| ]

Question 1

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the 10.1.0/30 network on interface serial 0/0 to the correct target area on the right.

GRETunnel.jpg

Answer:

GRETunnel_answer.jpg

Global-level commands:

1) interface tunnel 0

Interface-level commands:

1) ip address 10.1.1.1 255.255.255.252
2) tunnel source serial 0/0
3) tunnel destination 10.1.1.2
4) tunnel mode gre ip

Question 2

Identify the recommended steps for worm attack mitigation by dragging and dropping them into the target area in the correct order.

WormAttackSteps.jpg

Answer:

WormAttackSteps_answer.jpg

1) Containment - stop the spread of the worm inside your network and within your network
2) Inoculation - upgrade all systems to the lastest operating system code version
3) Quarantine - track down each infected machine inside your network
4) Treatment - clean and patch each infected system

Question 3

xDSLTypes.jpg

Answer:

xDSLTypes_answer.jpg

Question 4

xDSLTypes_Implementation.jpg

Answer:

xDSLTypes_Implementation_answer.jpg

Question 5

Drag each element of the Cisco ICS Firewall Feature Set from the above and drop onto its description on the below.

CiscoIOSFirewallFeatures.jpg

Answer:

CiscoIOSFirewallFeatures_answer.jpg

Question 6

Drag the protocols that are used to distribute MPLS labels from the above to the target area on the below.(Not all options will be used)

MPLS_Labels.jpg

Answer:

MPLS_Labels_answer.jpg

1) LDP
2) RSVP
3) BGPv4

Question 7

The upper gives the MPLS functions, the bottom describes the planes. Drag the above items to the proper location at the below.

MPLS_Control_Data_Planes.jpg

Answer:

MPLS_Control_Data_Planes_answer.jpg

Control Plane:

Exchange routing updates between neighboring devices
Exchanges labels between peer devices
Compiles a list of all labels advertised and received

Data Plane:

Performs label swapping
Performs packet forwarding
Builds a mapping of destination networks to active labels

Question 8

Drag each type of attack on the left to the description on the left.

TypesOfAttack.jpg

Answer:

1) Trojan horse: Programs that appear desirable but actually contain something harmful.
2) Virus: Malicious software attached to other programs and which execute a particular unwanted function on a user workstation.
3) Port redirection: Compromised system that is used as a jump-off point for attacks against other targets.
4) Worm: Executes arbitrary code and installs copies of itself in the memory of the Infected computer