Security Chap2 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.)

1. assign a secret password to the view 2.assign commands to the view 3.create a view using the parser view view-name cmd

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

CDP

Why is the username name algorithm-type scrypt secret password command preferred over the username name secret password command?

It uses the SCRYPT algorithm for encrypting passwords.

The_____ is a Layer 2 open standard network discovery protocol.

LLDP

OSPF _____authentication should be used wherever possible, because MD5 authentication is considered vulnerable to attacks.

SHA

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

an ip domain name/a user account/a unique hostname

What tool is available through the Cisco IOS CLI to initiate security audits and to make recommended configuration changes with or without administrator input?

cisco autosecure

Which packet type is user-generated and forwarded by a router?

data plane

Which two tasks are associated with router hardening? (Choose two.)

diabling all unused pors and interfaces securing administrative access

Which two options provide secure remote access to a router? (Choose two.)

https ssh

A network administrator needs to protect a router against brute force login attempts. What is the correct login-block-for command syntax to disable login for 3 minutes if more than 3 failed attempts are made within a 2 minute period?

login block-for 180 attemps 3 withen 120

When role-based CLI is used, only the ___view has the ability to add or remove commands from existing views

root

Which element of an SNMP implementation can be configured to respond to requests as well as to forward notifications?

snmp agent

Routing protocol_______ can be used to falsify routing information, cause DoS attacks, or cause traffic to be redirected.

spoofing

What IOS privilege levels are available to assign for custom user-level privileges?

level 2 through 14


Set pelajaran terkait

MGMT 5320 Exam 3 - Short Essay Study Guide

View Set

Risk Management & Insurance Exam 4: Chapters 18, 19, 25, 26 Rejda

View Set

Midterm Workplace Diversity Dr. Morganson

View Set

PHYS 2- Quiz Questions from Mastering Physics

View Set