Page 1 of 6

User name: PLS Peninsula Library System Book: CCNA Practice Questions Exam Cram, 2nd Edition

No part of any chapter or book may be reproduced or transmitted in any form by any means without the prior written permission for reprints and excerpts from the publisher of the book or chapter. Redistribution or other use that violates the fair use privilege under U.S. copyright laws (see 17 USC107) or that otherwise violates these Terms of Service is strictly prohibited. Violators will be prosecuted to the full extent of U.S. Federal and Massachusetts laws.

The CCNA Cram Sheet

This Cram Sheet contains the distilled, key facts about Exams 640-821, 640-811, and 640-801. Review this information as the last thing you do before you enter the testing center, paying special attention to those areas where you feel that you need the most review. You can transfer any of these facts from your head onto a blank sheet of paper immediately before you begin the exam. 1.

The primary advantage of bridging is increased bandwidth available on a segment because of the decreased number of devices in the collision domain. Switches are high-speed, multiport bridges. Switches support the same functionality as bridges but usually have a greater port density. Each switch port is a separate collision domain, and each port provides dedicated bandwidth. Virtual local area networks (VLANs) can be used to make a group of switch ports into a separate, isolated LAN. Routing is required for communication between VLANs. VLANs can function across multiple switches when they are connected by a trunk connection. Inter-switch linking (ISL) is used to create a trunk connection between Fast Ethernet ports on Cisco switches. Switches make it possible to run Ethernet devices in full-duplex mode. In full-duplex mode, two devices share the Ethernet wire simultaneously and exclusively, enabling faster throughput because no collisions are possible. Store-and-forward switching reads the entire frame before making a forwarding decision; cut-through switching reads only the first six bytes—the destination media access control (MAC) address—to make a forwarding decision. Store-and-forward switching performs error checking; cut-through switching does not. The primary advantages of routers are They allow you to connect dissimilar LANs. They provide multiple paths to a destination network. They allow the interconnection of large and complex networks.

2.

3.

4.

5.

6.

7.

8.

Connection-oriented communication uses a nonpermanent path for data transfer. It involves three steps: establish the connection, transfer the data, and terminate the connection. A practical example of a connection-oriented communication would be a walkie-talkie conversation in which the connection has to be established each time to the receiver by pressing a button, and after you are finished talking, you release the button until you want to talk again. Connectionless communication uses a permanently established link. An example of a connection-oriented protocol is TCP, and an example of connectionless communication protocol is UDP. Again, a practical example would be that of a telephone conversation in which a connection

http://proquest.safaribooksonline.com.ezproxy.plsinfo.org:2048/print?xmlid=0789735296/... 7/10/2007

and JPEG. Link state protocols send the state of their own interfaces to every router in the internetwork.. and images. 13. TCP provides a connection-oriented and reliable service to the applications that use its services with the use of acknowledgments. Application 6.Page 2 of 6 is made and maintained throughout the duration of the call. MPEG. 17. such as ASCII. graphics. This problem can be eliminated or mitigated by using the following techniques: maximum hop count. 11. It performs physical hardware addressing. 7/10/2007 . In addition. and holddown timers. Presentation 5.plsinfo. and the TCP three-way handshake. Distance vector routing protocols send their entire routing tables to their neighbors. and data compression. Data Link 1. The primary functions of the Data-Link layer of the OSI model are It allows the upper layers of the OSI model to work independently of the physical media. It provides end-to-end data transport services by segmenting upper-layer applications. MIDI. Counting to infinity is a problem for distance vector routing protocols. The Session layer establishes. data.com. http://proquest. or tunneling. Physical 10. 9. The Transport layer sits between the upper and lower layers of the OSI model. 12. 18. split horizon. remember that the Network layer is the domain of routing. Encapsulation. Transport 3. 14. establishing an end-to-end connection. data encryption. The Presentation layer concerns itself with data representation. It provides optional flow control. and ensuring reliable data transport. takes frames from one network system and places them inside frames from another network system. manages. and remote procedure calls (RPCs) are examples of Session layer protocols. 19. Convergence occurs when all routers in an internetwork agree on optimal routes. sequence number checking. and parallelization. sound.. video. structured query language (SQL). It performs flow control by buffering.ezproxy. GIF. 15. It generates error notification. 16. Network 2.org:2048/print?xmlid=0789735296/. User Datagram Protocol (UDP) provides a connectionless and best-effort service to the applications that use its services. It supports different protocols for text. multiplexing. error and duplication checking. route poisoning.safaribooksonline. and terminates sessions between applications. A routing loop occurs when a packet bounces back and forth between two or more routers. sending segments from one end host to another. Session 4. The layers of the OSI model are as follows: 7. Network file system (NFS). The primary functions of the Network layer of the OSI model are path determination and logical addressing.

Address Resolution Protocol (ARP) maps a known IP address to a physical address. the network number has all of the host bits of the address set to 0. http://proquest. StrataCom.0 Class C: 255. You should be able to recognize the default mask for each class of IP address as follows: Class A: 255.com.ezproxy. 23. DCE devices are usually modems.255. Frame relay is a high-speed. The broadcast address has all of the host bits set to 1. B. 24. DTE devices are usually routers. The network number and broadcast address for a given subnet are the first and last IP addresses.0. channel service units/data service units (CSUs/DSUs). The interface between the customer network and the WAN provider network occurs between the data terminal equipment (DTE) and the data communication equipment (DCE). 162 HTTP 80 21. Well-known port numbers include File Transfer Protocol (FTP) 21 Telnet 23 Simple Mail Transfer Protocol (SMTP) 25 Domain Name System (DNS) 53 TFTP 69 Simple Network Management Protocol (SNMP) 161. A virtual circuit must connect two DTE devices within a frame relay network. You should know the decimal representation of classes A.0.0 Class B: 255. and DEC. Reverse Address Resolution Protocol (RARP) maps a known physical address to a logical address.org:2048/print?xmlid=0789735296/. In binary format. The range of usable IP addresses is all addresses between the network number and broadcast address. Local Management Information (LMI) is a set of enhancements to frame relay that was developed by Cisco.safaribooksonline. 28. You should understand the basic concepts of IP addressing. 29.255. 7/10/2007 . packet-switching WAN protocol that operates at the Data-Link layer.0..plsinfo. It runs on nearly any type of serial interface. and C addresses as well as the number of networks and nodes each supports as follows: Class A: 1 through 126 Class B: 128 through 191 Class C: 192 through 223 22. This capability will save you valuable time in the end.. Permanent virtual circuits (PVCs) are more widely used than switched virtual circuits (SVCs) in frame relay networks. Cisco routers support LMI variations for American National 26.Page 3 of 6 20. uses frame check sequence (FCS) as its error-checking mechanism.0 25. Dotted-decimal notation is the decimal representation of a 32-bit IP address. Data link connection identifier (DLCI) serves as the addressing scheme within a frame relay network.255. and relies on a discard eligibility bit for congestion management. You should know how to do subnetting tasks very quickly. and terminal adapter/network terminations 1 (TA/NT1s). respectively. The dotted-decimal notation represents the four octets of bits by performing binary-to-decimal conversion for each octet and providing a decimal value for each octet. Northern Telecom. 27.

32.Page 4 of 6 Standards Institute (ANSI). Committed Information Rate (CIR) is the rate. 33. including all Layer 3 addresses and Internetwork Operating System (IOS) versions. Integrated Services Digital Network (ISDN) can be ordered as either basic rate interface (BRI) or primary rate interface (PRI).ezproxy. The terminal editing and terminal no editing commands enable and disable enhanced editing. 7/10/2007 .. and keyword completion. Use the Tab key to allow the router to complete commands after you get a %incomplete command% message. command prompting. 37. The command to restore a configuration file (copy a configuration file from a TFTP server to a router) is copy tftp running-config. Examine the status of a router with the following commands: show version. Reference points describe the logical interfaces between functions. Dial-on-demand routing (DDR) works with ISDN to establish and terminate connections. and encapsulate other WAN services. Enhanced editing that enables commands retrieved from the command history to be changed quickly and then reexecuted. 30. holdtime.org:2048/print?xmlid=0789735296/. It uses access lists to look for interesting traffic. local and remote port. in bits per second. ISDN functions represent devices or hardware functions within ISDN. encrypted passwords and unique IDs to authenticate PPP. show running-config (or write terminal). http://proquest. ISDN can be used to add bandwidth for telecommuting. and show flash. EXEC includes the following: Context-sensitive help for syntax checking. The command to back up a router configuration file (copy a configuration file from a router to a Trivial File Transfer Protocol [TFTP] server) is copy running-config tftp. Q933a. show startup-config (or show configuration). Use the question mark (?) to activate context-sensitive help. 36. Command history that provides a record of recent commands.safaribooksonline.plsinfo. Password Authentication Protocol (PAP) uses a two-way handshake to authenticate Point-to-Point Protocol (PPP) connections and transmits username/password information in clear text. show memory. The Cisco Discovery Protocol (CDP) displays summary information about directly connected devices and operates at the Data Link layer. Tab completes a partially entered command. show interfaces. 34.and down-arrow keys to scroll through the history list. carry multiple network layer protocols.com. The show cdp entry <device id> command displays information about a specific device.. Use the up. Challenge Handshake Authentication Protocol (CHAP) uses a three-way handshake and relies on secret. 39. and auxiliary passwords on a router are as follows: Router(config)#enable password Router(config)#enable secret password Router(config)#line aux 0 Router(config-line)#login Router(config-line)#password password Router(config)#line con 0 Router(config-line)#login Router(config-line)#password password Router(config)#line vty 0 4 38. and capability information. The commands to set the enable secret. and Cisco. 35. The show cdp neighbors command displays ID. improve Internet response time. 40. DLCIs are mapped to network layer addresses through inverse ARP or by using the frame-relay map command. platform. 31. console. show protocols. at which data is transferred across the frame relay network.

They can be eliminated or reduced by using the following techniques: Lengthening update frequency Exchanging route summaries Using time stamps or sequence numbers 42.ezproxy. and many other fields. Routing Information Protocol (RIP) can be configured on a router with the following commands: Router (config)# router rip Router (config-router)# network <network> 44. 7/10/2007 . A 0 in the wildcard mask indicates that the corresponding bit in the IP address must be strictly followed. 47. Enhanced Interior Gateway Routing Protocol (EIGRP) can be configured on a router with the following commands: Router (config)# router eigrp <autonomous system number> Router (config-router)# network <network> 45. Two rules for applying a wildcard mask to an IP address are A 1 bit in the wildcard mask indicates that the corresponding bit in the IP address can be ignored. The most important basic commands used to monitor IP with Cisco routers are show ip interface.. The difference in the capabilities of IP-extended access lists in comparison with IP standard access lists is that standard access lists filter IP traffic based on source IP address or address range. the value must be exactly the same as specified in the IP address. bandwidth consumption. IP extended access lists filter traffic based on source and destination addresses.. show ip protocol. use the banner motd (message of the day) and description commands. 50. 48. A standard access list can be configured on a router using the following command: Router(config)#access-list <1-99> <permit/deny> <source IP> <wildcard mask> 49.Page 5 of 6 Router(config-line)#login Router(config-line)#password password 41. To create a banner for a router and a description for an interface. 51. 43. Know that the last line of any access list is deny any any (implicit). Thus. and show ip route. Router resource usage.plsinfo. and update synchronization are problems for link state routing protocols. Thus. the IP address bit can be either 1 or 0.safaribooksonline. ports.com.org:2048/print?xmlid=0789735296/. A list of the important access list numeric identifiers follows: 1 through 99: IP standard access list 100 through 199: IP extended access list 800 through 899: IPX standard access list 900 through 999: IPX extended access list 1000 through 1099: Service Advertisement Protocols (SAP) access list 46. An extended access list can be configured on a router using the following command: http://proquest.

The commands to configure NAT Overload are as follows: Router(config-if)#ip nat inside Router(config-if)#ip nat outside Router(config)#ip nat inside source list <access list identifying inside addresses> interface <external interface> overload 55. The most popular form of NAT is the NAT Overload configuration. The commands to configure frame relay on a router are Router Router Router Router (config)# encapsulation frame-relay cisco (config)# frame-relay lmi-type cisco (config)# interface serial 0 (config-if)# frame-relay interface-dlci <dlci number> 56. The three forms of NAT include Static NAT Dynamic NAT NAT Overload 54. Network Address Translation (NAT) allows internal IP addresses to be translated to external IP addresses. The basic commands to monitor frame relay activity on a router are show frame-relay pvc. which translates many internal IP addresses to a single external IP address. 57. The basic commands to monitor ISDN and DDR activity on a router are show controller bri. 7/10/2007 . A single physical interface can be configured with several virtual subinterfaces. The commands to configure PPP on a router are Router (config)# username <name> password <password> Router (config)# interface serial 0 Router (config-if)# encapsulation ppp Router (config-if)# ppp authentication chap 58.ezproxy.Page 6 of 6 Router(config)#access-list <100-199> <permit/deny> <protocol> <source IP> <wildcard mask> <destination IP> <wildcard mask> eq <port number> 52.com.safaribooksonline. show interface bri. Each subinterface can be configured with different addressing information..plsinfo.78). 53. The commands to configure ISDN on a router are Router (config)# isdn switch-type <switch-type> Router (config)# dialer-list <dialer-group> protocol <protocol-name> permit Router (config-if)# interface bri 0 Router (config-if)# encapsulation PPP Router (config-if)# dialer-group <number> Router (config-if)# dialer map <protocol> <next-hop address> name <hostname> speed <number> <dial-string> Router (config-if) dialer idle-timeout <seconds> 61. and show dialer. Subinterfaces can be created and accessed using the serial interface number followed by a period and a number (such as serial 0. The basic commands to monitor PPP activity on a router are show interface and debug ppp chap. show frame-relay map.org:2048/print?xmlid=0789735296/. 59.. http://proquest. show framerelay lmi. 60. and debug frame-relay lmi.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.