16-17 Networking Final

Ace your homework & exams now with Quizwiz!

This zone is used to house servers that should be accessible to outside users. a) inside b) outside c) internet d) DMZ

d) DMZ

Which type of network threat is intended to prevent authorized users from accessing resources? a) reconnaissance attacks b) trust exploitation c) access attacks d) DoS attacks

d) DoS attacks

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications? a) ICMP b) PoE c) AAA d) QoS

d) QoS

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.) a) File Transfer Protocol (FTP) b) Hypertext Transfer Protocol (HTTP). c) Remote Connect (RC) d) Secure Shell (SSH) e) Simple Mail Transfer Protocol (SMTP) f) Telnet

d) Secure Shell (SSH) & f) Telnet

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack

a) access attack

What is necessary to plan and use when implementing a network? a) device names b) IP addressing scheme c) MAC addressing scheme d) printer location

b) IP addressing scheme

What factor should be considered in the design of a small network when devices are being chosen? a) ISP b) redundancy c) traffic analysis d) cost of devices

d) cost of devices

What kind of threat is described when a threat actor is stealing the user database of a company? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

d) information theft

What kind of threat is described when a threat actor alters data records? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

a) data loss or manipulation

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

a) data loss or manipulation

Which network design consideration would be more important to a large corporation than to a small business? a) redundancy b) firewall c) Internet router d) low port density switch

a) redundancy

A user is unable to reach the website when typing ht​tp://ww​w.cisco.com in a web browser, but can reach the same site by typing ht​tp://72.163.4.161. What is the issue? a) TCP/IP protocol stack b) DNS c) DHCP d) default gateway

b) DNS

What Windows 10 tool is useful to determine which applications are using network services on a host? a) Control panel b) Data Usage c) File Manager d) Windows Defender Firewall e) Windows Explorer

b) Data Usage

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails? a) Purchase a second least-cost link from another ISP to connect to this router. b) Have a second router that is connected to another ISP. c) Add more interfaces to the router that is connected to the internal network. d) Activate another router interface that is connected to the ISP, so the traffic can flow through it.

b) Have a second router that is connected to another ISP.

What three configuration steps must be performed to implement SSH access to a router? (Choose three.) a) an enable mode password b) a user account c) a password on the console line d) an IP domain name e) a unique hostname f) an encrypted password

b) a user account & d) an IP domain name & e) a unique hostname

Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack

b) denial of service (DoS) attack

What kind of threat is described when a threat actor overloads a network to deny other users network access? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

b) disruption of service

What kind of threat is described when a threat actor prevents legal users from accessing data services? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

b) disruption of service

Which benefit does SSH offer over Telnet for remotely managing a router? a) authorization b) encryption c) TCP usage d) connections via multiple VTY lines

b) encryption

Which device controls traffic between two or more networks to help prevent unauthorized access? a) AAA Server b) firewall c) ESA/WSA d) IPS

b) firewall

What is one of the most effective security tools available for protecting users from external threats? a) router that run AAA services b) firewalls c) patch servers d) password encryption techniques

b) firewalls

What is required to classify traffic according to priority? a) IP addressing scheme b) quality of service (QoS) c) routing d) switching

b) quality of service (QoS)

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port? a) show mac-address-table b) show interfaces c) show ip interface brief​ d) show running-config

b) show interfaces

What is the objective of a network reconnaissance attack? a) disabling network systems or services b) unauthorized manipulation of data c) discovery and mapping of systems d) denying access to resources by legitimate users

c) discovery and mapping of systems

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? a) electrical b) configuration c) environmental d) maintenance

c) environmental

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

c) identify theft

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack

c) malware attack

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.) a) debug ip icmp off b) no debug debug ip icmp c) no debug ip icmp d) undebug all e) undebug debug ip icmp

c) no debug ip icmp & d) undebug all

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection? a) monitor debug output b) monitor terminal c) terminal monitor d) terminal monitor debug

c) terminal monitor

What is the purpose of the network security accounting function? a) to require users to prove who they are b) to determine which resources a user can access c) to keep track of the actions of a user d) to provide challenge and response questions

c) to keep track of the actions of a user

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked? a) Trojan horse b) social engineering c) worm d) virus

c) worm

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process? a) Document findings, actions, and outcomes. b) Establish a plan of action and implement the solution. c) Identify the problem. d) Test the theory to determine cause. e) Verify solution and implement preventive measures.

d) Test the theory to determine cause.

Which device is used by other network devices to authenticate and authorize management access? a) AAA Server b) firewall c) ESA/WSA d) IPS

a) AAA Server

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? a) RouterA(config)# login block-for 30 attempts 2 within 10 b) RouterA(config)# login block-for 30 attempts 10 within 2 c) RouterA(config)# login block-for 10 attempts 2 within 30 d) RouterA(config)# login block-for 2 attempts 30 within 10

a) RouterA(config)# login block-for 30 attempts 2 within 10

Which three services are provided by the AAA framework? (Choose three.) a) accounting b) authorization c) authentication d) autoconfiguration e) automation f) autobalancing

a) accounting & b) authorization & c) authentication

Which statement is true about CDP on a Cisco device?​ a) Because it runs at the data link layer​, the CDP protocol can only be implemented in switches. b) CDP can be disabled globally or on a specific interface​. c) To disable CDP globally, the no cdp enable command in interface configuration mode must be used. d) The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity​.

b) CDP can be disabled globally or on a specific interface​.

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next? a) Email all users to let them know they are replacing a switch. b) Escalate the trouble ticket to the manager to approve the change. c) Purchase a new switch and replace the defective one. d) Resolve the problem.

b) Escalate the trouble ticket to the manager to approve the change.

What does the term vulnerability mean? a) a method of attack to exploit a target b) a weakness that makes a target susceptible to an attack c) a known target or victim machine d) a potential threat that a hacker creates e) a computer that contains sensitive information

b) a weakness that makes a target susceptible to an attack

Which is appropriate for providing endpoint security? a) a AAA server b) antivirus software c) a server-based firewall d) an ESA/WSA

b) antivirus software

What are two forms of software programs or processes that provide access to the network? (Choose two.) a) antivirus software b) application layer services c) gaming software d) network applications e) productivity software f) virtual machine software

b) application layer services & d) network applications

When should an administrator establish a network baseline? a) when there is a sudden drop in traffic b) at regular intervals over a period of time c) at the lowest point of traffic in the network d) when the traffic is at peak in the network

b) at regular intervals over a period of time

Where are Cisco IOS debug output messages sent by default? a) Syslog server b) console line c) memory buffers d) vty lines

b) console line

A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack

b) denial of service (DoS) attack

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? a) devices with a fixed number and type of interfaces b) devices with support for modularity c) redundant devices d) devices that have support for network monitoring

b) devices with support for modularity

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5? a) DNS b) IP c) DHCP d) HTTP

c) DHCP

Which statement correctly relates to a small network? a) Small networks are complex. b) Small networks require an IT department to maintain. c) The majority of businesses are small.

c) The majority of businesses are small.

Which factor must be considered when selecting network devices? a) color b) console connections c) cost d) elasticity

c) cost

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

c) identify theft

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack

c) malware attack

What type of attack may involve the use of tools such as nslookup and fping? a) worm attack b) denial of service attack c) reconnaissance attack d) access attack

c) reconnaissance attack

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection? a) direct access to the switch through the use of a terminal emulation program b) remote access to the switch through the use of a telephone dialup connection c) remote access to a switch where data is encrypted during the session d) out-of-band access to a switch through the use of a virtual terminal with password authentication e) on-site access to a switch through the use of a directly connected PC and a console cable

c) remote access to a switch where data is encrypted during the session

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data? a) frequency b) storage c) security d) validation

c) security

What kind of threat is described when a threat actor steals scientific research data? a) data loss or manipulation b) disruption of service c) identify theft d) information theft

d) information theft

Which element of scaling a network involves identifying the physical and logical topologies? a) cost analysis b) traffic analysis c) device inventory d) network documentation

d) network documentation

Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario? a) access attack b) denial of service (DoS) attack c) malware attack d) reconnaissance attack

d) reconnaissance attack

What is required to maintain a high degree of reliability and eliminate single points of failure? a) accessibility b) expandability c) integrity d) redundancy

d) redundancy

What type of traffic would most likely have the highest priority through the network? a) FTP b) instant messaging c) SNMP d) voice

d) voice

Which software installed on key hosts can reveal the types of network traffic flowing through the network? a) Linux b) MacOS c) SSH d) Windows e) Wireshark

e) Wireshark

Which component is designed to protect against unauthorized communications to and from a computer? a) antivirus b) port scanner c) antimalware d) security center e) firewall

e) firewall

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task? a) MAC address settings b) file system settings c) firewall settings d) smartcard settings

c) firewall settings

Which elements are required to scale to a larger network? (Choose two.) a) budget b) device configurations c) increased bandwidth d) network documentation e) windows hosts

a) budget & d) network documentation

Which two traffic types require delay sensitive delivery? (Choose two.) a) voice b) video c) email d) FTP e) web

a) voice & b) video

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? a) trace 10.1.1.5 b) traceroute 10.1.1.5 c) tracert 10.1.1.5 d) ping 10.1.1.5

c) tracert 10.1.1.5


Related study sets

A&P 2 Lab: Ex 4 White blood cells

View Set

Viruses and Needs of life quiz review

View Set

Nursing Assisting Chapter 5 - Diversity and Human Needs and Development

View Set

Crim. Ch.14 Deterrence/ Incapacitation/ Retribution/ and Rehabilitation

View Set

Transferring energy in the atmosphere (Conduction, convection and latent heat)

View Set