Modules 16 - 17: Building and Securing a Small Network
Technological Weakness
A network engineer is examining the operating system of a network device for vulnerabilities.
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
What type of attack may involve the use of tools such as nslookup and fping?
reconnaissance attack
What is the purpose of the network security accounting function?
to keep track of the actions of a user
Which component is designed to protect against unauthorized communications to and from a computer?
Firewall
Security Policy Weakness
The network administrator did not full consider the implications of unauthorized users accessing the network.
Configuration Weakness
When implementing an access list on a router, a network engineer did not filter a type of malicious traffic.