Chapter 11 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command? 1. The status of the switch interfaces and the address configured on interface vlan 1 2. That a specific host on another network can be reached 3. The default gateway that is used by the switch 4. The path that is used to reach a specific host on another network

1

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? 1. ipconfig/all 2. arp-a 3. ipconfig/displaydns 4. nslookup

3

Fill in the blank. Network services use __________________ to define a set of rules that govern how devices communicate and the data formats used in a network.

network protocols

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? 1. A user who is trying to guess a password to access the router 2. An unidentified individual who is trying to access the network equipment room 3. A worm that is attempting to access another part of the network 4. A device that is trying to inspect the traffic on a link

1

A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option? 1. It forces the trace to use IPv6 2. It limits the trace to only 6 hops 3. It sets a 6 milliseconds timeout for each replay 4. It sends 6 probes within each TTL time period

1

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? 1. Devices with support for modularity 2. Redundant devices 3. Devices with a fixed number and type of interfaces 4. Devices that have support for network monitoring

1

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? 1. Environmental 2. Maintenance 3. Electrical 4. Configuration

1

What information about a Cisco router can be verified using the show version command? 1. The value of the configuration register 2. The administrative distance used to reach networks 3. The routing protocol version that is enabled 4. The operational status of serial interfaces

1

What is one of the most effective security tools available for protecting users from external threats? 1. Firewalls 2. Router that run AAA services 3. Patch servers 4. Password encryption techniques

1

What is the purpose of the network security authentication function? 1. to require users to prove who they are 2. to determine which resources a user can access 3. to keep track of the actions of a user 4. to provide challenge and response questions

1

What is the purpose of using SSH to connect to a router? 1. It allows a secure remote connection to the router command line interface. 2. It allows a router to be configured using a graphical interface. 3. It allows the router to be monitored through a network management application. 4. It allows secure transfer of the IOS software image from an unsecure workstation or server

1

Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts? 1. Stateful packet Inspection 2. Application filtering 3. URL filtering 4. Packet filtering

1

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.) 1. Perform the capture on different network segments. 2. Capture traffic on the weekends when most employees are off work. 3. Capture traffic during peak utilization times to get a good representation of the different traffic types. 4. Only capture WAN traffic because traffic to the web is responsible for the largest amount of traffic on a network. 5. Only capture traffic in the areas of the network that receive most of the traffic such as the data center

1, 3

Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.) 1. Limit the number of unsuccessful attempts to log in to the server. 2. Distribute servers throughout the building, placing them close to the stakeholders. 3. Use servers from different vendors. 4. Never use passwords that need the Shift key. 5. Never send the password through the network in a clear text.

1, 5

Match the type of threat with the cause. (Not all options are used.) 1. Hardware threats 2. Environmental threats 3. Electrical threats 4. Maintenance threats a. Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) b. Physical damage to servers, routers, switches, cabling plant, and workstations c. Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss d. Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling e. Unauthorized access resulting in loss of data

1-b, 2-a, 3-c, 4-d

Match the type of information security threat to the scenario. (Not all options are used) 1. Installing virus code to destroy surveillance recordings for certain days 2. Pretending to be someone else by using stolen personal information to apply for a credit card 3. Preventing users from accessing a website by sending a large number of link requests in a short period 4. Obtaining trade secret documents illegally 5. Cracking the password of anadministrator account on a server a. information theft b. identity theft c. data loss d. disruption of service

1-c, 2-b, 3-d, 4-a

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails? 1. Activate another router interface that is connected to the ISP, so the traffic can flow through it. 2. Have a second router that is connected to another ISP. 3. Purchase a second least-cost link from another ISP to connect to this router. 4. Add more interfaces to the router that is connected to the internal network

2

How should traffic flow be captured in order to best understand traffic patterns in a network? 1. During low utilization times 2. During peak utilization times 3. When it is on the main network segment only 4. When it is from a subset of users

2

What service defines the protocols and technologies that implement the transmission of voice packets over an IP network? 1. QoS 2. VoIP 3. DHCP 4. NAT

2

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? 1. RouterA(config)# login block-for 10 attempts 2 within 30 2. RouterA(config)# login block-for 30 attempts 2 within 10 3. RouterA(config)# login block-for 2 attempts 30 within 10 4. RouterA(config)# login block-for 30 attempts 10 within 2

2

Which element of scaling a network involves identifying the physical and logical topologies? 1. Traffic analysis 2. Network documentation 3. Device inventory 4. Cost analysis

2

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies? 1. SNMP 2. ICMP 3. Telnet 4. TCP

2

Which statement is true about Cisco IOS ping indicators? 1. '!' indicates that the ping was unsuccessful and that the device may have issues finding a DNS server. 2. 'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful. 3. 'U' indicates that the ping was successful but the response time was longer than normal. 4.A combination of 'U' and '!' indicates that a router along the path did not have a route to the destination address and responded with an ICMP unreachable message

2

A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.) 1. Listing of the current employees and their role in the company 2. Inventory of the devices that are currently used on the network 3. Documentation of the current physical and logical topologies 4. Analysis of the network traffic based on protocols, applications, and services used on the network 5. History and mission statement of the company 6. Human resource policies and procedures for all employees in the company

2, 3, 4

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.) 1. Fast Ethernet interfaces 2. Console ports 3. Serial interfaces 4. VTY ports 5. Loopback interfaces

2, 4

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? 1. trace 10.1.1.5 2. traceroute 10.1.1.5 3. tracert 10.1.1.5 4. ping 10.1.1.5

3

DT_ATC_RS3(config)# username techadmin password 63t0ut0fh3r3! DT_ATC_RS3(config)# enable secret 5tay0ut!!%! DT_ATC_RS3(config)# service password-encryption DT_ATC_RS3(config)# login block-for 180 attempts 2 within 60 DT_ATC_RS3(config)# line console 0 DT_ATC_RS3(config-line)# login local DT ATC RS3(config-line)# end Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a password of 63t0ut0fh3r3!. What will be the result of this action? 1. The router will deny access and display an error message. 2. The router will deny access and display a banner message. 3. The router will display the DT_ATC_RS3> prompt. 4. The router will be locked for 2 minutes and 30 seconds

3

What type of traffic would most likely have the highest priority through the network? 1. FTP 2. Instant messaging 3. Voice 4. SNMP

3

When should an administrator establish a network baseline? 1. At the lowest point of traffic in the network 2. When there is a sudden drop in traffic 3. at regular intervals over a period of time 4. When the traffic is at peak in the network

3

Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH? 1. debug all 2. show running-config 3. terminal monitor 4. logging synchronous

3

Which network design consideration would be more important to a large corporation than to a small business? 1. Internet router 2. Firewall 3. Redundancy 4. Low port density switch

3

Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5? 1. IP 2. DNS 3. DHCP 4. HTTP

3

Which statement is true about CDP on a Cisco device? 1. To disable CDP globally, the no cdp enable command in interface configuration mode must be used. 2. The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity. 3. CDP can be disabled globally or on a specific interface. 4. Because it runs at the data link layer, the CDP protocol can only be implemented in switches

3

Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.) 1. Create a banner that will be displayed to users when they connect 2. Set up an authentication server to handle incoming connection requests 3. Generate a set of secret keys to be used for encryption and decryption 4. Give the router a host name and domain name 5. Enable SSH on the physical interfaces where the incoming connection requests will be received

3, 4

Which two traffic types require delay sensitive delivery? (Choose two.) 1. Web 2. Email 3. Voice 4. FTP 5. Video

3, 5

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued? 1. The ARP cache is synchronized with the router interface. 2. The current content of the ARP cache is displayed. 3. The detailed information of the ARP cache is displayed. 4. The ARP cache is cleared

4

What is considered the most effective way to mitigate a worm attack? 1. Change system passwords every 30 days. 2. Ensure that all systems have the most current virus definitions. 3. Ensure that AAA is configured in the network. 4. Download security updates from the operating system vendor and patch all vulnerable systems

4

Which type of network threat is intended to prevent authorized users from accessing resources? 1. Access attacks 2. Trust exploitation 3. Reconnaissance attacks 4. DoS attacks

4


Conjuntos de estudio relacionados

Architecture/Interior Design Unit

View Set

FOI.6 Nucleus: Understand the storage of genetic information and how it is passed down to successive generations and the principles of basic techniques in Molecular Biology

View Set

Unit 2: Environmental pollution

View Set

Chapter 16 - International Law in a Global Economy

View Set

Mental Health Practice Questions

View Set

casualty simulation exam missed q's

View Set

Strategic Final - starting from session 14

View Set

Chapter 10 (Math Foundations)- Arithmetic and Number Properties

View Set