CTI 120 chapters 6-9

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of attack is the ping of death? brute force virus social engineering denial of service

DOS

True or False? Authorized users are not considered a security threat to the network. true false

false

Fill in the blank. A -------- is a device usually installed between two or more networks to block undesirable traffic.

firewall

A network technician enters the command ipconfig /release followed by ipconfig /renew in order to ensure that the DHCP IP configuration on a workstation is updated. However, the workstation does not receive a valid IP configuration for the network. Which two problems may exist on the network? (Choose two.) There is a DHCP server issue. The DHCP lease time is misconfigured. The gateway router address needs to be updated. There is no network connectivity to the DHCP server. The ipconfig /all command must be issued to restore all IP configurations.

There is a DHCP server issue. There is no network connectivity to the DHCP server.

What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet? MAC address filtering guest SSID encryption authentication

guest SSID

A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting approach should be used? bottom-up top-down divide and conquer substitution

top down

What is the difference between the terms keyword and argument in the IOS command structure? A keyword is required to complete a command. An argument is not. A keyword always appears directly after a command. An argument does not. A keyword is a specific parameter. An argument is not a predefined variable. A keyword is entered with a predefined length. An argument can be any length.

A keyword is a specific parameter. An argument is not a predefined variable.

A small SOHO uses a wireless integrated router for employee workstations to connect to the Internet. For security consideration, the SSID is not broadcast and the IP address configuration is provided by the DHCP server in the router. An employee reports that the workstation cannot connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.) An invalid SSID is configured. The wireless client is not configured for DHCP. A bad cable exists between the client and the integrated router. An incorrect default gateway is manually configured on the client. A default gateway is improperly configured on the wireless router.

An invalid SSID is configured. The wireless client is not configured for DHCP.

Which type of networking technology is used to share an Internet connection wirelessly between two mobile devices? Ethernet Bluetooth cellular satellite

Bluetooth

Fill in the blank. The --------- is a part of the network that is used for servers which are accessible by both internal and external users.

DMZ

Which configuration step should be performed first when enabling SSH on a Cisco device? Generate RSA key pairs. Configure an IP domain name. Disable Telnet on vty lines. Configure an encrypted password for the console line.

Configure an IP domain name. For the actual SSH configuration, the first step is to configure a domain name. Other SSH configurations depend on the valid domain name, such as generating RSA key pairs.

Which type of attack attempts to overwhelm network links and devices with useless data? virus spyware brute force denial of service

DOS

Which type of device provides an Internet connection through the use of a phone jack? cable modem DSL modem satellite modem Wi-Fi AP

DSl

Which two files are loaded into RAM of a Cisco switch when it is booted? (Choose two.) routing table IOS image file file that contains customer settings startup configuration file running configuration file

IOS image file and startup configuration file

Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose two.) Is the PC configured for DHCP? Does a browser connection to www.cisco.com work? Is the network cable plugged in? From the PC, is the default gateway reachable using the ping command? Is there a link light on the network card?

Is the PC configured for DHCP? From the PC, is the default gateway reachable using the ping command? P address configuration and the ping command are associated with Layer 3 protocols. Visiting a web server is associated with the application layer. An Ethernet cable connection and NIC are associated with Layer 1 functions.

A network administrator attempted to access the company website and received a "page not found" error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude? It is normal web surfing activity. It is likely that someone attempted a DoS attack. The link to the website does not have enough capacity and needs to be increased. The web server was turned off and was not able to service requests.

It is likely that someone attempted a DoS attack.

What type of device is commonly connected to the Ethernet ports on a home wireless router? DSL modem cable modem wireless antenna LAN device

LAN device

Which two networking devices are used in enterprise networks for providing network connectivity to end devices? (Choose two.) router firewall LAN switch web server wireless access point

Lan switch and wireless access point

During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem? Check the operation status of the DHCP server. Test if these workstations can ping the default gateway. Make sure the cables are functional and properly plugged. Install all software updates.

Make sure the cables are functional and properly plugged.

A user wants to connect to a wireless network at a shopping center. What wireless network setting tells the user the name of the network? domain name SSID passphrase hostname

SSID

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? ipconfig netstat telnet traceroute

Traceroute The traceroute command provides connectivity information about the path a packet takes to reach the destination and about every router (hop) along the way. It also indicates how long a packet takes to get from the source to each hop and back.

What wireless router configuration would stop outsiders from using your home network? IP address encryption router location network name

encryption

Which two statements characterize wireless network security? (Choose two.) Wireless networks offer the same security features as wired networks offer. Wireless guest mode provides open access to a protected LAN. With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. An attacker needs physical access to at least one network device to launch an attack.

With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier.

A network administrator is working on a Cisco router. The CLI prompt is Router1(config-if)#. Which operation is the administrator likely to configure next? the vty lines a LAN interface the console port the password that is required to access the privileged EXEC mode

a LAN interface

What are two common causes of a physical layer network connectivity problem? (Choose two.) a monitor unplugged an Ethernet cable plugged into a wrong port an incorrect default gateway an unassigned IP address a faulty Ethernet cable

a faulty Ethernet cable an Ethernet cable plugged into a wrong port

What is CSMA/CA on a network? an access method that is used by wireless technology to avoid duplicate SSIDs an access method that is used by any technology that has excessive collisions an access method that is used by wired Ethernet technology to avoid collisions an access method that is used by wireless technology to avoid collisions

an access method that is used by wireless technology to avoid collisions

Which type of network technology is used for low-speed communication between peripheral devices? Bluetooth Ethernet 802.11 channels

bluetooth

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​? brute force phishing pretexting DDoS

brute force

What are two types of wired high-speed Internet connections? (Choose two.) cable satellite cellular DSL dial-up

cable and dsl

A small office uses a wireless router to connect to a cable modem for Internet access. The network administrator receives a call that one office computer cannot access external websites. The first troubleshooting step that the network administrator performs is to ping the wireless router from the office computer. Which troubleshooting technique does this represent? top-down bottom-up substitution divide-and-conquer

divide-and-conquer

How does a phisher typically contact a victim? email telephone adware spyware

email

What is a characteristic of a computer worm? malicious software that copies itself into other executable programs tricks users into running the infected software a set of computer instructions that lies dormant until triggered by a specific event exploits vulnerabilities with the intent of propagating itself across a network

exploits vulnerabilities with the intent of propagating itself across a network

How does an activity LED on wireless routers indicate that traffic is moving through a port? by flashing by staying turned off by staying a solid green color by staying a solid amber color

flashing

What are three advantages of wireless over wired LAN technology? (Choose three.) lower on-going costs longer transmission distance ease of installation ease of expansion higher level of security

lower on-going costs ease of installation ease of expansion

Which command would a technician use to display network connections on a host computer? nslookup netstat tracert ipconfig

netstat The netstat command is a network utility that can be used to display active TCP connections that are open and running on a networked host.

What type of authentication do most access points use by default? open PSK WEP EAP

open

Which Cisco IOS mode displays a prompt of Router#? global configuration mode privileged EXEC mode setup mode user EXEC mode

privileged EXEC mode Cisco IOS uses different command modes for operational needs. The privileged EXEC mode is identified by a prompt that ends with the # symbol after the device name. The user EXEC mode is identified by a prompt that ends with the > symbol after the device name. The global configuration mode is identified by a prompt that ends with (config)# after the device name.

Which command can be used to encrypt all passwords in the configuration file? password enable secret enable password service password-encryption

service password-encryption The service password-encryption command entered under the global configuration mode will encrypt all system passwords and store them in the encrypted format in the running-config and startup-config files.

A network administrator is troubleshooting inter-connection issues between routers. Which show command can be used to check the bandwidth and MTU settings of an interface? show arp show ip route show protocols show interfaces

show interfaces

Which type of attack exploits human behavior to gain confidential information?​ virus social engineering denial of service spyware

social engineering

Which term is used for bulk advertising emails flooded to as many end users as possible? phishing brute force spam adware

spam

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user? adware pop-ups spyware pop-unders

spyware

Which two protocols can be used to access a Cisco switch for in-band management? (Choose two.) DHCP SSH FTP SMTP Telnet

ssh and telnet Telnet and SSH are two protocols that can be used to remotely access a network device for in-band management tasks. DHCP provides dynamic IP configuration information to client devices. FTP is used for file transfers between a client and a file server. SMTP is used for email message delivery.

While troubleshooting a network problem, a network administrator issues the show version command on a router. What information can be found by using this command? the amount of NVRAM, DRAM, and flash memory installed on the router the bandwidth, encapsulation, and I/O statistics on the interfaces differences between the backup configuration and the current running configuration the version of the routing protocol that is running on the router

the amount of NVRAM, DRAM, and flash memory installed on the router

What purpose would a home user have for implementing Wi-Fi?​ to hear various radio stations to connect a keyboard to a PC to connect wireless headphones to a mobile device to create a wireless network usable by other devices

to create a wireless network usable by other devices

What is the purpose of assigning an IP address to the VLAN1 interface on a Cisco Layer 2 switch? to create a new IP local network on the switch to permit IP packets to be forwarded by the switch to enable remote access to the switch to manage it to enable the switch to route packets between networks

to enable remote access to the switch to manage it The VLAN 1 on a Cisco Layer 2 switch is a virtual interface. By default, VLAN 1 is assigned as the management interface for remote access (Telnet or SSH) to the device for management tasks. In order to allow remote access through the network, a valid IP address configuration is needed on VLAN 1.

What is the purpose of configuring a default gateway address on a host? to provide a permanent address to a computer to identify the network to which a computer is connected to identify the logical address of a networked computer and uniquely identify it to the rest of the network to identify the device that allows local network computers to communicate with devices on other networks

to identify the device that allows local network computers to communicate with devices on other networks

True or False? Most mobile devices have the ability to connect to a Wi-Fi network. true false

true

Fill in the blank. Cisco 1941 routers have one console port with an RJ-45 interface and a second console port with a -------- interface.

usb

Which three attacks exploit vulnerabilities in software? (Choose three.) vishing viruses worms Trojan horses phishing pretexting

viruses, worms, trojan horses

When is a client considered to be "authenticated" when using MAC address filtering to control network access to a wireless network? when the client gives the access point the correct secret key when the client sends the MAC address to the access point when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client when the access point sends the MAC address to the server and receives notification that the MAC address is a valid one

when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client


Conjuntos de estudio relacionados

The 􏰀Brain􏰀 and 􏰀Cranial􏰀 Nerves

View Set