This field contains an 8-bit binary value that is used to limit the lifetime of the packet
Time to live
This is the size of the source address field in bytes
16 bytes
This routes traffic to other networks
Default gateway
This protocol is used to map IPv4 addresses to MAC addresses
ARP
This command is used to configure a default gateway on a switch
ip default-gateway 192.168.0.1
This is used to ddetect corruption in the IPv4 header
Header checksum
This is what the time to live field from the IPv4 header was renamed to
Hop limit
This type of routing is where routes are manually configured
Static routing
An IPv6 device uses this message to receive the MAC address of another device with a known IPv6 address
Router(config)# enable secret cisco123
What is this command doing?
Securing privileged EXEC mode
This is how long in bytes an IPv4 packet header is
20 bytes
This is how long an IPv6 packet header is in bytes
40 bytes
In the router's routing table, this entry is used when there is no better match in the IP routing table
Default route
This command is used to show the ARP table in a Cisco router
show ip arp
This command helps to verify the IPv4 interface configuration
show ip interface brief
The flags field is this many bits long
3 bits
Flow label
OSPF and EIGRP are protocols of what type of routing?
Dynamic routing
Neighbor solicitation, neighbor advertisement, router solicitation, and router advertisement messages all use this protocol
ICMPv6
This command displays the contents of the IP routing tables stored in RAM
show ip route
OR
show ipv6 route
This 8 bit field is used to determine the priority of a packet
Differentiated services (or type of service)
IPv6 allows for this many unique addresses
340 undecillion addresses
Being connectionless, media independent, and giving best effort are characteristics of what?
IP
This is the destination MAC address of an ARP request
FF-FF-FF-FF-FF-FF
Router(config-line)# line vty 0 4
Router(config-line)# password cisco123
Router(config-line)# login
Router(config-line)# transport input ssh
What are these commands doing?
Securing remote SSH access