Deck 8: Advanced Routing Protocols

Full screen (f)
exit full mode
Question
Although it is often described as a hybrid protocol containing the features of both distance-vector and link-state protocols, EIGRP is still a ____ routing protocol at its core.

A) link-state
B) distance-vector
C) link-vector
D) distance-state
Use Space or
up arrow
down arrow
to flip the card.
Question
In general, ____ routing protocols flood nonperiodic link-state advertisements of only changed routes throughout the entire internetwork.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
Question
____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.

A) RIPv1
B) Classless
C) Classful
D) Class-oriented
Question
RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication.

A) SSH
B) RC4
C) MD5
D) SHA
Question
____ allow EIGRP to support multiple Network layer routed protocols such as IP, IPX, and AppleTalk.

A) Neighbor discovery and maintenance
B) Protocol Dependent Modules
C) Reliable Transport Protocol
D) Diffusing Update Algorithm (DUAL)
Question
The message update format in RIPv1 does not have room for subnet mask information in the IP address field.
Question
EIGRP uses multicast address ____ to multicast Hello packets every five seconds on most networks of T1 speed or greater.

A) 224.0.0.10
B) 224.224.0.1
C) 255.255.0.10
D) 255.255.255.10
Question
DUAL uses the ____ topology table to track the status of all links in a network.

A) EIGRP
B) OSPF
C) RIPv1
D) RIPv2
Question
In general, due to the complexity of modern networks and the use of VLSMs, which require subnet mask information to be sent with update messages, most networks use classful routing protocols.
Question
Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various packet types. Instead, Cisco developed an entirely new layer 4 protocol, the ____, for use by EIGRP.

A) Protocol Dependent Modules (PDM)
B) Reliable Transport Protocol (RTP)
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
Question
The ____ table contains information about all the networks a router can reach.

A) RIP neighbors
B) OSPF status
C) EIGRP topology
D) RIPv1 topology
Question
EIGRP uses the same metric as IGRP multiplied by ____.

A) 32
B) 64
C) 128
D) 256
Question
Classful routing protocols can be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM).
Question
____ allow EIGRP to discover neighbors and keep track of their status.

A) Reliable Transport Protocol
B) Protocol Dependent Modules
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
Question
The ____ command switches RIP to version 2.

A) version 2
B) no auto-summary
C) rip2
D) rip 2 on
Question
The four bytes set aside for the ____ field allow RIPv2 to send the full 32-bit subnet mask for each network configured on the router's interfaces.

A) Next Hop
B) IP Address
C) Address Family Identifier
D) Subnet Mask
Question
The ____ command overrides RIPv2's default behavior of summarizing to major network boundaries.

A) no default
B) no default summary
C) auto-summary off
D) no auto-summary
Question
In general, ____ routing protocols send periodic updates of the entire routing table to their directly connected neighbors.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
Question
EIGRP uses nonperiodic, partial, and bounded routing table updates.
Question
OSPF is ideally suited for large networks because it can use a concept known as areas to bound link-state advertisements.
Question
Describe the Routing Information Protocol version 2.
Question
Describe the Enhanced Interior Gateway Routing Protocol (EIGRP).
Question
What are the major components of EIGRP?
Question
____ is an open standards, link-state routing protocol that supports classless routing, variable-length subnet masks, and authentication.

A) OSPF
B) EIGRP
C) RIPv1
D) IGRP
Question
A(n) ____ in OSPF is a router's interface.

A) link-state
B) cost
C) link
D) area
Question
How does RIPv2 authenticate routing peers?
Question
____________________ routing protocols offer the ability to carry subnet mask information in the routing table updates.
Question
What are the six factors used by EIGRP to calculate a route metric?
Question
__________________________________________________ is a Cisco proprietary protocol designed to overcome the limitations found in IGRP.
Question
____________________ routing protocols summarize networks to their major network boundaries (Class A, B, or C) and do not carry subnet mask information in their routing table updates.
Question
The ___________________________________ is the heart and soul of EIGRP, and is the reason that EIGRP can quickly recover from a link outage and route around network problems.
Question
___________________________________ allow EIGRP to carry multiple routed protocols within their own native packet formats.
Question
OSPF uses a(n) ____ database, which holds the common view of the network formed from the link-state advertisements that are received.

A) adjacencies
B) designated routers
C) link-state
D) topological
Question
What are the steps for configuring EIGRP authentication?
Question
In EIGRP, ____ is a good state, as it means all DUAL computations have been completed and the route is stable.

A) active
B) fixed
C) down
D) passive
Question
In OSPF, a(n) ____ is the portion of a network within which LSAs are contained.

A) domain
B) segment
C) container
D) area
Question
Describe the Open Shortest Path First (OSPF) protocol.
Question
What are the steps required to configure RIPv2 authentication?
Question
What are some of the key terms associated with the Diffusing Update Algorithm (DUAL)?
Question
In OSPF, the ____ database contains information about all OSPF peers with which a router has successfully exchanged Hello packets.

A) link-state
B) adjacencies
C) cost
D) topological
Question
Match between columns
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Bandwidth
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
RIPv1
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hello packets
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MD5
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
EIGRP
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hash
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Reliable multicast
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Routing table updates
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MTU
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Bandwidth
a feature of RTP that requests an acknowledgment via unicast to a multicast message
RIPv1
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hello packets
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MD5
a feature of RTP that requests an acknowledgment via unicast to a multicast message
EIGRP
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hash
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Reliable multicast
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Routing table updates
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MTU
the speed of the link
Bandwidth
the speed of the link
RIPv1
the speed of the link
Hello packets
the speed of the link
MD5
the speed of the link
EIGRP
the speed of the link
Hash
the speed of the link
Reliable multicast
the speed of the link
Routing table updates
the speed of the link
MTU
an example of an EIGRP packet type that uses reliable multicast via RTP
Bandwidth
an example of an EIGRP packet type that uses reliable multicast via RTP
RIPv1
an example of an EIGRP packet type that uses reliable multicast via RTP
Hello packets
an example of an EIGRP packet type that uses reliable multicast via RTP
MD5
an example of an EIGRP packet type that uses reliable multicast via RTP
EIGRP
an example of an EIGRP packet type that uses reliable multicast via RTP
Hash
an example of an EIGRP packet type that uses reliable multicast via RTP
Reliable multicast
an example of an EIGRP packet type that uses reliable multicast via RTP
Routing table updates
an example of an EIGRP packet type that uses reliable multicast via RTP
MTU
a classful routing protocol
Bandwidth
a classful routing protocol
RIPv1
a classful routing protocol
Hello packets
a classful routing protocol
MD5
a classful routing protocol
EIGRP
a classful routing protocol
Hash
a classful routing protocol
Reliable multicast
a classful routing protocol
Routing table updates
a classful routing protocol
MTU
a number generated by MD5 from the secret key
Bandwidth
a number generated by MD5 from the secret key
RIPv1
a number generated by MD5 from the secret key
Hello packets
a number generated by MD5 from the secret key
MD5
a number generated by MD5 from the secret key
EIGRP
a number generated by MD5 from the secret key
Hash
a number generated by MD5 from the secret key
Reliable multicast
a number generated by MD5 from the secret key
Routing table updates
a number generated by MD5 from the secret key
MTU
a classless routing protocol
Bandwidth
a classless routing protocol
RIPv1
a classless routing protocol
Hello packets
a classless routing protocol
MD5
a classless routing protocol
EIGRP
a classless routing protocol
Hash
a classless routing protocol
Reliable multicast
a classless routing protocol
Routing table updates
a classless routing protocol
MTU
allow EIGRP neighbors to determine if routing peers are still online and available
Bandwidth
allow EIGRP neighbors to determine if routing peers are still online and available
RIPv1
allow EIGRP neighbors to determine if routing peers are still online and available
Hello packets
allow EIGRP neighbors to determine if routing peers are still online and available
MD5
allow EIGRP neighbors to determine if routing peers are still online and available
EIGRP
allow EIGRP neighbors to determine if routing peers are still online and available
Hash
allow EIGRP neighbors to determine if routing peers are still online and available
Reliable multicast
allow EIGRP neighbors to determine if routing peers are still online and available
Routing table updates
allow EIGRP neighbors to determine if routing peers are still online and available
MTU
the maximum datagram size allowed on a link
Bandwidth
the maximum datagram size allowed on a link
RIPv1
the maximum datagram size allowed on a link
Hello packets
the maximum datagram size allowed on a link
MD5
the maximum datagram size allowed on a link
EIGRP
the maximum datagram size allowed on a link
Hash
the maximum datagram size allowed on a link
Reliable multicast
the maximum datagram size allowed on a link
Routing table updates
the maximum datagram size allowed on a link
MTU
Question
Briefly describe OSPF authentication.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Advanced Routing Protocols
1
Although it is often described as a hybrid protocol containing the features of both distance-vector and link-state protocols, EIGRP is still a ____ routing protocol at its core.

A) link-state
B) distance-vector
C) link-vector
D) distance-state
B
2
In general, ____ routing protocols flood nonperiodic link-state advertisements of only changed routes throughout the entire internetwork.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
A
3
____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.

A) RIPv1
B) Classless
C) Classful
D) Class-oriented
C
4
RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication.

A) SSH
B) RC4
C) MD5
D) SHA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ allow EIGRP to support multiple Network layer routed protocols such as IP, IPX, and AppleTalk.

A) Neighbor discovery and maintenance
B) Protocol Dependent Modules
C) Reliable Transport Protocol
D) Diffusing Update Algorithm (DUAL)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The message update format in RIPv1 does not have room for subnet mask information in the IP address field.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
EIGRP uses multicast address ____ to multicast Hello packets every five seconds on most networks of T1 speed or greater.

A) 224.0.0.10
B) 224.224.0.1
C) 255.255.0.10
D) 255.255.255.10
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
DUAL uses the ____ topology table to track the status of all links in a network.

A) EIGRP
B) OSPF
C) RIPv1
D) RIPv2
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
In general, due to the complexity of modern networks and the use of VLSMs, which require subnet mask information to be sent with update messages, most networks use classful routing protocols.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various packet types. Instead, Cisco developed an entirely new layer 4 protocol, the ____, for use by EIGRP.

A) Protocol Dependent Modules (PDM)
B) Reliable Transport Protocol (RTP)
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ table contains information about all the networks a router can reach.

A) RIP neighbors
B) OSPF status
C) EIGRP topology
D) RIPv1 topology
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
EIGRP uses the same metric as IGRP multiplied by ____.

A) 32
B) 64
C) 128
D) 256
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Classful routing protocols can be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ allow EIGRP to discover neighbors and keep track of their status.

A) Reliable Transport Protocol
B) Protocol Dependent Modules
C) Neighbor discovery and maintenance
D) Diffusing Update Algorithm (DUAL)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ command switches RIP to version 2.

A) version 2
B) no auto-summary
C) rip2
D) rip 2 on
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The four bytes set aside for the ____ field allow RIPv2 to send the full 32-bit subnet mask for each network configured on the router's interfaces.

A) Next Hop
B) IP Address
C) Address Family Identifier
D) Subnet Mask
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ command overrides RIPv2's default behavior of summarizing to major network boundaries.

A) no default
B) no default summary
C) auto-summary off
D) no auto-summary
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In general, ____ routing protocols send periodic updates of the entire routing table to their directly connected neighbors.

A) link-state
B) distance-vector
C) exterior gateway
D) interior gateway
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
EIGRP uses nonperiodic, partial, and bounded routing table updates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
OSPF is ideally suited for large networks because it can use a concept known as areas to bound link-state advertisements.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the Routing Information Protocol version 2.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Describe the Enhanced Interior Gateway Routing Protocol (EIGRP).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What are the major components of EIGRP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____ is an open standards, link-state routing protocol that supports classless routing, variable-length subnet masks, and authentication.

A) OSPF
B) EIGRP
C) RIPv1
D) IGRP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ in OSPF is a router's interface.

A) link-state
B) cost
C) link
D) area
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
How does RIPv2 authenticate routing peers?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____________________ routing protocols offer the ability to carry subnet mask information in the routing table updates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the six factors used by EIGRP to calculate a route metric?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
__________________________________________________ is a Cisco proprietary protocol designed to overcome the limitations found in IGRP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ routing protocols summarize networks to their major network boundaries (Class A, B, or C) and do not carry subnet mask information in their routing table updates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ___________________________________ is the heart and soul of EIGRP, and is the reason that EIGRP can quickly recover from a link outage and route around network problems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
___________________________________ allow EIGRP to carry multiple routed protocols within their own native packet formats.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
OSPF uses a(n) ____ database, which holds the common view of the network formed from the link-state advertisements that are received.

A) adjacencies
B) designated routers
C) link-state
D) topological
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the steps for configuring EIGRP authentication?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
In EIGRP, ____ is a good state, as it means all DUAL computations have been completed and the route is stable.

A) active
B) fixed
C) down
D) passive
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In OSPF, a(n) ____ is the portion of a network within which LSAs are contained.

A) domain
B) segment
C) container
D) area
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe the Open Shortest Path First (OSPF) protocol.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the steps required to configure RIPv2 authentication?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What are some of the key terms associated with the Diffusing Update Algorithm (DUAL)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
In OSPF, the ____ database contains information about all OSPF peers with which a router has successfully exchanged Hello packets.

A) link-state
B) adjacencies
C) cost
D) topological
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Bandwidth
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
RIPv1
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hello packets
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MD5
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
EIGRP
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Hash
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Reliable multicast
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
Routing table updates
allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers
MTU
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Bandwidth
a feature of RTP that requests an acknowledgment via unicast to a multicast message
RIPv1
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hello packets
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MD5
a feature of RTP that requests an acknowledgment via unicast to a multicast message
EIGRP
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Hash
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Reliable multicast
a feature of RTP that requests an acknowledgment via unicast to a multicast message
Routing table updates
a feature of RTP that requests an acknowledgment via unicast to a multicast message
MTU
the speed of the link
Bandwidth
the speed of the link
RIPv1
the speed of the link
Hello packets
the speed of the link
MD5
the speed of the link
EIGRP
the speed of the link
Hash
the speed of the link
Reliable multicast
the speed of the link
Routing table updates
the speed of the link
MTU
an example of an EIGRP packet type that uses reliable multicast via RTP
Bandwidth
an example of an EIGRP packet type that uses reliable multicast via RTP
RIPv1
an example of an EIGRP packet type that uses reliable multicast via RTP
Hello packets
an example of an EIGRP packet type that uses reliable multicast via RTP
MD5
an example of an EIGRP packet type that uses reliable multicast via RTP
EIGRP
an example of an EIGRP packet type that uses reliable multicast via RTP
Hash
an example of an EIGRP packet type that uses reliable multicast via RTP
Reliable multicast
an example of an EIGRP packet type that uses reliable multicast via RTP
Routing table updates
an example of an EIGRP packet type that uses reliable multicast via RTP
MTU
a classful routing protocol
Bandwidth
a classful routing protocol
RIPv1
a classful routing protocol
Hello packets
a classful routing protocol
MD5
a classful routing protocol
EIGRP
a classful routing protocol
Hash
a classful routing protocol
Reliable multicast
a classful routing protocol
Routing table updates
a classful routing protocol
MTU
a number generated by MD5 from the secret key
Bandwidth
a number generated by MD5 from the secret key
RIPv1
a number generated by MD5 from the secret key
Hello packets
a number generated by MD5 from the secret key
MD5
a number generated by MD5 from the secret key
EIGRP
a number generated by MD5 from the secret key
Hash
a number generated by MD5 from the secret key
Reliable multicast
a number generated by MD5 from the secret key
Routing table updates
a number generated by MD5 from the secret key
MTU
a classless routing protocol
Bandwidth
a classless routing protocol
RIPv1
a classless routing protocol
Hello packets
a classless routing protocol
MD5
a classless routing protocol
EIGRP
a classless routing protocol
Hash
a classless routing protocol
Reliable multicast
a classless routing protocol
Routing table updates
a classless routing protocol
MTU
allow EIGRP neighbors to determine if routing peers are still online and available
Bandwidth
allow EIGRP neighbors to determine if routing peers are still online and available
RIPv1
allow EIGRP neighbors to determine if routing peers are still online and available
Hello packets
allow EIGRP neighbors to determine if routing peers are still online and available
MD5
allow EIGRP neighbors to determine if routing peers are still online and available
EIGRP
allow EIGRP neighbors to determine if routing peers are still online and available
Hash
allow EIGRP neighbors to determine if routing peers are still online and available
Reliable multicast
allow EIGRP neighbors to determine if routing peers are still online and available
Routing table updates
allow EIGRP neighbors to determine if routing peers are still online and available
MTU
the maximum datagram size allowed on a link
Bandwidth
the maximum datagram size allowed on a link
RIPv1
the maximum datagram size allowed on a link
Hello packets
the maximum datagram size allowed on a link
MD5
the maximum datagram size allowed on a link
EIGRP
the maximum datagram size allowed on a link
Hash
the maximum datagram size allowed on a link
Reliable multicast
the maximum datagram size allowed on a link
Routing table updates
the maximum datagram size allowed on a link
MTU
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Briefly describe OSPF authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.