ITNv6 Chapter 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

-documentation of the current physical and logical topologies -analysis of the network traffic based on protocols, applications, and services used on the network -inventory of the devices that are currently used on the network

A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth?

devices with support for modularity

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

- Never send the password through the network in a clear text -Limit the number of unsuccessful attempts to log in to the server

Actions that can be taken to prevent a successful network attack on an email server account.

Terminal Monitor

Command used to allow log messages to be displayed on remotely connected sessions using Telnet or SSH

DoS attacks

Network threat that is intended to prevent authorized users from accessing resources.

R1

Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?

Something is causing a time delay between the networks.

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?

Environmental Threat

Routers and Switches in a wiring closet malfunctioning after an air conditioning unit failed.

-Voice -Video

Traffic types that require delay sensitive delivery.

-Give router a host name and domain name -generate a set of secret keys to be used for encryption & decryption

Two steps requires before SSH can be enabled

Stateful Packet Inspection (SPI)

Type of firewall that ensures packets coming into a network are legitimate responses initiated from internal hosts.

Purpose of using SSH to connect to a router

allows a secure remote connection to the router command line interface

CDP

can be disabled globally or on a specific interface

arp -* command on a PC

clears the ARP cache

-Capture traffic during peak utilization times to get a good representation of the different traffic types. -Perform the capture on different network segments.

describe how to assess traffic flow patterns and network traffic types using a protocol analyzer

Network Baseline

established at regular intervals over a period of time

C:\>tracert -6 www.cisco.com on Windows

forces the trace to use IPv6

Data Loss

installing virus code to destroy surveillance recordings for certain days

Redundancy

network design consideration that is more important to a large corporation than to a small business

Information Theft

obtaining trade secret documents illegally

Identity Theft

pretending to be someone else by using stolen personal information to apply for a credit card

Disruption of Service

preventing users from accessing a website by sending a large number of link requests in a short period

"login block-for 180 attempts 2 within 30" command

prevents a user who is trying to guess a password to access the router

VoIP

service that defines the protocols and technologies that implement the transmission of voice packets over an IP network

"show ip interface brief" command

shows the status of the switch interfaces and the address configured on interface vlan 1

"show version" command

shows the value of the configuration register

Requires users to prove who they are

the purpose of the network security authentication function


Conjuntos de estudio relacionados

Texas: The Executive Branch (9) - American Government

View Set

Chapter 4 States of consciousness

View Set

Lesson 30: Probabilities and Power

View Set

section 4: unit 2 Budgeting, Prudent Procedures, and Security

View Set