NETADMIN

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/133

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

134 Terms

1
New cards

Adjacency Database

Which of the following OSPF components is associated with neighbor table?
- Dijkstra’s algorithm
- Link-State database
- Routing Protocol messages
- Adjacency database
- Forwarding database

is responsible for creating the neighbor table

2
New cards

Dijkstra’s algorithm

Which of the following OSPF components is responsible for computing the cost of each route?
- Dijkstra’s algorithm
- Link-State database
- Routing Protocol messages
- Adjacency database
- Forwarding database

is responsible for computing the cost of each route

3
New cards

Link-State database

Which of the following OSPF components is associated with the topology table?
- Dijkstra’s algorithm
- Link-State database
- Routing Protocol messages
- Adjacency database
- Forwarding database

is responsible for creating the topology table

4
New cards

Forwarding database

Which of the following OSPF components is associated with the routing table?
- Dijkstra’s algorithm
- Link-State database
- Routing Protocol messages
- Adjacency database
- Forwarding database

is responsible for creating the routing table

5
New cards

Establish - Exchange - Build - Execute - Choose

What is the correct order in the steps for Link-State operation?
1. _____ Neighbor Adjacencies
2. _____ Link-State Advertisements
3. _____ the Topology Table
4. _____ the SPF Algorithm
5. _____ the best route

6
New cards

Type 2: DBD packet

Which of the following OSPF packets contains an abbreviated list of the LSDB of the sending router?

7
New cards

Type 4: LSU packet

Which of the following OSPF packets is used by routers to announce new information?

8
New cards

Type 3: LSR packet

Which of the following OSPF packets is used by routers to request more information?

9
New cards

Type 1: Hello Packet

Which of the following OSPF packets is responsible and maintaining adjacency with other OSPF routers?

10
New cards

Type 5: LSAck Packet

Which of the following OSPF packets is used to confirm receipt of an LSA?

11
New cards

Router ID

Which of the following is used with the Hello Packet to uniquely identify the originating router?

12
New cards

Two-Way State

During this OSPF state on multiaccess networks, the routers elect a Designated Router (DR) and a Backup Designated Router (BDR)

13
New cards

Exchange State

During this OSPF state, routers send each other DBD packets

14
New cards

Init State

An OSPF routers enters this state when it has received a Hello packet from a neighbor, containing the sending Router ID

15
New cards

ExStart State

During this OSPF state on point-to-point networks, the routers decide which router initiates the exchange of DBD packets

16
New cards

Full-State

During this OSPF state, routers have converged link-state databases

17
New cards

Down State

During this OSPF state, no Hello packets are received

18
New cards

Loading State

During this OSPF state, routes are processed using the SPF algorithm

19
New cards

to discover neighbors and build adjacencies between them

What is a function of OSPF hello packets?

20
New cards

LSU

Which OSPF packet contains the different types of link-state advertisements?

21
New cards

-When converged, all routers in an area have identical topology tables.
-The table can be viewed via the show ip ospf database command
-It is a link-state database that represents the network topology

Which 3 statements describe features of the OSPF topology table?

22
New cards

routers that have the same link-state information in their LSDBs

What does an OSPF area contain?

23
New cards

OSPF will remove that neighbor from the router link-state database

A router is participating in an OSPFv2 domain. What will always happen if the dead interval expires before the router receives a hello packet from an adjacent DROTHER OSPF router?

24
New cards

Hello - DBD - LSR - LSU - LSAck

What is the order of packet types used by an OSPF router to establish convergence?

25
New cards

It scales well in both small and large networks

What is the feature of the OSPF routing protocol?

26
New cards

adjacency

What is used to create the OSPF neighbor table?

27
New cards

link-state

What is identical on all OSPF routers within a single area?

28
New cards

dissemination of LSAs

What function is performed by the OSPF designated router?

29
New cards

to reduce SPF calculations - to reduce use of memory and processor resources

What are two reasons for creating an OSPF network with multiple areas?

30
New cards

Full

At which OSPF state are neighbor routers converged and able to exchange routing updates?

31
New cards

60 seconds

The OSPF hello timer has been set to 15 seconds on a router in a point-to-point network. By default, what is the dead interval on this router?

32
New cards

They exchanged abbreviated lists of their LSDBs

What happens immediately after two OSPF routers have exchanged hello packets and have formed a neighbor adjacency?

33
New cards

Arranging routers into areas partitions a large autonomous system in order to lighten the load on routers

Which statement is correct about multiarea OSPF?

34
New cards

True

True or False? In the router ospf process-id command, the process ID value, which can be any number between 1 and 65,535, is logically significant. It must be same on all routers in the OSPF area.

35
New cards

The router ID is used to determine the DR
The router ID uniquely identifies the router

Which of the following applies to the router ID?

36
New cards

Which of the following is order of precedence for choosing the routing ID?

37
New cards
  1. Router ID that is explicitly configured.

  2. Highest IPv4 loopback address

  3. Highest active configured IPv4 address

Which of the following is the order of precedence for choosing the router ID?

38
New cards

the router rid command

Which criterion is preferred by the router to choose a router ID?

39
New cards

0.0.0.31

Which wildcard mask would be used to advertise the 192.168.5.96/27 network as a part of an OSPF configuration?

40
New cards

router(config-router)#network 192.168.1.0 0.0.0.255 area 0

The following three networks are directly connected to an OSPF router; 192.168.0.0/24, 192.168.1.0/24, and 192.168.2.0/24. Which OSPF network command would advertise only the 192.168.1.0 network to neighbors?

41
New cards

-OSPFv2 type of network
-hello timer
-subnet mask

Which three parameters should match in order for a pair of routers to form an adjacency when running OSPFv2?

42
New cards

calculates its metric using bandwidth
uses Dijkstra’s algorithm to build the SPF tree

What are two features of the OSPF routing protocol?(Choose two)

43
New cards

the loopback interface IP address

A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol. What does the router OSPF process use to assign the router ID?

44
New cards

show ip protocols

Which verification command would identify the specific interfaces on a router that were configured with the passive-interface command?

45
New cards

(config-router)# auto-cost reference-bandwidth 1000

Which command, if applied on an OSPF router, would give a Gigabit Ethernet interface a lower cost than a Fast Ethernet interface?

46
New cards

Issue the clear ip ospf process privileged mode command.

A network administrator has not changed the router ID on a router that is working in an OSPFv2 environment. What should the administrator do to reset the adjacencies and use the new router ID?

47
New cards

show ip ospf interface

Which command can be used to view the OSPF hello and dead time intervals?

48
New cards

The path that includes the fastest cumulative bandwidth links.

What does the SPF algorithm consider to be best path to a network?

49
New cards

The router ID can be used to break a tie in the election process

What is one use of the router ID in OSPF routing?

50
New cards

highest priority

What is the first criterion used by OSPF routers to elect a DR?

51
New cards

show ip ospf neighbor

Which command could be used on a router to ensure that an OSPF adjacency is formed with another router?

52
New cards

default-information

A router in an OSPF enterprise network has a default static route that has been configured via the interference that connects to the ISP. Which command would the network administrator apply on this router so that other routers in the OSPF network will use this default route?

53
New cards

Asset

Which security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data

54
New cards

Vulnerability

Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat?

55
New cards

Threat

Which security term is used to describe a potential danger to a company’s assets, data, or network functionality?

56
New cards

Exploit

Which security term is used to describe a mechanism that takes advantage of a vulnerability?

57
New cards

Mitigation

Which security term is used to describe the counter-measure for a potential threat or risk?

58
New cards

Risk

Which security term is used to describe the likelihood of a threat to exploit the vulnerability of an asset, with the aim of negatively affecting an organization?

59
New cards

Gray Hat

Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered

60
New cards

Black Hat

Which type of hacker is described in the scenario: From my laptop, I transferred $10 million to my bank account using victim account numbers and PINs after viewing recordings of victims entering the numbers.

61
New cards

White Hat

Which type of hacker is described in the scenario: My job is to identify weaknesses in my company’s network .

62
New cards

Black Hat

Which type of hacker is described in the scenario: I used malware to compromise several corporate systems to steal credit card information. I then sold that information to the highest bidder.

63
New cards

White Hat

Which type of hacker is described in the scenario: During my research for security exploits, I stumbled across a security vulnerability on a corporate network that I am authorized to access.

64
New cards

White Hat

Which type of hacker is described in the scenario It is my job to work with technology companies to fix a flaw with DNS.

65
New cards

Encryption Tools

Which penetration testing tool uses algorithm schemes to encode the data, which then prevents access to the data?

66
New cards

Debuggers

Which penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They are also used by white hats when analyzing malware.

67
New cards

Packet Crafting Tools

Which penetration testing tool is used to probe and test a firewall’s robustness?

68
New cards

Forensic Tools

Which penetration testing tool is used by white hat hackers to sniff out any trace of evidence existing in a computer?

69
New cards

Vulnerability Exploitation Tools

Which penetration testing tool identifies whether a remote host is susceptible to a security attack?

70
New cards

Worm

Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.

71
New cards

Trojan Horse

Which malware is non-self-replicating type of malware? It often contains malicious code that is designed to look like something else, such as a legitimate application or file. It attacks the device from within.

72
New cards

Spyware

Which malware is used to gather information about a user and then, without the user's consent, sends the information to another entity?

73
New cards

Adware

Which malware typically displays annoying pop-ups to generate revenue for its author?

74
New cards

Rootkit

Which malware is installed on a compromised system and provides privileged access to the threat actor?

75
New cards

Ransomware

Which malware denies access to the infected computer system and demands payment before the restriction is removed?

76
New cards

Social Engineering

What type of attack is tailgating?

77
New cards

Access

What type of attack is a password attack?

78
New cards

Reconnaissance

What type of attack is port scanning?

79
New cards

Access

What type of attack is man-in-the-middle?

80
New cards

Access

What type of attack is address spoofing?

81
New cards

MiMTM

Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication?

82
New cards

Session Hijacking

Which attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user’s traffic?

83
New cards

Amplification and Reflection Attacks

Which attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?

84
New cards

ICMP Attack

Which attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?

85
New cards

Address Spoofing Attack

Which attack being used is when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user?

86
New cards

TCP SYN Flood Attack

Which attack exploits the three-way handshake?

87
New cards

TCP reset attack

Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both hosts informing them to immediately stop using the TCP connection. Which attack is this?

88
New cards

TCP session hijacking

Which attack is being used when the threat actor spoofs the IP address of one host, predicts the next sequence number, and sends an ACK to the other host?

89
New cards

UDP flood attack

A program sends a flood of UDP packets from a spoofed host to a server on the subnet sweeping through all the known UDP ports looking for closed ports. This will cause the server to reply with an ICMP port unreachable message. Which attack is this?

90
New cards

ASA Firewall

Which network security device ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts?

91
New cards

AAA server

Which network security device contains a secure database of who is authorized to access and manage network devices?

92
New cards

ESA/WSA

Which network security device filters known and suspicious internet malware sites?

93
New cards

VPN

Which network security device is used to provide secure services with corporate sites and remote access support for remote users using secure encrypted tunnels?

94
New cards

IPS

Which network security device monitors incoming and outgoing traffic looking for malware, network attack signatures, and if it recognizes a threat, it can immediately stop it?

95
New cards

Triple DES

Which encryption method repeats an algorithm process three times and is considered very trustworthy when implemented using very short key lifetimes?

96
New cards

Stream Cipher

Which encryption method encrypts plaintext one byte or one bit at a time?

97
New cards

Symmetric

Which encryption method uses the same key to encrypt and decrypt data?

98
New cards

Rivest Cipher

Which encryption method is a stream cipher and is used to secure web traffic in SSL and TLS?

99
New cards

DDoS

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

100
New cards

attempting to write more data to a memory location than that location can hold

What causes a buffer overflow?