0% found this document useful (0 votes)
264 views5 pages

Docx

This document contains 10 multiple choice questions about networking concepts and protocols such as DHCP attacks, Cisco Discovery Protocol, port numbers for Telnet, commands for configuring IP addresses and default gateways, global configuration mode, password cracking attacks, and network time synchronization protocols. The questions cover a range of networking fundamentals and security topics.

Uploaded by

jikjik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
264 views5 pages

Docx

This document contains 10 multiple choice questions about networking concepts and protocols such as DHCP attacks, Cisco Discovery Protocol, port numbers for Telnet, commands for configuring IP addresses and default gateways, global configuration mode, password cracking attacks, and network time synchronization protocols. The questions cover a range of networking fundamentals and security topics.

Uploaded by

jikjik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Question 1

Answer saved
Marked out of 1.00

Flag question

Question text

What type of DHCP attack where in an attacker floods the DHCP server with DHCP
requests to use all the available IP addresses that the DHCP server can issue. After
these IP addresses are issued, the server cannot issue any more addresses, and this
situation produces a denial-of-service (DoS) attackas new clients cannot obtain network
access.

Select one:
a. DHCP starvation attack
b. DHCP spoofing attack
c. DHCP backdoor attack
d. DHCP phishing attack
Clear my choice

Question 2

Answer saved
Marked out of 1.00

Flag question

Question text

This is a proprietary protocol that all Cisco devices can be configured to use. This
checks other Cisco devices that are directly connected, which allows the devices to
auto-configure their connection.

Select one:
a. Cisco Configuration Protocol
b. Cisco Auto Configure
c. Cisco Discovery Protocol
d. Cisco Auto Connect Protocol
Clear my choice

Question 3
Answer saved
Marked out of 1.00

Flag question

Question text

Telnet protocol by default uses Port ______.

Select one:
a. 23
b. 8080
c. 80
d. 22
Clear my choice

Question 4
Answer saved
Marked out of 1.00

Remove flag

Question text

Which of the following is the command to configure the IP domain name of the network
(mycompany.com)

Select one:
a. Config mycompany -ipdomain
b. Ip domain-name mycompany.com
c. Ipconfig mycompany.com
d. Ip configure mycompany.com
Clear my choice
Question 5
Answer saved
Marked out of 1.00

Flag question

Question text

A protocol that provides an encrypted connection to a remote device.

Select one:
a. SSH
b. TCP/IP
c. FTP
d. HTTP
Clear my choice

Question 6
Answer saved
Marked out of 1.00

Remove flag

Question text

Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?

Select one:
a. Ipdefault gateway 172.10.90.1
b. Ipset gateway 172.10.90.1 -default
c. Ipconfig default-gateway 172.10.90.1
d. Ip default-gateway 172.10.90.1
Clear my choice

Question 7
Answer saved
Marked out of 1.00

Remove flag

Question text

What is the command to set the IP address (192.168.10.2) and subnet mask
(255.255.0.0) for specific Fast Ethernet interface?

Select one:
a. ipconfig 192.168.10.2 255.255.0.0
b. ipset 192.168.10.2 255.255.0.0
c. ip 192.168.10.2 255.255.0.0
d. ipset config 192.168.10.2 255.255.0.0
e. ip address 192.168.10.2 255.255.0.0
Clear my choice

Question 8
Answer saved
Marked out of 1.00

Remove flag

Question text

Global configuration mode is used to configure system globally, or to enter specific


configuration modes to configure specific elements such as protocols. What is the
command to enter global configuration mode?

Select one:
a. config global
b. configure terminal
c. config device
d. enter global
e. set global
Clear my choice
Question 9
Answer saved
Marked out of 1.00

Flag question

Question text

This attack tries to crack a password on another device. The first phase of this attack
starts with the attacker using a list of common passwords and a program designed to try
to establish a Telnet session using each word on the dictionary list.

Select one:
a. Telnet DoS attack
b. Telnet password attack
c. Brute force password attack
d. Crack password attack
Clear my choice

Question 10

Answer saved
Marked out of 1.00

Remove flag

Question text

This is a protocol that is used to synchronize the clocks of computer systems over
packet-switched, variable-latency data networks.

Select one:
a. Real Time Protocol
b. Internetwork Time Protocol
c. Network Time Protocol
d. Synchronize Time Protocol
Clear my choice

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy