hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Other
Computer Skills
Chapter 16- Module Quiz
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (15)
Which component is designed to protect against unauthorized communications to and from a computer?
firewall
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
What is the purpose of the network security accounting function?
to keep track of the actions of a user
What type of attack may involve the use of tools such as nslookup and fping?
reconnaissance attack
Which benefit does SSH offer over Telnet for remotely managing a router?
encryption
What is one of the most effective security tools available for protecting users from external threats?
firewalls
Which type of network threat is intended to prevent authorized users from accessing resources?
DOS attacks
Which three services are provided by the AAA framework? (Choose three.
authentication; authorization; accounting
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
worm
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
environmental
What does the term vulnerability mean?
a weakness that makes a target susceptible to an attack
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
an ip domain name; a unique hostname; a user account
What is the objective of a network reconnaissance attack?
discovery and mapping of systems
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
firewall settings
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
remote access to a switch where data is encrypted during the session
Sets found in the same folder
Chapter 16- Check your understanding
19 terms
Chapter 17 Check your understanding
14 terms
Chapter 17 Module Quiz
15 terms
Chapter 16+17 Module Exam
62 terms
Other sets by this creator
2.4.9
13 terms
2.3.7
14 terms
2.2.12
10 terms
2.1.6
7 terms
Other Quizlet sets
TD23
12 terms
Techniki w biologii molekularnej
13 terms
Plastic & reconstructive surgery
24 terms
Relief
20 terms