IP addresses and subnet mask and access the switch using HTTP, Telnet, SSH, or SNMP
- Native VLANs pass untagged traffic
- Default VLANs assign all switch ports to a VLAN after initial bootup
EtherChannel Technology
- STP blocks on redundant links by default to avoid creating a loop and broadcast storm
Remote Access Security
- Securing remote access includes access lists on VTY lines and SSH configuration
Wireless Network Configuration
- Most secure wireless encryption method is WPA2 with AES
- A network device with switch ports, SSID configuration and authentication settings (WLAN), firewall capabilities
Packet Source and Destination Addresses
- In packet flow, layer 2 addresses change while Layer 3 addresses stay the same.
- A firewall device places its own MAC Address as the Source MAC and replaces the Source IP with its own IP
Static Routes
- Used for traffic not a directly connected NW, requires the internet for Packet destination
- Packets for non-routing Table destinations are dropped or undeliverable
Layer 2 Loops
- Are disabled using STP, not VTP
VLAN Interface Issues
- Is usually a lack of configuration
Trunking Configurations
- To establish successful trunking choose three from one or more of the protocols
- dynamic desirable protocol
- trunk protocol
- spanning tree root
Cisco Express Forwarding (CEF)
- CEF is disabled for Ethernet to use static routes
- If Cisco Express Forwarding is disabled, multiaccess network interfaces require fully specified static routes
Static Routes
- Static Routes are used for network security
- With CEF disabled, you can use an exit interface or hop address to configure one
Switch Boot Sequence
- The correct Switch boot sequence should be, POST, ROM, CPU, Flash, IOS, and Control
IP Helper not configured on Interface
- Is an example where PCs can't receive proper IP Address
Open Defaults
- Open or default WiFi settings create network intrusion
Management SNMP Messages
- Is referred to as Traps
Wireless Setup
- To begin installing a Cisco 3500 series WLC, open the WIRELESS tab
- The default IP address of an AP, should be changed because it helps secure the network
- You should disable wireless data and packet info to help avoid intrusion
Troubleshooting
- Use multi-Lite Wave APs, it helps to centralize multiple Wave channels, and provides greater privacy
BPDU Ports
- It allows enhanced stability along a network
Attackers MAC flood switch
- Is an example of hackers attempting to see all data
IPv6 address
- Is configured when a stateless DHCPv6 configuration utilizes
AAA Networks
- Has data for proper network access
Wi-Fi operations
- Operates properly in a dual channel frequency, typically setup by a technician
Show Commands information
- Show switch port shows Spanning Tree BIDs and Roles
Trunk Protocol
- Does prevent information from being sent properly
Static Routes Protocol
- Do stop all IP addresses from being properly configured
HSRP Protocols
- Will send a HSRP to the default gateway
PAgP Protocols
- Are necessary for auto configurations
Shutdown Protocols
- Has default guard configuration
MAC Attacks
- Help others from gaining proper access
802.1x Setup
- Can have the highest levels of bandwidth
IPv6 Protocols
- Needs unicast and local configurations
Access protocols
- Work for a great number of applications
DHCP protocol
- has limited attacks without full configuration
Switch Configuration
- The protocols help get the device ready for use with full access.
DCHI server
- Will identify what network access can support
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.