Cisco Packet Tracer - Enabling A Router Flashcards

1
Q

What is the first step to secure a router in Cisco Packet Tracer?

A

Access the router’s command line interface (CLI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: The default username and password should be kept unchanged for security.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What command is used to enter privileged EXEC mode?

A

The command ‘enable’ is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: To change the router’s hostname, use the command ______.

A

hostname [new_hostname]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of setting a console password?

A

To prevent unauthorized access to the router’s console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command sets a password for console access?

A

The command ‘line con 0’ followed by ‘password [your_password]’ and ‘login’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to secure remote access to the router?

A

The command ‘line vty 0 4’ followed by ‘password [your_password]’ and ‘login’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Enabling secret passwords is less secure than enabling simple passwords.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command is used to set an enable secret password?

A

The command ‘enable secret [your_secret_password]’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of the ‘service password-encryption’ command?

A

It encrypts plain text passwords in the configuration file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: To configure the SNMP community string, use the command ______.

A

snmp-server community [community_string] [RO|RW]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of access control lists (ACLs) in router security?

A

To filter traffic and enhance security by restricting access to the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which command is used to create a standard access list?

A

The command ‘access-list [number] permit [source]’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the range of numbers for standard access lists?

A

1 to 99.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Extended access lists can filter traffic based on protocol type.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command is used to apply an access list to an interface?

A

The command ‘ip access-group [access-list-number] [in|out]’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: To configure SSH access, you need to generate ______.

A

RSA keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What command generates RSA keys for SSH?

A

The command ‘crypto key generate rsa’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the minimum key length recommended for RSA keys?

A

2048 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False: Telnet is a secure protocol for remote router access.

21
Q

What command is used to enable SSH on the router?

A

The command ‘ip ssh version 2’.

22
Q

What is the purpose of the ‘banner motd’ command?

A

To display a message of the day to users when they connect to the router.

23
Q

Fill in the blank: The command to set a banner is ______.

A

banner motd [message]

24
Q

What is the command to disable unused interfaces?

A

The command ‘interface [interface_id]’ followed by ‘shutdown’.

25
Q

True or False: Keeping unused services enabled on a router enhances security.

26
Q

What command is used to view the running configuration?

A

The command ‘show running-config’.

27
Q

What is the importance of regularly updating router firmware?

A

To protect against vulnerabilities and enhance security features.

28
Q

Fill in the blank: The command to save the running configuration to startup is ______.

A

write memory or copy running-config startup-config.

29
Q

What is the purpose of logging to a remote server?

A

To keep a record of events and access attempts for security auditing.

30
Q

Which command enables logging to a remote syslog server?

A

The command ‘logging [syslog_server_ip]’.

31
Q

True or False: All users should have administrative privileges on a router.

32
Q

What command is used to create a user account with privilege level?

A

The command ‘username [username] privilege [level] secret [password]’.

33
Q

Fill in the blank: To configure a timeout for inactive sessions, use the command ______.

A

exec-timeout [minutes] [seconds]

34
Q

What is the command to disable IP source routing?

A

The command ‘no ip source-route’.

35
Q

True or False: Using ACLs can help mitigate DoS attacks.

36
Q

What command is used to verify the status of ACLs?

A

The command ‘show access-lists’.

37
Q

What is the primary benefit of using dynamic routing protocols?

A

To automatically adjust routes based on network changes.

38
Q

Fill in the blank: The command to enable a routing protocol like OSPF is ______.

A

router ospf [process_id]

39
Q

What is the purpose of configuring NAT on a router?

A

To allow multiple devices on a private network to access the internet using a single public IP.

40
Q

True or False: NAT increases the number of IP addresses available on a network.

41
Q

What command is used to configure NAT overload?

A

The command ‘ip nat inside source list [access-list] interface [interface] overload’.

42
Q

What is the function of the ‘ip dhcp snooping’ command?

A

To prevent rogue DHCP servers from assigning IP addresses.

43
Q

Fill in the blank: To enable DHCP snooping, use the command ______.

A

ip dhcp snooping

44
Q

What command is used to verify DHCP snooping status?

A

The command ‘show ip dhcp snooping’.

45
Q

True or False: Port security can help prevent unauthorized devices from accessing the network.

46
Q

What command is used to enable port security on an interface?

A

The command ‘switchport port-security’.

47
Q

Fill in the blank: To limit the number of MAC addresses on a port, use the command ______.

A

switchport port-security maximum [number]

48
Q

What is the purpose of the ‘show ip interface brief’ command?

A

To display the status of all interfaces on the router.

49
Q

What command is used to perform a basic security assessment of the router?

A

The command ‘show running-config’.