Question 1. An activist can best be described as which of the following?
- An unskilled programmer that spreads malicious scripts
- Consider themselves seekers of knowledge
- Use DoS attacks on websites with which they disagree
- Deface websites by leaving messages for their friends to read
Question 2. Which type of firewall policy calls for a firewall to deny all traffic by default?
- Permissive policy
- Perimeter policy
- Restrictive policy
- Demilitarized policy
Question 3. What is a program that appears to do something useful but is actually malware?
- Virus
- Logic bomb
- Trojan
- Back door
Question 4. In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
- Basic
- Challenge/response
- Biometrics
- Signature
Question 5. Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
- Malicious port scanning
- Man-in-the-middle
- Denial of service
- Remote procedure call
Question 6. How large is the IPv6 address space?
- 32 bits
- 128 bits
- 64 bits
- 168 bits
Question 7. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?
- TTL
- Fragment Offset
- ECN
- Options
Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?
Question 9. Which of the following is not an advantage of IPv6 versus IPv4?
- Larger address space
- Built-in security
- Supports static configuration
- NAT is unnecessary
Question 10. Which of the following is a valid IPv6 address?
- 5BA4:2391:0:0:4C3E
- 1080::8:800:200C:417A
- 24::5B1A::346C
- 5510:ABCD::34:1::2
Question 11. Which TCP flag can be the default response to a probe on a closed port?
Question 12. Which of the following is the description of a land attack?
- The local host source address occurs in the packet.
- Source and destination IP address/port are the same.
- An illegal TCP flag is found in the segment header.
- The attacker uses an undefined protocol number.
Question 13. What is the typical packet sequence for closing a TCP session?
- FIN, FIN ACK, RST
- FIN, ACK, FIN ACK, ACK
- FIN ACK, FIN, ACK, RST
- FIN, FIN ACK
Question 14. Which of the following is an element of the TCP header that can indicate that a connection has been established?
- Flags
- Stream index
- SEQ/ACK analysis
- Sequence number
Question 15. Of what category of attack is a DoS attack an example?
- Bad header information
- Single-packet attack
- Multiple-packet attack
- Suspicious data payload
Question 16. What uses mathematical calculations to compare routes based on some measurement of distance?
- Route summarization
- Link-state routing protocols
- Routing metrics
- Distance-vector routing protocols
Question 17. Which protocol that runs on Cisco routers shares information between Cisco devices?
Question 18. Which of the following is true about ACLs on Cisco routers?
- There is an implicit deny any statement at the end of the ACL.
- There is an explicit permit any statement at the beginning of the ACL.
- ACLs are processed in reverse order so place high priority statements last.
- ACLs bound to an interface apply to inbound and outbound traffic by default.
Question 19.19.Which of the following types of traffic does NOT travel through routers?
- DNS zone transfers
- ARP requests
- SNMP status information
- Network route information
Question 20. Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?