Description:
dictionary cracking and brute force attack
using ping sweep, port scans, and packet sniffers to gain information about a network
flooding a network device with traffic in an attempt to render it unusable for legitimate traffic
malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
Reconnaissance attack => using ping sweep, port scans, and packet sniffers to gain information about a network
Password attack => dictionary cracking and brute force attack
Worms, virus, Trojan horse => malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
DoS attack => flooding a network device with traffic in an attempt to render it unusable for legitimate traffic
What is the function of an IDS?
C) Detect attacks against a network and send logs to a management console.
Which of the following must be configured first before configuring SSH on VTY lines? (Choose 2)
A) domain name
c) hostname
Which protocol should be used when strong privacy and session integrity are needed for remote router administration?
A) SSH
What is the configuration register setting that will cause the router to bypass the startup configuration?