What are five examples of configuration weaknesses?
(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet services (4) Unsecured default settings within products (5) Misconfigured network equipment
(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet services (4) Unsecured default settings within products (5) Misconfigured network equipment
(1) TCP/IP Protocol Weaknesses (2) Operating System Weaknesses (3) Network equipment weaknesses
(1) Vulnerability (2) Threats (3) Attack
(1) Technological weaknesses (2) configuration Weaknesses (3) Security Policy Weaknesses
(1) Informs users, staff, and managers of their requirements for protecting information assets (2) Specifies the mechanisms through which these requirements can be met (3) Provides a baseline from which to acquire, configure and audit computer systems for compliance
Answer: completely closed a network from the outside world
(1) Keep networks open to support business requirements (2) Protect private, personal, and business information
(1) Insider abuse of network access (2) Virus (3) Mobile device theft (4) Phishing where an organization is fraudulently represented as the sender (5) Denial of service (6) Unauthorized access to information (7) Bots within the organization (8) Theft of customer or employee data
(1) Perform footprint analysis (2) Enumerate Information (3) Manipulate Users to gain access (4) Escalate Privileges (5) Gather additional passwords and secrets (6) Install backdoors (7) Leverage the compromised systems
Answer: Phisher
Answer: Spammer
Answer: Phreaker
Answer: Cracker
Answer: Hacker
Answer: Black Hat
Answer: White Hat
Answer: (1) Loss of Privacy (2) Theft of information (3) Legal Liability
Answer: (1) Router on the other side of Frame Relay doesn't support dynamic inverse ARP (2) Hub-and-Spoke network topologies
Answer: Static Address Mapping
Answer: Dynamic Address Mapping
Answer: Because NBMA does not support broadcast traffic, using the broadcast keyword allows broadcasts and multicasts over the PVC so that other nodes get routing updates
Answer: In Hub-in-Spoke Frame Relay topologies, split horizon can cause reachability issues because split horizon prevent routing loops by preventing a routing update received on one interface to be forwarded out the same interface
Answer: Gateway
Answer: BC (committed burst)
Answer: CBIR (Committed Burst Information Rate)
Answer: BE (Excess Burst)
Answer: CIR
Answer: DE (Discard Eligible)
Answer: BECN (Backward Explicit Congestion Notification)
Answer: FECN (Forward Explicit Congestion Notification)
Answer: Does not have DLCI programmed, but it was operational in the past
Answer: Frame Relay Switch has DLCI programmed and everything is operational
Answer: Frame Relay Switch has DLCI programmed, but t is not usable
Answer: DTE is configured for a DLCI switch but the DLCI switch does not recognize it as valid
Answer: Everything is working properly
Answer: DTE device is not detected
Answer: (1) Active (2) Inactive (3) Deleted
Answer: LMI Exchange Messages
Answer: includes information about every DLCI on the frame relay switch
Answer: LMI status msg sent by FR Switch
Answer: LMI status msg sent by router
Answer: clear frame-relay inarp
Answer: clear counters
Answer: (1)FECN (2) BECN
(1) show interface serial 0/0/0 (2) show frame-relay lmi (3) show frame-relay pvc (number) (3) show frame-relay map (4) debug-frame relay lmi
(1) Remove any Network layer address assigned to the physical interface. If the physical interface has an address, frames are not received by the local subinterfaces. (2) Configure Frame Relay encapsulation on the physical interface using the encapsulation frame-relay command. (3) For each of the defined PVCs, create a logical subinterface. To make troubleshooting easier, it is suggested that the subinterface number matches the DLCI number. (4) Configure an IP address for the interface and set the bandwidth. (5) Configure the local DLCI on the subinterface using the frame-relay interface-dlci command
Answer: They are Discard Eligible
Answer: Committed Information Rate (CIR)
Answer: access rate (port speed)
Answer: (1) Sub interfaces act as leased lines (2) Each point-to-point sub interface requires its own subnet
Answer: protocol address
Answer: Since Frame Relay doesn't forward broadcasts by default, this function sends broadcasts made by routing protocols
Answer: protocol
(1) Configure the LMI (2) Configure Frame Relay SVCs (3) Configure Frame Relay Traffic Shaping (4) Customize frame relay for your network (5) Monitor and Maintain Frame Relay Connections
(1) Enable Frame Relay encapsulation on an interface (2) Configure dynamic or static address mapping
(1) DTE sends Status Enquiry Message to DCE (2) DCE responds with Status Message- includes configured DLCIs (3) DTE learns what VCs it has
Answer: Simple Flow Control
Answer: Global Addressing
Answer: Multicasting
Answer: VC status messages
Answer: the keepalive feature
Answer: auto-detection is turned off
Answer: frame-relay lmi-type cisco
Answer: q933a
Answer: ANSI
Answer: CISCO
Answer: (1) CISCO (2) ANSI (3) q933a
Answer: (inter config) keepalive (seconds)
Answer: show frame-relay lmi
Answer: Every Ten Seconds
Answer: Local Management Interface (LMI)
Answer: ietf
Answer: All land east of the Mississippi
Answer: Southern Colonies
Answer: Mid-Atlantic Colonies
Answer: 1775-1776
Answer: Women's Rights
Answer: 1779
Answer: The reply to the king; August 1775
Answer: December 15, 1788- January 10, 1789
Answer: 1788
Answer: 1787
Answer: 9 out of 13
Answer: 1781
Answer: 1777
Answer: Articles of Confederation
Answer: December 1776
Answer: The American Crisis
Answer: Lafayette
Answer: December 23, 1783
Answer: July 4, 1776
Answer: July 2, 1776
Answer: May 10, 1775
Answer: Monarch and King George III
Answer: January 15, 1776
Answer: Thomas Paine
Answer: Patrick Henry
Answer: Negotiation to stop the rebellion
Answer: Blockade American ports and allowed the British to save American ships
Answer: Over 40%