CCNA Discovery 1 Chapter 8 V4.0 Answers
DHomesb Chapter 8 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)
1. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
Trojan horse
brute force
ping of death
SYN flooding
2. What environment would be best suited for a two-firewall network design?
a large corporate environment
a home environment with 10 or fewer hosts
a home environment that needs VPN access
a smaller, less congested business environment