Preview

Ccna Discovery Chapter 9

Satisfactory Essays
Open Document
Open Document
897 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna Discovery Chapter 9
CCNA Discovery 2: DsmbISP Chapter 8 answers

Working at a Small-to-Medium Business or ISP

DsmbISP Chapter 8 Exam Answers

1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
• authentication
• accreditation
* accounting
• authorization

2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)
* date and time of message
* ID of sending device
• length of message
* message ID
• checksum field
• community ID

3. What is the advantage of using WPA to secure a wireless network?
* It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
• It uses an advanced encryption key that is never transmitted between host and access point.
• It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.
• It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.

4. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
• packet filtering
• proxy
* stateful packet inspection
• stateless packet inspection

5. A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
• authentication
• authorization
* accounting
• accessing

6. What two measures help to verify that server backups have been reliably completed? (Choose two.)
* reviewing backup logs
* performing trial restore
• performing full backups only
• replacing tape backup with hard disk-based backup
• using an autoloader when backups

You May Also Find These Documents Helpful

  • Good Essays

    The IEEE 802.11n draft standard is intended to improve WLAN data rates and range without requiring additional power or RF band allocation.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    3. the client connection accept to the server and replay to read the system date and time.…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    | |containing success or failure |mechanisms of the 802.11 standard also |management frames are still |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Describe the three modes of communication available on a network. (Minimum word count: 60)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    4. The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1, is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Firewall configuration: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    A wireless access point (WAP) is a device that usually connects to a router and acts like a switch. WAPs utilise wifi to connect to devices to allow communication between them. WAPs are used to extend the wireless reach of a network or to allow wireless access to that network. Unlike a router or switch, the WAP does not filter data and has no inbuilt firewall, so does not add to the security of the…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The reason why testing the integrity of data that is backed up because the is no point in backing up your data and not knowing if the backup works. Because as time goes on any sort of backup material will start to break down and you don’t want to need the backup when it has not been tested and end up with it been broke.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. Placing a firewall between two routers and another firewall before a DMZ would be the best requirement choice to use…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control?…

    • 718 Words
    • 3 Pages
    Good Essays