399
72. B. The command
show ip interface will display the IP addresses configured on the
router’s interfaces. It will detail which are static and which have been allocated through
DHCP. The command
show ip dhcp bindings is incorrect because it will show the
internal table for the local DHCP server. The command
show ip lease is incorrect. The
command
show ip dhcp lease is incorrect.
73. A. QoS marking should always be performed closest to the source of the traffic. All
switches and routers in the network should be configured to properly prioritize markings
of traffic in queues. If it is performed closest to the Internet router, you may not get any
effectiveness from the configuration because Internet routers may not process QoS. Not
every device in the network needs QoS marking, such as infrastructure services like DHCP
and DNS. QoS marking should also not be performed on the core router in the network;
a good rule of thumb is don’t implement anything on the core router that could slow it
down. The act of QoS marking could slow the core router down; already marked packets
are fine.
74. A. A malicious user can mark all of their traffic as high priority. Therefore, a trust
boundary must be established by the network administrator. A common trust boundary
device is the IP phone, but it is any device that the network administrator controls. If the
switch is set as a trust boundary, a malicious user could plug in and start marking their
packets with a higher than normal QoS. Routers are not the only devices that create trust
boundaries, and IP phones are not the only devices that can become trust boundaries.
75. B. The command
ip scp server enable needs to be configured to enable the SSH Copy
Protocol (SCP). This command is entered in the global configuration. The command
ip
ssh server enable is incorrect. The command service scp enable is incorrect. The
command
service scp-server is incorrect.
76. B. VLAN hopping is an attack in which DTP is exploited. The attacker negotiates a trunk
with the switch via DTP and can hop from VLAN to VLAN. Native VLAN will carry
any frame that is not tagged; the native VLAN should be configured to something other
than VLAN 1. VLAN traversal and trunk popping are not terms used with VLANs, and
therefore, they are invalid answers.
77. B. Point-to-Point Protocol (PPP) is a layer 2 wide area network (WAN) protocol.
PPP supports Challenge Handshake Authentication Protocol (CHAP), which secures
connections. High-Level Data Link Control (HDLC) is a serial control protocol used on
WAN links and it provides no security. The IPsec protocol is a layer 3 security protocol
used to encrypt traffic and not a layer 2 protocol. Although Metro Ethernet is built site to
site by the service provider, there is no guarantee of security in the form of authentication.
78. B. Antivirus software is an application that is installed on a system and is used to protect
it and to scan workstations for viruses as well as worms and Trojan horses. Malware is
malicious software that once installed on a system causes malicious activity. Software
firewalls will not detect Trojan horses and worms. Spyware is software that monitors user
activity and offers unsolicited pop-up advertisements.
Do'stlaringiz bilan baham: |