DHomesb Chapter 8

CCNA Discovery 1 Chapter 8 V4.0 Answers

CCNA Discovery 1 Chapter 8 V4.0 Answers

DHomesb Chapter 8 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

Trojan horse 

brute force 

ping of death 

SYN flooding


2. What environment would be best suited for a two-firewall network design?

a large corporate environment

a home environment with 10 or fewer hosts

a home environment that needs VPN access

a smaller, less congested business environment