What are five examples of configuration weaknesses?(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet...
What are three examples of Technological Weaknesses?
What are three examples of Technological Weaknesses?(1) TCP/IP Protocol Weaknesses (2) Operating System Weaknesses (3) Network equipment weaknes...
What are the 3 factors of network security?
What are the 3 factors of network security?(1) Vulnerability (2) Threats (3) Att...
What are the three primary vulnerabilities?
What are the three primary vulnerabilities?(1) Technological weaknesses (2) configuration Weaknesses (3) Security Policy Weaknes...
What three goals must a security policy meet?
What three goals must a security policy meet?(1) Informs users, staff, and managers of their requirements for protecting information assets (2) Specifies...
What is an extreme alternative for managing security?
What is an extreme alternative for managing security?Answer: completely closed a network from the outside wo...
What are the two important needs that need to be balanced in a network?
What are the two important needs that need to be balanced in a network?(1) Keep networks open to support business requirements (2) Protect private, personal,...
Examples of commonly reported acts of computer crime.
Examples of commonly reported acts of computer crime.(1) Insider abuse of network access (2) Virus (3) Mobile device theft (4) Phishing where an organization...
What is the seven-step process to gain information and state an attack?
What is the seven-step process to gain information and state an attack?(1) Perform footprint analysis (2) Enumerate Information (3) Manipulate Users to...
Uses e-mail or other means to trick others into providing information, such as credit card numbers.
Uses e-mail or other means to trick others into providing information, such as credit card numbers.Answer: Phis...
An individual who sends large quantities of unsolicited e-mail messages.
An individual who sends large quantities of unsolicited e-mail messages.Answer: Spam...
Individual who manipulates phone network, through a payphone, to make free long distance calls.
Individual who manipulates phone network, through a payphone, to make free long distance calls.Answer: Phrea...
Someone who tries to gain unauthorized access to network resources with malicious intent.
Someone who tries to gain unauthorized access to network resources with malicious intent.Answer: Crac...
An individual that attempts to gain unauthorized access to network with malicious intent
An individual that attempts to gain unauthorized access to network with malicious intentAnswer: Hac...
An individuals who use their knowledge to break into systems that they are not authorized to use
An individuals who use their knowledge to break into systems that they are not authorized to useAnswer: Black ...
An individual who looks for vulnerabilities in systems and reports these so that they can be fixed
An individual who looks for vulnerabilities in systems and reports these so that they can be fixedAnswer: White ...
What are the possible consequences if a network is compromised?
What are the possible consequences if a network is compromised?Answer: (1) Loss of Privacy (2) Theft of information (3) Legal Liabil...
What are two examples of when you would use static address mapping?
What are two examples of when you would use static address mapping?Answer: (1) Router on the other side of Frame Relay doesn't support dynamic inverse...
Supplying a manual static mapping for the next hop protocol address to a local DLCI.
Supplying a manual static mapping for the next hop protocol address to a local DLCI.Answer: Static Address Mapp...
What relies on Inverse ARP to resolve a next hop network protocol address to a local DLCI value.
What relies on Inverse ARP to resolve a next hop network protocol address to a local DLCI value.Answer: Dynamic Address Mapp...
Explain the problem with NBMA networks in routing and explain how this problem can be fixed
Explain the problem with NBMA networks in routing and explain how this problem can be fixedAnswer: Because NBMA does not support broadcast traffic,...
Explain the problem with frame relay and routing loops
Explain the problem with frame relay and routing loopsAnswer: In Hub-in-Spoke Frame Relay topologies, split horizon can cause reachability issues...
What device in frame relay is the DTE
What device in frame relay is the DTEAnswer: Gate...
Negotiated tariff metric in Frame Relay internetworks. The maximum amount of data (in bits) that a Frame Relay internetwork is committed to accept the transmit at the CIR
Negotiated tariff metric in Frame Relay internetworks. The maximum amount of data (in bits) that a Frame Relay internetwork is committed to accept the...
Negotiated rate above the CIR which the customer can use to transmit for short bursts
Negotiated rate above the CIR which the customer can use to transmit for short burstsAnswer: CBIR (Committed Burst Information Ra...
Negotiated tariff metric in Frame Relay internetworks. The number of bits that a Frame Relay internetwork will attempt to transmit after BC is accommodated. This data is, in general, delivered with a lower probability than BC data because this data can be marked as DE by the network
Negotiated tariff metric in Frame Relay internetworks. The number of bits that a Frame Relay internetwork will attempt to transmit after BC is accommodated....
The capacity through the local loop guaranteed by the provider
The capacity through the local loop guaranteed by the providerAnswer: ...
If the network is congested, tagged traffic can be dropped to ensure delivery of higher-priority traffic. This tagged traffic is known as this.
If the network is congested, tagged traffic can be dropped to ensure delivery of higher-priority traffic. This tagged traffic is known as this.Answer: DE...
Bit set by a Frame Relay network in frames traveling in the opposite direction of frames encountering a congested path. DTE receiving frames with this bit set can request that higher-level protocols take flow control action as appropriate
Bit set by a Frame Relay network in frames traveling in the opposite direction of frames encountering a congested path. DTE receiving frames with this...
Bit set by a Frame Relay network to inform DTE receiving the frame that congestion was experienced in the path from the source to destination. DTE receiving frames with this bit set can request that higher-level protocols take flow-control action as appropriate
Bit set by a Frame Relay network to inform DTE receiving the frame that congestion was experienced in the path from the source to destination. DTE receiving...
According to the status numbers in debug frame-relay lmi, what does 0x4 mean?
According to the status numbers in debug frame-relay lmi, what does 0x4 mean?Answer: Does not have DLCI programmed, but it was operational in the...
According to the status numbers in debug frame-relay lmi, what does 0x2 mean?
According to the status numbers in debug frame-relay lmi, what does 0x2 mean?Answer: Frame Relay Switch has DLCI programmed and everything is op...
According to the status numbers in debug frame-relay lmi, what does 0x0 mean?
According to the status numbers in debug frame-relay lmi, what does 0x0 mean?Answer: Frame Relay Switch has DLCI programmed, but t is not usa...
What does deleted mean in the LMI type 1 message
What does deleted mean in the LMI type 1 messageAnswer: DTE is configured for a DLCI switch but the DLCI switch does not recognize it as va...
What does active mean in the LMI type 1 message
What does active mean in the LMI type 1 messageAnswer: Everything is working prope...
What does Inactive mean in the LMI type 1 message
What does Inactive mean in the LMI type 1 messageAnswer: DTE device is not detec...
What are the three statuses
What are the three statusesAnswer: (1) Active (2) Inactive (3) Dele...
Under debug frame-relay lmi, what type 1 message include?
Under debug frame-relay lmi, what type 1 message include?Answer: LMI Exchange Messa...
Under debug frame-relay lmi, what type 0 Full status message include?
Under debug frame-relay lmi, what type 0 Full status message include?Answer: includes information about every DLCI on the frame relay swi...
Under debug frame-relay lmi, what does the "in" represent
Under debug frame-relay lmi, what does the "in" representAnswer: LMI status msg sent by FR Swi...
Under debug frame-relay lmi, what does the "out" represent
Under debug frame-relay lmi, what does the "out" representAnswer: LMI status msg sent by rou...
What command is useful when changes have been made by the service provider in frame relay?
What command is useful when changes have been made by the service provider in frame relay?Answer: clear frame-relay in...
What command clears the counters of the packets you have been receiving
What command clears the counters of the packets you have been receivingAnswer: clear count...
What two things in frame relay are used for flow control
What two things in frame relay are used for flow controlAnswer: (1)FECN (2) B...
What are useful commands for verifying frame relay configuration
What are useful commands for verifying frame relay configuration(1) show interface serial 0/0/0 (2) show frame-relay lmi (3) show frame-relay pvc (number)...
What are the five steps for configuring Frame Relay Subinterfaces?
What are the five steps for configuring Frame Relay Subinterfaces?(1) Remove any Network layer address assigned to the physical interface. If the physical...
What is meant by frames being forwarded but marked DE?
What is meant by frames being forwarded but marked DE?Answer: They are Discard Eligi...
What is the capacity through the local loop guaranteed by the provider
What is the capacity through the local loop guaranteed by the providerAnswer: Committed Information Rate (C...
What is the capacity of the local loop
What is the capacity of the local loopAnswer: access rate (port spe...
What are 2 characteristics of Point-to-Point sub interfaces in hub and spoke technologies
What are 2 characteristics of Point-to-Point sub interfaces in hub and spoke technologiesAnswer: (1) Sub interfaces act as leased lines (2) Each...
What command defines the network layer address of the destination router interface
What command defines the network layer address of the destination router interfaceAnswer: protocol addr...
What is the function of turning on broadcast in frame relay?
What is the function of turning on broadcast in frame relay?Answer: Since Frame Relay doesn't forward broadcasts by default, this function sends...
What command defines the supported protocol, bridging, or logical link control: appletalk, decent, disw, ip, ipx, etc
What command defines the supported protocol, bridging, or logical link control: appletalk, decent, disw, ip, ipx, etcAnswer: proto...
What are the 5 optional steps you can use to configure Frame Relay?
What are the 5 optional steps you can use to configure Frame Relay?(1) Configure the LMI (2) Configure Frame Relay SVCs (3) Configure Frame Relay Traffic...
What are the two required steps to configure Frame Relay
What are the two required steps to configure Frame Relay(1) Enable Frame Relay encapsulation on an interface (2) Configure dynamic or static address ...
What are the three stages of Inverse ARP and LMI Operations?
What are the three stages of Inverse ARP and LMI Operations?(1) DTE sends Status Enquiry Message to DCE (2) DCE responds with Status Message- includes...
What Provides for an XON/XOFF flow control mechanism that applies to the entire Frame Relay interface.
What Provides for an XON/XOFF flow control mechanism that applies to the entire Frame Relay interface.Answer: Simple Flow Cont...
What Gives connection identifiers global rather than local significance, allowing them to be used to identify a specific interface to the Frame Relay network.
What Gives connection identifiers global rather than local significance, allowing them to be used to identify a specific interface to the Frame Relay...
What allows a sender to transmit a single frame that is delivered to multiple recipients
What allows a sender to transmit a single frame that is delivered to multiple recipientsAnswer: Multicast...
What provides information about PVC integrity by communicating and synchronizing between devices?
What provides information about PVC integrity by communicating and synchronizing between devices?Answer: VC status messa...
What must you also configure if you manually set the LMI extension?
What must you also configure if you manually set the LMI extension?Answer: the keepalive feat...
If you manually set the LMI-extension, what happens to the Auto-Detect feature?
If you manually set the LMI-extension, what happens to the Auto-Detect feature?Answer: auto-detection is turned ...
What command would you use to set the cisco LMI extension?
What command would you use to set the cisco LMI extension?Answer: frame-relay lmi-type ci...
Which LMI extension corresponds to ITU standards?
Which LMI extension corresponds to ITU standards?Answer: q9...
What LMI extension corresponds to ANSI standards?
What LMI extension corresponds to ANSI standards?Answer: A...
What is the original LMI extension?
What is the original LMI extension?Answer: CI...
What are the three most common types of LMIs that you can set up?
What are the three most common types of LMIs that you can set up?Answer: (1) CISCO (2) ANSI (3) q9...
What command would you use to change the interval of LMI
What command would you use to change the interval of LMIAnswer: (inter config) keepalive (secon...
What is the command to find out information about LMI?
What is the command to find out information about LMI?Answer: show frame-relay ...
What is the default LMI timer for Frame Relay
What is the default LMI timer for Frame RelayAnswer: Every Ten Seco...
What is a keepalive mechanism that provides status information about Frame Relay connections between the router (DTE) and the Frame Relay Switch (DCE)
What is a keepalive mechanism that provides status information about Frame Relay connections between the router (DTE) and the Frame Relay Switch (DCE)Answer: Local...
What encapsulation type in frame relay would you use from a cisco device to a non-cisco device?
What encapsulation type in frame relay would you use from a cisco device to a non-cisco device?Answer: i...
What did the Americans acquire with the Treaty of Paris?
What did the Americans acquire with the Treaty of Paris?Answer: All land east of the Mississi...
Where did the final phase take place?
Where did the final phase take place?Answer: Southern Colon...
Where did the second phase mostly take place?
Where did the second phase mostly take place?Answer: Mid-Atlantic Colon...
When was most of the fighting in New England?
When was most of the fighting in New England?Answer: 1775-1...
Abigail Adams wrote a note to John Adams asking for what?
Abigail Adams wrote a note to John Adams asking for what?Answer: Women's Rig...
When was the Slave Petition given to the General Assembly in Connecticut?
When was the Slave Petition given to the General Assembly in Connecticut?Answer: 1...
What was the Proclamation Rebellion and when was it sent?
What was the Proclamation Rebellion and when was it sent?Answer: The reply to the king; August 1...
When were the first elections for the President and House of Representatives?
When were the first elections for the President and House of Representatives?Answer: December 15, 1788- January 10, 1...
When was the ratification of the Constitution official?
When was the ratification of the Constitution official?Answer: 1...
When did the ratification on the Constitution start?
When did the ratification on the Constitution start?Answer: 1...
By how many states did the constitution need to be ratified by?
By how many states did the constitution need to be ratified by?Answer: 9 out of...
When was the Articles of Confederation ratified?
When was the Articles of Confederation ratified?Answer: 1...
When was the Articles of Confederation adopted by Congress?
When was the Articles of Confederation adopted by Congress?Answer: 1...
What document was the government set up under?
What document was the government set up under?Answer: Articles of Confederat...
When was "The American Crisis" published?
When was "The American Crisis" published?Answer: December 1...
What was the name of Thomas Paine's second pamphlet?
What was the name of Thomas Paine's second pamphlet?Answer: The American Cri...
Who did Washington immediately make general?
Who did Washington immediately make general?Answer: Lafaye...
When did Washington resign from Commander in Chief?
When did Washington resign from Commander in Chief?Answer: December 23, 1...
When was the Declaration of Independence signed?
When was the Declaration of Independence signed?Answer: July 4, 1...
When did they vote for Independence?
When did they vote for Independence?Answer: July 2, 1...
When was George Washington named Commander in Chief?
When was George Washington named Commander in Chief?Answer: May 10, 1...
What did "Common Sense" argue against?
What did "Common Sense" argue against?Answer: Monarch and King George ...
When was "Common Sense" published?
When was "Common Sense" published?Answer: January 15, 1...
Who wrote "Common Sense"?
Who wrote "Common Sense"?Answer: Thomas Pa...
Who gave the "Give Me Liberty or Give Me Death" speech to the House of Burgesses?
Who gave the "Give Me Liberty or Give Me Death" speech to the House of Burgesses?Answer: Patrick He...
What was the Olive Branch Petition?
What was the Olive Branch Petition?Answer: Negotiation to stop the rebell...
What did the Prohibitory Act do?
What did the Prohibitory Act do?Answer: Blockade American ports and allowed the British to save American sh...
How much of the British Army was killed during the Battle of Bunker Hill?
How much of the British Army was killed during the Battle of Bunker Hill?Answer: Over ...
Subscribe to:
Posts (Atom)