QUIZ-1-LACSA PDF
Document Details
Tags
Summary
This document is a quiz/exam on networking concepts, specifically focusing on OSPF and security protocols. It contains multiple-choice questions covering topics like malware types, OSPF states, and network security devices.
Full Transcript
1. True or False? Cost = interface bandwidth/reference bandwidth a. True b. False 2. Which malware is used to gather information about a user and then, the user’s consent, sends the information to another entity? a. Adware b. Rootkit c. Ransomware d. Spy...
1. True or False? Cost = interface bandwidth/reference bandwidth a. True b. False 2. Which malware is used to gather information about a user and then, the user’s consent, sends the information to another entity? a. Adware b. Rootkit c. Ransomware d. Spyware 3. During this OSPF state, routers send each other DBD packets a. Exstart state b. Two-way state c. Link-state d. Exchange state 4. True or False? You can also configure OSPF directly on the interface with the ip ospf command a. True b. False 5. During this OSPF state, routers have converged link-state databases a. Exchange State b. ExStart State c. Loading State d. FULL State 6. During this OSPF state, routers are processed using the SPF algorithm a. Exchange State b. FULL State c. Loading State d. eExStart State 7. Which network security device is used to provide secure services with corporate sites and remote access support for remote users using secure encrypted tunnels? a. WSA b. IPS c. ASA Firewall d. VPN 8. True or false? The wildcard mask for /25 is 0.0.0.128 a. True b. False 9. Which penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They are also used by white hats when analyzing malware. a. Rootkit Detectors b. Forensic Tools c. Packet Crafting Tools d. Debuggers 10. Which of the following OSPF components is associated with the topology table? a. Adjacency Database b. Forwarding database c. Link-State Database d. Routes Database 11. Which security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data a. Threat b. Exploit c. Vulnerability d. Asset 12. Which of the following OSPF components is associated with the neighbor table? a. Forwarding Database b. Link-State Database c. Adjacency Database d. Dijstra Algorithm 13. Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat? a. Vulnerability b. Mitigation c. Threat d. Risk 14. During the OSPF state on point-to-point networks, the routers decide which router initiates the exchange of DBD packets a. Loading State b. ExStart State c. Init State d. Exchange state 15. What is used to create the OSPF neighbor table? a. Link-State Database b. Adjacency Database c. Topology database d. Routing database 16. Which of the following OSPF packets is responsible for establishing and maintaining adjacency with other OSPF routers? a. Type 2 b. Type 4 c. Type 1 d. Type 3 17. Which of the following OSPF components is responsible for computing the cost of each route? a. Dijkstra's algorithm b. Vector c. Routing protocol messages d. Distance 18. Which of the following OSPF packets contains an abbreviated list of the LSDB of the sending router? a. Type 4 b. Type 2 c. Type 3 d. Type 1 19. During this OSPF state on multiaccess networks, the routers elect a Designated Router (DR) and a Backup Designated Roter (BDR) a. Exchange State b. Link-Statae c. Exstart State d. Two-Way State 20. True or False? The DR is responsible for collecting and distributing LSAs sent and received. The DR uses the multicast IPV4 address 224.0.0.5 which is meant for all OSPF routers. a. True b. False 21. The OSPF hello timer has been set to 40 seconds on a router in a point-to-point network. By default, what is the dead interval on this router? a. 60 seconds b. 120 seconds c. 80 seconds d. 160 seconds 22. What type of attack is address spoofing? a. Social engineering b. DOS c. Access d. Reconnaisance 23. The OSPF hello timer has been set to 15 seconds on a router in a point-to-point network. By default, what is the dead interval on this router? a. 40 seconds b. 30 seconds c. 60 seconds d. 120 seconds 24. Which of the following OSPF components is associated with the routing table? a. Adjacency Database b. Link-state database c. Routing protocol messages d. Forwarding database 25. Which network security device monitors incoming and outgoing traffic looking for malware network attack signatures, and if it recognizes a threat, it can immediately stop it? a. ASA Firewall b. AAA Server c. IPS d. VPN 26. During this OSPF state, no Hello packets are received. a. DOWN State b. FULL state c. LOADING State d. INIT State 27. Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. a. Rootkit b. Spyware c. Worm d. Virus 28. Which penetration testing tool is used by white hat hackers to sniff out any trace of evidence existing in a computer? a. Packet sniffers b. Forensic Tools c. Encryption Tools d. Debuggers 29. Which of the following OSPF packets is used by routers to request more information? a. Type 1 b. Type 4 c. Type 3 d. Type 2 30. True or False? The auto-cost reference-bandwidth command must be configured consistently on all routers in the OSPF domain to ensure accurate route calculations. a. True b. False 31. Which penetration testing tool identifies whether a remote host is susceptible to a security attack? a. Encryption tools b. Vulnerability Exploitation Tools c. Packet Sniffers d. Debuggers 32. Which network security device ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts? a. ASA Firewall b. IPS c. AAA Server d. VPN 33. What type of attack is man-in-the-middle? a. DOS b. Reconaisance c. Access d. Social Engineering 34. True or False? Use the passive-interface router configuration mode command to prevent the transmission of routing messages through a router interface, but still allow that network to be advertised to other routers a. True b. False 35. An OSPF router enters this state when it has received a Hello packet from a neighbor, containing the sending Router ID. a. ExStart State b. Two-way State c. Init State d. Exchange State 36. Which of the following OSPF packets is used by routers to announce new information? a. Type 1 b. Type 3 c. Type 4 d. Type 2 37. What is identical on all OSPF routers within a single area? a. LINK-STATE Database b. Static Routes c. Adjacency Database d. Topology Database 38. At which OSPF state are neighbor routers converged and able to exchange routing updates? a. LOADING b. EXCHANGE c. EXSTART d. FULL 39. True or False? The following is the order of precedence for choosing the router ID? 1. Router ID that is explicitly configured 2. Highest IPv4 Loopback Address 3. Highest configured IPv4 address a. True b. False 40. True or False? The default static route cannot propagate in an OSPF network unless the default information originate command is involved a. True b. False 41. True or False? Multiaccess OSPF networks are unique in that one router controls the distribution of LSAS a. True b. False 42. True or False? The router id is used to determine the DR a. True b. False 43. True or False? In the router ospf process-id command, the process ID value, which can any number between 1 and 65,535, is locally significant. It must be the same on all routers in the OSPF area. a. True b. False 44. Which network security device contains a secure database of who is authorized to access and manage network devices? a. IPS b. AAA Server c. VPN d. Firewall