Enterprise networks 3-5

Ace your homework & exams now with Quizwiz!

What wild card mask will match networks 172.16.0.0 through 172.19.0.0? 0.0.3.255 0.0.255.255 0.252.255.255 0.3.255.255

0.3.255.255

Consider the following access list. access-list 100 permit ip host 192.168.10.1 any access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo access-list 100 permit ip any any Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.) A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned. Devices on the 192.168.10.0/24 network are allowed to reply to any ping requests. Only Layer 3 connections are allowed to be made from the router to any other network device. Only the network device assigned the IP address 192.168.10.1 is allowed to access the router. Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.

A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned. Devices on the 192.168.10.0/24 network are allowed to reply to any ping requests.

Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack? DNS ICMP HTTP or HTTPS DHCP

DHCP

In which type of attack is falsified information used to redirect users to malicious Internet sites? DNS cache poisoning ARP cache poisoning DNS amplification and reflection domain generation

DNS cache poisoning

Cover 16,18,22,23,25,27,28,29,31,33,35,36,40,41,44,56,58,60,62,63,65

Do in curriculum

In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services? DoS MITM session hijacking address spoofing

DoS

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.) destination MAC address ICMP message type computer type source TCP hello address destination UDP port number

ICMP message type destination UDP port number

Which statement describes a difference between the operation of inbound and outbound ACLs? In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria. Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers. Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed. On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.

Which statement accurately characterizes the evolution of threats to network security? Internal threats can cause even greater damage than external threats. Internet architects planned for network security from the beginning. Early Internet users often engaged in activities that would harm other users. Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.

Internal threats can cause even greater damage than external threats.

What is the best description of Trojan horse malware? It is the most easily detected form of malware. It is malware that can only be distributed over the Internet. It is software that causes annoying but not fatal computer problems. It appears as useful software but hides malicious code.

It appears as useful software but hides malicious code.

What is a feature of an IPS? It can stop malicious packets. It has no impact on latency. It is deployed in offline mode. It is primarily focused on identifying possible incidents.

It can stop malicious packets.

What is considered a best practice when configuring ACLs on vty lines? Use only extended access lists. Place identical restrictions on all vty lines. Apply the ip access-group command inbound. Remove the vty password since the ACL restricts access to trusted users.

Place identical restrictions on all vty lines.

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.) Router(config)# access-list 95 deny any Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0 Router(config)# access-list 95 permit any Router(config)# access-list 95 host 172.16.0.0 Router(config)# access-list 95 172.16.0.0 255.255.255.255

Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 Router(config)# access-list 95 permit any

What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode? Router(config)# Router(config-if)# Router(config-router)# Router(config-std-nacl)# Router(config-line)#

Router(config-std-nacl)#

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.) Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255 Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0 Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255

Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections? reset attack port scan attack SYN flood attack session hijacking attack

SYN flood attack

In what way are zombies used in security attacks? They are maliciously formed code segments used to replace legitimate applications. They target specific individuals to gain corporate or personal information. They are infected machines that carry out a DDoS attack. They probe a group of machines for open ports to learn which services are running.

They are infected machines that carry out a DDoS attack.

Which statement describes a characteristic of standard IPv4 ACLs? They are configured in the interface configuration mode. They filter traffic based on source IP addresses only. They can be created with a number but not with a name. They can be configured to filter traffic based on both source IP addresses and source ports.

They filter traffic based on source IP addresses only.

What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface? All TCP traffic is permitted, and all other traffic is denied. The command is rejected by the router because it is incomplete. All traffic from 172.16.4.0/24 is permitted anywhere on any port. Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.

Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.

What is the quickest way to remove a single ACE from a named ACL? Use the no keyword and the sequence number of the ACE to be removed. Use the no access-list command to remove the entire ACL, then recreate it without the ACE. Copy the ACL into a text editor, remove the ACE, then copy the ACL back into the router. Create a new ACL with a different number and apply the new ACL to the router interface.

Use the no keyword and the sequence number of the ACE to be removed.

What is a ping sweep? a network scanning technique that indicates the live hosts in a range of IP addresses. a software application that enables the capture of all network packets that are sent across a LAN. a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services. a query and response protocol that identifies information about a domain, including the addresses that are assigned to that domain.

a network scanning technique that indicates the live hosts in a range of IP addresses.

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? DH a private key a digital certificate a different public key

a private key

Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1? access-list 101 permit tcp host 192.168.1.1 any eq 80 access-list 101 permit tcp host 192.168.1.1 eq 80 any access-list 101 permit tcp any eq 80 host 192.168.1.1 access-list 101 permit tcp any host 192.168.1.1 eq 80

access-list 101 permit tcp any host 192.168.1.1 eq 80

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet? access-list 103 deny tcp host 192.168.10.0 any eq 23 access-list 103 permit tcp host 192.168.10.1 eq 80 access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet​​ access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23 access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

What is the term used to describe unethical criminals who compromise computer and network security for personal gain, or for malicious reasons? black hat hackers vulnerability broker hacktivists script kiddies

black hat hackers

What is the term used to describe a mechanism that takes advantage of a vulnerability? exploit threat vulnerability mitigation

exploit

What type of ACL offers greater flexibility and control over network access? flexible named standard extended numbered standard

extended

What commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers? fame seeking financial gain political reasons status among peers

financial gain

Which type of hacker is motivated to protest against political and social issues? script kiddie hacktivist vulnerability broker cybercriminal

hacktivist

What is the term used to describe gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks? hacktivists grey hat hackers white hat hackers state-sponsored hacker

hacktivists

Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.) most host all any some gt

host any

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​ confidentiality authentication integrity nonrepudiation

integrity

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication? DoS attack ICMP attack SYN flood attack man-in-the-middle attack

man-in-the-middle attack

What is the term used to describe a guarantee that the message is not a forgery and does actually come from whom it states? origin authentication mitigation exploit risk

origin authentication

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent? DDoS spam social engineering anonymous keylogging

social engineering

What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data? symmetric encryption algorithm data integrity risk mitigation

symmetric encryption algorithm

What is the term used to describe a potential danger to a company's assets, data, or network functionality? threat vulnerability exploit asset

threat

A technician is tasked with using ACLs to secure a router. When would the technician use the remark configuration option or command? to add a text entry for documentation purposes to restrict specific traffic access through an interface to generate and send an informational message whenever the ACE is matched to identify one specific IP address

to add a text entry for documentation purposes

A technician is tasked with using ACLs to secure a router. When would the technician use the ip access-group 101 in configuration option or command? to apply an extended ACL to an interface to secure administrative access to the router to create an entry in a numbered ACL to apply an ACL to all router interfaces

to apply an extended ACL to an interface

A technician is tasked with using ACLs to secure a router. When would the technician use the 40 deny host 192.168.23.8 configuration option or command? to create an entry in a numbered ACL to secure management traffic into the router to display all restricted traffic to remove all ACLs from the router

to create an entry in a numbered ACL

A technician is tasked with using ACLs to secure a router. When would the technician use the any configuration option or command? to identify any IP address to add a text entry for documentation purposes to generate and send an informational message whenever the ACE is matched to identify one specific IP address

to identify any IP address

A technician is tasked with using ACLs to secure a router. When would the technician use the no ip access-list 101 configuration option or command? to remove a configured ACL to remove all ACLs from the router to apply an ACL to all router interfaces to secure administrative access to the router

to remove a configured ACL

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command? to secure administrative access to the router to display all restricted traffic to secure management traffic into the router to remove all ACLs from the router

to secure administrative access to the router


Related study sets

Chapter 46: Management of Patients with Metabolic Disorders

View Set

Unit 2 Part II Study Guide Second One

View Set

Organizational Management Final- Quizzes and Etc.

View Set

chp 39 study guide: antibiotics affecting the bacterial cell wall

View Set

Chapter 3: Leadership Concepts in Health Information Management

View Set