p222

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

True or false? Resource sharing over SMB is only supported on Microsoft operating systems

. False

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

.com

Which of these ports are used by FTP? (Choose two.)

20 / 21

On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home network?

A home router

What does the term vulnerability mean?

A weakness that makes a target susceptible to an attack

Which device is used by other network devices to authenticate and authorize management access?

AAA Server

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?

Access attack

Which is appropriate for providing endpoint security?

Antivirus software

Which TCP/IP model layer is closest to the end user?

Application

When should an administrator establish a network baseline?

At regular intervals over a period of time

Which statement is true about CDP on a Cisco device?

CDP can be disabled globally or on a specific initerface

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

Client

Where are Cisco IOS debug output messages sent by default?

Console line

Which factor must be considered when selecting network devices?

Cost

What factor should be considered in the design of a small network when devices are being chosen?

Cost of devices

A wireless host needs to request an IPv4 address. What protocol would be used to process the request?

DHCP

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DHCP

This zone is used to house servers that should be accessible to outside users.

DMZ

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?

DNS

What Windows 10 tool is useful to determine which applications are using network services on a host?

Data Usage

What kind of threat is described when a threat actor alters data records?

Data loss or manipulation

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

Data loss or manipulation

A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?

Denial of service (DOS) attack

Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario?

Denial of service(DOS ) Attack

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

Devices with the support for modularity

What is the objective of a network reconnaissance attack?

Discovery and mapping of systems

What kind of threat is described when a threat actor overloads a network to deny other users network access?

Disruption of service

What kind of threat is described when a threat actor prevents legal users from accessing data services?

Disruption of service

Which type of network threat is intended to prevent authorized users from accessing resources?

DoS attacks

Which benefit does SSH offer over Telnet for remotely managing a router?

Encryption

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?

Environmental

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?

Escalate the trouble ticket to the manager to approve the change

Which component is designed to protect against unauthorized communications to and from a computer?

Firewall

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

Firewall settings

What is one of the most effective security tools available for protecting users from external threats?

Firewalls

What message type is used by an HTTP client to request data from a web server?

GET

Which protocol uses encryption?

HTTPS

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

What is necessary to plan and use when implementing a network?

IP addressing scheme

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

Identify theft

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

Identify theft

What kind of threat is described when a threat actor is stealing the user database of a company?

Information theft

What kind of threat is described when a threat actor steals scientific research data?

Information theft

Why is DHCP for IPv4 preferred for use on large networks?

It is a more efficient way to manage ipv4 addresses that static address assignment is

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)

MPEG / HTTP / GIF

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?

Malware attack

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?

Malware attack

Which two tasks can be performed by a local DNS server? (Choose two.)

Mapping name to ip addresses for internal hosts / forwarding name resolution requests between servers

Which element of scaling a network involves identifying the physical and logical topologies?

Network documentation

Which protocol can be used to transfer messages from an email server to an email client?

POP3

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?

QoS

What is required to classify traffic according to priority?

Quality of service (QoS)

Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?

Reconnaissance attack

What type of attack may involve the use of tools such as nslookup and fping?

Reconnaissance attack

What is required to maintain a high degree of reliability and eliminate single points of failure?

Redundancy

Which network design consideration would be more important to a large corporation than to a small business?

Redundancy

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

Remote access to a switch where data is encrypted during the session

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA)config)# login block-for 30 attempts 2 within 10

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

SMB

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?

Security

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

Show interfaces

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?

Terminal monitor

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?

Test the theory to determine cause

Which statement is true about FTP?

The client can download data from or upload data to the server

Which statement correctly relates to a small network?

The majority of businesses are small

What is the purpose of the network security accounting function?

To keep track of the actions of a user

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

Tracert 10.1.1.5

True or false? FTP data transfers take place from client to server (push) and from server to client (pull).

True

What type of traffic would most likely have the highest priority through the network?

Voice

Which software installed on key hosts can reveal the types of network traffic flowing through the network?

Wireshark

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

Worm

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

a unique hostname / a user account / an IP domain name

What are two forms of software programs or processes that provide access to the network? (Choose two.)

application layer services / network applications

Which three services are provided by the AAA framework? (Choose three.)

authentication / accounting / authorization

Which elements are required to scale to a larger network? (Choose two.)

budget / network documentation

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)

no debug ip icmp / undebug all

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)

secure shell (SHH) / Telnet

What are two characteristics of the application layer of the TCP/IP model? (Choose two.)

the creation and maintenance of dialogue between source and destination applications / closest to the end user

Which two traffic types require delay sensitive delivery? (Choose two.)

video / voice


Set pelajaran terkait

Unit 7 Financial (Cash) Budget Concepts

View Set

Lab 14-3: Working in Event Viewer

View Set

NU 250 Quiz #3- DM and Endocrine

View Set