Netacad Chapter 11: Build A Small Network
On which two interfaces or ports can security be improved by configuring executive timeouts?
1. Console Ports 2. VTY Ports
What is considered the most effective way to mitigate a worm attack?
Download security updates from the operating system vendor and patch all vulnerable systems.
What type of threat is caused by Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss?
Electrical Threats
What type of threats are caused by temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)?
Environmental Threats
What is one of the most effective security tools available for protecting users from external threats?
Firewalls
What type of threat is caused by Physical damage to servers, routers, switches, cabling plant, and workstations?
Hardware Threats
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP.
Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?
ICMP
Budget
Itemized IT budget, including fiscal year equipment purchasing budget
What type of threat is caused by Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling?
Maintenance Threats
Which element of scaling a network involves identifying the physical and logical topologies?
Network Documentation
What doe Network services used to define a set of rules that govern how devices communicate and the data formats used in a network?
Protocols
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10 syntax is RouterA(config)# login block-for (number of seconds) attempts (number of attempts) within (number of seconds).
Which command displays all of the available file systems on the device?
Show file systems
What does the "!" indicate?
The ping completed successfully, verifying connectivity at Layer
What type of traffic would most likely have the highest priority through the network?
Voice
What does a "." indicate?
a connectivity problem, routing problem, or device security issue exists along the path and that an ICMP destination unreachable message was not provided
Which command is used to change the current directory?
cd
Which command is used to show the contents of the flash memory?
dir flash0
How should traffic flow be captured in order to best understand traffic patterns in a network?
during peak utilization times and on different network segments
What does a Host Intrusion Prevention System do?
help prevent outside intruders and should be used on all systems.
What command is used to show any cached DNS entries?
ipconfig /displaydns
Device Inventory
list of devices that use or make up the network
Traffic Analysis
protocols, applications, and services and their respective traffic requirements should be documented
Which command shows the current directory being navigated?
pwd
What does a "U" indicate?
that a router along the path may not have had a route to the destination address, and that it responded with an ICMP unreachable message
When is the traceroute command used?
to initiate a trace from a Cisco router or switch
When is the tracert command used?
to initiate a trace from the command prompt on a Windows PC.