Docx
Docx
Docx
Answer saved
Marked out of 1.00
Flag question
Question text
What type of DHCP attack where in an attacker floods the DHCP server with DHCP
requests to use all the available IP addresses that the DHCP server can issue. After
these IP addresses are issued, the server cannot issue any more addresses, and this
situation produces a denial-of-service (DoS) attackas new clients cannot obtain network
access.
Select one:
a. DHCP starvation attack
b. DHCP spoofing attack
c. DHCP backdoor attack
d. DHCP phishing attack
Clear my choice
Question 2
Answer saved
Marked out of 1.00
Flag question
Question text
This is a proprietary protocol that all Cisco devices can be configured to use. This
checks other Cisco devices that are directly connected, which allows the devices to
auto-configure their connection.
Select one:
a. Cisco Configuration Protocol
b. Cisco Auto Configure
c. Cisco Discovery Protocol
d. Cisco Auto Connect Protocol
Clear my choice
Question 3
Answer saved
Marked out of 1.00
Flag question
Question text
Select one:
a. 23
b. 8080
c. 80
d. 22
Clear my choice
Question 4
Answer saved
Marked out of 1.00
Remove flag
Question text
Which of the following is the command to configure the IP domain name of the network
(mycompany.com)
Select one:
a. Config mycompany -ipdomain
b. Ip domain-name mycompany.com
c. Ipconfig mycompany.com
d. Ip configure mycompany.com
Clear my choice
Question 5
Answer saved
Marked out of 1.00
Flag question
Question text
Select one:
a. SSH
b. TCP/IP
c. FTP
d. HTTP
Clear my choice
Question 6
Answer saved
Marked out of 1.00
Remove flag
Question text
Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?
Select one:
a. Ipdefault gateway 172.10.90.1
b. Ipset gateway 172.10.90.1 -default
c. Ipconfig default-gateway 172.10.90.1
d. Ip default-gateway 172.10.90.1
Clear my choice
Question 7
Answer saved
Marked out of 1.00
Remove flag
Question text
What is the command to set the IP address (192.168.10.2) and subnet mask
(255.255.0.0) for specific Fast Ethernet interface?
Select one:
a. ipconfig 192.168.10.2 255.255.0.0
b. ipset 192.168.10.2 255.255.0.0
c. ip 192.168.10.2 255.255.0.0
d. ipset config 192.168.10.2 255.255.0.0
e. ip address 192.168.10.2 255.255.0.0
Clear my choice
Question 8
Answer saved
Marked out of 1.00
Remove flag
Question text
Select one:
a. config global
b. configure terminal
c. config device
d. enter global
e. set global
Clear my choice
Question 9
Answer saved
Marked out of 1.00
Flag question
Question text
This attack tries to crack a password on another device. The first phase of this attack
starts with the attacker using a list of common passwords and a program designed to try
to establish a Telnet session using each word on the dictionary list.
Select one:
a. Telnet DoS attack
b. Telnet password attack
c. Brute force password attack
d. Crack password attack
Clear my choice
Question 10
Answer saved
Marked out of 1.00
Remove flag
Question text
This is a protocol that is used to synchronize the clocks of computer systems over
packet-switched, variable-latency data networks.
Select one:
a. Real Time Protocol
b. Internetwork Time Protocol
c. Network Time Protocol
d. Synchronize Time Protocol
Clear my choice