You are on page 1of 2

11 Which network design consideration would be more important to a large corporation than to a small business?

redundancy A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario? information theft How does the service password-encryption command enhance password security on Cisco routers and switches? It encrypts passwords that are stored in router or switch configuration files. Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator? Something is causing a time delay between the networks Which command can an administrator execute to determine what interface a router will use to reach remote networks? Show IP route A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers? The network administrator wants to verify Layer 2 connectivity. If a configuration file is saved to a USB flash drive attached to a router, what must be done by the network administrator before the file can be used on the router? Edit the configuration file with a text editor. What types of traffic should have the highest priority through the network for a company that relies on realtime applications such as VoIP and streaming media for communicating with customers? voice and video Which two guidelines are important to follow when capturing traffic for an analysis of traffic flow patterns? (Choose two.) Perform the traffic capture on different network segments. Capture traffic during peak utilization times. The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville? DoS A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this? reconnaissance

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework? authorization Refer to the exhibit. Host H3 is having trouble communicating with host H1. The network administrator suspects a problem exists with the H3 workstation and wants to prove that there is no problem with the R2 configuration. What tool could the network administrator use on router R2 to prove that communication exists to host H1 from the interface on R2, which is the interface that H3 uses when communicating with remote networks? an extended ping What is the purpose of establishing a network baseline? to help monitor and troubleshoot network performance Refer to the exhibit. A technician is troubleshooting a network problem and issues the command shown. Based on what the technician sees, the technician immediately follows up with the command arp -d. What prompted the technician to issue the second command? The technician wants to see if a specific address is relearned. A company makes use of the flash cards on its Cisco routers by creating directories and storing old configuration files and old IOS versions. Which command would the network administrator use on a Cisco router to determine the current directory? pwd

Which command will begin the process of copying the running-configuration file to a server for backup? copy tftp: running-config

A network administrator issues the copy tftp running-config command on a router. Where will the information from the TFTP server be copied onto the router? RAM

Fill in the blank. Locking doors and windows, the use of security cameras, and monitoring entry points are examples of *physical* security measures that can limit damage to equipment. Application filters prevent access based on Layer 4 port numbers.Packet filters prevent access based on IP or MAC address.URL filters prevent access to web site URLs or content.Stateful packet inspection prevents unsolicited incoming sessions.Network address translators translate internal IP addresses to to outside IP addresses and do not prevent network attacks.