Intro to networks chapter 16-17

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which device is used by other network devices to authenticate and authorize management access?

AAA server

Which is appropriate for providing endpoint security?

Antivirus software

Which elements are required to scale to larger network?

Budget Network documentation

Which statement is true about CDP on Cisco device?​

CDP can be disabled globally or on specific interface​.

Which factor must be considered when selecting network devices?

Cost

Which process failed if computer cannot access internet and received IP address of 169.254.142.5?

DHCP

This zone is used to house servers that should be accessible to outside users.

DMZ

A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue?

DNS

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? What kind of threat is described when a threat actor alters data records?

Data loss or manipulation

What Windows 10 tool is useful to determine which applications are using network services on a host?

Data usage

Defense in Depth

Defense that uses multiple types of security devices to protect network. Also called layered security. This includes VPN, firewall , ASA, IPS, ESA/WSA, AAA server, etc.

Denial of service

Disabling or corruption of networks, systems, or services

What is the objective of a network reconnaissance attack?

Discovery and mapping of systems

Reconnaissance attacks

Discovery and mapping of systems, services, or vulnerabilities Involve use of tools such as nslookup and fping

What kind of threat is described when threat actor prevents legal users from accessing data services? What kind of threat is described when threat actor overloads network to deny other users network access?

Disruption of service

Which benefit does SSH offer over Telnet for remotely managing router?

Encryption

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?

Environmental

A technician is troubleshooting network problem. After troubleshooting, technician concludes that switch should be replaced. What should technician do next?

Escalate trouble ticket to manager to approve change.

Which device controls traffic between two or more networks to help prevent unauthorized access? Which component is designed to protect against unauthorized communications to and from a computer?

Firewall

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

Firewall settings

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

What is necessary to plan and use when implementing network?

IP addressing scheme

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information? What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

Identify theft

What kind of threat is described when a threat actor steals scientific research data? What kind of threat is described when a threat actor is stealing the user database of a company?

Information theft

Which statement correctly relates to a small network?

Majority of businesses are small

DDoS Attack

Originates from multiple, coordinated sources

Trojan horses

Piece of software that looks legitimate

DoS attack

Prevent authorized people from using service by consuming system resources

packet filtering

Prevents or allows access based on IP or MAC addresses of source and destination

application filtering

Prevents or allows access by specific application types based on port numbers

URL filtering

Prevents or allows access to websites based on keywords.

stateful packet inspection

Prevents or allows access whether traffic is in response to requests from internal hosts

IPS

Provides real time detention and blocking of attacks

What is required to classify traffic according to priority? What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?

Quality of Service (QoS)

What is required to maintain a high degree of reliability and eliminate single points of failure?

Redundancy

Network administrator establishes connection to switch via SSH. What characteristic uniquely describes SSH connection?

Remote access to switch where data is encrypted during session

Which two network protocols are used to establish a remote access network connection to a device?

Secure Shell (SSH) Telnet

worm

Standalone malware computer program that do not require host program or human help to propagate

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?

Test the theory to determine cause

Virus

Type of malware that is capable of copying itself and typically has detrimental effect, such as corrupting the system or destroying data

Access attacks

Unauthorized manipulation of data, system access, or user privileges

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?

Validation

What does the term vulnerability mean?

Weakness that makes target susceptible to attack

Which software installed on key hosts can reveal types of network traffic flowing through network?

Wireshark

Which three services are provided by the AAA framework?

accounting authorization authentication

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

an IP domain name a user account a unique hostname

What are two forms of software programs or processes that provide access to network?

application layer services network applications

When should an administrator establish a network baseline?

at regular intervals over a period of time

Where are Cisco IOS debug output messages sent by default?

console line

What factor should be considered in design of small network when devices are being chosen?

cost of devices

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

devices with support for modularity

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router?

no debug ip icmp undebug all

Which network design consideration would be more important to large corporation than to small business?

redundancy

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would technician use to see Layer 1 and Layer 2 details of switch port?

show interfaces

A technician has established a remote connection to router R1 to observe debug output. Technician enters debug ip icmp command then pings remote destination. However, no output is displayed. Which command would technician have to enter to display log messages on remote connection?

terminal monitor

A network technician is investigating network connectivity from PC to remote host with address 10.1.1.5. Which command, when issued on Windows PC, will display path to remote host?

tracert 10.1.1.5

What type of traffic would most likely have the highest priority through the network?

voice

Which two traffic types require delay sensitive delivery?

voice video


Set pelajaran terkait

Semester 2 Theory-Final Study Set (PrepU)

View Set

علم الجيولجيا و مادة الارض

View Set

OB Comprehensive Review for the NCLEX-PN Exam, 6th Edition

View Set

Objective review principles of Radiology

View Set

2.1 Finding the slope and the y-intercept.

View Set

A&P Exam 2: Integumentary System

View Set