|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
Chapter 11 Quiz
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails: Have a second router that is connected to another ISP Place the recommended steps for worm attack mitigation in the correct order. (Not all options are used.): 1Containment;2 Inoculation;3 Quarantine;4 Treatment What is an advantage of using a deterministic IP addressing scheme: controlling access to devices by IP address What are the two WEP key lengths: 64,128 bit Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds: RouterA(config)# login block-for 30 attempts 2 within 10 Match the type of threat with the cause. (Not all options are used.): hardware threats(physical damage to servers, routers, switches, cabling plant, and workstations); environmental threats(temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry); electrical threats(voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss); maintenance threats(poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling) What is the factory default setting for the configuration register on Cisco routers: 0x2102 What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command: the IP address of the neighbor While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean: The transfer is working A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem: Ensure the correct cable is used; Ensure the link status LED on the integrated router is lit An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router: show file systems On which two interfaces or ports can security be improved by configuring executive timeouts: console ports; vty ports Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run: Trojan Which statement is true about Cisco IOS ping indicators: '.' may indicate that the ping was blocked by a firewall
Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.004 сек.) |