security-2 Flashcards

1
Q
Question 1
How do you maintain security in multiple websites?
A. VPN 
B. DMVPN 
C. other 
D. other
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Question 2
Which of the following encrypts the traffic on a leased line?
A. telnet 
B. ssh 
C. vtp 
D. vpn 
E. dmvpn
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Question 3
Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?
A. transport type all 
B. transport output all 
C. transport preferred all 
D. transport input all
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Question 4
How to verify SSH connections were secured?
A. ssh -v 1 -l admin IP 
B. ssh -v 2 -l admin IP 
C. ssh -l admin IP 
D. ssh -v 2 admin IP
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Question 5
In order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to meet this requirement?
A. Access control lists on file servers 
B. Elimination of shared accounts 
C. Group-based privileges for accounts 
D. Periodic user account access reviews
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Question 6
Which three feature are represented by A letter in AAA? (Choose three)
A. authorization 
B. accounting 
C. authentication 
D. accountability 
E. accessibility 
F. authority
A

Answer: A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Question 7
What are two characteristics of SSH? (Choose two)
A. use port 22 
B. unsecured 
C. encrypted
D. most common remote-access method 
E. operate at transport
A

Answer: A C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 8
Which two statements about TACACS+ are true? (Choose two)
A. It can run on a UNlX server.
B. It authenticates against the user database on the local device.
C. It is more secure than AAA authentication.
D. It is enabled on Cisco routers by default. E. It uses a managed database.

A

Answer: A E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 9
Refer to the exhibit. Which user-mode password has just been set?
R1#config R1(config)#line vty 0 4 R1(config-line)#password C1scO R1(config-line)#login
A. Telnet
B. Auxiliary
C. SSH
D. Console

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Question 10
Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two)
A. tty password 
B. enable secret password 
C. vty password 
D. aux password
E. console password 
F. username password
A

Answer: B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question 11
Which two statements about firewalls are true?
A. They can be used with an intrusion prevention system. B. They can limit unauthorized user access to protect data. C. Each wireless access point requires its own firewall
D. They must be placed only at locations where the private network connects to the internet.
E. They can prevent attacks from the internet only.

A

Answer: A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Question 12
Which three options are types of Layer 2 network attack? (Choose three)
A. Spoofing attacks 
B. VLAN Hopping 
C. Botnet attacks 
D. DDOS attacks 
E. ARP Attacks 
F. Brute force attacks
A

Answer: A B E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Question 13
Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?
A. 802.1x 
B. 802.11 
C. 802.2x 
D. 802.3x
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Question 14
Which IPsec security protocol should be used when confidentiality is required?
A. AH 
B. MD5 
C. PSK 
D. ESP
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly