Summary: Ccnp And Ccie Enterprise Core Official Cert Guide | 1-58714-523-5 | Bradley Edgeworth, et al
- This + 400k other summaries
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding
Read the summary and the most important questions on CCNP and CCIE Enterprise Core Official Cert Guide | 1-58714-523-5 | Bradley Edgeworth, Ramiro Garza Rios, Jason Gooley, David Hucaby
-
1 Packet Forwarding
-
1.1 Network Device Communication
This is a preview. There are 12 more flashcards available for chapter 1.1
Show more cards here -
What does the acronym MAC, used by the Layer 2 Ethernet protocol for addressing, stand for.
MediaAccess Control -
A MAC address is notated in hexadecimal, of how many bits and octets does it consist?
It consists of 48 bits, divided in 6 octets. -
CSMA/CD is used by Ethernet devices to ensure only one device talks at a time on a collision domain. What does CSMA/CD stand for?
Carrier Sense Multiple Access/Collision Detect -
What is the flooding of a packet known as when a switch doesn't know the destination MAC address
Unknown Unicast Flooding. -
All devices in the same Layer 2 segment are considered to be in the same?
Broadcast Domain -
VLANs are defined in the IEEE 802.1Q standard, which states 32 bits are added to the packet header. Which 4 fields are added in those 32 bits?
TPID - Tag Protocol Identifier, 16 bit, Set to 0x8100 to identify as 802.1Q
PCP - Priority Code Point, 3bit, Class of Service, Used for QoS
DEI - Drop Eligible Indicator, 1 bit, Indicates if packet can be dropped
VLAN ID, 12 bit, Specifies the associated VLAN. -
Cisco switches have some default uses for VLAN 0, VLAN 1 and VLAN 1002-1005. Which ones?
VLAN 0 - Reserverd for 802.1P traffic
VLAN 1 - default VLAN
VLAN 1002-1005 - Reserved -
802.1Q tags are not included on packets received on an access port. How many VLANs can an Access Port be Assigned to?
Only oneVLAN -
A Trunk port can receive and send packets with 802.1Q headers and removes them after receiving them. Can a Trunk port be assigned to multiple VLANs?
Yes -
What is the command Switchport Trunk Allowed VLAN used for?
To addVLANS to theswitchport configuration which are allowed to traverse theswitchport .
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Topics related to Summary: Ccnp And Ccie Enterprise Core Official Cert Guide
-
Spanning Tree Protocol - Spanning Tree Protocol Fundamentals
-
Advanced STP Tuning - STP Topology Tuning
-
Advanced STP Tuning - Additional STP Protection Mechanisms
-
Multiple Spanning Tree Protocol
-
VLAN Trunks and EtherChannel Bundles - VLAN Trunking Protocol
-
VLAN Trunks and EtherChannel Bundles - Dynamic Trunking Protocol
-
VLAN Trunks and EtherChannel Bundles - EtherChannel Bundle
-
IP Routing Essentials - Routing Protocol Overview
-
EIGRP - EIGRP Fundamentals
-
OSPF - Common OSPF Optimizations
-
Advanced OSPF - Areas
-
Advanced OSPF - Link-State Announcements
-
Advanced OSPF - Route Filtering
-
OSPFv3 Fundamentals
-
OSPFv3 Configuration
-
BGP - BGP Fundamentals
-
BGP - Basic BGP Configuration
-
BGP - Route Summarization
-
BGP - Multiprotocol BGP for IPv6
-
Advanced BGP - Conditional Matching
-
Advanced BGP - BGP Route Filtering and Manipulation
-
Advanced BGP - BGP Communities
-
Multicast - Multicast Fundamentals
-
Multicast - Internet Group Management Protocol
-
Multicast - Protocol Independent Multicast
-
Multicast - Rendezvous Points
-
QoS - The Need For QoS
-
QoS - QoS Models
-
QoS - Classification and Marking
-
QoS - Policing and Shaping
-
QoS - Congestion Management and Avoidance
-
IP Services - Foundation Topics
-
IP Services - First-Hop Redundancy Protocol
-
IP Services - Network Address Translation
-
Overlay Tunnels - Generic Routing Encapsulation (GRE) Tunnels
-
Overlay Tunnels - IPSec Fundamentals
-
Overlay Tunnels - Cisco Location ID Seperation Protocol
-
Overlay Tunnels - Virtual Extensible Local Area Network (VXLAN)
-
Wireless Signals and Modulation - Understanding Basic Wireless Theory
-
Wireless Signals and Modulation - Carrying Data Over an RF Signal
-
Wireless Infrastructure
-
Understanding Wireless Roaming and Location Services - Roaming Overview
-
Understanding Wireless Roaming and Location Services - Roaming Between Centralized Controllers
-
Authenticatin Wireless Clients
-
Troubleshooting Wireless Connectivity - Troubleshooting Wireless Connectivity From The WLC
-
Enterprise Network Architecture - Enterprise Network Architecture Options
-
Fabric Technologies - Software-Defined Access
-
Fabric Technologies - Software-Defined WAN
-
Network Assurance - Debugging
-
Network Assurance - NetFlow and Flexible NetFlow
-
Network Assurance - Switch Port Analyzer (SPAN) Technologies
-
Secure Network Access Control - Network Security Design for Threat Defense
-
Secure Network Access Control - Next-Generation Endpoint Security
-
Secure Network Access Control - Network Access Control (NAC)
-
Network Device Access Control and Infrastructure Security
-
Virtualization - Network Functions Virtualization
-
Foundational Network Programmability Concepts
-
Introduction to Automation Tools - Embedded Event Manager (EEM)
-
Introduction to Automation Tools - Agent-Based Automation Tools
-
Introduction to Automation Tools - Agentless Automation Tools
-
Based on practice exams
-
Based on practive exams