answers
-Capture traffic during peak utilization times to get a good representation of the
different traffic types.
-Perform the capture on different network segments. Ans✓✓✓ Which two
statements describe how to assess traffic flow patterns and network traffic types
using a protocol analyzer?
-documentation of the current physical and logical topologies
-analysis of the network traffic based on protocols, applications, and services used
on the network
-inventory of the devices that are currently used on the network Ans✓✓✓ A
network administrator for a small company is contemplating how to scale the
network over the next three years to accommodate projected growth. Which
three types of information should be used to plan for network growth?
-Give the router a host name and domain name.
-Generate a set of secret keys to be used for encryption and decryption.
Ans✓✓✓ Which two steps are required before SSH can be enabled on a Cisco
router?
-Never send the password through the network in a clear text.
-Limit the number of unsuccessful attempts to log in to the server. Ans✓✓✓
Which two actions can be taken to prevent a successful network attack on an
email server account?
-voice
, -video Ans✓✓✓ Which two traffic types require delay sensitive delivery?
a user who is trying to guess a password to access the router Ans✓✓✓ A network
administrator is issuing the login block-for 180 attempts 2 within 30 command on
a router. Which threat is the network administrator trying to prevent?
at regular intervals over a period of time Ans✓✓✓ When should an administrator
establish a network baseline?
CDP can be disabled globally or on a specific interface. Ans✓✓✓ Which
statement is true about CDP on a Cisco device?
copy startup-config tftp Ans✓✓✓ Which command will backup the configuration
that is stored in NVRAM to a TFTP server?
devices with support for modularity Ans✓✓✓ A newly hired network technician
is given the task of ordering new hardware for a small business with a large
growth forecast. Which primary factor should the technician be concerned with
when choosing the new devices?
DoS attacks Ans✓✓✓ Which type of network threat is intended to prevent
authorized users from accessing resources?
environmental Ans✓✓✓ Some routers and switches in a wiring closet
malfunctioned after an air conditioning unit failed. What type of threat does this
situation describe?
file systems Ans✓✓✓ Fill in the blank. Do not use abbreviations.