CCNA v7 Module 16-17 Exam Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

What are the different types of threats?

Information Theft

Data loss and Manipulation

Identity Theft

Disruption of Service

2
New cards

What are the different types of vulnerabilities?

Technological, Configuration and policy.

3
New cards

Describe hardware threats from the Physical threat class.

Damage to routers, servers...etc.

4
New cards

What does it describe when extreme temperature / humidity threatens devices?

Environmental threat.

5
New cards

Describe electrical threats from the Physical threat class.

Spikes in voltage, insufficient voltage, unconditioned power, and total power loss.

6
New cards

What is the final class in the Physical threat class?

Maintenance threats.

7
New cards

What are the types of malware?

Viruses, worms and trojan horses.

8
New cards

How do trojan horses spread?

They self replicate but spread through user interaction.

9
New cards

What distinguishes worms from other types of malware?

They do not need a human / program operating it.

10
New cards

What are the three Network attack categories?

Reconnaissance, Access, and Denial of Service.

11
New cards

What commands can easily determine the IP address space assigned to an entity?

nslookup and whois

12
New cards

What are the two ping sweep tools?

fping and gping.

13
New cards

What are the different types of access attacks?

Password attacks

Trust Exploitation

Port Redirection

Man in the Middle

14
New cards

What does a DoS attack do?

Interrupts communication.

15
New cards

What assets are available to aid the user in preventing threats?

VPN

ASA Firewall

IPS

ESA/WSA

AAA Server

16
New cards

How should a user back up their data?

Frequently, using proper storage, secure location, and validation.

17
New cards

True or false. AAA (Authentication, Authorization & Accounting) is similar to a credit card.

True.

18
New cards

What is a firewall topology with DMZ.

It allows outside users controlled access in the delimiterized zone (DMZ).

19
New cards

What are the types of firewalls?

1. Packet filtering

2. Application Filtering

3. URL Filtering

4. Stateful packet inspection

20
New cards

How do you configure ssh?

Step 1: config hostname

Step 2: config domain name

Step 3: generate a key to encrypt (crypto key generate rsa)

Step 4: verify/create local database entry using username.

Step 5: authenticate using login local

Step 6: transport input [ssh / telnet]

21
New cards

True or false. Small networks require an IT department.

False. Large networks require an IT department.

22
New cards

What should one plan for when making a small network.

Cost

Speed & Port/Interface types

Expandability

OS Features and Services

23
New cards

What does redundancy in a small network do?

Eliminates any single points of failure.

24
New cards

What is the highest priority in traffic management. Lowest? Whats second most important?

Voice, FTP, SMTP.

25
New cards

What are network applications?

End-user applications that are network aware.

26
New cards

What are application layer services?

Programs that interface with the network and prepare data for transfer.

27
New cards

Which protocols retrieve emails?

POP3 & IMAP.

28
New cards

True or false. Real-time applications must support QoS.

True.

29
New cards

What are the four scaling requirements?

Net documentation

Device inventory

Budget

Traffic analysis

30
New cards

What is net documentation?

The physical / logical topology.

31
New cards

How do you clear an arp table?

netsh interface ip or delete arpcache.

32
New cards

What are the CDP commands?

show cdp neighbor, show cdp neighbor detail, no cdp run, no cdp enable.

33
New cards

What information do the cdp commands provide?

device identifiers

address list

port identifier

capabilities list

platform

34
New cards

what does the terminal monitor command do?

It displays log messages on a remote location.