Cisco Networking: Modules 16-17 Check Your Understanding
A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next? a) Email all users to let them know they are replacing a switch. b) Escalate the trouble ticket to the manager to approve the change. c) Purchase a new switch and replace the defective one. d) Resolve the problem.
b) Escalate the trouble ticket to the manager to approve the change.
Which statement correctly relates to a small network? a) Small networks are complex. b) Small networks require an IT department to maintain. c) The majority of businesses are small.
c) The majority of businesses are small.
Which factor must be considered when selecting network devices? a) color b) console connections c) cost d) elasticity
c) cost
What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
c) identify theft
What kind of threat is described when a threat actor is stealing the user database of a company? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
d) information theft
Which is appropriate for providing endpoint security? a) a AAA server b) antivirus software c) a server-based firewall d) an ESA/WSA
b) antivirus software
What are two forms of software programs or processes that provide access to the network? (Choose two.) a) antivirus software b) application layer services c) gaming software d) network applications e) productivity software f) virtual machine software
b) application layer services d) network applications
A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack
b) denial of service (DoS) attack
Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack
b) denial of service (DoS) attack
Which device is used by other network devices to authenticate and authorize management access? a) AAA Server b) firewall c) ESA/WSA d) IPS
a) AAA Server
Which elements are required to scale to a larger network? (Choose two.) a) budget b) device configurations c) increased bandwidth d) network documentation e) windows hosts
a) budget d) network documentation
What kind of threat is described when a threat actor overloads a network to deny other users network access? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
b) disruption of service
Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack
d) reconnaissance attack
Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data? a) frequency b) storage c) security d) validation
d) validation
What kind of threat is described when a threat actor alters data records? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
a) data loss or manipulation
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
a) data loss or manipulation
George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack
a) access attack
What Windows 10 tool is useful to determine which applications are using network services on a host? a) Control panel b) Data Usage c) File Manager d) Windows Defender Firewall e) Windows Explorer
b) Data Usage
What kind of threat is described when a threat actor prevents legal users from accessing data services? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
b) disruption of service
Which device controls traffic between two or more networks to help prevent unauthorized access? a) AAA Server b) firewall c) ESA/WSA d) IPS
b) firewall
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
c) identify theft
Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack
c) malware attack
Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack
c) malware attack
A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.) a) debug ip icmp off b) no debug debug ip icmp c) no debug ip icmp d) undebug all e) undebug debug ip icmp
c) no debug ip icmp d) undebug all
A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection? a) monitor debug output b) monitor terminal c) terminal monitor d) terminal monitor debug
c) terminal monitor
This zone is used to house servers that should be accessible to outside users. a) inside b) outside c) internet d) DMZ
d) DMZ
Which two network protocols are used to establish a remote access network connection to a device? (Choose two.) a) File Transfer Protocol (FTP) b) Hypertext Transfer Protocol (HTTP). c) Remote Connect (RC) d) Secure Shell (SSH) e) Simple Mail Transfer Protocol (SMTP) f) Telnet
d) Secure Shell (SSH) f) Telnet
A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process? a) Document findings, actions, and outcomes. b) Establish a plan of action and implement the solution. c) Identify the problem. d) Test the theory to determine cause. e) Verify solution and implement preventive measures.
d) Test the theory to determine cause.
What kind of threat is described when a threat actor steals scientific research data? a) data loss or manipulation b) disruption of service c) identify theft d) information theft
d) information theft
Which software installed on key hosts can reveal the types of network traffic flowing through the network? a) Linux b) MacOS c) SSH d) Windows e) Wireshark
e) Wireshark