NET 224: Advanced Routers and Routing

Review for Second Test
 
  1. What is the Bootstrap component of a Cisco router? What other names is it known by?

  2. Where is the Cisco IOS stored on a router?

  3. Where are configuration files stored on a Cisco router?

  4. What is the configuration register? What is its standard value?

  5. In a standard bootup for a router, what are the first four things that should load?

  6. In a non-standard boot, what causes the router to ask if it should go into setup mode?

  7. What must be changed in the configuration register to cause the configuration file NOT be be loaded on boot?

  8. What is stored in the router's configuration file that makes us want to load or not load it?

  9. "The text gives us a procedure to recover a router's passwords". Why is that statement incorrect?

  10. When resetting passwords, what is the confreg command used for? What model router in the text example uses this command?

  11. The first step in the password reset sequence asks you to send a break to the router. Does the current value of the configuration register matter for this step? Why?

  12. The second step of the password reset sequence asks you to change the configuration register. Why?

  13. The password reset sequence includes a step to copy the startup-config file to the running-config file. Is this done before or after changing the passwords? Why?

  14. You should be able to chart the steps to reset the enable password for a router.

  15. Where can you keep a safety copy of your router's IOS file?

  16. What protocol is used to copy the IOS file to its secondary location?

  17. What will the show flash command tell you?

  18. What is the command to make a copy of the IOS file?

  19. When you copy the IOS file from the secondary location to the router, what unfortunate destructive action might occur?

  20. Copying the configuration file from the safety storage to the router has what effect on interfaces?

  21. The CDP protocol can show you several kinds of devices that are attached to ports on Cisco devices. What kinds of device can be sensed? What symbols stand for those kinds of devices?

  22. What must be done on Cisco devices in order to use Telnet connections to manage them?

  23. What is the ping command used for?

  24. What is the tracert command used for?

  25. What is a Cisco access list?

  26. What is the access-list command used for?

  27. What is the access-group command used for?

  28. What is the access-class command used for?

  29. What is the difference between a standard access list and an extended accessl list?

  30. Assume an access list has five permit rules in it.
    What happens with the rest of the rules if the first rule applies to a packet?

    What must be true for a packet to be evaluate by the fifth rule?

    What must be true for a packet to be denied?

  31. What is a wildcard mask?

  32. Write an access list rule that creates a standard access list, permitting packets from any host in subnet 10.24.16.0.

    Does this command require a wildcard mask?

  33. Rewrite the command above to allow a packets from a block of 8 subnets, starting with the one above.

    What if we wanted to allow packets from a block of 10 subnets, instead? Rewrite the command as it might have to be written.

  34. What is the difference between inbound and outbound packets, with respect to any interface?

    Which command is used to specify whether we are applying a list to inbound or outbound packets?

  35. If you give an access list a name, what feature do you leave out of the command that creates it? What option must be added that is not needed when the list does not have a name?

  36. Explain the parts of this command to create an extended access list:
    access-list number permit/deny/dynamic protocol source destination service_type_number

  37. What are the ranges of numbers that apply to standard IP access lists?

  38. What are the ranges of numbers that apply to extended IP access lists?