Datacomms Module 16

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

a unique hostname

an IP domain name

a user account

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

2
New cards

discovery and mapping of systems

What is the objective of a network reconnaissance attack?

3
New cards

firewall settings

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

4
New cards

remote access to a switch where data is encrypted during the session

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

5
New cards

encryption

Which benefit does SSH offer over Telnet for remotely managing a router?

6
New cards

firewalls

What is one of the most effective security tools available for protecting users from external threats?

7
New cards

DoS attacks

Which type of network threat is intended to prevent authorized users from accessing resources?

8
New cards

authorization

authentication

accounting

Which three services are provided by the AAA framework? (Choose three.)

9
New cards

worm

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

10
New cards

environmental

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?

11
New cards

a weakness that makes a target susceptible to an attack

What does the term vulnerability mean?

12
New cards

firewall

Which component is designed to protect against unauthorized communications to and from a computer?

13
New cards

RouterA(config)# login block-for 30 attempts 2 within 10

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

14
New cards

to keep track of the actions of a user

What is the purpose of the network security accounting function?

15
New cards

reconnaissance attack

What type of attack may involve the use of tools such as nslookup and fping?