Small 2
What is the advantage of using SSH over Telnet?
SSH provides secure communications to access hosts.
Match the description to the type of firewall filtering
See 11
Identify the steps needed to configure a switch for SSH. The answer order does not matter
See 15
What is an accurate description of redundancy?
designing a network to use multiple paths between switches to ensure there is no single point of failure
What is the role of an IPS?
detecting and blocking of attacks in real time
When applied to a router, which command would help mitigate brute-force password attacks against the router?
login block-for 60 attempts 5 within 60
A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing?
layered
What feature of SSH makes it more secure than Telnet for a device management connection?
login information and data encryption
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?
stateful packet inspection
What is the purpose of the network security authentication function?
to require users to prove who they are