Kahoot Review Flashcards

1
Q

Which of the following is NOT a purpose of DHCP snooping?

A

Enable DHCP and allow a host and client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens to a route if the administrative distance is 255?

A

The router will not install the route in the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in Depth centers around how many levels of security?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most basic countermeasure to preventing DDOS attacks is to allow as little user error as possible.

(True/False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the wildcard mask for 192.168.200.50/30?

A

0.0.0.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ occurs when your switch sends broadcasts to fill its MAC address table.

A

Thrashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to save the running configuration to the start up configuration?

A

Copy running config startup config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the range for standard ACLs?

A

1-99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the maximum hop count for RIPv1?

A

15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which command displays neighbor relationships with OSPF?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dynamic routes take precedence over static routes.

(True / False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two ways to perform Fault Management?

A

Active and Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an advantage of Layer 7 load balancing?

A

Offers smart routing based off of URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol is widely used in email, IM, VoiP and in HTTPS?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which layer in the Cisco model is used as a communication point between the access and the core layer?

A

Distribution Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used by the EIGRP to select and maintain the best route to each remote network?

A

DUAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What measures the number of routers that a packet must travel through?

A

Hop count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is NOT a tier in the Cisco model?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is NOT a password security best practic e?

A

Use hints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is an example of a named ACL?

A

ip access-list standard ______

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is considered one of the hardest DDoS raids to prevent and recover from?

A

DNS flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Router(config-router)# indicate?

A

Changes are to be made to the routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do system banners exist?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many types of DNS queries are there?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How do switches remember source hardware address of each frame received on an interface?

A

MAC address table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

1+1 = ___

A

None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a protocol suite that authenticates and encrypts packets for secure communication?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is NOT an advantage of static routes?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The three-tier hierarchical network model consists of what three layers?

A

Core, Distribution, Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

_____ cards are a flash memory storage device that can store both the start-up and running configs, and the Cisco IOS

A

Compact Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When a port enters “protect” mode, an error message is displayed.

(True / False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

GRE uses encryption for its tunnel.

(True / False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is NOT a main layer of Security Controls?

A

Logical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a rule based list that filters inbound and outbound traffic?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Spanning Tree Protocol prevents layer ___ loops from being formed.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which layer in the Cisco model is responsible for transferring heavy amounts of traffic in a reliable and quick way?

A

Core layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which layer of the hierarchical network model handles routing, packet filtering and WAN access?

A

Distribution

38
Q

What is the default encapsulation method used in Cisco tunneling?

A

Generic Routing Encapsulation (GRE)

39
Q

What is the purpose and goal of fault management?

A
40
Q

___ is when the source and destination port of a frame that reaches the switches is dropped.

A

Frame filtering

41
Q

_________ happens when a switch does not find the destination MAC address in its table.

A

Flooding

42
Q

Which of the following is NOT a disadvantage to NAT?

A
43
Q

Which command is used to display the startup configuration on a Cisco device?

A

Show start

44
Q

Which ACL filters traffic on source and destination address and protocol?

A

Extended ACL

45
Q

Which protocol supports encryption-only and authentication-only configurations?

A

ESP

46
Q

In the following version number, the .4 represents what: 12.4(25A)

A

minor release

47
Q

How many modes of operation are there?

A

3

48
Q

Which character identifies with Privileged Exec Mode?

A

#

49
Q

HTTP __________ is the practice of creating a network link between two nodes in a network environment.

A

proxying

50
Q

At what layer does DHCP snooping exist?

A

2

51
Q

Which of the following protocols is NOT an example of Interior Gateway Protocol?

A

BGP

52
Q

What mode must you b e in to make any configurations?

A

global configuration mode

53
Q

Reflexive ACLs are usually placed on the most outward routers of the network.

(True / False)

A

True

54
Q

What is used to save IPv$ addresses by converting private to Public IPs?

A

NAT

55
Q

Which technology was created with HTTP Connect disadvantages in mind?

A

MASQUE

56
Q

Physical controls are typically the most complex of the controls.

(True / False)

A

False

57
Q

What is the default administrative distance for EIGRP?

A

5

58
Q

What protocol is used commonly for web browsers?

A

SSL

59
Q

Which of these is not a difference between STP and RSTP?

A

RSTP cannot generate its own Hellos

60
Q

What provides the ability to balance incoming traffic across multiple network resources?

A

Load balancing

61
Q

What is a minor version release which includes new features and bug fixes?

A

Throttles

62
Q

Which character identifies with User EXEC mode?

A

>

63
Q

A default route is also known as what?

A

Gateway of last resort

64
Q

What is a command line interface used to allow a Telnet connection to the router?

A
65
Q

What process ID is used in the added header of GRE when encapsulating?

A

47

66
Q

Which protocol provides trusted identification and proof that data was not changed?

A

AUthentication header (AH)

67
Q

Which DNS lookup returns a host 128-bit IPv6 address?

A

AAAA

68
Q

Which types of attacks use massive amounts of bogus traffic to overwhelm a resource?

A

Volumetric attacks

69
Q

Which command is used to set a default route?

A

ip route

70
Q

Which command will bring you to Global configuration mode?

A

configure terminal

71
Q

PAT is also known as what?

A

Overloading

72
Q

Which type of accounts are typical business users who don’t require special systems or information to do their job?

A

Standard

73
Q

In reference to flooding, the frame sent out will be _______ to all ports except the source port.

A

Broadcast

74
Q

What NAT is a constant mapping that allows private IP networks with unregistered IPs to connect to the internet?

A

Static NAT

75
Q

Which of the following is NOT a key element in develeloping a DoS response plan?

A

Security guards

76
Q

What are the 3 violation modes when it comes to port security?

A

Protect, Restrict, Shutdown

77
Q

What happens when a port is configured as a secure port and the maximum numbe rof MAC addresses is reached?

A

Protect, Restrict, Shutdown

78
Q

Which attack sends a lot of fake UDP packets to the router broadcast address?

A

Fraggle attack

79
Q

Which of the following is an ongoing cycle of inspecting network traffic for problems?

A

Fault monitoring

80
Q

Why should PortFast only be used on ports with a single host connected to it?

A

a bridge loop could occur

81
Q

What hardware is associated with the Access Layer of the Cisco Model?

A

Access points and Layer 2 switches

82
Q

What message is sent by the router if the datagram has reached the maximum limit of routers that it can travel?

A

Time exceeded

83
Q

Which attack sends its victim in a continuous loop once it tries to respond?

A

LAND attack

84
Q

Which of the following is an example of administrative controls?

A

Minimizing the use of privileged accounts and placing more restrictions

85
Q

According to lecture, what is the largest security vulnerability in a network, and also the hardest to contorl?

A

Human factor

86
Q

In the following version number, the “12” represents what?

12.4(25a)

A

Major release

87
Q

Which command enables the OSPF routing protocol?

A

Router OSPF 1

88
Q

What is the wildcard mask of 200.10.57.98/26?

A

0.0.0.63

89
Q

Which of the following is not a functional area of Network Management?

A

Controlling management

90
Q

Which of the following controls access to Netowrk resources to protect a network from unauthorized access?

A

Security management

91
Q

Which attack relies on a malicious program called Smurf to flood multiple devices with ICMP pings?

A

Smurf attack

92
Q

Which versions of TLS does Google Chrome use by default?

A

TLS 1.2, TLS 1.3