Chapter 11 Homework Flashcards
What type of traffic would most likely have the highest priority through the network?
voice
hardware threats
physical damage to servers, routers, switches, cabling plant, and workstations
environmental threats
temperature and humidity extremes
electrical threats
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss
in a ping āUā may indicate that a router along the path _________
did not contain a route to the destination address and that the ping was unsuccessful.
What is one of the most effective security tools available for protecting users from external threats?
password encryption techniques
Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies
ICMP (internet control message protocal)
What is considered the most effective way to mitigate a worm attack?
download security updates and patch all vulnerable systems
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
ipconfig
hich process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5
DNS (domain name system)
Which element of scaling a network involves identifying the physical and logical topologies?
network documentation
How should traffic flow be captured in order to best understand traffic patterns in a network?
during peak utilization times
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
tracert 10.1.1.5
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?
show file systems
Network services use to define a set of rules that govern how devices communicate and the data formats used in a network
protocols