SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA 2 Chapter 8 V4.0

Labels: CCNA 2 Chapter 8 V4.0
1
Which AAA service reduces IT operating costs by providing detailed reporting and
monitoring of network user behavior, and also by keeping a record of every access
connection and device configuration change across the network?

authentication

accreditation

*accounting

authorization


2
Which three items are normally included when a log message is generated by a syslog
client and forwarded to a syslog server? (Choose three.)

*date and time of message

*ID of sending device

length of message

*message ID

checksum field

community ID


3
What is the advantage of using WPA to secure a wireless network?

*It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless
access.

It uses an advanced encryption key that is never transmitted between host and access
point.

It is supported on older wireless hardware, thus providing maximum compatibility
with enterprise equipment.

It requires the MAC address of a network device that is requesting wireless access to
be on a list of approved MAC addresses.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/



4
A company wants to configure a firewall to monitor all channels of communication
and allow only traffic that is part of a known connection. Which firewall
configuration should be deployed?

*packet filtering

proxy

stateful packet inspection

stateless packet inspection


5
A server log includes this entry: User student accessed host server ABC using Telnet
yesterday for 10 minutes. What type of log entry is this?

authentication

authorization

*accounting

accessing


6
What two measures help to verify that server backups have been reliably completed?
(Choose two.)

*reviewing backup logs

*performing trial backups

performing full backups only

replacing tape backup with hard disk-based backup

using an autoloader when backups require more than one tape


7
Which means of communication does an SNMP network agent use to provide a
network management station with important but unsolicited information?
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

query

broadcast

ICMP ping

trap

*poll


8
Which three protocols are used for in-band management? (Choose three.)

FTP

HTTP

*SNMP

*Telnet

*TFTP

DHCP


9
A hacker has gained access to sensitive network files. In analyzing the attack, it is
found that the hacker gained access over a wireless segment of the network. It is
further discovered that the only security measure in place on the wireless network is
MAC Address Filtering. How is it likely that the hacker gained access to the network?

The hacker used a software tool to crack the shared hexadecimal wireless key.

*The hacker obtained the MAC address of a permitted host, and cloned it on his
wireless laptop NIC.

The attacker mounted a denial of service attack to overwhelm the firewall before
penetrating the wireless LAN.

The hacker gained wireless access to the MAC address database and added his own
MAC address to the list of permitted addresses.


10
A network administrator is assigning network permissions to new groups of users and
employing the principle of least privilege. Which two actions should the administrator
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

take? (Choose two.)

*Provide users with only the access to resources required to do their jobs.

Provide the minimum level of permissions required for users to do their jobs.

Remove all permissions from the users and grant permissions as they are requested.

*Allow users to decide how much permission they need to accomplish their job tasks.

Provide full access to the users and gradually remove privileges over time.


11
Which three protocols describe methods that can be used to secure user data for
transmission across the internet? (Choose three.)

SMTP

*IPSEC

*SSL

*HTTPS

FTP

TFTP


12
Which benefit does SSH offer over Telnet when remotely managing a router?

*encryption

TCP usage

authorization

connection using six VTY lines


13
Which of the following does SNMP use to hold information collected about the
network?

network management station
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

*network management database

management information base

database information agent


14
What are two potential problems with using tape media to back up server data?
(Choose two.)

*Tape is not a cost-effective means of backing up data.

Data tapes are difficult to store offsite.

Data tapes are prone to failure and must be replaced often.

*Tape drives require regular cleaning to maintain reliability.

Backup logs are not available with tape backup solutions.


15
What is the term for the public network between the boundary router and the firewall?

"clean" LAN

intranet

*DMZ

extranet

16
Which two characteristics of network traffic are being monitored if a network
technician configures the company firewall to operate as a packet filter? (Choose
two.)

applications

physical addresses

packet size

*ports

*protocols
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


17
When is the use of out-of-band network management necessary?

when a server needs to be monitored across the network

*when the management interface of a device is not reachable across the network

when enhanced monitoring features are required to gain an overall view of the entire
network

when it is desirable to use the information that is provided by SNMP


18
What network layer security protocol can secure any application layer protocol used
for communication?

HTTPS

IMAP

FTPS

*IPSEC

TLS


19
Before a technician upgrades a server, it is necessary to back up all data. Which type
of backup is necessary to ensure that all data is backed up?

daily

differential

*full

incremental

partial


20
What AAA component assigns varying levels of rights to users of network resources?

auditing
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


accounting

authorization

access control

*authentication

acknowledgement

Más contenido relacionado

La actualidad más candente

Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015AFCEA International
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slideAlya Al Saadi
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityAyoma Wijethunga
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 

La actualidad más candente (20)

Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
WPA2
WPA2WPA2
WPA2
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Firewalls
FirewallsFirewalls
Firewalls
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slide
 
WPA 3
WPA 3WPA 3
WPA 3
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wpa3
Wpa3Wpa3
Wpa3
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 

Similar a Ccna 2 Chapter 8 V4.0 Answers

Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersĐồng Quốc Vương
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answersccna4discovery
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion ciscoyexia
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion ciscoyexia
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCCNA4Answers
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersĐồng Quốc Vương
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Hamza Malik
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 

Similar a Ccna 2 Chapter 8 V4.0 Answers (20)

Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 Answers
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 

Más de ccna4discovery

Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answersccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answersccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answersccna4discovery
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answersccna4discovery
 

Más de ccna4discovery (9)

Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answers
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Ccna 2 Chapter 8 V4.0 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA 2 Chapter 8 V4.0 Labels: CCNA 2 Chapter 8 V4.0 1 Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network? authentication accreditation *accounting authorization 2 Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.) *date and time of message *ID of sending device length of message *message ID checksum field community ID 3 What is the advantage of using WPA to secure a wireless network? *It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access. It uses an advanced encryption key that is never transmitted between host and access point. It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment. It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 4 A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed? *packet filtering proxy stateful packet inspection stateless packet inspection 5 A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this? authentication authorization *accounting accessing 6 What two measures help to verify that server backups have been reliably completed? (Choose two.) *reviewing backup logs *performing trial backups performing full backups only replacing tape backup with hard disk-based backup using an autoloader when backups require more than one tape 7 Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ query broadcast ICMP ping trap *poll 8 Which three protocols are used for in-band management? (Choose three.) FTP HTTP *SNMP *Telnet *TFTP DHCP 9 A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network? The hacker used a software tool to crack the shared hexadecimal wireless key. *The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC. The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN. The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses. 10 A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ take? (Choose two.) *Provide users with only the access to resources required to do their jobs. Provide the minimum level of permissions required for users to do their jobs. Remove all permissions from the users and grant permissions as they are requested. *Allow users to decide how much permission they need to accomplish their job tasks. Provide full access to the users and gradually remove privileges over time. 11 Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.) SMTP *IPSEC *SSL *HTTPS FTP TFTP 12 Which benefit does SSH offer over Telnet when remotely managing a router? *encryption TCP usage authorization connection using six VTY lines 13 Which of the following does SNMP use to hold information collected about the network? network management station
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ *network management database management information base database information agent 14 What are two potential problems with using tape media to back up server data? (Choose two.) *Tape is not a cost-effective means of backing up data. Data tapes are difficult to store offsite. Data tapes are prone to failure and must be replaced often. *Tape drives require regular cleaning to maintain reliability. Backup logs are not available with tape backup solutions. 15 What is the term for the public network between the boundary router and the firewall? "clean" LAN intranet *DMZ extranet 16 Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.) applications physical addresses packet size *ports *protocols
  • 6. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 17 When is the use of out-of-band network management necessary? when a server needs to be monitored across the network *when the management interface of a device is not reachable across the network when enhanced monitoring features are required to gain an overall view of the entire network when it is desirable to use the information that is provided by SNMP 18 What network layer security protocol can secure any application layer protocol used for communication? HTTPS IMAP FTPS *IPSEC TLS 19 Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up? daily differential *full incremental partial 20 What AAA component assigns varying levels of rights to users of network resources? auditing
  • 7. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ accounting authorization access control *authentication acknowledgement