A+ answers of the following questions

Category: Business & Finance

1. (TCO 6) _____ encryption algorithms use the same key to encrypt and decrypt data between the sender and recipient. (Points : 4)
Symmetric
Asymmetric
Balanced
Single token

2. (TCO 6) The _____ encryption algorithm uses a key size of 128, 192, and 256 bits. (Points : 4)
DES
3DES
AES
WEP

3. (TCO 6) Which of the following algorithms is used to securely exchange IKE policy information? (Points : 4)
Diffie-Hellman
RSA signatures
Preshared keys
MD5

1. (TCO 2) Which of the following prompts indicates that you have booted (normally) into the IOS stored in Flash memory?(Points : 4)
 Router> > or ROMMON> (Boot)> ROM> 

 2. (TCO 2) Which of the following commands will encrypt line (con,vty,aux) passwords on a router? (Points : 4)
(config)# line password encryption (config)# service encryption password (config)# password service-encryption (config)# service password-encryption

 3. (TCO 2) Which does a router do with the packets whose destination addresses are unknown when no default gateway or network exists? (Points : 4)
The router will broadcast the packet. The router will send the packet back to the source. The router will discard the packet. The router will query the DNS root server for the destination address.

mode is _____. (Points : 4)
parser view
view enable 
enable view 
config view super view

2. (TCO 2) Which of the following commands is required before you can begin configuring SSH configuration on a Cisco router? (Points : 4)
crypto key generate rsa 
ip domain-name 
crypto key zeroize 
transport input ssh

3.  (TCO 2) The show running-config output can be modified using all of the following pipes, except _____. (Points : 4)
| begin 
end 
include 
exclud

1. (TCO 1) The agents used in a distributed denial of service attack are called _____. (Points : 4)
Zombies
Vampires
Werewolves
Smurfs

2. (TCO 1) When an attacker monitors traffic between a sender and receiver, this is called a(n) _____ attack. (Points : 4)
Active
Monitoring
packet capture
intrusion
man-in-the-middle

3. (TCO 1) How would you describe IP spoofing? (Points : 4)
Altering the source IP address in packets 
Sending large amounts of ICMP packets to a broadcast address
Altering IP routing tables
Packet sniffing

 

1. (TCO 1) The _____ attack method uses the target IP address as both a source and destination to confuse the destination host or router. (Points : 4)
Ping of Death
SYN flood
Smurf
land.c

2. (TCO 1) The component of network security that ensures that authorized users have access to data and network resources is _____. (Points : 4)
data integrity
data confidentiality
data and system availability
data and user authentication

3. (TCO 1) An external menace to a system or its design is called a(n) _____. (Points : 4)
Vulnerability
Threat
Risk
exploit

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Pay Someone To Write Essay