Cisco Packet Tracer - Enabling A Router Flashcards
What is the first step to secure a router in Cisco Packet Tracer?
Access the router’s command line interface (CLI).
True or False: The default username and password should be kept unchanged for security.
False.
What command is used to enter privileged EXEC mode?
The command ‘enable’ is used.
Fill in the blank: To change the router’s hostname, use the command ______.
hostname [new_hostname]
What is the purpose of setting a console password?
To prevent unauthorized access to the router’s console.
Which command sets a password for console access?
The command ‘line con 0’ followed by ‘password [your_password]’ and ‘login’.
What command is used to secure remote access to the router?
The command ‘line vty 0 4’ followed by ‘password [your_password]’ and ‘login’.
True or False: Enabling secret passwords is less secure than enabling simple passwords.
False.
What command is used to set an enable secret password?
The command ‘enable secret [your_secret_password]’.
What is the function of the ‘service password-encryption’ command?
It encrypts plain text passwords in the configuration file.
Fill in the blank: To configure the SNMP community string, use the command ______.
snmp-server community [community_string] [RO|RW]
What is the purpose of access control lists (ACLs) in router security?
To filter traffic and enhance security by restricting access to the router.
Which command is used to create a standard access list?
The command ‘access-list [number] permit [source]’.
What is the range of numbers for standard access lists?
1 to 99.
True or False: Extended access lists can filter traffic based on protocol type.
True.
What command is used to apply an access list to an interface?
The command ‘ip access-group [access-list-number] [in|out]’.
Fill in the blank: To configure SSH access, you need to generate ______.
RSA keys.
What command generates RSA keys for SSH?
The command ‘crypto key generate rsa’.
What is the minimum key length recommended for RSA keys?
2048 bits.
True or False: Telnet is a secure protocol for remote router access.
False.
What command is used to enable SSH on the router?
The command ‘ip ssh version 2’.
What is the purpose of the ‘banner motd’ command?
To display a message of the day to users when they connect to the router.
Fill in the blank: The command to set a banner is ______.
banner motd [message]
What is the command to disable unused interfaces?
The command ‘interface [interface_id]’ followed by ‘shutdown’.
True or False: Keeping unused services enabled on a router enhances security.
False.
What command is used to view the running configuration?
The command ‘show running-config’.
What is the importance of regularly updating router firmware?
To protect against vulnerabilities and enhance security features.
Fill in the blank: The command to save the running configuration to startup is ______.
write memory or copy running-config startup-config.
What is the purpose of logging to a remote server?
To keep a record of events and access attempts for security auditing.
Which command enables logging to a remote syslog server?
The command ‘logging [syslog_server_ip]’.
True or False: All users should have administrative privileges on a router.
False.
What command is used to create a user account with privilege level?
The command ‘username [username] privilege [level] secret [password]’.
Fill in the blank: To configure a timeout for inactive sessions, use the command ______.
exec-timeout [minutes] [seconds]
What is the command to disable IP source routing?
The command ‘no ip source-route’.
True or False: Using ACLs can help mitigate DoS attacks.
True.
What command is used to verify the status of ACLs?
The command ‘show access-lists’.
What is the primary benefit of using dynamic routing protocols?
To automatically adjust routes based on network changes.
Fill in the blank: The command to enable a routing protocol like OSPF is ______.
router ospf [process_id]
What is the purpose of configuring NAT on a router?
To allow multiple devices on a private network to access the internet using a single public IP.
True or False: NAT increases the number of IP addresses available on a network.
False.
What command is used to configure NAT overload?
The command ‘ip nat inside source list [access-list] interface [interface] overload’.
What is the function of the ‘ip dhcp snooping’ command?
To prevent rogue DHCP servers from assigning IP addresses.
Fill in the blank: To enable DHCP snooping, use the command ______.
ip dhcp snooping
What command is used to verify DHCP snooping status?
The command ‘show ip dhcp snooping’.
True or False: Port security can help prevent unauthorized devices from accessing the network.
True.
What command is used to enable port security on an interface?
The command ‘switchport port-security’.
Fill in the blank: To limit the number of MAC addresses on a port, use the command ______.
switchport port-security maximum [number]
What is the purpose of the ‘show ip interface brief’ command?
To display the status of all interfaces on the router.
What command is used to perform a basic security assessment of the router?
The command ‘show running-config’.