Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.

Which technology is used to allow a pool of users to share one global IP address for Internet access?

A.

Port Address Translation

B.

Private Address Translation

C.

Per-user Address Translation

D.

Pool Address Translation

The simplest form of a firewall is a packet filtering firewall. A packet filtering firewall filters packets at the Network layer and Transport layer.

What are the types of information that are filtered at the Network layer of the OSI reference model?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

TCP and UDP port numbers

B.

IP addresses

C.

TCP/IP protocols

D.

TCP control flags

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

A.

SysPCap

B.

libpcap

C.

WinPCap

D.

PCAP

You are tasked with configuring your routers with a minimum security standard that includes the following:

• A local Username and Password configured on the router

• A strong privilege mode password

• Encryption of user passwords

• Configuring telnet and ssh to authenticate against the router user database

Choose the configuration that meets these requirements best.

A.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable password n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

B.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login

C.

RouterA(config)#service enable-password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login user

D.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

Which of the following attacks generates falsified information within an IP header?

A.

Web spoofing attack

B.

DNS spoofing attack

C.

IP spoofing attack

D.

ARP spoofing attack

You want to create a binary log file using tcpdump.

Which of the following commands will you use?

A.

tcpdump -d

B.

tcpdump -B

C.

tcpdump -dd

D.

tcpdump -w

Which of the following tools is used to detect spam email without checking the content?

A.

DCC

B.

Sniffer

C.

EtherApe

D.

Kismet

Which of the following is a Cisco IOS management term described in the statement below?

"It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM".

A.

Boot value

B.

Boot field

C.

Boot

D.

Boot check

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. (Choose three.)

A.

Datagram Identification Number field

B.

Flags field

C.

Fragment Offset field

D.

Datagram Length field

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

A.

Multicast

B.

Anycast

C.

Unicast

D.

Loopback