Chapter 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which statement is true about Cisco IOS ping indicators?​

'.' may indicate that the ping was blocked by a firewall.

What is the factory default setting for the configuration register on Cisco routers?

0x2102

What are the two WEP key lengths?

64 bits 128 bits

What is an advantage of using a deterministic IP addressing scheme?

Controlling access to devices by IP address

A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem?

Ensure the correct cable is used Ensure the link status LED on the integrated router is lit.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

Place the recommended steps for worm attack mitigation in the correct order. (Not all options are used.) Step 1 Step 2 Step 3 Step 4

Step 1 - Containment Step 2 - Inoculation Step 3 - Quarantine Step 4 - Treatment

While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean?

The transfer is working.

Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run?

Trojan

In which two interfaces or ports can security be improved by configuring executive timeouts?

console ports vty ports

Hardware threats

physical damage to servers, routers, cabling plant, and workstations

Maintenance threats

poor handling of key electrical components (electric discharge), lack of critical spare parts, poor cabling, and poor labeling

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

Environmental threats

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

the IP address of the neighbor

A user issues the ipconfig /displaydns command on the workstation. What is the function of this command?

to show all of the cached DNS entries

Electrical threats

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power lost


Set pelajaran terkait

MIE CH 4 Smartbook, Chapter 4, Exploring Business: Chapter 4, Ch. 5 Understanding Business: How to Form a Business, Business Chapter 5 test, Chapter 4 Smartbook, Intro To Business, Chapter 3 concepts of business, BUS 100 CH. 3 business in a border le...

View Set

Human Anatomy & Physiology Test #1

View Set

Lewis-Chapter 69: Nursing Management Emergency, Terrorism, and Disaster Nursing

View Set

Med Surg: Chapter 42: Nursing Management: Patients With Musculoskeletal Trauma

View Set