CCNA 1 Chapter 11
When should an administrator establish a network baseline? when the traffic is at peak in the network when there is a sudden drop in traffic at the lowest point of traffic in the network at regular intervals over a period of time
at regular intervals over a period of time
Which type of network attack involves the disabling or corruption of networks, systems, or services? reconnaissance attacks access attacks denial of service attacks malicious code attacks
denial of service attacks
How should traffic flow be captured in order to best understand traffic patterns in a network? during low utilization times during peak utilization times when it is on the main network segment only when it is from a subset of users
during peak utilization times
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? configuration environmental electrical maintenance
environmental
Which network design consideration would be more important to a large corporation than to a small business? Internet router firewall low port density switch redundancy
redundancy
Which statement is true about CDP on a Cisco device? The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity. To disable CDP globally, the no cdp enable command in interface configuration mode must be used. CDP can be disabled globally or on a specific interface. Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
CDP can be disabled globally or on a specific interface.
Which type of network threat is intended to prevent authorized users from accessing resources? DoS attacks access attacks reconnaissance attacks trust exploitation
DoS attacks
Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.) Give the router a host name and domain name. Create a banner that will be displayed to users when they connect. Generate a set of secret keys to be used for encryption and decryption. Set up an authentication server to handle incoming connection requests. Enable SSH on the physical interfaces where the incoming connection requests will be received.
Give the router a host name and domain name. Generate a set of secret keys to be used for encryption and decryption.
Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.) Never send the password through the network in a clear text. Never use passwords that need the Shift key. Use servers from different vendors. Distribute servers throughout the building, placing them close to the stakeholders. Limit the number of unsuccessful attempts to log in to the server.
Never send the password through the network in a clear text. Limit the number of unsuccessful attempts to log in to the server.
Which two traffic types require delay sensitive delivery? (Choose two.) email web FTP voice video
voice video