Network essentials Ch 6-9
What are two common causes of a physical layer network connectivity problem? (Choose two.)
-An Ethernet cable plugged into a wrong port -A faulty Ethernet cable
A small SOHO uses a wireless integrated router for employee workstations to connect to the Internet. For security consideration the SSID is not broadcast and the IP address configuration is provided by the DHCP server in the router. An employee reports that the workstation cannot connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.)
-An invalid SSID is configured. --And the wireless client is not configured for DHCP.
What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet?
Guest SSID
What are two types of wired high-speed Internet connections? (Choose two.)
Cable and DSL
What type of attack is the ping of death?
Denial of Service (DoS)
The _____ is a part of the network that is used for servers which are accessible by both internal and external users.
DMZ
Which type of device provides an Internet connection through the use of a phone jack?
DSL Modem
What type of authentication do most access points use by default?
Open
Which Cisco IOS mode displays a prompt of Router#?
Privileged EXEC mode
Which two protocols can be used to access a Cisco switch for in-band management? (Choose two.)
SSH and Telnet
Which command can be used to encrypt all passwords in the configuration file?
Service Password-encryption
Using a systematic troubleshooting approach a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information which two questions are associated with Layer 3? (Choose two.)
-Is the PC configured for DHCP and From the PC is the default gateway reachable using the ping command?
Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
-The web server at 192.168.0.10 is reachable from the source host. -And DNS cannot resolve the IP address for the server web-s1.cisco.com
A network technician enters the command ipconfig /release followed by ipconfig /renew in order to ensure that the DHCP IP configuration on a workstation is updated. However the workstation does not receive a valid IP configuration for the network. Which two problems may exist on the network? (Choose two.)
-There is a DHCP server issue -There is no network connectivity to the DHCP server.
A user calls the help desk to report a workstation problem. Which three questions would produce the most helpful information for troubleshooting? (Choose three.)
-f you received an error message, what was it? -What changes have you made to your workstation? -What operating system version is running on your workstation?
What type of device is commonly connected to the Ethernet ports on a home wireless router?
LAN Device
The home computer of a user is working properly. However the user cannot access the Internet. The Internet connection is provided through a cable company. The user cannot identify the cause of the problem. Who should the user contact for further help?
The help line of the cable company.
Refer to the exhibit. Which router port connects to the modem provided by the service provider?
internet port
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page?
Correct
A network administrator is working on a Cisco router. The CLI prompt is Router1(config-if)#. Which operation is the administrator likely to configure next?
A LAN interface
What is the difference between the terms keyword and argument in the IOS command structure?
A keyword is a specific parameter. An argument is not a predetermined variable.
Match the type of malware with the definition: Pop-ups
Advertising windows that display when visiting a web site.
Match the type of malware with the definition: Tracking Cookies
Allow personalization for visited web sites.
What is CSMA/CA on a network?
An access method that is used by wireless technology to avoid collisions.
Which type of network technology is used for low-speed communication between peripheral devices
Bluetooth
Which type of networking technology is used to share an Internet connection wirelessly between two mobile devices?
Bluetooth
Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?
Brute Force
How does an activity LED on wireless routers indicate that traffic is moving through a port?
By Flashing
Which configuration step should be performed first when enabling SSH on a Cisco device?
Configure an IP domain name.
Which type of attack attempts to overwhelm network links and devices with useless data?
Denial of Service (DoS)
A small office uses a wireless router to connect to a cable modem for Internet access. The network administrator receives a call that one office computer cannot access external websites. The first troubleshooting step that the network administrator performs is to ping the wireless router from the office computer. Which troubleshooting technique does this represent?
Divide-and-conquer
How does a phisher typically contact a victim?
Match the type of password on a Cisco device to the function: Enable Secret
Encrypted and restricts access to the privileged EXEC mode.
What wireless router configuration would stop outsiders from using your home network?
Encryption
What is a characteristic of a computer worm?
Exploits vulnerabilities with the intent of propagating itself across a network.
Authorized users are not considered a security threat to the network.
False
A ________ is a device usually installed between two or more networks to block undesirable traffic.
Firewall
14.Match the type of malware with the definition: Spyware
Gathers personal information about a user without permission or knowledge.
Which two files are loaded into RAM of a Cisco switch when it is booted? (Choose two.)
IOS image file and Startup Configuration File
Match the type of password on a Cisco device to the function: Console Password
Limits access to the device through OUT-OF-BAND connection.
Match the type of password on a Cisco device to the function: VTY Password
Limits access to the device through SSH connection.
Match the type of password on a Cisco device to the function: Enable Password
Limits access to the privileged EXEC mode.
What are three advantages of wireless over wired LAN technology? (Choose three.)
Lower on-going costs, Ease of Installation, Ease of Expansion
A network administrator attempted to access the company website and received a "page not found" error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information what might the network administrator conclude?
It is likely that someone attempted a DoS attack.
Which two networking devices are used in enterprise networks for providing network connectivity to end devices? (Choose two.)
LAN Switch and Wireless Access Point
During a move employee workstations were disconnected from the network and reconnected in new offices. However after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem?
Make sure the cables are functional and properly plugged.
Which command would a technician use to display network connections on a host computer?
Netstat
A user wants to connect to a wireless network at a shopping center. What wireless network setting tells the user the name of the network?
SSID
A network administrator is troubleshooting inter-connection issues between routers. Which show command can be used to check the bandwidth and MTU settings of an interface?
Show Interfaces
Which type of attack exploits human behavior to gain confidential information?
Social Engineering
Which term is used for bulk advertising emails flooded to as many end users as possible?
Spam
What type of program installs and gathers personal information including password and account information from a computer without permission or knowledge of the user?
Spyware
A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
Substitution
A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However the technician cannot identify the root cause of the problem. What should the technician do to help the customer?
Tell the customer that a ticket is created and another technician will contact the user soon.
What purpose would a home user have for implementing Wi-Fi?
To create a wireless network usable by other devices.
What is the purpose of assigning an IP address to the VLAN1 interface on a Cisco Layer 2 switch?
To enable remote access to the switch to manage it.
What is the purpose of configuring a default gateway address on a host?
To identify the device that allows local network computers to communicate with devices on other networks.
A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting approach should be used?
Top-down
A network administrator can successfully ping the server at www.cisco.com but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?
Traceroute
True or False? Most mobile devices have the ability to connect to a Wi-Fi network.
True
Cisco 1941 routers have one console port with an RJ45 interface and a second console with a _____ interface.
USB
Which three attacks exploit vulnerabilities in software? (Choose three.)
Viruses, Worms, Trojan Horses
When is a client considered to be "authenticated" when using MAC address filtering to control network access to a wireless network?
When the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client.
Which two statements characterize wireless network security? (Choose two.)
With SSID broadcast disabled, an attacker must know the SSID too connect. and Using the default IP address on an access point makes hacking easier
While troubleshooting a network problem
a network administrator issues the show version command on a router. What information can be found by using this command?, The amount of NVRAM, DRAM, and flash memory installed on the router.