CCNA4 Final Review

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

38.

Which Command is used on a router to verify Frame Relay is up and


operational?

- The show interface command (Recall that with Frame Relay, the router is
normally considered a DTE device. However, a Cisco router can be configured as a
Frame Relay switch. In such cases, the router becomes a DCE device when it is
configured as a Frame Relay switch.)

39. Which packet-switched WAN technologies are characterized by the use of


Permanent Virtual Circuits (PVCs)?

- Frame Relay and X.25

40. What is used to indicate the beginning or end of a PPP frame?

- Flags (A single byte that indicates the beginning or end of a frame.)

41. What does CIR designate in a Frame Relay connection?


CIR designate the rate at which a Frame Relay network agrees to transfer
information under normal conditions, averaged over a minimum increment of time.

42. What command is used to configure an interface for PPP encapsulation?

- Router (config-if) #encapsulation ppp

43. Which Protocol with Network Traffic Monitoring software to gather


information for monitoring analysis?
- SNMP: provides a means to monitor and control network devices, and to manage
configurations, statistics collection, performance, and security.

44. What does PPP use to establish, configure and test the WAN link?
- Link control protocol

45. What is LMI?


- Local Management Interface
Set of enhancements to the basic Frame Relay specification. LMI includes support
for a keepalive mechanism, which verifies that data is flowing; a multicast
mechanism, which provides the network server with its local DLCI and the
multicast DLCI; global addressing, which gives DLCIs global rather than local
significance in Frame Relay networks; and a status mechanism, which provides an
on-going status report on the DLCIs known to the switch.
LMI is known as LMT in ANSI terminology.

46. What is DSL? Explain its Technology.


- DSL is a technology that provides digital data transmission over the wires
of a local telephone network. The term Digital Subscriber Line is widely
understood to mean Asymmetric Digital Subscriber Line (ADSL), the most
commonly installed technical variety of DSL. DSL provides a continuous
connection to the Internet. DSL uses a special high-speed modem that
separates the DSL signal from the telephone signal and provides an Ethernet
connection to a host computer or LAN.

47. Explain the following security risk on our network:

Worm: A program or algorithm that replicates itself over a computer network and
usually performs malicious actions, such as using up the computer's resources and
possibly shutting the system down.

Virus: A program or piece of code that is loaded onto your computer without your
knowledge. Viruses can also replicate themselves. All computer viruses are
manmade. A simple virus that can make a copy of itself over and over again is
relatively easy to produce. Even such a simple virus is dangerous because it will
quickly use all available memory and bring the system to a halt. An even more
dangerous type of virus is one capable of transmitting itself across networks and
bypassing security systems.

Trojan: A destructive program that masquerades as a benign application. Unlike


viruses, Trojan horses do not replicate themselves but they can be just as
destructive. One of the most insidious types of Trojan horse is a program that
claims to rid your computer of viruses but instead introduces viruses onto your
computer.

Trojan horses are broken down in classification based on how they breach systems
and the damage they cause. The seven main types of Trojan horses are:
• Remote Access Trojans
• Data Sending Trojans
• Destructive Trojans
• Proxy Trojans
• FTP Trojans
• security software disabler Trojans
• denial-of-service attack (DoS) Trojans

48. What is Cisco SDM?

Cisco Router and Security Device Manager (SDM) is a Web-based device-


management tool for Cisco routers that can improve the productivity, simplify
router deployments, and help troubleshoot complex network and VPN connectivity
issues. Cisco SDM configures the router to automatically exclude the LAN
interface IP address in the pool.

49. Explain the primary attributes of a security policy.

1. It provides step-by-step procedures in order to harden routers and other network


devices.

2. It establishes a process for managing security violations.

3. It creates the rules for legal actions if necessary

You might also like