Network Security Fundamentals
Remote access to a switch where data is encrypted during the session
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
Firewall Settings
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
Enviornmental
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
A weakness that makes a target susceptible to an attack
What does the term vulnerability mean?
Firewalls
What is one of the most effective security tools available for protecting users from external threats?
Discovery and mapping of systems
What is the objective of a network reconnaissance attack?
to keep track of the actions of a user
What is the purpose of the network security accounting function?
Reconnaissance Attack
What type of attack may involve the use of tools such as nslookup and fping?
Encryption
Which benefit does SSH offer over Telnet for remotely managing a router?
RouterA(config)# login block-for 30 attempts 2 within 10
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
Firewall
Which component is designed to protect against unauthorized communications to and from a computer?
Worm
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
DoS Attacks
Which type of network threat is intended to prevent authorized users from accessing resources?