0% found this document useful (0 votes)
707 views12 pages

M2 SA0s

The document covers various aspects of OSPF routing protocols, including components, advantages of multi-area OSPF, and router roles such as Designated Router and Area Border Router. It also discusses operational states, database synchronization, and configuration commands for OSPF. Additionally, it touches on encryption protocols, characteristics of IDS and IPS, and details about worm attacks.

Uploaded by

jincepts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
707 views12 pages

M2 SA0s

The document covers various aspects of OSPF routing protocols, including components, advantages of multi-area OSPF, and router roles such as Designated Router and Area Border Router. It also discusses operational states, database synchronization, and configuration commands for OSPF. Additionally, it touches on encryption protocols, characteristics of IDS and IPS, and details about worm attacks.

Uploaded by

jincepts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

SA06

Which of the following are components of OSPF routing protocols?


Routing Control Messages
Data Structures
Algorithm

A pool of OSPF routers where the BDR is selected when DR fails?


Drother

Which of the following are advantages of multi-area OSPF?


Smaller routing tables
Reduced link-state update overhead
Reduced frequency of SPF calculations

Which of the following operational states where the election of the DR and BDR
took place?
Two-way

A router role that disseminate link-state advertisements to all the OSPF routers
on the network.
Designated router

Adjacency Database : Neighbor Table <==> _ : Routing Table


Forwarding Database

Which of the following are being performed by the OSPF router during the database
synchronization?
Decide first router
Exchange DBDs
Send an LSR

What do you call a router that is located between 2 different area in an OSPF network?
Area border router

Which of the following are link-state routing procedures performed by the router?
Establish neighbor adjacencies
Exchange link-state advertisements
Build the link-state database
execute the SPF algorithm
Choose the best route
Which of the following operational states where the best path to a destination is
determined?
Loading State

SA07

Considering the given topology above, What seems to be the problem when Router A is not
forming adjacency with Router B?
Ans:

Dead timer’s value on the routers are not the same

Loopback addresses might be on different subnets

Both routers uses route summarization

Both routers are using different process identifiers.

Refer to the figure below.


The following has been configured on the City Router:

City(config-router)network [Link] [Link] area 0

Which of the following interfaces will participate in OSPF?


Ans:
FastEthernet 0/0

FastEthernet 0/1

Serial0/0

Serial0/1.102

Serial0/1.103

Serial0/1.104

What are the characteristics of OSPF areas?


Ans:
Area 0 is called Backbone area
Areas can be from 0 to 65535.
Non-area zero should be connected to the backbone
You are required to properly configure a router to run OSPF. Which of the command would add
[Link]/24 to SPF area 0?
Ans:
Router(config)# router ospf 1
Router(config-router)# network [Link] [Link] area 0
Refer to the diagram above. Considering RouterB, which are true about loopback address?

Ans:
● It ensure stability for the OSPF process on RouterB
● It specifies that the Router ID for RouterB should be [Link].

Ans: [Link]
Refer to the given diagram below. What do you mean to 128 on the highlighted output
OSPF Priority

OSPF hop count

OSPF ID number

OSPF cost

OSPF administrative distance

On which network will OSPF choose a Designated Router?


Ans:

Non broadcast
Broadcast
Refer to the digram above, if Router1 has just rebooted, what will be its router ID?

Ans:
[Link]

What address is being used by OSPF hello packets on a point-to-point networks?


Ans: [Link] or [Link]

SA08
Which encryption protocol provides Layer 3 confidentiality?
Ans: IPSec protocol suite

To provide authentication, integrity, and confidentiality, which type of encryption algorithm uses
public and private keys?
Ans: asymmetric
Which of the following screnario/s where Deffie-Hellman is usually utilized.
Ans:
IPSec VPN data exchange
SSL or TLS data encryption
SSH data exchange

Which encryption protocol provides Layer 3 confidentiality?


Ans: IPsec protocol suite

Which component is used to support non-repudation?


Ans: the Digital signatures

Which of the following are the two shared characteristics of the IDS and the IPS?
Ans:
Both use signatures to detect malicious traffic
Both are deployed as sensors
Pre-shared key : __ <==> Asymmetric Algorithm : Public-Key Algorithm
Ans: Secret Key

A type of attack where threat actors are not having official permission to gain access to a
system compromising the victim.
Ans: Trust Exploitation

To provide authentication, integrity, and confidentiality, which type of encryption algorithm uses
public and private keys?
● asymmetric

What are the three major components of worm attack?


Ans:
A payload
An enabling vulnerability
A propagation mechanism

•A worm is a self-replicating program that propagates automatically without user actions by exploiting
vulnerabilities in legitimate software.
•It uses the network to search for other victims with the same vulnerability.
•The intent of a worm is usually to slow or disrupt network operations

AES : Confidentiality <==> SHA : _


Ans: Integrity
Diffie-Helman algorithm is most applicable on which scenario?
Ans: to secure the exchange of keys used to encrypt data

(Generally, it's used for encryption, password-authenticated key agreement and


forward security.)

You might also like