كل واحد يحاول ويكتب رقم السؤال والاجابة واللي هيغش
هعرفه
:ah34::ah27:
اتفضم الوقت بدأ
:cdcd:

- What does a router do?



It determines the entire route for an IP packet from source to destination.

It uses ARP to route all packets.

It attempts to get an IP packet two hops closer to the destination.

It uses DNS to route all packets.



2- Which of the following is a guideline to be followed when designing ACLs?

Since ACL are executed in order, they should be organized from the most general condition to the most specific.



Since ACL are executed in order, they should be organized from the most specific condition to the most general.



Since all ACL statement are evaluated before they are executed an explicit deny any should be written to make sure it will work properly.



Since all ACL statement are evaluated before they are executed an explicit permit any should be written to make sure it will work properly.



3- Design a standard IP access list that permits traffic from host 193.5.2.76, but denies all other IP traffic?

access-list 100 permit host 193.5.2.76 0.0.0.0

Access-list 100 deny any



access-list 1 permit host 193.5.2.76 0.0.0.255

Access-list 100 deny any



access-list 1 permit 193.5.2.76 0.0.0.0



access-list 3 permit 193.5.2.76 0.0.0.255



4- Design an IP access list that denies traffic from host 11.5.25.239, but permits all other IP traffic?

access-list 7 deny host 11.5.25.239

access-list 7 permit any



access-list 7 deny host 11.5.25.239 0.0.0.0

access-list 7 permit any



access-list 7 deny host 11.5.25.239 0.0.0.0



5- Which of the following is true regarding passwords on a Cisco router?

All passwords are encrypted.



A password is not active until the login command is issued for the associated line.



The console, auxiliary, and Telnet passwords cannot be the same.



Only one password can be set for all Telnet sessions.





6- If an interface indicates that the interface is administratively up but the line protocol is down, what could be the problem?

No shutdown command was not issued



IP address was not set



Wrong cable used



No console cable is detected from the other end



7- A manager within your organization is concerned that his workers are wasting time by accessing the WWW for non-business purposes. Which wild card mask will identify this departmental subnet as a source to be blocked assuming a subnet address of 187.162.17.0/24?

0.0.0.8



0.0.0.255



0.0.255.255



255.255. 255.0



8- Nmap?

Is the ideal tool for performing a simple network inventory or vulnerability assessment.



Can be used to quickly scan and secure thousands of ports, and it allows clear, reliable differentiation between ports in open, closed and filtered states.



Is used for hacking



9- Which subnet mask is represented by the /21 notation?

255.255.224.0



255.255.248.0



255.255.252.0



255.255.240.0



10- What is the primary reason for implementing security on a network?

filtering switching errors



maintaining a consistent 7-layers security policy



isolating the network layer from traffic destined for other networks



minimize the risk from being compromised by hackers, worms, viruses and other intrusions



11- A prompt such as "Router >" indicates you are in what mode?

Privileged mode



User mode



Setup mode



Configuration mode



12- What are the numbers that define a standard access list?

0-255



100-199



1-99



255-1023





13- Which of the following is true regarding Telnet password on a Cisco router?

It is used for anyone wanting to accesse the router through the console port.



A password is active before the login command is issued for the associated line.



The console, auxiliary, and Telnet passwords cannot be the same.



Only one password can be set for all Telnet sessions.





14- Which networking devices can be used at the networking layer of the hierarchical OSI model?



hub



bridge



switch



router


---------------------------