What are five examples of configuration weaknesses?

What are five examples of configuration weaknesses?



(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet services (4) Unsecured default settings within products (5) Misconfigured network equipment


What three goals must a security policy meet?

What three goals must a security policy meet?


(1) Informs users, staff, and managers of their requirements for protecting information assets (2) Specifies the mechanisms through which these requirements can be met (3) Provides a baseline from which to acquire, configure and audit computer systems for compliance


Examples of commonly reported acts of computer crime.

Examples of commonly reported acts of computer crime.



(1) Insider abuse of network access (2) Virus (3) Mobile device theft (4) Phishing where an organization is fraudulently represented as the sender (5) Denial of service (6) Unauthorized access to information (7) Bots within the organization (8) Theft of customer or employee data

Explain the problem with frame relay and routing loops

Explain the problem with frame relay and routing loops



Answer: In Hub-in-Spoke Frame Relay topologies, split horizon can cause reachability issues because split horizon prevent routing loops by preventing a routing update received on one interface to be forwarded out the same interface


Negotiated tariff metric in Frame Relay internetworks. The number of bits that a Frame Relay internetwork will attempt to transmit after BC is accommodated. This data is, in general, delivered with a lower probability than BC data because this data can be marked as DE by the network

Negotiated tariff metric in Frame Relay internetworks. The number of bits that a Frame Relay internetwork will attempt to transmit after BC is accommodated. This data is, in general, delivered with a lower probability than BC data because this data can be marked as DE by the network



Answer: BE (Excess Burst)

Bit set by a Frame Relay network in frames traveling in the opposite direction of frames encountering a congested path. DTE receiving frames with this bit set can request that higher-level protocols take flow control action as appropriate

Bit set by a Frame Relay network in frames traveling in the opposite direction of frames encountering a congested path. DTE receiving frames with this bit set can request that higher-level protocols take flow control action as appropriate


Answer: BECN (Backward Explicit Congestion Notification)


Bit set by a Frame Relay network to inform DTE receiving the frame that congestion was experienced in the path from the source to destination. DTE receiving frames with this bit set can request that higher-level protocols take flow-control action as appropriate

Bit set by a Frame Relay network to inform DTE receiving the frame that congestion was experienced in the path from the source to destination. DTE receiving frames with this bit set can request that higher-level protocols take flow-control action as appropriate



Answer: FECN (Forward Explicit Congestion Notification)


What are the five steps for configuring Frame Relay Subinterfaces?

What are the five steps for configuring Frame Relay Subinterfaces?



(1) Remove any Network layer address assigned to the physical interface. If the physical interface has an address, frames are not received by the local subinterfaces. (2) Configure Frame Relay encapsulation on the physical interface using the encapsulation frame-relay command. (3) For each of the defined PVCs, create a logical subinterface. To make troubleshooting easier, it is suggested that the subinterface number matches the DLCI number. (4) Configure an IP address for the interface and set the bandwidth. (5) Configure the local DLCI on the subinterface using the frame-relay interface-dlci command