Intro to networks chapter 16-17
Which device is used by other network devices to authenticate and authorize management access?
AAA server
Which is appropriate for providing endpoint security?
Antivirus software
Which elements are required to scale to larger network?
Budget Network documentation
Which statement is true about CDP on Cisco device?
CDP can be disabled globally or on specific interface.
Which factor must be considered when selecting network devices?
Cost
Which process failed if computer cannot access internet and received IP address of 169.254.142.5?
DHCP
This zone is used to house servers that should be accessible to outside users.
DMZ
A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?
DNS
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? What kind of threat is described when a threat actor alters data records?
Data loss or manipulation
What Windows 10 tool is useful to determine which applications are using network services on a host?
Data usage
Defense in Depth
Defense that uses multiple types of security devices to protect network. Also called layered security. This includes VPN, firewall , ASA, IPS, ESA/WSA, AAA server, etc.
Denial of service
Disabling or corruption of networks, systems, or services
What is the objective of a network reconnaissance attack?
Discovery and mapping of systems
Reconnaissance attacks
Discovery and mapping of systems, services, or vulnerabilities Involve use of tools such as nslookup and fping
What kind of threat is described when threat actor prevents legal users from accessing data services? What kind of threat is described when threat actor overloads network to deny other users network access?
Disruption of service
Which benefit does SSH offer over Telnet for remotely managing router?
Encryption
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
Environmental
A technician is troubleshooting network problem. After troubleshooting, technician concludes that switch should be replaced. What should technician do next?
Escalate trouble ticket to manager to approve change.
Which device controls traffic between two or more networks to help prevent unauthorized access? Which component is designed to protect against unauthorized communications to and from a computer?
Firewall
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
Firewall settings
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP.
What is necessary to plan and use when implementing network?
IP addressing scheme
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information? What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
Identify theft
What kind of threat is described when a threat actor steals scientific research data? What kind of threat is described when a threat actor is stealing the user database of a company?
Information theft
Which statement correctly relates to a small network?
Majority of businesses are small
DDoS Attack
Originates from multiple, coordinated sources
Trojan horses
Piece of software that looks legitimate
DoS attack
Prevent authorized people from using service by consuming system resources
packet filtering
Prevents or allows access based on IP or MAC addresses of source and destination
application filtering
Prevents or allows access by specific application types based on port numbers
URL filtering
Prevents or allows access to websites based on keywords.
stateful packet inspection
Prevents or allows access whether traffic is in response to requests from internal hosts
IPS
Provides real time detention and blocking of attacks
What is required to classify traffic according to priority? What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?
Quality of Service (QoS)
What is required to maintain a high degree of reliability and eliminate single points of failure?
Redundancy
Network administrator establishes connection to switch via SSH. What characteristic uniquely describes SSH connection?
Remote access to switch where data is encrypted during session
Which two network protocols are used to establish a remote access network connection to a device?
Secure Shell (SSH) Telnet
worm
Standalone malware computer program that do not require host program or human help to propagate
A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?
Test the theory to determine cause
Virus
Type of malware that is capable of copying itself and typically has detrimental effect, such as corrupting the system or destroying data
Access attacks
Unauthorized manipulation of data, system access, or user privileges
Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?
Validation
What does the term vulnerability mean?
Weakness that makes target susceptible to attack
Which software installed on key hosts can reveal types of network traffic flowing through network?
Wireshark
Which three services are provided by the AAA framework?
accounting authorization authentication
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
an IP domain name a user account a unique hostname
What are two forms of software programs or processes that provide access to network?
application layer services network applications
When should an administrator establish a network baseline?
at regular intervals over a period of time
Where are Cisco IOS debug output messages sent by default?
console line
What factor should be considered in design of small network when devices are being chosen?
cost of devices
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
devices with support for modularity
A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router?
no debug ip icmp undebug all
Which network design consideration would be more important to large corporation than to small business?
redundancy
A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would technician use to see Layer 1 and Layer 2 details of switch port?
show interfaces
A technician has established a remote connection to router R1 to observe debug output. Technician enters debug ip icmp command then pings remote destination. However, no output is displayed. Which command would technician have to enter to display log messages on remote connection?
terminal monitor
A network technician is investigating network connectivity from PC to remote host with address 10.1.1.5. Which command, when issued on Windows PC, will display path to remote host?
tracert 10.1.1.5
What type of traffic would most likely have the highest priority through the network?
voice
Which two traffic types require delay sensitive delivery?
voice video