Cisco Final Part 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

what are two types of attacks used on DNS open resolvers

amplification and reflection resource utilization

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs

building the topology table

what command would be used as part of configuring nat or pat to clear dynamic entries before the timeout has expired?

clear ip nat translation

which two scenarios would result in a duplex mismatch

connecting a device with auto negotiation to another that is manually set to full duplex manually setting the two connected devices to different duplex modes

administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement

data center

what method can be used to enable an OSPF router to advertise a default route to neighboring OSPF routers

default-information originate command on R0-A

which is a characteristic of a Type 2 hypervisor?

does not require management console software

what are two syntax rules for writing a JSON array

each value is separated by a comma values are enclosed in square brackets

what functionality does mGRE provide to the DMVPN technology?

it allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes

what is a purpose of establishing a network baseline

it creates a point of reference for future network evaluations

a company is considering updating the campus WAN connection. Which two WAN optionas re examples of the private WAN architecture 2

leased line

what is a characteristic of a Trojan horse as it relates to network security

malware is contained in a seemingly legitimate executable program

which statement describes a characteristic of CIsco Catalyst 2960 switches

new cisco catalyst 2960-c switches support PoE pass-through

what command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the poo

show ip nat statistics

what are the two types of VPN connections 2

site-to-site remote access

What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets

the ARP table

what is used to pre-populate the adjacency table on cisco devices that use CEF to process packets

the ARP table

If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?

the host initiates a clientless VPN connection using a compliant web browser to download the client

two-tier spine-leaf topology

the leaf switches always attach to the spines, but they never attach to each other

Which design feature will limit the size of a failure domain in an enterprise network

the use of the building switch block approach

a company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?

to capture and analyze packets within traditional Ethernet LANs or WLANs

why would a team use applications such as John the Ripper, THC Hydra, RainbowCrack

to make repeated guesses in order to crack a password

a company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?

to reverse engineer binary files when writing exploits and when analyzing malware.

what are two characteristics of video traffic?

video traffic latency should not exceed 400 ms video traffic is unpredictable and inconsistent

an administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0 what wildcard mask would he use

0.0.3.255

Which type of QoS marking is applied to Ethernet frames?

CoS

an attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

DHCP Spoofing

Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?

DSL

which protocol provides authentication, integrity, and confidentiality services and is a type of VPN

IPsec

Which two IPsec protocols are used to provide data integrity?

MD5 SHA

In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?

NAT

What protocol allows the manager to poll agents to access information from the agent MIB

SNMP

what type of resources are required for a type 1 hypervisor

a management console


Set pelajaran terkait

AP Biology Ch. 6-7 AP collegeboard

View Set

Hardware and Software Module 11 Quiz

View Set

Chapter 5 Cost-Volume-Profit Relationships

View Set

Chapter 41 Management of Patients with musculoskeletal disorders

View Set

Information Systems Project Mgmt - Chapter 7 Quiz

View Set

CC Algebra 3 Module 1 Sequences & Series Quiz Review 2020

View Set