Cisco Final Part 2
what are two types of attacks used on DNS open resolvers
amplification and reflection resource utilization
Which step in the link-state routing process is described by a router building a link-state database based on received LSAs
building the topology table
what command would be used as part of configuring nat or pat to clear dynamic entries before the timeout has expired?
clear ip nat translation
which two scenarios would result in a duplex mismatch
connecting a device with auto negotiation to another that is manually set to full duplex manually setting the two connected devices to different duplex modes
administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement
data center
what method can be used to enable an OSPF router to advertise a default route to neighboring OSPF routers
default-information originate command on R0-A
which is a characteristic of a Type 2 hypervisor?
does not require management console software
what are two syntax rules for writing a JSON array
each value is separated by a comma values are enclosed in square brackets
what functionality does mGRE provide to the DMVPN technology?
it allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes
what is a purpose of establishing a network baseline
it creates a point of reference for future network evaluations
a company is considering updating the campus WAN connection. Which two WAN optionas re examples of the private WAN architecture 2
leased line
what is a characteristic of a Trojan horse as it relates to network security
malware is contained in a seemingly legitimate executable program
which statement describes a characteristic of CIsco Catalyst 2960 switches
new cisco catalyst 2960-c switches support PoE pass-through
what command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the poo
show ip nat statistics
what are the two types of VPN connections 2
site-to-site remote access
What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets
the ARP table
what is used to pre-populate the adjacency table on cisco devices that use CEF to process packets
the ARP table
If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?
the host initiates a clientless VPN connection using a compliant web browser to download the client
two-tier spine-leaf topology
the leaf switches always attach to the spines, but they never attach to each other
Which design feature will limit the size of a failure domain in an enterprise network
the use of the building switch block approach
a company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?
to capture and analyze packets within traditional Ethernet LANs or WLANs
why would a team use applications such as John the Ripper, THC Hydra, RainbowCrack
to make repeated guesses in order to crack a password
a company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?
to reverse engineer binary files when writing exploits and when analyzing malware.
what are two characteristics of video traffic?
video traffic latency should not exceed 400 ms video traffic is unpredictable and inconsistent
an administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0 what wildcard mask would he use
0.0.3.255
Which type of QoS marking is applied to Ethernet frames?
CoS
an attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?
DHCP Spoofing
Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?
DSL
which protocol provides authentication, integrity, and confidentiality services and is a type of VPN
IPsec
Which two IPsec protocols are used to provide data integrity?
MD5 SHA
In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?
NAT
What protocol allows the manager to poll agents to access information from the agent MIB
SNMP
what type of resources are required for a type 1 hypervisor
a management console
