Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Networking Midterms2

Midterms

QuestionAnswer
1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring? DDos
2. What causes a buffer overflow? attempting to write more data to a memory location than that location can hold
3. Which objective of secure communications is achieved by encrypting data? confidentiality
4. What type of malware has the primary objective of spreading across the network? worm
5. What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers? financial gain
6. Which type of hacker is motivated to protest against political and social issues? hacktivists
7. What is a ping sweep? a network scanning technique that indicates the live hosts in a range of IP addresses.
8. In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services? DoS
9. Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​ integrity
10. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? private key
11. Refer to the exhibit. Which two ACLs would permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface? (Choose two.) access-list 1 permit 192.168.10.0 0.0.0.127 access-list 5 permit 192.168.10.0 0.0.0.63 access-list 5 permit 192.168.10.64 0.0.0.63
12. Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.) destination UDP port number ICMP message type
13. What type of ACL offers greater flexibility and control over network access? extended
14. What is the quickest way to remove a single ACE from a named ACL? Use the no keyword and the sequence number of the ACE to be removed.
15. Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered? ACL 10 is removed from the running configuration.
16. Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure? The sequence of the ACEs is incorrect.
17. A network administrator needs to configure a standard ACL so that only the workstation of the administrator with IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve task? Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0 Router1(config)# access-list 10 permit host 192.168.15.23
18. Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1? access-list 1 permit 192.168.10.96 0.0.0.31
19. A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network but permit all other traffic. Which two commands should be used? (Choose two.) Router(config)# access-list 95 permit any Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
RefToExhibit. ACL was configured on R1 with intention denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All traffic into subnet 172.16.3.0/24 should be permitted. This ACL was applied outbound on int F0/0. Which conclusion can be drawn All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.
21. Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement? 5 deny 172.23.16.0 0.0.15.255
22. Refer to the exhibit. A network administrator configures an ACL on the router. Which statement describes the result of the configuration? An SSH connection is allowed from a workstation with IP 192.168.25.18 to a device with IP 172.16.45.16.
23. Refer to the exhibit. What can be determined from this output? The router has not had any Telnet packets from 10.35.80.22 that are destined for 10.23.77.101.
24. Refer to the exhibit. A network administrator wants to permit only host 192.168.1.1 /24 to be able to access the server 192.168.2.1 /24. Which three commands will achieve this using best ACL placement practices? (Choose three.) R2(config-if)# ip access-group 101 in R2(config)# interface fastethernet 0/0 R2(config)# access-list 101 permit ip host 192.168.1.1 host 192.168.2.1
25. Consider the access list: access-list 100 permit ip host 192.168.10.1 any access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo access-list 100 permit ip any any Gigabit Ethernet port has the IP address 192.168.10.254 assigned (Choose two) A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned. Devices on the 192.168.10.0/24 network are allowed to reply to any ping requests.
26. Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit? The commands are added at the end of the existing Managers ACL.
27. In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections? SYN flood attack
28. Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack? DHCP
29. Refer to exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements? The traffic is dropped.
30. Refer to the exhibit. The Gigabit interfaces on both routers are configured with subinterface numbers that match VLAN numbers connected to them. PCs on VLAN 10 are able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers R1 Gi0/1.12 outbound
31. Which statement describes a characteristic of standard IPv4 ACLs? They filter traffic based on source IP addresses only.
32. What is considered a best practice when configuring ACLs on vty lines? Place identical restrictions on all vty lines.
33. Refer to exhibit. An administrator first configured extended ACL as shown by output of show access-lists command. The administrator edited this access-list by issuing commands below. Which two conclusions in this configuration?​ (Choose two.) Ping packets will be permitted. SSH packets will be permitted.
34. Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet? access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23
35. What is the term used to describe a mechanism that takes advantage of a vulnerability? exploit
36. Refer to the exhibit. The network administrator has an IP address of 192.168.11.10 and needs access to manage R1. What is the best ACL type and placement to use in this situation? standard ACL inbound on R1 vty lines
37. A technician is tasked with using ACLs to secure a router. When would the technician use the any configuration option or command? to identify any IP address
38. Which statement accurately characterizes the evolution of threats to network security? Internal threats can cause even greater damage than external threats.
39. A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent? social engineering
40. In what way are zombies used in security attacks? They are infected machines that carry out a DDoS attack.
41. Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication? man-in-the-middle attack
42. Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.) host any
43. Which statement describes a difference between the operation of inbound and outbound ACLs? Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.
44. What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface? Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.
45. Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1? access-list 101 permit tcp any host 192.168.1.1 eq 80
Refer to exhibit. New network policy requires ACL denying FTP/Telnet access to Corp file server from all interns. Address of file server is 172.16.1.15 and interns are assigned addresses in the 172.18.200.0/24. Now, no one can access the servers. The ACL is implicitly denying access to all the servers.
47. A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command? to secure administrative access to the router
48. What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data? symmetric encryption algorithm
49. Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type and placement to use in this situation? standard ACL outbound on R2 WAN interface towards the internet
50. Refer to the exhibit. The student on H1 computer continues to launch extended ping with expanded packets at student on H2 computer. The school network administrator wants to stop this behavior, but allow both students access to web-based computer assi Apply an inbound extended ACL on R1 Gi0/0.
51. A technician is tasked with using ACLs to secure a router. When would the technician use the ‘ip access-group 101 in’ configuration option or command? to apply an extended ACL to an interface
52. In which type of attack is falsified information used to redirect users to malicious Internet sites? DNS cache poisoning
53. What is a feature of an IPS? It can stop malicious packets.
54. What is the term used to describe a potential danger to a company’s assets, data, or network functionality? threat
Refer to the exhibit. Network 192.168.30.0/24 contains all company servers. Policy dictates that traffic from servers to both networks 192.168.10.0 and 192.168.11.0 be limited to replies for original requests. What is the best ACL type/placement to use? extended ACL inbound on R3 G0/0
56. What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode? Router(config-std-nacl)#
57. Refer to the exhibit. Many employees are wasting company time accessing social media on their work computers. The company wants to stop this access. What is the best ACL type and placement to use in this situation? extended ACLs inbound on R1 G0/0 and G0/1
58. A technician is tasked with using ACLs to secure a router. When would the technician use the 40 deny host 192.168.23.8 configuration option or command? to create an entry in a numbered ACL
59. What is the best description of Trojan horse malware? It appears as useful software but hides malicious code.
60. What wild card mask will match networks 172.16.0.0 through 172.19.0.0? 0.3.255.255
61. What is the term used to describe gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks? hacktivists
62. A technician is tasked with using ACLs to secure a router. When would the technician use the no ip access-list 101 configuration option or command? to remove a configured ACL
63. What is the term used to describe unethical criminals who compromise computer and network security for personal gain, or for malicious reasons? black hat hackers
64. What is the term used to describe a guarantee that the message is not a forgery and does actually come from whom it states? origin authentication
65. A technician is tasked with using ACLs to secure a router. When would the technician use the ip access-group 101 in configuration option or command? to apply an extended ACL to an interface
66. A technician is tasked with using ACLs to secure a router. When would the technician use the remark configuration option or command? to add a text entry for documentation purposes
67. Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation? extended ACL outbound on R2 WAN interface towards the internet
68. A technician is tasked with using ACLs to secure a router. When would the technician use the established configuration option or command? to allow returning reply traffic to enter the internal network
69. A technician is tasked with using ACLs to secure a router. When would the technician use the deny configuration option or command? to restrict specific traffic access through an interface
70. Refer to the exhibit. Only authorized remote users are allowed remote access to the company server 192.168.30.10. What is the best ACL type and placement to use in this situation? extended ACL inbound on R2 WAN interface connected to the internet
71. Refer to the exhibit. Employees on 192.168.11.0/24 work on critically sensitive information and are not allowed access off their network. What is the best ACL type and placement to use in this situation? standard ACL inbound on R1 G0/1
72. A technician is tasked with using ACLs to secure a router. When would the technician use the host configuration option or command? to identify one specific IP address
73. What commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers? financial gain
74. Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation? extended ACL inbound on R1 G0/0
Created by: user-1838864
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards