What is an accurate description of redundancy?
What is an accurate description of redundancy? configuring a router with a complete MAC address database to ensure that all frames can be forwarded to the correct destination configuring a…
What is an accurate description of redundancy? configuring a router with a complete MAC address database to ensure that all frames can be forwarded to the correct destination configuring a…
What is the role of an IPS? detecting and blocking of attacks in real time connecting global threat information to Cisco network security devices authenticating and validating traffic filtering of…
What feature of SSH makes it more secure than Telnet for a device management connection? confidentiality with IPsec stronger password requirement random one-time port connection login information and data encryption …
Identify the steps needed to configure a switch for SSH. The answer order does not matter. (Not all options are used.) Answers Explanation & Hints: The login and password cisco…
When applied to a router, which command would help mitigate brute-force password attacks against the router? exec-timeout 30 service password-encryption banner motd $Max failed logins = 5$ login block-for 60…
Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities? reconnaissance DoS dictionary man-in-the-middle Answers Explanation & Hints: Reconnaissance is a type of…
Match the type of information security threat to the scenario. (Not all options are used.) Answers Explanation & Hints: After an intruder gains access to a network, common network threats…
Match each weakness with an example. (Not all options are used.) Answers Explanation & Hints: An employee who is trying to guess the password of another user exemplifies not a…
A client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet?…
A client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet?…
Which three protocols operate at the application layer of the TCP/IP model? (Choose three.) ARP TCP UDP FTP POP3 DHCP Answers Explanation & Hints: FTP, DHCP, and POP3 are application…
Which application layer protocol uses message types such as GET, PUT, and POST? DNS DHCP SMTP HTTP POP3 Answers Explanation & Hints: The GET command is a client request for…
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three…
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.) physical session network presentation data link transport application Answers Explanation…
What is a key characteristic of the peer-to-peer networking model? wireless networking social networking without the Internet network printing using a print server resource sharing without a dedicated server Answers Explanation & Hints: The…
What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza? Ethernet Gnutella POP SMTP Answers Explanation & Hints: The Gnutella protocol is used…
What is the function of the HTTP GET message? to request an HTML page from a web server to send error information from a web server to a web client…
Which field in the TCP header indicates the status of the three-way handshake process? window reserved checksum control bits Answers Explanation & Hints: The value in the control bits field…
Which three application layer protocols use TCP? (Choose three.) SMTP FTP SNMP HTTP TFTP DHCP Answers Explanation & Hints: Some protocols require the reliable data transport that is provided by…
What kind of port must be requested from IANA in order to be used with a specific application? registered port private port dynamic port source port Answers Explanation & Hints:…