Question 1
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the 10.1.0/30 network on interface serial 0/0 to the correct target area on the right.
Answer:
Global-level commands:
1) interface tunnel 0
Interface-level commands:
1) ip address 10.1.1.1 255.255.255.252
2) tunnel source serial 0/0
3) tunnel destination 10.1.1.2
4) tunnel mode gre ip
Question 2
Identify the recommended steps for worm attack mitigation by dragging and dropping them into the target area in the correct order.
Answer:
1) Containment - stop the spread of the worm inside your network and within your network
2) Inoculation - upgrade all systems to the lastest operating system code version
3) Quarantine - track down each infected machine inside your network
4) Treatment - clean and patch each infected system
Question 3
Answer:
Question 4
Answer:
Question 5
Drag each element of the Cisco ICS Firewall Feature Set from the above and drop onto its description on the below.
Answer:
Question 6
Drag the protocols that are used to distribute MPLS labels from the above to the target area on the below.(Not all options will be used)
Answer:
1) LDP
2) RSVP
3) BGPv4
Question 7
The upper gives the MPLS functions, the bottom describes the planes. Drag the above items to the proper location at the below.
Answer:
Control Plane:
Exchange routing updates between neighboring devices
Exchanges labels between peer devices
Compiles a list of all labels advertised and received
Data Plane:
Performs label swapping
Performs packet forwarding
Builds a mapping of destination networks to active labels
Question 8
Drag each type of attack on the left to the description on the left.
Answer:
1) Trojan horse: Programs that appear desirable but actually contain something harmful.
2) Virus: Malicious software attached to other programs and which execute a particular unwanted function on a user workstation.
3) Port redirection: Compromised system that is used as a jump-off point for attacks against other targets.
4) Worm: Executes arbitrary code and installs copies of itself in the memory of the Infected computer