A) Use access lists to allow only sources from the network to enter the router's interfaces.
B) Set up a spoofing account so that the attacker doesn't know which machine to attack.
C) There isn't a way to reduce this threat.
D) Configure the router to block directed broadcasts to the network.
E) Prevent intrusions.
Correct Answer
verified
Multiple Choice
A) No, the SSH connection is fully encrypted and this cannot be decoded.
B) Yes, the SSH connection is not very strong and parts are in plain text.
C) No, the time required to decode the SSH is too lengthy to be a threat.
D) Yes, the network administrator should be concerned if someone is suspected of having internal access.
Correct Answer
verified
Multiple Choice
A) Convert all operating systems to Linux.
B) Make sure antivirus software is installed with the most current version.
C) Use a personal firewall.
D) Use firewall software that permits only trusted sites.
Correct Answer
verified
Multiple Choice
A) Asset management
B) Network drawings and diagrams
C) Vendor documentation
D) All of the above
Correct Answer
verified
Multiple Choice
A) WPA
B) WEP2
C) SSID
D) MACSEC
Correct Answer
verified
Multiple Choice
A) When configuring routing for a network
B) When configuring a remote user's tunneling protocol
C) To block ICMP packets from coming into a network
D) To help with packet filtering
Correct Answer
verified
Multiple Choice
A) Access all authorized services and systems.
B) Access just email, with only one login per week.
C) Administrator access to all services and systems.
D) None of the above is correct.
Correct Answer
verified
Multiple Choice
A) RADIUS
B) TACACS+
C) Both RADIUS and TACACS+
D) Neither RADIUS nor TACACS+
Correct Answer
verified
Multiple Choice
A) Something you have
B) Something you want
C) Someone you know
D) None of the above
Correct Answer
verified
Multiple Choice
A) SNMP
B) TRACE
C) NMAP
D) ICMP
Correct Answer
verified
Multiple Choice
A) Authorization
B) Authentication
C) Accounting
D) Access
Correct Answer
verified
Multiple Choice
A) The purpose of the firewall is to hide the file server from the outside but still allow traffic to pass to the outside and back. The firewall must be stateful so that it keeps track of data packet flow.
B) The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back. The firewall should not be stateful unless the file server is not secure.
C) The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back. The firewall must be stateful so that it keeps track of data packet flow.
D) The purpose of the firewall is to hide the file server from the inside but allow traffic to pass to the outside. The firewall must be stateful so that it keeps track of data packet flow.
Correct Answer
verified
Multiple Choice
A) permit ip any any
B) permit all
C) permit any
D) permit traffic all
Correct Answer
verified
Multiple Choice
A) The attacker claims to be from network support.
B) The attacker is sifting through discarded trash.
C) The attacker uses a dictionary attack.
D) The attacker uses packet sniffing.
Correct Answer
verified
Multiple Choice
A) This system will provide IP address information of all possible threats in the network.
B) This system will monitor data packets passing through the network and identify potential attacks.
C) This system will cut down any unnecessary TCP data traffic and convert it to UDP.
D) This system will potentially catch ongoing attacks.
Correct Answer
verified
Multiple Choice
A) Network accounting
B) Net-logging
C) Sys-logging
D) Net-tracking
Correct Answer
verified
Multiple Choice
A) The attacker is using a secret list of code words.
B) The attacker is using only uppercase letters for common words.
C) The attacker is using only lowercase letter for unknown words.
D) The attacker is using known passwords and many variations of upper- and lowercase combinations.
E) All of these answers are correct.
Correct Answer
verified
Multiple Choice
A) A test lab
B) A safe zone
C) A DMZ
D) A protected hub
Correct Answer
verified
Multiple Choice
A) Check the source and destination IP address of the tunnel configured on the router.
B) Make sure the IP addresses on the ends of the tunnel are not in the same subnet.
C) Make sure the IP addresses on the ends of the tunnel are in the same subnet.
D) Use the show access-list command to verify the routers are properly configured.
Correct Answer
verified
Multiple Choice
A) Review
B) Analysis
C) Containment
D) Collection
Correct Answer
verified
Showing 1 - 20 of 22
Related Exams