Network essentials Ch 6-9

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are two common causes of a physical layer network connectivity problem? (Choose two.)

-An Ethernet cable plugged into a wrong port -A faulty Ethernet cable

A small SOHO uses a wireless integrated router for employee workstations to connect to the Internet. For security consideration the SSID is not broadcast and the IP address configuration is provided by the DHCP server in the router. An employee reports that the workstation cannot connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.)

-An invalid SSID is configured. --And the wireless client is not configured for DHCP.

What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet?

Guest SSID

What are two types of wired high-speed Internet connections? (Choose two.)

Cable and DSL

What type of attack is the ping of death?

Denial of Service (DoS)

The _____ is a part of the network that is used for servers which are accessible by both internal and external users.

DMZ

Which type of device provides an Internet connection through the use of a phone jack?

DSL Modem

What type of authentication do most access points use by default?

Open

Which Cisco IOS mode displays a prompt of Router#?

Privileged EXEC mode

Which two protocols can be used to access a Cisco switch for in-band management? (Choose two.)

SSH and Telnet

Which command can be used to encrypt all passwords in the configuration file?

Service Password-encryption

Using a systematic troubleshooting approach a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information which two questions are associated with Layer 3? (Choose two.)

-Is the PC configured for DHCP and From the PC is the default gateway reachable using the ping command?

Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)

-The web server at 192.168.0.10 is reachable from the source host. -And DNS cannot resolve the IP address for the server web-s1.cisco.com

A network technician enters the command ipconfig /release followed by ipconfig /renew in order to ensure that the DHCP IP configuration on a workstation is updated. However the workstation does not receive a valid IP configuration for the network. Which two problems may exist on the network? (Choose two.)

-There is a DHCP server issue -There is no network connectivity to the DHCP server.

A user calls the help desk to report a workstation problem. Which three questions would produce the most helpful information for troubleshooting? (Choose three.)

-f you received an error message, what was it? -What changes have you made to your workstation? -What operating system version is running on your workstation?

What type of device is commonly connected to the Ethernet ports on a home wireless router?

LAN Device

The home computer of a user is working properly. However the user cannot access the Internet. The Internet connection is provided through a cable company. The user cannot identify the cause of the problem. Who should the user contact for further help?

The help line of the cable company.

Refer to the exhibit. Which router port connects to the modem provided by the service provider?

internet port

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page?

Correct

A network administrator is working on a Cisco router. The CLI prompt is Router1(config-if)#. Which operation is the administrator likely to configure next?

A LAN interface

What is the difference between the terms keyword and argument in the IOS command structure?

A keyword is a specific parameter. An argument is not a predetermined variable.

Match the type of malware with the definition: Pop-ups

Advertising windows that display when visiting a web site.

Match the type of malware with the definition: Tracking Cookies

Allow personalization for visited web sites.

What is CSMA/CA on a network?

An access method that is used by wireless technology to avoid collisions.

Which type of network technology is used for low-speed communication between peripheral devices

Bluetooth

Which type of networking technology is used to share an Internet connection wirelessly between two mobile devices?

Bluetooth

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?

Brute Force

How does an activity LED on wireless routers indicate that traffic is moving through a port?

By Flashing

Which configuration step should be performed first when enabling SSH on a Cisco device?

Configure an IP domain name.

Which type of attack attempts to overwhelm network links and devices with useless data?

Denial of Service (DoS)

A small office uses a wireless router to connect to a cable modem for Internet access. The network administrator receives a call that one office computer cannot access external websites. The first troubleshooting step that the network administrator performs is to ping the wireless router from the office computer. Which troubleshooting technique does this represent?

Divide-and-conquer

How does a phisher typically contact a victim?

Email

Match the type of password on a Cisco device to the function: Enable Secret

Encrypted and restricts access to the privileged EXEC mode.

What wireless router configuration would stop outsiders from using your home network?

Encryption

What is a characteristic of a computer worm?

Exploits vulnerabilities with the intent of propagating itself across a network.

Authorized users are not considered a security threat to the network.

False

A ________ is a device usually installed between two or more networks to block undesirable traffic.

Firewall

14.Match the type of malware with the definition: Spyware

Gathers personal information about a user without permission or knowledge.

Which two files are loaded into RAM of a Cisco switch when it is booted? (Choose two.)

IOS image file and Startup Configuration File

Match the type of password on a Cisco device to the function: Console Password

Limits access to the device through OUT-OF-BAND connection.

Match the type of password on a Cisco device to the function: VTY Password

Limits access to the device through SSH connection.

Match the type of password on a Cisco device to the function: Enable Password

Limits access to the privileged EXEC mode.

What are three advantages of wireless over wired LAN technology? (Choose three.)

Lower on-going costs, Ease of Installation, Ease of Expansion

A network administrator attempted to access the company website and received a "page not found" error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information what might the network administrator conclude?

It is likely that someone attempted a DoS attack.

Which two networking devices are used in enterprise networks for providing network connectivity to end devices? (Choose two.)

LAN Switch and Wireless Access Point

During a move employee workstations were disconnected from the network and reconnected in new offices. However after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem?

Make sure the cables are functional and properly plugged.

Which command would a technician use to display network connections on a host computer?

Netstat

A user wants to connect to a wireless network at a shopping center. What wireless network setting tells the user the name of the network?

SSID

A network administrator is troubleshooting inter-connection issues between routers. Which show command can be used to check the bandwidth and MTU settings of an interface?

Show Interfaces

Which type of attack exploits human behavior to gain confidential information?​

Social Engineering

Which term is used for bulk advertising emails flooded to as many end users as possible?

Spam

What type of program installs and gathers personal information including password and account information from a computer without permission or knowledge of the user?

Spyware

A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?

Substitution

A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However the technician cannot identify the root cause of the problem. What should the technician do to help the customer?

Tell the customer that a ticket is created and another technician will contact the user soon.

What purpose would a home user have for implementing Wi-Fi?​

To create a wireless network usable by other devices.

What is the purpose of assigning an IP address to the VLAN1 interface on a Cisco Layer 2 switch?

To enable remote access to the switch to manage it.

What is the purpose of configuring a default gateway address on a host?

To identify the device that allows local network computers to communicate with devices on other networks.

A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting approach should be used?

Top-down

A network administrator can successfully ping the server at www.cisco.com but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?

Traceroute

True or False? Most mobile devices have the ability to connect to a Wi-Fi network.

True

Cisco 1941 routers have one console port with an RJ45 interface and a second console with a _____ interface.

USB

Which three attacks exploit vulnerabilities in software? (Choose three.)

Viruses, Worms, Trojan Horses

When is a client considered to be "authenticated" when using MAC address filtering to control network access to a wireless network?

When the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client.

Which two statements characterize wireless network security? (Choose two.)

With SSID broadcast disabled, an attacker must know the SSID too connect. and Using the default IP address on an access point makes hacking easier

While troubleshooting a network problem

a network administrator issues the show version command on a router. What information can be found by using this command?, The amount of NVRAM, DRAM, and flash memory installed on the router.


Conjuntos de estudio relacionados

Chapter 19: Blood Vessels and Circulation

View Set

#5 - Hypertrophy, Atrophy & Hyperplasia (Pgs. 11-12)

View Set

Ch-1 (What is an Accident?) and Ch-2 (An Accident Happens: What Do You Do? How Long Do You Do It?)

View Set

PF 5- Overview of Loans, Mortgages, Other Loans, & Rent or Buy-11/27/17(Mon.)- Q2: Loans

View Set

Psychology 2e - Chapter 14 Reading quiz

View Set

A civilização Grega - O que é democracia - Capítulo 9

View Set