Netacad Chapter 11: Build A Small Network

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

On which two interfaces or ports can security be improved by configuring executive timeouts?

1. Console Ports 2. VTY Ports

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

What type of threat is caused by Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss?

Electrical Threats

What type of threats are caused by temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)?

Environmental Threats

What is one of the most effective security tools available for protecting users from external threats?

Firewalls

What type of threat is caused by Physical damage to servers, routers, switches, cabling plant, and workstations?

Hardware Threats

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP

Budget

Itemized IT budget, including fiscal year equipment purchasing budget

What type of threat is caused by Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling?

Maintenance Threats

Which element of scaling a network involves identifying the physical and logical topologies?

Network Documentation

What doe Network services used to define a set of rules that govern how devices communicate and the data formats used in a network?

Protocols

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10 syntax is RouterA(config)# login block-for (number of seconds) attempts (number of attempts) within (number of seconds).

Which command displays all of the available file systems on the device?

Show file systems

What does the "!" indicate?

The ping completed successfully, verifying connectivity at Layer

What type of traffic would most likely have the highest priority through the network?

Voice

What does a "." indicate?

a connectivity problem, routing problem, or device security issue exists along the path and that an ICMP destination unreachable message was not provided

Which command is used to change the current directory?

cd

Which command is used to show the contents of the flash memory?

dir flash0

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times and on different network segments

What does a Host Intrusion Prevention System do?

help prevent outside intruders and should be used on all systems.

What command is used to show any cached DNS entries?

ipconfig /displaydns

Device Inventory

list of devices that use or make up the network

Traffic Analysis

protocols, applications, and services and their respective traffic requirements should be documented

Which command shows the current directory being navigated?

pwd

What does a "U" indicate?

that a router along the path may not have had a route to the destination address, and that it responded with an ICMP unreachable message

When is the traceroute command used?

to initiate a trace from a Cisco router or switch

When is the tracert command used?

to initiate a trace from the command prompt on a Windows PC.


Ensembles d'études connexes

Medical Soc stuff for exam 1 (After the first quiz we took)

View Set

Writing Linear Equations - Quiz 100%

View Set