Introduction to Networks ( Version 7.00) – Modules 16 – 17: Building and
Securing a Small Network Exam
1. Which component is designed to protect against unauthorized communications
to and from a computer?
security center
port scanner
antimalware
antivirus
firewall
2. Which command will block login attempts on RouterA for a period of 30 seconds
if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 2 attempts 30 within 10
RouterA(config)# login block-for 30 attempts 10 within 2
3. What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
4. What type of attack may involve the use of tools such as nslookup and fping?
access attack
reconnaissance attack
denial of service attack
worm attack
5. Match each weakness with an example. (Not all options are used.)