cyan security, 28

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which protocol is used by ping to test connectivity between network hosts?

ICMP

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host

ICMPv6

What is indicated by a successful ping to the ::1 IPv6 address?

IP is properly installed on the host.

Which protocol provides authentication, integrity,and confidentiality services and is a type of VPN?

IPsec

What contains information on how hard drive partitions are organized?

MBR

Application Layer

The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.

what is a function of a proxy firewall?

connects to remote servers on behalf of clients

What is the command netstat -r used for?

to display the host routing table

What is the main difference between the implementation of IDS and IPS devices?

An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately

How is a source IP address used in a standard ACL?

It is the criterion that is used to filter traffic

Which protocol enables mail to be downloaded from an email server to a client and then deletes the email from the server?

POP3

Which two protocols are considered distance vector routing protocols

RIP, EIGRP

Session Layer

The fifth layer in the OSI model. This layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for network communications.

Transport Layer

The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.

Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?

Tier 1 Personnel

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

VoIP DNS

what device can control and manage a large number of corporate APs?

WLC

Which two fields are included in the TCP header but not in the UDP header? (Choose two.)

Window, Sequence Number

how are ip addressing designs affected by vlan implementations?

each vlan must have a different network number

What type of server would use IMAP?

email

which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments

layer 2

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

when the value of the Hop Limit field reaches zero

OSI Model Layers

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?

80

Which statement best describes the operation of the File Transfer Protocol?

An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

How does BYOD change the way in which businesses implement networks?

BYOD provides flexibility in where and how users can access network resources.

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface?

DAD

Which protocol automates assignment of IP addresses on a network, and which port number does it (Choose two)

DCHP, 67

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

DHCPREQUEST

What are two services provided by the OSI network layer? (Choose two.)

Encapsulating PDUs from the transport layer routing packets toward the destination

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

Ethernet, IP, TCP, HTTP

A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?

Every application installed will update itself to the latest version

What application layer protocol uses message types such as GET, PUT, and POST?

HTTP

What is a characteristic of a WAN?

It connects multiple networks that are geographically separated.

What characterizes a traceroute utility?

It identifies the routers in the path from a source host to a destination host.

Which statement descrbies the Cisco cloud web security?

It is a cloud-based security service to scan traffic for malware and policy enforcement

Which statement describes a MAC Address?

It is a physical address assigned to an Ethernet NIC by the manufacturer.

Which two characteristics describe Ethernet technology? (Choose two).

It uses the CSMA/CD access control method It is supported by IEEE 802.3 standards

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

MAC Address settings

Which tool is used to provide a list of open ports on network devices?

NMap

What application layer protocol describes the services that are used for file sharing in Microsoft networks

SMB

Which network service allows administrators to monitor and manage network devices?

SNMP

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

SSID

what technology is used to prevent layer 2 loops?

STP

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

SYN ACK

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

Segments are sent from the transport layer to the internet layer

Which transport layer feature is used to guarantee session establishment?

TCP 3-way Handshake

What is a benefit of using DDNS

The DDNS provider detects a change to the client IP address and immediately updates the mapping change

Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

What happens if part of an FTP message is not delivered to the destination?

The part of the FTP message that was lost i s re-sent

Data Link Layer

The second layer in the OSI model. This layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.

Presentation Layer

The sixth layer of the OSI model. Protocols in the Presentation layer translate between the application and the network. Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. The Presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.

Network Layer

The third layer in the OSI model. Protocols in this layer translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.

What is a characteristic of a TCP server process?

There can be many ports open simultaneously on a server, one for each active server application.

How do hosts ensure that their packets are directed to the correct network destination?

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.

A user complains that the workstation cannot access the network. The network technician asks the user to issue the ping 127.0.0.1 command. What is the purpose of using this command?

To verify that the TCP/IP stack is operational

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

UDP Segmenets are encapsulated within IP Packets for transport across the network the source port field identifies the running application or service that will handle data returning to the PC

What is a daemon?

a background process that runs without the need for user interaction

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network

a home router

Which two roles are typically performed by a wireless router that is used in a home or small business?

access point, ethernet switch

A host is transmitting a broadcast. Which host or hosts will receive it?

all hosts in the same network

which sentence correctly describes the SVI inter-vlan routing method?

an svi needed for each vlan

Which OSI model layer contains protocols for process-to-process communication?

application

What is the purpose of the "cd" command?

changes directory to the root directory

which wireless parameter refers to the frequency bands used to transmit data to a wireless access point?

channel settings

What information does an Ethernet switch examine and use to forward a frame?

destination MAC address

what is a role of an intermediary device on a network?

determines the path and directs data along the way to its final destination

What process involves placing one PDU inside of another PDU?

encapsulation

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

In NAT translation for internal hosts, what address would be used by external users to reach internal hosts? outside global inside local outside local inside global

inside global

Which two pieces of information should be included in a logical topology diagram of a network?

interface identifier, connection type

A particular website does not appear to be responding on a windows 7 computer. What command could the technician use to show any cached DNS entries for this web page

ipconfig/displaydns

Which function or operation is performed by the LLC sublayer

it communicates with upper protocol layers

at what layer of the OSI model do routers operate?

layer 3

What message is sent by a host to check the uniqueness of an IPv6 address before using that address?

neighbor solicitation

A user issues a ping 192.168.219.8 command and receives a response that includes a code of 0. What does this code represent?

network unreachable

What are two characteristics of IP? (Choose two.)

operates independently of network media does not require a dedicated end-to-end connection

For which discovery mode will an AP generate the most traffic on a WLAN?

passive mode

What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out another interface toward a network analysis device?

port mirroring

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 3. What does this code represent?

port unreachable

What information does an Ethernet switch examine and use to build its address table?

source MAC address

A technician uses the ping 127.0.0.1 command. What is the technician testing?

the TCP/IP stack on a network host

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?

the next byte that the destination expects to receive

Which technology is used by cisco advanced malware protection (AMP) in defending and protecting against known and emerging threats?

threat intelligence

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

time exceeded

In computer communication, what is the purpose of message encoding?

to convert information to the appropriate form for transmission

Why would a manager need to use the tracert command?

to display a list of the near-side router interfaces between the source device and the destination device

What is the purpose of a personal firewall on a computer?

to filter the traffic that is moving in and out of the PC

Why does a Layer 3 device perform ANDing process n a destination IP address and subnet mask?

to identify the network address of the destination network

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?

traceroute

What are two roles of the transport layer in data communication on a network? (Choose two.)

tracking the individual communication between applications on the source and destination hosts identifying the proper application for each communication stream

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

transport layer


Set pelajaran terkait

Chap 26: The Fetal Spine and Musculoskeletal System

View Set

CHEMISTRY: The Laws Governing Formulas and Names

View Set

Unit 3 - Foundations Ch. 2-8 & Ch. 19 (part 2)

View Set

Texas Promulgated Contract Forms: Quiz Questions

View Set

SIS220 [Midterm: 1-31, Final: 33-79]

View Set

PRACTICE AND CLASS Ch.11 (Capital Budgeting)

View Set

CS303 Data Structures Final Study Guide

View Set

Chapter: Life Insurance Policy Provisions, Riders, and Options

View Set