SA06
Which of the following are components of OSPF routing protocols?
Routing Control Messages
Data Structures
Algorithm
A pool of OSPF routers where the BDR is selected when DR fails?
Drother
Which of the following are advantages of multi-area OSPF?
Smaller routing tables
Reduced link-state update overhead
Reduced frequency of SPF calculations
Which of the following operational states where the election of the DR and BDR
took place?
Two-way
A router role that disseminate link-state advertisements to all the OSPF routers
on the network.
Designated router
Adjacency Database : Neighbor Table <==> _ : Routing Table
Forwarding Database
Which of the following are being performed by the OSPF router during the database
synchronization?
Decide first router
Exchange DBDs
Send an LSR
What do you call a router that is located between 2 different area in an OSPF network?
Area border router
Which of the following are link-state routing procedures performed by the router?
Establish neighbor adjacencies
Exchange link-state advertisements
Build the link-state database
execute the SPF algorithm
Choose the best route
Which of the following operational states where the best path to a destination is
determined?
Loading State
SA07
Considering the given topology above, What seems to be the problem when Router A is not
forming adjacency with Router B?
Ans:
Dead timer’s value on the routers are not the same
Loopback addresses might be on different subnets
Both routers uses route summarization
Both routers are using different process identifiers.
Refer to the figure below.
The following has been configured on the City Router:
City(config-router)network [Link] [Link] area 0
Which of the following interfaces will participate in OSPF?
Ans:
FastEthernet 0/0
FastEthernet 0/1
Serial0/0
Serial0/1.102
Serial0/1.103
Serial0/1.104
What are the characteristics of OSPF areas?
Ans:
Area 0 is called Backbone area
Areas can be from 0 to 65535.
Non-area zero should be connected to the backbone
You are required to properly configure a router to run OSPF. Which of the command would add
[Link]/24 to SPF area 0?
Ans:
Router(config)# router ospf 1
Router(config-router)# network [Link] [Link] area 0
Refer to the diagram above. Considering RouterB, which are true about loopback address?
Ans:
● It ensure stability for the OSPF process on RouterB
● It specifies that the Router ID for RouterB should be [Link].
Ans: [Link]
Refer to the given diagram below. What do you mean to 128 on the highlighted output
OSPF Priority
OSPF hop count
OSPF ID number
OSPF cost
OSPF administrative distance
On which network will OSPF choose a Designated Router?
Ans:
Non broadcast
Broadcast
Refer to the digram above, if Router1 has just rebooted, what will be its router ID?
Ans:
[Link]
What address is being used by OSPF hello packets on a point-to-point networks?
Ans: [Link] or [Link]
SA08
Which encryption protocol provides Layer 3 confidentiality?
Ans: IPSec protocol suite
To provide authentication, integrity, and confidentiality, which type of encryption algorithm uses
public and private keys?
Ans: asymmetric
Which of the following screnario/s where Deffie-Hellman is usually utilized.
Ans:
IPSec VPN data exchange
SSL or TLS data encryption
SSH data exchange
Which encryption protocol provides Layer 3 confidentiality?
Ans: IPsec protocol suite
Which component is used to support non-repudation?
Ans: the Digital signatures
Which of the following are the two shared characteristics of the IDS and the IPS?
Ans:
Both use signatures to detect malicious traffic
Both are deployed as sensors
Pre-shared key : __ <==> Asymmetric Algorithm : Public-Key Algorithm
Ans: Secret Key
A type of attack where threat actors are not having official permission to gain access to a
system compromising the victim.
Ans: Trust Exploitation
To provide authentication, integrity, and confidentiality, which type of encryption algorithm uses
public and private keys?
● asymmetric
What are the three major components of worm attack?
Ans:
A payload
An enabling vulnerability
A propagation mechanism
•A worm is a self-replicating program that propagates automatically without user actions by exploiting
vulnerabilities in legitimate software.
•It uses the network to search for other victims with the same vulnerability.
•The intent of a worm is usually to slow or disrupt network operations
AES : Confidentiality <==> SHA : _
Ans: Integrity
Diffie-Helman algorithm is most applicable on which scenario?
Ans: to secure the exchange of keys used to encrypt data
(Generally, it's used for encryption, password-authenticated key agreement and
forward security.)