4
Chapter 8 True/False Indicate whether the statement is true or false. ____ 1. Classful routing protocols can be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM). ____ 2. The message update format in RIPv1 does not have room for subnet mask information in the IP address field. ____ 3. In general, due to the complexity of modern networks and the use of VLSMs, which require subnet mask information to be sent with update messages, most networks use classful routing protocols. ____ 4. EIGRP uses nonperiodic, partial, and bounded routing table updates. ____ 5. OSPF is ideally suited for large networks because it can use a concept known as areas to bound link-state advertisements. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. In general, ____ routing protocols send periodic updates of the entire routing table to their directly connected neighbors. a. link-state c. exterior gateway b. distance-vector d. interior gateway ____ 7. In general, ____ routing protocols flood nonperiodic link-state advertisements of only changed routes throughout the entire internetwork. a. link-state c. exterior gateway b. distance-vector d. interior gateway ____ 8. ____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist. a. RIPv1 c. Classful b. Classless d. Class-oriented ____ 9. The four bytes set aside for the ____ field allow RIPv2 to send the full 32-bit subnet mask for each network configured on the router’s interfaces. a. Next Hop c. Address Family Identifier b. IP Address d. Subnet Mask ____ 10. The ____ command switches RIP to version 2. a. version 2 c. rip2 b. no auto-summary d. rip 2 on ____ 11. The ____ command overrides RIPv2’s default behavior of summarizing to major network boundaries. a. no default c. auto-summary off b. no default summary d. no auto-summary ____ 12. RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication. a. SSH c. MD5

CCNA Advanced Routing Protocols Questions

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: CCNA Advanced Routing Protocols Questions

Chapter 8

True/False

Indicate whether the statement is true or false.

____ 1. Classful routing protocols can be used in networks with either discontiguous subnets or networks using

variable length subnet masks (VLSM).

____ 2. The message update format in RIPv1 does not have room for subnet mask information in the IP address field.

____ 3. In general, due to the complexity of modern networks and the use of VLSMs, which require subnet mask

information to be sent with update messages, most networks use classful routing protocols.

____ 4. EIGRP uses nonperiodic, partial, and bounded routing table updates.

____ 5. OSPF is ideally suited for large networks because it can use a concept known as areas to bound link-state

advertisements.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

____ 6. In general, ____ routing protocols send periodic updates of the entire routing table to their directly connected

neighbors.

a. link-state c. exterior gateway

b. distance-vector d. interior gateway

____ 7. In general, ____ routing protocols flood nonperiodic link-state advertisements of only changed routes

throughout the entire internetwork.

a. link-state c. exterior gateway

b. distance-vector d. interior gateway

____ 8. ____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM

exist.

a. RIPv1 c. Classful

b. Classless d. Class-oriented

____ 9. The four bytes set aside for the ____ field allow RIPv2 to send the full 32-bit subnet mask for each network

configured on the router’s interfaces.

a. Next Hop c. Address Family Identifier

b. IP Address d. Subnet Mask

____ 10. The ____ command switches RIP to version 2.

a. version 2 c. rip2

b. no auto-summary d. rip 2 on

____ 11. The ____ command overrides RIPv2’s default behavior of summarizing to major network boundaries.

a. no default c. auto-summary off

b. no default summary d. no auto-summary

____ 12. RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication.

a. SSH c. MD5

Page 2: CCNA Advanced Routing Protocols Questions

b. RC4 d. SHA

____ 13. Although it is often described as a hybrid protocol containing the features of both distance-vector and

link-state protocols, EIGRP is still a ____ routing protocol at its core.

a. link-state c. link-vector

b. distance-vector d. distance-state

____ 14. EIGRP uses the same metric as IGRP multiplied by ____.

a. 32 c. 128

b. 64 d. 256

____ 15. ____ allow EIGRP to support multiple Network layer routed protocols such as IP, IPX, and AppleTalk.

a. Neighbor discovery and maintenance c. Reliable Transport Protocol

b. Protocol Dependent Modules d. Diffusing Update Algorithm (DUAL)

____ 16. ____ allow EIGRP to discover neighbors and keep track of their status.

a. Reliable Transport Protocol c. Neighbor discovery and maintenance

b. Protocol Dependent Modules d. Diffusing Update Algorithm (DUAL)

____ 17. EIGRP uses multicast address ____ to multicast Hello packets every five seconds on most networks of T1

speed or greater.

a. 224.0.0.10 c. 255.255.0.10

b. 224.224.0.1 d. 255.255.255.10

____ 18. Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various

packet types. Instead, Cisco developed an entirely new layer 4 protocol, the ____, for use by EIGRP.

a. Protocol Dependent Modules (PDM) c. Neighbor discovery and maintenance

b. Reliable Transport Protocol (RTP) d. Diffusing Update Algorithm (DUAL)

____ 19. DUAL uses the ____ topology table to track the status of all links in a network.

a. EIGRP c. RIPv1

b. OSPF d. RIPv2

____ 20. The ____ table contains information about all the networks a router can reach.

a. RIP neighbors c. EIGRP topology

b. OSPF status d. RIPv1 topology

____ 21. In EIGRP, ____ is a good state, as it means all DUAL computations have been completed and the route is

stable.

a. active c. down

b. fixed d. passive

____ 22. ____ is an open standards, link-state routing protocol that supports classless routing, variable-length subnet

masks, and authentication.

a. OSPF c. RIPv1

b. EIGRP d. IGRP

____ 23. In OSPF, a(n) ____ is the portion of a network within which LSAs are contained.

a. domain c. container

b. segment d. area

____ 24. A(n) ____ in OSPF is a router’s interface.

a. link-state c. link

b. cost d. area

Page 3: CCNA Advanced Routing Protocols Questions

____ 25. In OSPF, the ____ database contains information about all OSPF peers with which a router has successfully

exchanged Hello packets.

a. link-state c. cost

b. adjacencies d. topological

____ 26. OSPF uses a(n) ____ database, which holds the common view of the network formed from the link-state

advertisements that are received.

a. adjacencies c. link-state

b. designated routers d. topological

Completion

Complete each statement.

27. ____________________ routing protocols summarize networks to their major network boundaries (Class A,

B, or C) and do not carry subnet mask information in their routing table updates.

28. ____________________ routing protocols offer the ability to carry subnet mask information in the routing

table updates.

29. __________________________________________________ is a Cisco proprietary protocol designed to

overcome the limitations found in IGRP.

30. ___________________________________ allow EIGRP to carry multiple routed protocols within their own

native packet formats.

31. The ___________________________________ is the heart and soul of EIGRP, and is the reason that EIGRP

can quickly recover from a link outage and route around network problems.

Matching

Match each item with a statement below:

a. RIPv1 f. MTU

b. EIGRP g. Hello packets

c. MD5 h. Routing table updates

d. Hash i. Reliable multicast

e. Bandwidth

____ 32. the speed of the link

____ 33. a classful routing protocol

____ 34. allow EIGRP neighbors to determine if routing peers are still online and available

____ 35. allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link

between the two peers

____ 36. a classless routing protocol

____ 37. a number generated by MD5 from the secret key

____ 38. a feature of RTP that requests an acknowledgment via unicast to a multicast message

Page 4: CCNA Advanced Routing Protocols Questions

____ 39. an example of an EIGRP packet type that uses reliable multicast via RTP

____ 40. the maximum datagram size allowed on a link

Short Answer

41. Describe the Routing Information Protocol version 2.

42. How does RIPv2 authenticate routing peers?

43. What are the steps required to configure RIPv2 authentication?

44. Describe the Enhanced Interior Gateway Routing Protocol (EIGRP).

45. What are the six factors used by EIGRP to calculate a route metric?

46. What are the major components of EIGRP?

47. What are some of the key terms associated with the Diffusing Update Algorithm (DUAL)?

48. What are the steps for configuring EIGRP authentication?

49. Describe the Open Shortest Path First (OSPF) protocol.

50. Briefly describe OSPF authentication.