100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CCNA Chapter 1 Latest 2024/2025 Updated Questions and Answers Guaranteed 100% Success. $7.99
Add to cart

Exam (elaborations)

CCNA Chapter 1 Latest 2024/2025 Updated Questions and Answers Guaranteed 100% Success.

 8 views  0 purchase
  • Course
  • CCNA Chapter 1
  • Institution
  • CCNA Chapter 1

Describe 3 types of network attacks and their solutions, including recommended devices. - 1) Reconnaissance - Mitigation: ACL's Devices: IPS, IDS, routers 2) Access - Mitigation: Authentication, port security, virtual LANs (VLANs), ACLs, virtual private networks (VPNs) Devices: Switches, routers,...

[Show more]

Preview 2 out of 11  pages

  • September 4, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CCNA Chapter 1
  • CCNA Chapter 1
avatar-seller
ACADEMICMATERIALS
CCNA Chapter 1
Describe 3 types of network attacks and their solutions, including recommended devices. - 1)
Reconnaissance - Mitigation: ACL's Devices: IPS, IDS, routers 2) Access - Mitigation: Authentication, port
security, virtual LANs (VLANs), ACLs, virtual private networks (VPNs) Devices: Switches, routers, firewalls,
IPS, IDS 3) DoS - Mitigation: ACL's Devices: IPS, IDS, firewalls, routers.



Describe a distributed network attack. - An adversary introduces code, such as a Trojan horse or
back-door program, to a "trusted" component or software that will later be distributed to many other
companies and users.



__________ has both physical and logical ring topologies. - FDDI



A __________ topology describes how devices communicate with each other. - Logical



A __________ topology uses a single cable to connect all devices together. - Bus



A brute-force password attack would be classified as what kind of attack? - Access



Describe 3 logical security controls. - Idle timeout on logins, passwords, and authentication
methods.




Describe 4 physical security controls. - Sign in and out logs, locks, guards, and doors.



Describe a bus topology. - All components are connected to and share a single wire using special
types of connectors or transceivers.



Describe a circuit-switched service. - It provides a temporary connection across a phone circuit
and are typically used for backup of primary circuits and for temporary boosts of bandwidth.

, Describe a close-in network attack. - An adversary attempts to get physically close to network
components, data, and systems in order to learn more about a network or to cause damage.



Describe a dedicated circuit. - A permanent connection between two sites in which the bandwidth
is dedicated to that company's use. Common when services such as voice, video, and data, must traverse
the connection.

Describe a point-to-point topology. - It has a single connection between two components, and
two components can directly communicate without interference from other components.



Describe a possible DoS attack scenario. - Flooding millions of packets or injecting code into an
application or overrunning the buffer(s) of an application, causing it to crash.



Describe a ring topology. - Device one connects to device two, device two connects to device
three, and so on to the last device, which connects back to the first device. Ring topologies can be
implemented with a single ring or a dual ring.



Describe a star topology. - A central device has many point-to-point connections to other
components. Star topologies are used in environments where many different devices need to be
connected, with a hub or switch at the center of the star.



Describe an active network attack. - An adversary tries to bypass or break into secured systems
using stealth, viruses, worms, or Trojan horses, or by exploiting a discovered security vulnerability.



Describe an insider network attack. - An inside adversary attempts to eavesdrop, copy, or cause
damage to information, often using a sniffing tool such as Wireshark.



Describe cell-switched services. - "Cell-switched services provide the same features that dedicated
circuits offer, but their advantage is that a single device can connect to multiple devices on the same
interface. "



Describe full meshing. - Every network component is connected to every other network
component.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICMATERIALS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

53249 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
Add to cart
Added