ITNv6 Chapter 11
-documentation of the current physical and logical topologies -analysis of the network traffic based on protocols, applications, and services used on the network -inventory of the devices that are currently used on the network
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth?
devices with support for modularity
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
- Never send the password through the network in a clear text -Limit the number of unsuccessful attempts to log in to the server
Actions that can be taken to prevent a successful network attack on an email server account.
Terminal Monitor
Command used to allow log messages to be displayed on remotely connected sessions using Telnet or SSH
DoS attacks
Network threat that is intended to prevent authorized users from accessing resources.
R1
Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
Something is causing a time delay between the networks.
Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Environmental Threat
Routers and Switches in a wiring closet malfunctioning after an air conditioning unit failed.
-Voice -Video
Traffic types that require delay sensitive delivery.
-Give router a host name and domain name -generate a set of secret keys to be used for encryption & decryption
Two steps requires before SSH can be enabled
Stateful Packet Inspection (SPI)
Type of firewall that ensures packets coming into a network are legitimate responses initiated from internal hosts.
Purpose of using SSH to connect to a router
allows a secure remote connection to the router command line interface
CDP
can be disabled globally or on a specific interface
arp -* command on a PC
clears the ARP cache
-Capture traffic during peak utilization times to get a good representation of the different traffic types. -Perform the capture on different network segments.
describe how to assess traffic flow patterns and network traffic types using a protocol analyzer
Network Baseline
established at regular intervals over a period of time
C:\>tracert -6 www.cisco.com on Windows
forces the trace to use IPv6
Data Loss
installing virus code to destroy surveillance recordings for certain days
Redundancy
network design consideration that is more important to a large corporation than to a small business
Information Theft
obtaining trade secret documents illegally
Identity Theft
pretending to be someone else by using stolen personal information to apply for a credit card
Disruption of Service
preventing users from accessing a website by sending a large number of link requests in a short period
"login block-for 180 attempts 2 within 30" command
prevents a user who is trying to guess a password to access the router
VoIP
service that defines the protocols and technologies that implement the transmission of voice packets over an IP network
"show ip interface brief" command
shows the status of the switch interfaces and the address configured on interface vlan 1
"show version" command
shows the value of the configuration register
Requires users to prove who they are
the purpose of the network security authentication function