Wrong answers Flashcards

1
Q

Which security feature or device would more likely be used within a CAN than a SOHO or data center?

A

ESA/WSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company has several sales offices distributed within a city. Each sales office has a SOHO network. What are two security features that are commonly found in such a network configuration?

A

WPA2 and port security on user facing ports because WPA2 is commonly used for wireless encryption and port security is used to ensure non-company devices are not plugged into the wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a reconnaissance attack on a computer?

A

To gather information about the target network system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network?

A

Implement encryption for sensitive traffic so data cannot be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements

A

Data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which security implementation will provide Management plane protection for a network device?

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two practices are associated with securing the features and performance of router operating systems?

A

Keep a secure copy of router operating system images and configure router with the maximum amount of memory possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does keeping a secure copy of router operating system images and configuring a router with the maximum amount of memory possible do?

A

-Provides backups needed for device recovery
-Allows support for the widest range of security services AND can help protect against certain DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What IOS privilege levels are available to assign for custom user-level privileges?

A

Levels 2 through 14 because levels 0, 1, and 15 have predefined settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?

A

Privilege exec level 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A student is learning role-based CLI access and CLI view configurations. The student opens Packet Tracer and adds a router. Which command should be used first for creating a CLI view named TECH-View?

A

Router(config)# aaa new-model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A student is learning about role-based views and role-based view configurations. The student enters the Router(config)# parser view TECH-view command. What is the purpose of this command?

A

To create a CLI view named TECH-View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two characteristics of the Cisco IOS Resilient Configuration feature?

A

It saves a secure copy of the primary image and device configuration that cannot be removed by a user and it minimizes the downtime of a device that has had the image and configuration deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network engineer is implementing security on all company routers. Which two commands must be issued to force authentication via the password 1A2b3C for all OSPF-enabled interfaces in the backbone area of the company network?

A

Area 0 authentication message-digest and area 1 authentication message-digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What information in the syslog message identifies the facility? |*Mar 1 00:02:59.451: %OSPF-5-ADJCHG: Process 99, Nbr 172.16.10.5 on Serial0/0 from LOADING to FULL, Loading Done|

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A