Kahoot Review Flashcards
Which of the following is NOT a purpose of DHCP snooping?
Enable DHCP and allow a host and client
What happens to a route if the administrative distance is 255?
The router will not install the route in the routing table
Defense in Depth centers around how many levels of security?
5
The most basic countermeasure to preventing DDOS attacks is to allow as little user error as possible.
(True/False)
True
What is the wildcard mask for 192.168.200.50/30?
0.0.0.3
_____ occurs when your switch sends broadcasts to fill its MAC address table.
Thrashing
What command is used to save the running configuration to the start up configuration?
Copy running config startup config
What is the range for standard ACLs?
1-99
What is the maximum hop count for RIPv1?
15
Which command displays neighbor relationships with OSPF?
Dynamic routes take precedence over static routes.
(True / False)
False
What are two ways to perform Fault Management?
Active and Passive
Which of the following is an advantage of Layer 7 load balancing?
Offers smart routing based off of URL
Which protocol is widely used in email, IM, VoiP and in HTTPS?
TLS
Which layer in the Cisco model is used as a communication point between the access and the core layer?
Distribution Layer
What is used by the EIGRP to select and maintain the best route to each remote network?
DUAL
What measures the number of routers that a packet must travel through?
Hop count
Which of the following is NOT a tier in the Cisco model?
Application Layer
Which of the following is NOT a password security best practice?
Use hints
Which of the following is an example of a named ACL?
ip access-list standard ______
Which of the following is considered one of the hardest DDoS raids to prevent and recover from?
DNS flood
What does Router(config-router)# indicate?
Changes are to be made to the routing protocol
Why do system banners exist?
How many types of DNS queries are there?
3
How do switches remember source hardware address of each frame received on an interface?
MAC address table
1+1 = ___
None of the above
What is a protocol suite that authenticates and encrypts packets for secure communication?
IPSec
Which of the following is NOT an advantage of static routes?
The three-tier hierarchical network model consists of what three layers?
Core, Distribution, Access
_____ cards are a flash memory storage device that can store both the start-up and running configs, and the Cisco OS.
Compact Flash
When a port enters “protect” mode, an error message is displayed.
(True / False)
False
GRE uses encryption for its tunnel.
(True / False)
False
Which of the following is NOT a main layer of Security Controls?
Logical Controls
What is a rule based list that filters inbound and outbound traffic?
Access Control List
Spanning Tree Protocol prevents layer ___ loops from being formed.
2
Which layer in the Cisco model is responsible for transferring heavy amounts of traffic in a reliable and quick way?
Core layer