NET 224: Advanced Routers and Routing
Review for Second Test
- What is the Bootstrap component of a Cisco router? What other names
is it known by?
- Where is the Cisco IOS stored on a router?
- Where are configuration files stored on a Cisco router?
- What is the configuration register? What is its standard value?
- In a standard bootup for a router, what are the first four things
that should load?
- In a non-standard boot, what causes the router to ask if it should
go into setup mode?
- What must be changed in the configuration register to cause the configuration
file NOT be be loaded on boot?
- What is stored in the router's configuration file that makes us want
to load or not load it?
- "The text gives us a procedure to recover a router's passwords".
Why is that statement incorrect?
- When resetting passwords, what is the confreg command used for? What
model router in the text example uses this command?
- The first step in the password reset sequence asks you to send a break
to the router. Does the current value of the configuration register
matter for this step? Why?
- The second step of the password reset sequence asks you to change
the configuration register. Why?
- The password reset sequence includes a step to copy the startup-config
file to the running-config file. Is this done before or after changing
the passwords? Why?
- You should be able to chart the steps to reset the enable password
for a router.
- Where can you keep a safety copy of your router's IOS file?
- What protocol is used to copy the IOS file to its secondary location?
- What will the show flash command tell you?
- What is the command to make a copy of the IOS file?
- When you copy the IOS file from the secondary location to the router,
what unfortunate destructive action might occur?
- Copying the configuration file from the safety storage to the router
has what effect on interfaces?
- The CDP protocol can show you several kinds of devices that are attached
to ports on Cisco devices. What kinds of device can be sensed? What
symbols stand for those kinds of devices?
- What must be done on Cisco devices in order to use Telnet connections
to manage them?
- What is the ping command used for?
- What is the tracert command used for?
- What is a Cisco access list?
- What is the access-list command used for?
- What is the access-group command used for?
- What is the access-class command used for?
- What is the difference between a standard access list and an extended
- Assume an access list has five permit rules in it.
What happens with the rest of the rules if the first rule applies to
What must be true for a packet to be evaluate by the fifth rule?
What must be true for a packet to be denied?
- What is a wildcard mask?
- Write an access list rule that creates a standard access list, permitting
packets from any host in subnet 10.24.16.0.
Does this command require a wildcard mask?
- Rewrite the command above to allow a packets from a block of 8 subnets,
starting with the one above.
What if we wanted to allow packets from a block of 10 subnets, instead?
Rewrite the command as it might have to be written.
- What is the difference between inbound and outbound packets, with
respect to any interface?
Which command is used to specify whether we are applying a list to inbound
or outbound packets?
- If you give an access list a name, what feature do you leave out of
the command that creates it? What option must be added that is not needed
when the list does not have a name?
- Explain the parts of this command to create an extended access list:
access-list number permit/deny/dynamic
protocol source destination service_type_number
- What are the ranges of numbers that apply to standard IP access lists?
- What are the ranges of numbers that apply to extended IP access lists?