Module 16 - 17 (Building and Securing a Small Network)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which statement is true about CDP on a Cisco device?​

CDP can be disabled globally or on a specific interface

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DHCP

A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue?

DNS

Which type of network threat is intended to prevent authorized users from accessing resources?

DoS attacks

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?

QoS

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 309 attempts 2 within 10

What three configuration steps must be performed to implement SSH access to a router?

[1] a user account [2] an IP domain name [3] a unique hostname

Which three services are provided by the AAA framework?

[1] accounting [2] authentication [3] authorization

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack

When should an administrator establish a network baseline?

at regular intervals over a period of time

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

firewall settings

What factor should be considered in the design of a small network when devices are being chosen?

cost of devices

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

devices with support for modularity

What is the objective of a network reconnaissance attack?

discovery and mapping of systems

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?

environmental

Which component is designed to protect against unauthorized communications to and from a computer?

firewall

What is one of the most effective security tools available for protecting users from external threats?

firewalls

Where are Cisco IOS debug output messages sent by default?

network documentation

What type of attack may involve the use of tools such as nslookup and fping?

reconnaissance attack

Which network design consideration would be more important to a large corporation than to a small business?

redundancy

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

remote access to a switch where data is encrypted during the session

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

show interfaces

What is the purpose of the network security accounting function?

to keep track of the actions of a user

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5

What type of traffic would most likely have the highest priority through the network?

voice

Which two traffic types require delay sensitive delivery?

voice, video

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

worm


Set pelajaran terkait

Sayles Check your understanding (Chapter 17-21)

View Set

Life and Health Ch 7 Fed Tax Considerations and Retirement Plans

View Set

Physics and Technology for Future Presidents: Chapter 13

View Set

Cyber Literacy: It's a Big World

View Set