0% found this document useful (0 votes)
310 views

Practica Final

A client packet with a destination port of 22 is received by a server, indicating the client is requesting the SSH service.

Uploaded by

Jhon Rojas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
310 views

Practica Final

A client packet with a destination port of 22 is received by a server, indicating the client is requesting the SSH service.

Uploaded by

Jhon Rojas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

1 A CLIENT PACKET IS RECEIVED BY A SERVER.

THE PACKET HAS A


DESTINATION PORT NUMBER OF 22. WHAT SERVICE IS THE CLIENT
REQUESTING?

 SSH
 TFTP
 DNS
 DHCP

2 TO WHICH TCP PORT GROUP DOES THE PORT 414 BELONG?

 PRIVATE OR DYNAMIC
 REGISTERED
 WELL-KNOWN
 PUBLIC

3 REFER TO THE EXHIBIT. WHAT DOES THE VALUE OF THE WINDOW SIZE
SPECIFY?

 THE AMOUNT OF DATA THAT CAN BE SENT AT ONE TIME


 A RANDOM NUMBER THAT IS USED IN ESTABLISHING A
CONNECTION WITH THE 3-WAY HANDSHAKE
 THE AMOUNT OF DATA THAT CAN BE SENT BEFORE AN
ACKNOWLEDGMENT IS REQUIRED
 THE TOTAL NUMBER OF BITS RECEIVED DURING THIS TCP
SESSION
4 REFER TO THE EXHIBIT. THE EXHIBIT SHOWS A SMALL SWITCHED
NETWORK AND THE CONTENTS OF THE MAC ADDRESS TABLE OF THE
SWITCH. PC1 HAS SENT A FRAME ADDRESSED TO PC3. WHAT WILL THE
SWITCH DO WITH THE FRAME?

 THE SWITCH WILL FORWARD THE FRAME ONLY TO PORTS 1


AND 3.
 THE SWITCH WILL FORWARD THE FRAME TO ALL PORTS.
 THE SWITCH WILL DISCARD THE FRAME.
 THE SWITCH WILL FORWARD THE FRAME TO ALL PORTS
EXCEPT PORT 4.
 THE SWITCH WILL FORWARD THE FRAME ONLY TO PORT 2.

5 WHICH DESTINATION ADDRESS IS USED IN AN ARP REQUEST FRAME?

 255.255.255.255
 THE PHYSICAL ADDRESS OF THE DESTINATION HOST
 FFFF.FFFF.FFFF
 0.0.0.0
 AAAA.AAAA.AAAA
6 REFER TO THE EXHIBIT. PC1 ISSUES AN ARP REQUEST BECAUSE IT
NEEDS TO SEND A PACKET TO PC3. IN THIS SCENARIO, WHAT WILL
HAPPEN NEXT?

 RT1 WILL SEND AN ARP REPLY WITH ITS OWN FA0/1 MAC
ADDRESS.
 RT1 WILL FORWARD THE ARP REQUEST TO PC3.
 SW1 WILL SEND AN ARP REPLY WITH ITS FA0/1 MAC ADDRESS.
 RT1 WILL SEND AN ARP REPLY WITH THE PC3 MAC ADDRESS.
 RT1 WILL SEND AN ARP REPLY WITH ITS OWN FA0/0 MAC
ADDRESS.

7 WHAT ROUTING TABLE ENTRY HAS A NEXT HOP ADDRESS


ASSOCIATED WITH A DESTINATION NETWORK?

 REMOTE ROUTES
 C AND L SOURCE ROUTES
 LOCAL ROUTES
 DIRECTLY-CONNECTED ROUTES

8 WHICH TERM DESCRIBES A FIELD IN THE IPV4 PACKET HEADER THAT


CONTAINS A UNICAST, MULTICAST, OR BROADCAST ADDRESS?
 DESTINATION IPV4 ADDRESS
 TTL
 PROTOCOL
 HEADER CHECKSUM

9 IF THE DEFAULT GATEWAY IS CONFIGURED INCORRECTLY ON THE


HOST, WHAT IS THE IMPACT ON COMMUNICATIONS?

 THE HOST CAN COMMUNICATE WITH OTHER HOSTS ON


REMOTE NETWORKS, BUT IS UNABLE TO COMMUNICATE WITH
HOSTS ON THE LOCAL NETWORK.
 THE HOST IS UNABLE TO COMMUNICATE ON THE LOCAL
NETWORK.
 THE HOST CAN COMMUNICATE WITH OTHER HOSTS ON THE
LOCAL NETWORK, BUT IS UNABLE TO COMMUNICATE WITH HOSTS
ON REMOTE NETWORKS.
 THERE IS NO IMPACT ON COMMUNICATIONS.

10 WHY IS NAT NOT NEEDED IN IPV6?

 ANY HOST OR USER CAN GET A PUBLIC IPV6 NETWORK


ADDRESS BECAUSE THE NUMBER OF AVAILABLE IPV6 ADDRESSES
IS EXTREMELY LARGE.
 THE END-TO-END CONNECTIVITY PROBLEMS THAT ARE
CAUSED BY NAT ARE SOLVED BECAUSE THE NUMBER OF ROUTES
INCREASES WITH THE NUMBER OF NODES THAT ARE CONNECTED
TO THE INTERNET.
 THE PROBLEMS THAT ARE INDUCED BY NAT APPLICATIONS
ARE SOLVED BECAUSE THE IPV6 HEADER IMPROVES PACKET
HANDLING BY INTERMEDIATE ROUTERS.
 BECAUSE IPV6 HAS INTEGRATED SECURITY, THERE IS NO NEED
TO HIDE THE IPV6 ADDRESSES OF INTERNAL NETWORKS.

11 REFER TO THE EXHIBIT. A USER ISSUES THE COMMAND NETSTAT –


R ON A WORKSTATION. WHICH IPV6 ADDRESS IS ONE OF THE LINK-
LOCAL ADDRESSES OF THE WORKSTATION?
 2001:0:9D38:6AB8:30D0:115:3F57:FE4C/128
 ::1/128
 FE80::30D0:115:3F57:FE4C/128
 FE80::/64

13 WHAT TYPE OF IPV6 ADDRESS IS REPRESENTED BY ::1/128?

 GLOBAL UNICAST
 EUI-64 GENERATED LINK-LOCAL
 UNSPECIFIED
 LOOPBACK

14 TWO NETWORK ENGINEERS ARE DISCUSSING THE METHODS USED TO


FORWARD FRAMES THROUGH A SWITCH. WHAT IS AN IMPORTANT
CONCEPT RELATED TO THE CUT-THROUGH METHOD OF SWITCHING?

 FRAGMENT-FREE SWITCHING IS THE TYPICAL CUT-THROUGH


METHOD OF SWITCHING.
 THE FRAGMENT-FREE SWITCHING OFFERS THE LOWEST LEVEL
OF LATENCY.
 PACKETS CAN BE RELAYED WITH ERRORS WHEN FAST-
FORWARD SWITCHING IS USED.
 FAST-FORWARD SWITCHING CAN BE VIEWED AS A
COMPROMISE BETWEEN STORE-AND-FORWARD SWITCHING AND
FRAGMENT-FREE SWITCHING.

15 WHAT HAPPENS WHEN A SWITCH RECEIVES A FRAME AND THE


CALCULATED CRC VALUE IS DIFFERENT THAN THE VALUE THAT IS IN
THE FCS FIELD?

 THE SWITCH DROPS THE FRAME.


 THE SWITCH NOTIFIES THE SOURCE OF THE BAD FRAME.
 THE SWITCH FLOODS THE FRAME TO ALL PORTS EXCEPT THE
PORT THROUGH WHICH THE FRAME ARRIVED TO NOTIFY THE
HOSTS OF THE ERROR.
 THE SWITCH PLACES THE NEW CRC VALUE IN THE FCS FIELD
AND FORWARDS THE FRAME.

16 WHICH TWO FUNCTIONS ARE PERFORMED AT THE LLC SUBLAYER OF


THE OSI DATA LINK LAYER TO FACILITATE ETHERNET
COMMUNICATION? (CHOOSE TWO.)

 ADDS ETHERNET CONTROL INFORMATION TO NETWORK


PROTOCOL DATA
 APPLIES SOURCE AND DESTINATION MAC ADDRESSES TO
ETHERNET FRAME
 IMPLEMENTS CSMA/CD OVER LEGACY SHARED HALF-DUPLEX
MEDIA
 PLACES INFORMATION IN THE ETHERNET FRAME THAT
IDENTIFIES WHICH NETWORK LAYER PROTOCOL IS BEING
ENCAPSULATED BY THE FRAME
 INTEGRATES LAYER 2 FLOWS BETWEEN 10 GIGABIT ETHERNET
OVER FIBER AND 1 GIGABIT ETHERNET OVER COPPER

17 WHICH TWO ISSUES CAN CAUSE BOTH RUNTS AND GIANTS IN


ETHERNET NETWORKS? (CHOOSE TWO.)

 A MALFUNCTIONING NIC
 CRC ERRORS
 ELECTRICAL INTERFERENCE ON SERIAL INTERFACES
 USING THE INCORRECT CABLE TYPE
 HALF-DUPLEX OPERATIONS

18 WHICH TWO DEVICES WOULD BE DESCRIBED AS INTERMEDIARY


DEVICES? (CHOOSE TWO.)

 WIRELESS LAN CONTROLLER


 GAMING CONSOLE
 RETAIL SCANNER
 ASSEMBLY LINE ROBOTS
 SERVER
 IPS

19 WHICH STATEMENT DESCRIBES NETWORK SECURITY?

 IT SUPPORTS GROWTH OVER TIME IN ACCORDANCE WITH


APPROVED NETWORK DESIGN PROCEDURES.
 IT ENSURES SENSITIVE CORPORATE DATA IS AVAILABLE FOR
AUTHORIZED USERS.
 IT SYNCHRONIZES TRAFFIC FLOWS USING TIMESTAMPS.
 IT PRIORITIZES DATA FLOWS IN ORDER TO GIVE PRIORITY TO
DELAY-SENSITIVE TRAFFIC.

20 WHAT CHARACTERISTIC DESCRIBES SPYWARE?

 THE USE OF STOLEN CREDENTIALS TO ACCESS PRIVATE DATA


 A NETWORK DEVICE THAT FILTERS ACCESS AND TRAFFIC
COMING INTO A NETWORK
 AN ATTACK THAT SLOWS OR CRASHES A DEVICE OR NETWORK
SERVICE
 SOFTWARE THAT IS INSTALLED ON A USER DEVICE AND
COLLECTS INFORMATION ABOUT THE USER

21 A ROUTER BOOTS AND ENTERS SETUP MODE. WHAT IS THE REASON


FOR THIS?

 THE IOS IMAGE IS CORRUPT.


 CISCO IOS IS MISSING FROM FLASH MEMORY.
 THE CONFIGURATION FILE IS MISSING FROM NVRAM.
 THE POST PROCESS HAS DETECTED HARDWARE FAILURE.
22 FLOOR(CONFIG)# INTERFACE GI0/1
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE REGISTRAR LAN
FLOOR(CONFIG-IF)# IP ADDRESS 192.168.235.234 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# INTERFACE GI0/0
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE MANAGER LAN
FLOOR(CONFIG-IF)# IP ADDRESS 192.168.234.114 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# INTERFACE S0/0/0
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE ISP
FLOOR(CONFIG-IF)# IP ADDRESS 10.234.235.254 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# INTERFACE S0/0/1
FLOOR(CONFIG-IF)# DESCRIPTION CONNECTS TO THE HEAD OFFICE WAN
FLOOR(CONFIG-IF)# IP ADDRESS 203.0.113.3 255.255.255.0
FLOOR(CONFIG-IF)# NO SHUTDOWN
FLOOR(CONFIG-IF)# END

REFER TO THE EXHIBIT. A NETWORK ADMINISTRATOR IS CONNECTING A


NEW HOST TO THE REGISTRAR LAN. THE HOST NEEDS TO COMMUNICATE
WITH REMOTE NETWORKS. WHAT IP ADDRESS WOULD BE CONFIGURED
AS THE DEFAULT GATEWAY ON THE NEW HOST?

 203.0.113.3
 10.234.235.254
 192.168.235.1
 192.168.234.114
 192.168.235.234

24 WHICH TWO ICMP MESSAGES ARE USED BY BOTH IPV4 AND IPV6
PROTOCOLS? (CHOOSE TWO.)

 ROUTER SOLICITATION
 NEIGHBOR SOLICITATION
 ROUTE REDIRECTION
 ROUTER ADVERTISEMENT
 PROTOCOL UNREACHABLE
25 NETWORK INFORMATION:
* LOCAL ROUTER LAN INTERFACE: 172.19.29.254 / FE80:65AB:DCC1::10
* LOCAL ROUTER WAN INTERFACE: 198.133.219.33 / 2001:DB8:FACE:39::10
* REMOTE SERVER: 192.135.250.103

WHAT TASK MIGHT A USER BE TRYING TO ACCOMPLISH BY USING


THE PING 2001:DB8:FACE:39::10 COMMAND?

 CREATING A NETWORK PERFORMANCE BENCHMARK TO A


SERVER ON THE COMPANY INTRANET
 VERIFYING THAT THERE IS CONNECTIVITY TO THE INTERNET
 VERIFYING THAT THERE IS CONNECTIVITY WITHIN THE LOCAL
NETWORK
 DETERMINING THE PATH TO REACH THE REMOTE SERVER

26 A NETWORK TECHNICIAN TYPES THE COMMAND PING 127.0.0.1 AT THE


COMMAND PROMPT ON A COMPUTER. WHAT IS THE TECHNICIAN TRYING
TO ACCOMPLISH?

 CHECKING THE IP ADDRESS ON THE NETWORK CARD


 TRACING THE PATH TO A HOST COMPUTER ON THE NETWORK
AND THE NETWORK HAS THE IP ADDRESS 127.0.0.1
 TESTING THE INTEGRITY OF THE TCP/IP STACK ON THE LOCAL
MACHINE
 PINGING A HOST COMPUTER THAT HAS THE IP ADDRESS
127.0.0.1 ON THE NETWORK

27

REFER TO THE EXHIBIT. WHAT IS THE MAXIMUM POSSIBLE THROUGHPUT


BETWEEN THE PC AND THE SERVER?

 10 MB/S
 1000 MB/S
 128 KB/S
 100 MB/S
28 WHAT OSI PHYSICAL LAYER TERM DESCRIBES THE MEASURE OF THE
TRANSFER OF BITS ACROSS A MEDIUM OVER A GIVEN PERIOD OF TIME?

 LATENCY
 GOODPUT
 BANDWIDTH
 THROUGHPUT

29 WHICH TWO STATEMENTS DESCRIBE THE CHARACTERISTICS OF


FIBER-OPTIC CABLING? (CHOOSE TWO.)

 MULTIMODE FIBER-OPTIC CABLING CARRIES SIGNALS FROM


MULTIPLE SENDING DEVICES.
 FIBER-OPTIC CABLING USES LEDS FOR SINGLE-MODE CABLES
AND LASER TECHNOLOGY FOR MULTIMODE CABLES.
 FIBER-OPTIC CABLING HAS HIGH SIGNAL LOSS.
 FIBER-OPTIC CABLING IS PRIMARILY USED AS BACKBONE
CABLING.
 FIBER-OPTIC CABLING DOES NOT CONDUCT ELECTRICITY.

31 TWO STUDENTS ARE WORKING ON A NETWORK DESIGN PROJECT. ONE


STUDENT IS DOING THE DRAWING, WHILE THE OTHER STUDENT IS
WRITING THE PROPOSAL. THE DRAWING IS FINISHED AND THE STUDENT
WANTS TO SHARE THE FOLDER THAT CONTAINS THE DRAWING SO THAT
THE OTHER STUDENT CAN ACCESS THE FILE AND COPY IT TO A USB
DRIVE. WHICH NETWORKING MODEL IS BEING USED?

 CLIENT-BASED
 POINT-TO-POINT
 PEER-TO-PEER
 MASTER-SLAVE

32 WHICH COMMAND IS USED TO MANUALLY QUERY A DNS SERVER TO


RESOLVE A SPECIFIC HOST NAME?
 NET
 TRACERT
 IPCONFIG /DISPLAYDNS
 NSLOOKUP

33 WHAT SERVICE IS PROVIDED BY POP3?

 USES ENCRYPTION TO PROVIDE SECURE REMOTE ACCESS TO


NETWORK DEVICES AND SERVERS.
 AN APPLICATION THAT ALLOWS REAL-TIME CHATTING AMONG
REMOTE USERS.
 ALLOWS REMOTE ACCESS TO NETWORK DEVICES AND
SERVERS.
 RETRIEVES EMAIL FROM THE SERVER BY DOWNLOADING THE
EMAIL TO THE LOCAL MAIL APPLICATION OF THE CLIENT.

34 WHICH TWO OSI MODEL LAYERS HAVE THE SAME FUNCTIONALITY AS


TWO LAYERS OF THE TCP/IP MODEL? (CHOOSE TWO.)

 TRANSPORT
 SESSION
 DATA LINK
 NETWORK
 PHYSICAL

35 WHICH THREE LAYERS OF THE OSI MODEL ARE COMPARABLE IN


FUNCTION TO THE APPLICATION LAYER OF THE TCP/IP MODEL? (CHOOSE
THREE.)

 PHYSICAL
 NETWORK
 TRANSPORT
 DATA LINK
 PRESENTATION
 SESSION
 APPLICATION
36 WHICH PDU IS PROCESSED WHEN A HOST COMPUTER IS DE-
ENCAPSULATING A MESSAGE AT THE TRANSPORT LAYER OF THE TCP/IP
MODEL?

 PACKET
 BITS
 FRAME
 SEGMENT

37 GIVEN NETWORK 172.18.109.0, WHICH SUBNET MASK WOULD BE USED


IF 6 HOST BITS WERE AVAILABLE?

 255.255.255.252
 255.255.255.192
 255.255.192.0
 255.255.224.0
 255.255.255.248

38 WHAT DOES THE IP ADDRESS 192.168.1.15/29 REPRESENT?

 MULTICAST ADDRESS
 UNICAST ADDRESS
 SUBNETWORK ADDRESS
 BROADCAST ADDRESS

40 WHAT TYPE OF ADDRESS IS 198.133.219.162?

 LINK-LOCAL
 LOOPBACK
 MULTICAST
 PUBLIC

41 A NETWORK TEAM IS COMPARING TOPOLOGIES FOR CONNECTING ON


A SHARED MEDIA. WHICH PHYSICAL TOPOLOGY IS AN EXAMPLE OF A
HYBRID TOPOLOGY FOR A LAN?

 RING
 PARTIAL MESH
 EXTENDED STAR
 BUS

42 WHICH TWO ACRONYMS REPRESENT THE DATA LINK SUBLAYERS


THAT ETHERNET RELIES UPON TO OPERATE? (CHOOSE TWO.)

 LLC
 CSMA
 FCS
 MAC
 SFD

43 WHAT DOES A ROUTER DO WHEN IT RECEIVES A LAYER 2 FRAME


OVER THE NETWORK MEDIUM?

 RE-ENCAPSULATES THE PACKET INTO A NEW FRAME


 FORWARDS THE NEW FRAME APPROPRIATE TO THE MEDIUM OF
THAT SEGMENT OF THE PHYSICAL NETWORK
 DE-ENCAPSULATES THE FRAME
 DETERMINES THE BEST PATH

44 ALTHOUGH CSMA/CD IS STILL A FEATURE OF ETHERNET, WHY IS IT NO


LONGER NECESSARY?

 THE USE OF CSMA/CA


 THE USE OF GIGABIT ETHERNET SPEEDS
 THE VIRTUALLY UNLIMITED AVAILABILITY OF IPV6
ADDRESSES
 THE DEVELOPMENT OF HALF-DUPLEX SWITCH OPERATION
 THE USE OF FULL-DUPLEX CAPABLE LAYER 2 SWITCHES

45 ONLY EMPLOYEES CONNECTED TO IPV6 INTERFACES ARE HAVING


DIFFICULTY CONNECTING TO REMOTE NETWORKS. THE ANALYST
WANTS TO VERIFY THAT IPV6 ROUTING HAS BEEN ENABLED. WHAT IS
THE BEST COMMAND TO USE TO ACCOMPLISH THE TASK?
 SHOW RUNNING-CONFIG
 SHOW INTERFACES
 COPY RUNNING-CONFIG STARTUP-CONFIG
 SHOW IP NAT TRANSLATIONS

46 WHICH TWO COMMANDS COULD BE USED TO CHECK IF DNS NAME


RESOLUTION IS WORKING PROPERLY ON A WINDOWS PC? (CHOOSE TWO.)

 PING CISCO.COM
 NSLOOKUP CISCO.COM
 NBTSTAT CISCO.COM
 IPCONFIG /FLUSHDNS
 NET CISCO.COM

47 A SMALL ADVERTISING COMPANY HAS A WEB SERVER THAT


PROVIDES CRITICAL BUSINESS SERVICE. THE COMPANY CONNECTS TO
THE INTERNET THROUGH A LEASED LINE SERVICE TO AN ISP. WHICH
APPROACH BEST PROVIDES COST EFFECTIVE REDUNDANCY FOR THE
INTERNET CONNECTION?

 ADD MULTIPLE CONNECTIONS BETWEEN THE SWITCHES AND


THE EDGE ROUTER.

 ADD A CONNECTION TO THE INTERNET VIA A DSL LINE TO


ANOTHER ISP.
 ADD ANOTHER WEB SERVER TO PREPARE FAILOVER SUPPORT.
 ADD A SECOND NIC TO THE WEB SERVER.

48 WHICH STATEMENT DESCRIBES THE CHARACTERISTICS OF PACKET-


FILTERING AND STATEFUL FIREWALLS AS THEY RELATE TO THE OSI
MODEL?
 A STATEFUL FIREWALL CAN FILTER APPLICATION LAYER
INFORMATION, WHEREAS A PACKET-FILTERING FIREWALL
CANNOT FILTER BEYOND THE NETWORK LAYER.
 BOTH STATEFUL AND PACKET-FILTERING FIREWALLS CAN
FILTER AT THE APPLICATION LAYER.
 A PACKET-FILTERING FIREWALL TYPICALLY CAN FILTER UP TO
THE TRANSPORT LAYER, WHEREAS A STATEFUL FIREWALL CAN
FILTER UP TO THE SESSION LAYER.
 A PACKET-FILTERING FIREWALL USES SESSION LAYER
INFORMATION TO TRACK THE STATE OF A CONNECTION, WHEREAS
A STATEFUL FIREWALL USES APPLICATION LAYER INFORMATION
TO TRACK THE STATE OF A CONNECTION.

49 WHAT ARE TWO WAYS TO PROTECT A COMPUTER FROM MALWARE?


(CHOOSE TWO.)

 KEEP SOFTWARE UP TO DATE.


 DEFRAGMENT THE HARD DISK.
 DELETE UNUSED SOFTWARE.
 USE ANTIVIRUS SOFTWARE.
 EMPTY THE BROWSER CACHE.

50 A NETWORK ADMINISTRATOR IS ISSUING THE LOGIN BLOCK-FOR 180


ATTEMPTS 2 WITHIN 30 COMMAND ON A ROUTER. WHICH THREAT IS THE
NETWORK ADMINISTRATOR TRYING TO PREVENT?

 AN UNIDENTIFIED INDIVIDUAL WHO IS TRYING TO ACCESS THE


NETWORK EQUIPMENT ROOM
 A USER WHO IS TRYING TO GUESS A PASSWORD TO ACCESS
THE ROUTER
 A WORM THAT IS ATTEMPTING TO ACCESS ANOTHER PART OF
THE NETWORK
 A DEVICE THAT IS TRYING TO INSPECT THE TRAFFIC ON A LINK

51 THE EMPLOYEES AND RESIDENTS OF CISCOVILLE CANNOT ACCESS


THE INTERNET OR ANY REMOTE WEB-BASED SERVICES. IT WORKERS
QUICKLY DETERMINE THAT THE CITY FIREWALL IS BEING FLOODED
WITH SO MUCH TRAFFIC THAT A BREAKDOWN OF CONNECTIVITY TO THE
INTERNET IS OCCURRING. WHICH TYPE OF ATTACK IS BEING LAUNCHED
AT CISCOVILLE?

 DOS
 TROJAN HORSE
 RECONNAISSANCE
 ACCESS

52 REFER TO THE EXHIBIT. AN ADMINISTRATOR IS TRYING TO


CONFIGURE THE SWITCH BUT RECEIVES THE ERROR MESSAGE THAT IS
DISPLAYED IN THE EXHIBIT. WHAT IS THE PROBLEM?

 THE ADMINISTRATOR MUST CONNECT VIA THE CONSOLE PORT


TO ACCESS GLOBAL CONFIGURATION MODE.
 THE ENTIRE COMMAND, CONFIGURE TERMINAL , MUST BE
USED.
 THE ADMINISTRATOR MUST FIRST ENTER PRIVILEGED EXEC
MODE BEFORE ISSUING THE COMMAND.
 THE ADMINISTRATOR IS ALREADY IN GLOBAL CONFIGURATION
MODE.

53 WHAT IS A USER TRYING TO DETERMINE WHEN ISSUING A PING 10.1.1.1


COMMAND ON A PC?

 IF THE TCP/IP STACK IS FUNCTIONING ON THE PC WITHOUT


PUTTING TRAFFIC ON THE WIRE
 THE PATH THAT TRAFFIC WILL TAKE TO REACH THE
DESTINATION
 WHAT TYPE OF DEVICE IS AT THE DESTINATION
 IF THERE IS CONNECTIVITY WITH THE DESTINATION DEVICE

55 WHAT IS A CHARACTERISTIC OF A SWITCH VIRTUAL INTERFACE (SVI)?

 SVIS COME PRECONFIGURED ON CISCO SWITCHES.


 AN SVI IS CREATED IN SOFTWARE AND REQUIRES A
CONFIGURED IP ADDRESS AND A SUBNET MASK IN ORDER TO
PROVIDE REMOTE ACCESS TO THE SWITCH.
 SVIS DO NOT REQUIRE THE NO SHUTDOWN COMMAND TO
BECOME ENABLED.
 ALTHOUGH IT IS A VIRTUAL INTERFACE, IT NEEDS TO HAVE
PHYSICAL HARDWARE ON THE DEVICE ASSOCIATED WITH IT.

You might also like