Module 4: Secure Device Access

Ace your homework & exams now with Quizwiz!

Q10: Which TCP port number is used by SSH server installed on a router ?

22

Q11: A switch can be accessed only locally for administrative purposes a) True b) False

b) False

Q9: What is the purpose of using a banner message on a network device? a) It can provide more security by slowing down attacks b) It can protect the organization from legal prospective c) It can be used to create a quit period where remote connections are refused d) It is effective in deflecting threat actors from entering the device e) It can be used to log successful and failed login attempts

b) It can protect the organization from legal prospective

Q3: Which security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode? a) Provision the router with maximum memory possible b) Locate the router in secure locked room that is accessible only to authorized personnel c) Keep a secure copy of the router Cisco IOS image and router configuration file as a backup d) Configure secure administrative control to ensure that only authorized personnel can access the router e) Disable all unused ports and interfaces to reduce the number of ways the router can be accessed

b) Locate the router in secure locked room that is accessible only to authorized personnel

Q1: At what point in the enterprise network are packets arriving from the internet examined prior to entering the network? a) Campus core b) Network edge c) WAN edge d) Internet edge e) Firewall

b) Network edge

Q5: Which type of access is secured on a Cisco router or switch with enable secret command? a) Console line b) Privileged EXEC c) AUX port d) Virtual Terminal e) Console port

b) Privileged EXEC

Q8: Which of the following encryption algorithms is used by enable secret password command by default? a) SHA-256 b) SHA-512 c) MD5 d) AES e) Scrypt

c) MD5

Q2: What is the one difference between using Telnet or SSH to connect to a network device for management purposes? a) Telnet does not provide authentication whereas SSH provides authentication b) Telnet uses UDP as the transport protocol whereas SSH uses TCP c) Telnet sends a username and password in plaintext, whereas SSH encrypts the username and password d) Telnet supports a host GUI whereas SSH only supports host CLI

c) Telnet sends a user name and password in plaintext, whereas SSH encrypts the user name and password

Q4: A company is planning to use DMZ for their servers and is concerned about securing the network infrastructure. Which device should the network security team use for the edge router? a) High-speed switch b) Layer 2 switch with port security enabled c) VPN gateway d) Firewall e) Layer 3 switch

d) Firewall

Q6: Which global config command is used to encrypt all plaintexts passwords?

service password-encryption

Q7: Which command is used to verify that all passwords are encrypted?

show running-config


Related study sets

"flowers for Algernon" questions review

View Set

Chapter 9.3.7 Practice Questions

View Set

Pituitary, hypothalamus and pineal gland

View Set

PVD/PAD- Ch 30 - Brunner & Suddarths

View Set