Q:41-60 Flashcards
- A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?
to capture and analyze packets within traditional Ethernet LANs or WLANs
to probe and test the robustness of a firewall by using specially created forged packets
to make repeated guesses in order to crack a password
to make repeated guesses in order to crack a password
- What are two syntax rules for writing a JSON array? (Choose two.)
Each value in the array is separated by a comma.
The array can include only one value type.
A space must separate each value in the array.
A semicolon separates the key and list of values.
Values are enclosed in square brackets.
Each value in the array is separated by a comma.
Values are enclosed in square brackets.
- What is a characteristic of a Trojan horse as it relates to network security?
An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
Malware is contained in a seemingly legitimate executable program.
Extreme quantities of data are sent to a particular network device interface.
Too much information is destined for a particular memory block, causing additional memory areas to be affecte
Malware is contained in a seemingly legitimate executable program.
- An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?
TCP SYN flood
DNS tunneling
DHCP spoofing
ARP cache poisoning
DHCP spoofing
- A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?
data integrity
non-repudiation
origin authentication
data confidentiality
origin authentication
- A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to detect any evidence of a hack or malware in a computer or network
to probe and test the robustness of a firewall by using specially created forged packets
to capture and analyze packets within traditional Ethernet LANs or WLANs
to capture and analyze packets within traditional Ethernet LANs or WLANs
- An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?
- 0.15.255
- 0.3.255
- 0.7.255
- 0.1.255
0.0.3.255
- Match the HTTP method with the RESTful operation.
POST
GET
PUT/PATCH
DELETE
Create
Read
Update/replace
delete
POST –» Create
GET –» Read
PUT/PATCH –» Update/Replace?Modify
Delete –» Delete
- Refer to the exhibit. What is the OSPF cost to reach the West LAN 172.16.2.0/24 from East?
782
74
128
65
65
- What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?
to activate the OSPF neighboring process
to influence the DR/BDR election process
to provide a backdoor for connectivity during the convergence process
to streamline and speed up the convergence process
to influence the DR/BDR election process
- An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?
permitted
- What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
The spine and leaf switches are always linked through core switches.
The spine switches attach to the leaf switches and attach to each other for redundancy.
The leaf switches always attach to the spines and they are interlinked through a trunk line.
The leaf switches always attach to the spines, but they never attach to each other.
The leaf switches always attach to the spines, but they never attach to each other.
- Which two scenarios would result in a duplex mismatch? (Choose two.)
connecting a device with autonegotiation to another that is manually set to full-duplex
starting and stopping a router interface during a normal operation
connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps
configuring dynamic routing incorrectly
manually setting the two connected devices to different duplex modes
connecting a device with autonegotiation to another that is manually set to full-duplex
manually setting the two connected devices to different duplex modes
- A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?
authenticates a packet by a string match of the username or community string
authenticates a packet by using either the HMAC with MD5 method or the SHA method
authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms
authenticates a packet by using the SHA algorithm only
authenticates a packet by using either the HMAC with MD5 method or the SHA method
- What are two types of attacks used on DNS open resolvers? (Choose two.)
amplification and reflection resource utilization fast flux ARP poisoning cushioning
amplification and reflection
resource utilization