CCIE Routing and Switching FAQ: Spanning Tree Protocol Q1. Assume that a nonroot 802.1D switch has ceased to receive Hello BPDUs. Which STP setting determines how long a nonroot switch waits before trying to choose a new Root Port? A. Hello timer setting on the Root B. MaxAge timer setting on the Root C. ForwardDelay timer setting on the Root D. Hello timer setting on the … [Read more...]
Network Security FAQ: Wireless Security
Network Security FAQ: Wireless Security Q1. List three categories of WLANs. Answer: Types of WLANs include peer-to-peer, LAN, and hotspots. Q2. Which IEEE standards define WLANs? a. IEEE 802.3 b. IEEE 802.5 c. IEEE 802.11 d. IEEE 802.10 Answer: c. IEEE 802.11 is the IEEE standard that defines WLANs. Q3. The IEEE 802.11 standard specifies the over-the-air interface … [Read more...]
Network Security FAQ: Remote Access
Network Security FAQ: Remote Access Q1. What does AAA stand for, and what is its function? Answer: AAA stands for authentication, authorization, and accounting and provides security to Cisco IOS routers and network devices. Q2. What is authentication used for? Answer: By requiring the user's username and password, authentication enables administrators to identify who can … [Read more...]
Network Security FAQ: Intrusion Detection System Concepts
Network Security FAQ: Intrusion Detection System Concepts Q1. List two weaknesses of the signature-based IDS. Answer: Weaknesses of the signature-based IDS include the following: High false positive rate Evasion susceptibility Single vulnerability may require multiple signatures Continuous updates required Cannot detect unknown attacks Q2. Why does … [Read more...]
Network Security FAQ: Firewalls
Network Security FAQ: Firewalls Q1. List three types of firewalls. Answer: Three firewall types include hardware, software, and personal. Q2. A TCP SYN flood attack is a form of DoS attack, which randomly opens up a number of TCP ports. True or False? Answer: True. Q3. List the three types of inspection methodologies. Answer: Three types of inspection methodologies are … [Read more...]
Network Security FAQ: Router Security
Network Security FAQ: Router Security Q1. Give two commands to configure an enable password on a router. Answer: Two commands to configure an enable password on a router are enable password and enable secret. Q2. Name three services that are running on a router that should be turned off if they are not used. Answer: Services that are running on a router that should be … [Read more...]
CCNA Security FAQ: Security at the Network Perimeter
CCNA Security FAQ: Security at the Network Perimeter Q1. Match the following deployment scenarios for a Cisco IOS router with the correct description: Single Perimeter: ___ Two Perimeters: ___ Screen Subnet: ___ Descriptions: A. The router establishes the trusted network boundary at the Internet and protects a single LAN. B. A DMZ is established on a … [Read more...]
Network Security FAQ: Web Security
Network Security FAQ: Web Security Q1. What is the difference between a right and a permission? Answer: A right applies to actions that involve accessing the resources of the operating system itself, such as shutting down the system. A permission applies to accessing the file system's resources, such as reading and writing files. Q2. What can be done on a web server to make … [Read more...]
Network Security FAQ: Secure Design
Network Security FAQ: Secure Design Q1. ROI is calculated by dividing the ___ by the total ___. Answer: ROI is calculated by dividing the profit (return) by the total investment cost. Q2. What are the four general categories of constraints encountered by a network designer? Answer: Technological, political, social, and economical constraints affect network design. Q3. What … [Read more...]
Network Security FAQ: Security Policies
Network Security FAQ: Security Policies Q1. What is the difference between a closed network and an open network? Answer: A closed network is typically designed and implemented in a corporate environment. A closed network provides connectivity only to known parties and sites without connection to public networks. In contrast, an open network is designed with availability to … [Read more...]