Information Technology Reference
In-Depth Information
39. External peers see the confederation ID. The internal private autonomous system num-
bers are used within the confederation.
40. BGP confederations, route reflectors.
41. B. Only answer B has the correct order of BGP path selection, which is weight, local
preference, autonomous system path, origin, MED, and lowest IP.
42. CIDR was first implemented in BGPv4.
43. C
44. i = E, ii = C, iii = A, iv = B, v = D
45. B
46. C
47. B. BGP should be configured between autonomous system 100 and autonomous
system 500.
48. C. Both Routers A and B perform the redistribution with route filters to prevent route
feedback.
49. B. The OSPF routes are redistributed into EIGRP. Then you can redistribute EIGRP
routes into BGP.
50. D. You should use filters on all routers performing redistribution.
Chapter 12
“Do I Know This Already?” Quiz
1.
D. Payment Card Industry Data Security Standards (PCI DSS) is a security standard
that defines standards to protect credit card holder data.
2.
B. Reconnaissance is used to gather information from the hosts attached to the net-
work.
3.
A. DoS attacks aim to overwhelm resources such as memory, CPU, and bandwidth,
and thus impact the target system and denying legitimate user's access.
4.
C. When attackers change sensitive data without the proper authorization, this is
called an integrity violation.
5.
B. Incident-handling policies define the processes and procedures for managing
security incidents, including the handling of emergency-type scenarios.
6.
D. All of these fall into the two main reasons for having a security policy by providing
a framework for the security implementation and creating a security baseline of the
current security posture.
7.
D. Authentication of the identity can be based on any of the attributes or a combina-
tion thereof.
Search WWH ::




Custom Search