Wrong answers Flashcards
Which security feature or device would more likely be used within a CAN than a SOHO or data center?
ESA/WSA
A company has several sales offices distributed within a city. Each sales office has a SOHO network. What are two security features that are commonly found in such a network configuration?
WPA2 and port security on user facing ports because WPA2 is commonly used for wireless encryption and port security is used to ensure non-company devices are not plugged into the wired network
What is the purpose of a reconnaissance attack on a computer?
To gather information about the target network system
Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network?
Implement encryption for sensitive traffic so data cannot be read
What functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements
Data plane
Which security implementation will provide Management plane protection for a network device?
Role-based access control
Which two practices are associated with securing the features and performance of router operating systems?
Keep a secure copy of router operating system images and configure router with the maximum amount of memory possible
What does keeping a secure copy of router operating system images and configuring a router with the maximum amount of memory possible do?
-Provides backups needed for device recovery
-Allows support for the widest range of security services AND can help protect against certain DoS attacks
What IOS privilege levels are available to assign for custom user-level privileges?
Levels 2 through 14 because levels 0, 1, and 15 have predefined settings
An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?
Privilege exec level 2
A student is learning role-based CLI access and CLI view configurations. The student opens Packet Tracer and adds a router. Which command should be used first for creating a CLI view named TECH-View?
Router(config)# aaa new-model
A student is learning about role-based views and role-based view configurations. The student enters the Router(config)# parser view TECH-view command. What is the purpose of this command?
To create a CLI view named TECH-View
What are two characteristics of the Cisco IOS Resilient Configuration feature?
It saves a secure copy of the primary image and device configuration that cannot be removed by a user and it minimizes the downtime of a device that has had the image and configuration deleted
A network engineer is implementing security on all company routers. Which two commands must be issued to force authentication via the password 1A2b3C for all OSPF-enabled interfaces in the backbone area of the company network?
Area 0 authentication message-digest and area 1 authentication message-digest
What information in the syslog message identifies the facility? |*Mar 1 00:02:59.451: %OSPF-5-ADJCHG: Process 99, Nbr 172.16.10.5 on Serial0/0 from LOADING to FULL, Loading Done|
OSPF