Kahoot Review Flashcards

1
Q

Which of the following is NOT a purpose of DHCP snooping?

A

Enable DHCP and allow a host and client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens to a route if the administrative distance is 255?

A

The router will not install the route in the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in Depth centers around how many levels of security?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most basic countermeasure to preventing DDOS attacks is to allow as little user error as possible.

(True/False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the wildcard mask for 192.168.200.50/30?

A

0.0.0.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ occurs when your switch sends broadcasts to fill its MAC address table.

A

Thrashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to save the running configuration to the start up configuration?

A

Copy running config startup config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the range for standard ACLs?

A

1-99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the maximum hop count for RIPv1?

A

15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which command displays neighbor relationships with OSPF?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dynamic routes take precedence over static routes.

(True / False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two ways to perform Fault Management?

A

Active and Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an advantage of Layer 7 load balancing?

A

Offers smart routing based off of URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol is widely used in email, IM, VoiP and in HTTPS?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which layer in the Cisco model is used as a communication point between the access and the core layer?

A

Distribution Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used by the EIGRP to select and maintain the best route to each remote network?

A

DUAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What measures the number of routers that a packet must travel through?

A

Hop count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is NOT a tier in the Cisco model?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is NOT a password security best practic e?

A

Use hints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is an example of a named ACL?

A

ip access-list standard ______

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is considered one of the hardest DDoS raids to prevent and recover from?

A

DNS flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Router(config-router)# indicate?

A

Changes are to be made to the routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do system banners exist?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many types of DNS queries are there?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How do switches remember source hardware address of each frame received on an interface?
MAC address table
26
1+1 = \_\_\_
None of the above
27
What is a protocol suite that authenticates and encrypts packets for secure communication?
IPSec
28
Which of the following is NOT an advantage of static routes?
29
The three-tier hierarchical network model consists of what three layers?
Core, Distribution, Access
30
\_\_\_\_\_ cards are a flash memory storage device that can store both the start-up and running configs, and the Cisco IOS
Compact Flash
31
When a port enters “protect” mode, an error message is displayed. (True / False)
False
32
GRE uses encryption for its tunnel. | (True / False)
False
33
Which of the following is NOT a main layer of Security Controls?
Logical Controls
34
What is a rule based list that filters inbound and outbound traffic?
Access Control List
35
Spanning Tree Protocol prevents layer ___ loops from being formed.
2
36
Which layer in the Cisco model is responsible for transferring heavy amounts of traffic in a reliable and quick way?
Core layer
37
Which layer of the hierarchical network model handles routing, packet filtering and WAN access?
Distribution
38
What is the default encapsulation method used in Cisco tunneling?
Generic Routing Encapsulation (GRE)
39
What is the purpose and goal of fault management?
40
\_\_\_ is when the source and destination port of a frame that reaches the switches is dropped.
Frame filtering
41
\_\_\_\_\_\_\_\_\_ happens when a switch does not find the destination MAC address in its table.
Flooding
42
Which of the following is NOT a disadvantage to NAT?
43
Which command is used to display the startup configuration on a Cisco device?
Show start
44
Which ACL filters traffic on source and destination address and protocol?
Extended ACL
45
Which protocol supports encryption-only and authentication-only configurations?
ESP
46
In the following version number, the .4 represents what: 12.4(25A)
minor release
47
How many modes of operation are there?
3
48
Which character identifies with Privileged Exec Mode?
#
49
HTTP __________ is the practice of creating a network link between two nodes in a network environment.
proxying
50
At what layer does DHCP snooping exist?
2
51
Which of the following protocols is NOT an example of Interior Gateway Protocol?
BGP
52
What mode must you b e in to make any configurations?
global configuration mode
53
Reflexive ACLs are usually placed on the most outward routers of the network. (True / False)
True
54
What is used to save IPv$ addresses by converting private to Public IPs?
NAT
55
Which technology was created with HTTP Connect disadvantages in mind?
MASQUE
56
Physical controls are typically the most complex of the controls. (True / False)
False
57
What is the default administrative distance for EIGRP?
5
58
What protocol is used commonly for web browsers?
SSL
59
Which of these is not a difference between STP and RSTP?
RSTP cannot generate its own Hellos
60
What provides the ability to balance incoming traffic across multiple network resources?
Load balancing
61
What is a minor version release which includes new features and bug fixes?
Throttles
62
Which character identifies with User EXEC mode?
\>
63
A default route is also known as what?
Gateway of last resort
64
What is a command line interface used to allow a Telnet connection to the router?
65
What process ID is used in the added header of GRE when encapsulating?
47
66
Which protocol provides trusted identification and proof that data was not changed?
AUthentication header (AH)
67
Which DNS lookup returns a host 128-bit IPv6 address?
AAAA
68
Which types of attacks use massive amounts of bogus traffic to overwhelm a resource?
Volumetric attacks
69
Which command is used to set a default route?
ip route
70
Which command will bring you to Global configuration mode?
configure terminal
71
PAT is also known as what?
Overloading
72
Which type of accounts are typical business users who don't require special systems or information to do their job?
Standard
73
In reference to flooding, the frame sent out will be _______ to all ports except the source port.
Broadcast
74
What NAT is a constant mapping that allows private IP networks with unregistered IPs to connect to the internet?
Static NAT
75
Which of the following is NOT a key element in develeloping a DoS response plan?
Security guards
76
What are the 3 violation modes when it comes to port security?
Protect, Restrict, Shutdown
77
What happens when a port is configured as a secure port and the maximum numbe rof MAC addresses is reached?
Protect, Restrict, Shutdown
78
Which attack sends a lot of fake UDP packets to the router broadcast address?
Fraggle attack
79
Which of the following is an ongoing cycle of inspecting network traffic for problems?
Fault monitoring
80
Why should PortFast only be used on ports with a single host connected to it?
a bridge loop could occur
81
What hardware is associated with the Access Layer of the Cisco Model?
Access points and Layer 2 switches
82
What message is sent by the router if the datagram has reached the maximum limit of routers that it can travel?
Time exceeded
83
Which attack sends its victim in a continuous loop once it tries to respond?
LAND attack
84
Which of the following is an example of administrative controls?
Minimizing the use of privileged accounts and placing more restrictions
85
According to lecture, what is the largest security vulnerability in a network, and also the hardest to contorl?
Human factor
86
In the following version number, the “12” represents what? 12.4(25a)
Major release
87
Which command enables the OSPF routing protocol?
Router OSPF 1
88
What is the wildcard mask of 200.10.57.98/26?
0.0.0.63
89
Which of the following is not a functional area of Network Management?
Controlling management
90
Which of the following controls access to Netowrk resources to protect a network from unauthorized access?
Security management
91
Which attack relies on a malicious program called Smurf to flood multiple devices with ICMP pings?
Smurf attack
92
Which versions of TLS does Google Chrome use by default?
TLS 1.2, TLS 1.3