Ccna certification Practice Tests



Download 8,04 Mb.
Pdf ko'rish
bet537/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   533   534   535   536   537   538   539   540   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

399

 72.  B.  The command 

show ip interface will display the IP addresses configured on the 

router’s interfaces. It will detail which are static and which have been allocated through 

DHCP. The command 

show ip dhcp bindings is incorrect because it will show the 

internal table for the local DHCP server. The command 

show ip lease is incorrect. The 

command 


show ip dhcp lease is incorrect.

 73.  A.  QoS marking should always be performed closest to the source of the traffic. All 

switches and routers in the network should be configured to properly prioritize markings 

of traffic in queues. If it is performed closest to the Internet router, you may not get any 

effectiveness from the configuration because Internet routers may not process QoS. Not 

every device in the network needs QoS marking, such as infrastructure services like DHCP 

and DNS. QoS marking should also not be performed on the core router in the network; 

a good rule of thumb is don’t implement anything on the core router that could slow it 

down. The act of QoS marking could slow the core router down; already marked packets 

are fine.

 74.  A.  A malicious user can mark all of their traffic as high priority. Therefore, a trust 

boundary must be established by the network administrator. A common trust boundary 

device is the IP phone, but it is any device that the network administrator controls. If the 

switch is set as a trust boundary, a malicious user could plug in and start marking their 

packets with a higher than normal QoS. Routers are not the only devices that create trust 

boundaries, and IP phones are not the only devices that can become trust boundaries.



 75.  B.  The command 

ip scp server enable needs to be configured to enable the SSH Copy 

Protocol (SCP). This command is entered in the global configuration. The command 

ip 


ssh server enable is incorrect. The command service scp enable is incorrect. The 

command 


service scp-server is incorrect.

 76.  B.  VLAN hopping is an attack in which DTP is exploited. The attacker negotiates a trunk 

with the switch via DTP and can hop from VLAN to VLAN. Native VLAN will carry 

any frame that is not tagged; the native VLAN should be configured to something other 

than VLAN 1. VLAN traversal and trunk popping are not terms used with VLANs, and 

therefore, they are invalid answers.

 77.  B.  Point-to-Point Protocol (PPP) is a layer 2 wide area network (WAN) protocol. 

PPP supports Challenge Handshake Authentication Protocol (CHAP), which secures 

connections. High-Level Data Link Control (HDLC) is a serial control protocol used on 

WAN links and it provides no security. The IPsec protocol is a layer 3 security protocol 

used to encrypt traffic and not a layer 2 protocol. Although Metro Ethernet is built site to 

site by the service provider, there is no guarantee of security in the form of authentication.



 78.  B.  Antivirus software is an application that is installed on a system and is used to protect 

it and to scan workstations for viruses as well as worms and Trojan horses. Malware is 

malicious software that once installed on a system causes malicious activity. Software 

firewalls will not detect Trojan horses and worms. Spyware is software that monitors user 

activity and offers unsolicited pop-up advertisements.




Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   533   534   535   536   537   538   539   540   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish