Category: CCNA v7.0
1. Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered. White Hat Gray Hat Black Hat 2. Which type of hacker is described in the scenario: …
3.1.4 Check Your Understanding – Current State of Cybersecurity Answers
1. Which security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data. Vulnerability Exploit Asset Risk 2. Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat? …
2.1.9 Check Your Understanding – OSPF Router ID Answers
1. True or False? In the router ospf process-id command, the process ID value, which can any number between 1 and 65,535, is locally significant. It must be the same on all routers in the OSPF area. True False 2. Which of the following applies to the router …
1.3.7 Check Your Understanding – OSPF Operation Answers
1. During this OSPF state on multiaccess networks, the routers elect a Designated Router (DR) and a Backup Designated Router (BDR). Down State Init State Two-Way State ExStart State Exchange State Loading State Full State 2. During this OSPF state, routers send each other DBD packets. Down State …
1.2.5 Check Your Understanding – OSPF Packets Answers
1. Which of the following OSPF packets contains an abbreviated list of the LSDB of the sending router? Type 1: Hello packet Type 2: DBD packet Type 3: LSR packet Type 4: LSU packet Type 5: LSAck packet 2. Which of the following OSPF packets is used by …
1.1.7 Check Your Understanding – OSPF Features and Characteristics Answers
1. Which of the following OSPF components is associated with the neighbor table? Dijkstra’s algorithm Link-State database Routing protocol messages Adjacency database Forwarding database 2. Which of the following OSPF components is responsible for computing the cost of each route? Dijkstra’s algorithm Link-State database Routing protocol messages Adjacency …
16.1.2 Check Your Understanding – Packet Processing with Static Routes Answers
1. Refer to the exhibit. True or False? R1 must encapsulate received packets into new frames before forwarding them to R2. True False 2. Refer to the exhibit. True or False? R2 will forward frames to R3 with an all 1s Layer 2 address. True False 3. Refer …
15.1.8 Check Your Understanding – Static Routes Answers
1. Which two methods can be used to identify the next hop in a static route? (Choose two.) destination interface next hop IP address destination network address exit interface source IP address 2. Which IPv4 static route statement is true? The destination network is identified using the network …
14.5.6 Check Your Understanding – Dynamic and Static Routing Answers
1. Which type of routing automatically adapts to topology changes? static routes dynamic routing protocols both static routes and dynamic routing protocols 2. What type of routing is typically used with a stub network? static routes dynamic routing protocol 3. What metric is used by OSPF to determine …
14.4.13 Check Your Understanding – IP Routing Table Answers
1. Which routing table principle is not correct? Every router makes its decision alone, based on the information it has in its own routing table. The fact that one router has certain information in its routing table does not mean that other routers have the same information. Routing …