Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Docx

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Question 1

Answer saved
Marked out of 1.00

Flag question

Question text

What type of DHCP attack where in an attacker floods the DHCP server with DHCP
requests to use all the available IP addresses that the DHCP server can issue. After
these IP addresses are issued, the server cannot issue any more addresses, and this
situation produces a denial-of-service (DoS) attackas new clients cannot obtain network
access.

Select one:
a. DHCP starvation attack
b. DHCP spoofing attack
c. DHCP backdoor attack
d. DHCP phishing attack
Clear my choice

Question 2

Answer saved
Marked out of 1.00

Flag question

Question text

This is a proprietary protocol that all Cisco devices can be configured to use. This
checks other Cisco devices that are directly connected, which allows the devices to
auto-configure their connection.

Select one:
a. Cisco Configuration Protocol
b. Cisco Auto Configure
c. Cisco Discovery Protocol
d. Cisco Auto Connect Protocol
Clear my choice

Question 3
Answer saved
Marked out of 1.00

Flag question

Question text

Telnet protocol by default uses Port ______.

Select one:
a. 23
b. 8080
c. 80
d. 22
Clear my choice

Question 4
Answer saved
Marked out of 1.00

Remove flag

Question text

Which of the following is the command to configure the IP domain name of the network
(mycompany.com)

Select one:
a. Config mycompany -ipdomain
b. Ip domain-name mycompany.com
c. Ipconfig mycompany.com
d. Ip configure mycompany.com
Clear my choice
Question 5
Answer saved
Marked out of 1.00

Flag question

Question text

A protocol that provides an encrypted connection to a remote device.

Select one:
a. SSH
b. TCP/IP
c. FTP
d. HTTP
Clear my choice

Question 6
Answer saved
Marked out of 1.00

Remove flag

Question text

Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?

Select one:
a. Ipdefault gateway 172.10.90.1
b. Ipset gateway 172.10.90.1 -default
c. Ipconfig default-gateway 172.10.90.1
d. Ip default-gateway 172.10.90.1
Clear my choice

Question 7
Answer saved
Marked out of 1.00

Remove flag

Question text

What is the command to set the IP address (192.168.10.2) and subnet mask
(255.255.0.0) for specific Fast Ethernet interface?

Select one:
a. ipconfig 192.168.10.2 255.255.0.0
b. ipset 192.168.10.2 255.255.0.0
c. ip 192.168.10.2 255.255.0.0
d. ipset config 192.168.10.2 255.255.0.0
e. ip address 192.168.10.2 255.255.0.0
Clear my choice

Question 8
Answer saved
Marked out of 1.00

Remove flag

Question text

Global configuration mode is used to configure system globally, or to enter specific


configuration modes to configure specific elements such as protocols. What is the
command to enter global configuration mode?

Select one:
a. config global
b. configure terminal
c. config device
d. enter global
e. set global
Clear my choice
Question 9
Answer saved
Marked out of 1.00

Flag question

Question text

This attack tries to crack a password on another device. The first phase of this attack
starts with the attacker using a list of common passwords and a program designed to try
to establish a Telnet session using each word on the dictionary list.

Select one:
a. Telnet DoS attack
b. Telnet password attack
c. Brute force password attack
d. Crack password attack
Clear my choice

Question 10

Answer saved
Marked out of 1.00

Remove flag

Question text

This is a protocol that is used to synchronize the clocks of computer systems over
packet-switched, variable-latency data networks.

Select one:
a. Real Time Protocol
b. Internetwork Time Protocol
c. Network Time Protocol
d. Synchronize Time Protocol
Clear my choice

You might also like