Chapter 11 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Maintenance threats are defined by what characteristics?

Poor handling of key electrical components. Electrostatic discharge, Lack of critical spare parts, poor cabling, and poor labeling

Network services use _______ to define a set of rules that govern how devices communicate and the data formats used in a network.

Protocols

Environmental Hardware threat are defined as?

Temperature related i.e. too hot cold wet or too dry

What type of traffic would most likely have the highest priority through the network?

Voice

What is Device Inventory?

list of devices that use or make up the network

Which statement is true about Cisco IOS ping indicators?​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful. The most common indicators of a ping issued from the Cisco IOS are "!", ".", and "U". The "!" indicates that the ping completed successfully, verifying connectivity at Layer 3. The "." may indicate that a connectivity problem, routing problem, or device security issue exists along the path and that an ICMP destination unreachable message was not provided. The "U" indicates that a router along the path may not have had a route to the destination address, and that it responded with an ICMP unreachable message.

Electrical threats are defined by?

Voltage Spikes, Insufficient Power Supply, Voltage burnouts, total power loss

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times

What is one of the most effective security tools available for protecting users from external threats?

firewalls Refer to curriculum topic: 11.2.3 A firewall is one of the most effective security tools for protecting internal network users from external threats. A firewall resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access. A host intrusion prevention system can help prevent outside intruders and should be used on all systems.

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /displaydns

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation

Hardware threats are defined by?

physical damage to physical equipment

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5 The tracert command is used to initiate a trace from the command prompt on a Windows PC. The traceroute command is used to initiate a trace from a Cisco router or switch. Some other PC operating systems, such as Linux and Mac OS also use the traceroute command. The ping command does not display the network path to the remote host.

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

Show file systems


संबंधित स्टडी सेट्स

Eight Unique Features of E-commerce

View Set

Algorithms Final Exam ORDER OF MAGNITUDE IS IN SQUARE BRACKETS LIKE O[n]

View Set

Fluid and Electrolytes (Fluid volume deficit)

View Set

Quiz Block 4: PUNCTUATION/MECHANICS: Commas I, paragraph editing

View Set

Environmental earth science final

View Set

Hesi Final Study Questions: Med Surg II

View Set

Chapter 23: Gynecologic Emergencies

View Set