5.3 Device Access and Local Passwords Flashcards

Configure and verify device access control using local passwords. (21 cards)

1
Q

Define:

local authentication

A

A method where users log in using credentials stored on the device.

Local authentication is used when no external authentication servers (AAA) are configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command sets a local username and password on a Cisco device?

A

username < user> secret < password>

The secret keyword encrypts the password, unlike password, which is stored in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when no local password is set on a console or VTY line?

A

VTY access is denied without a password, while console access is open unless login is enforced.

By default, Cisco devices allow console access without a password unless explicitly configured with the login command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three types of passwords used to secure access on Cisco devices.

A
  1. Console password
  2. VTY (Telnet/SSH) password
  3. Enable secret password

Console password – Secures access to the device via the physical console port.

VTY (Telnet/SSH) password – Controls remote access through Telnet or SSH sessions.

Enable secret password – Protects privileged EXEC mode with an encrypted password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:

The ‘enable password’ command is more secure than ‘enable secret’.

A

False

‘enable secret’ encrypts the password with MD5, while enable password stores it in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank:

The command to encrypt plain-text passwords in a Cisco configuration is ______ ______.

A

service password-encryption

This command prevents casual viewing of passwords in the configuration file but uses weak encryption (Type 7).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command enables password authentication for console access?

A

line console 0 → password < password> → login

Without the login command, the password is ignored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if both enable password and enable secret are configured?

A

The device prioritizes enable secret over enable password.

‘enable password’ is ignored when ‘enable secret’ is set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why use an enable secret password over enable password?

A

It provides better security through encryption.

MD5 hashing protects enable secret passwords, whereas enable password is stored in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List two ways to strengthen password security on Cisco devices.

A
  1. Use enable secret instead of enable password
  2. Enforce password complexity with minimum length, uppercase, lowercase, numbers, and special characters.

Implementing enable secret ensures that the password is stored using a more secure hashing algorithm. Additionally, enforcing password complexity rules enhances security by making passwords more resistant to brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:

The enable secret password can be decrypted by default.

A

False

It is hashed with MD5, making it non-reversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should Telnet be disabled on production devices?

A

It transmits credentials in plaintext.

SSH is recommended since it encrypts login credentials, preventing eavesdropping attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What command restricts remote access to only SSH connections?

A

transport input ssh

This is configured under line vty mode to block insecure Telnet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does show running-config | include password display?

A

It filters and displays all configured passwords.

This command helps administrators review password configurations while troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command verifies user login attempts and authentication methods?

A

show login

This command tracks failed and successful login attempts, along with the authentication methods used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank:

The command ______ ______ ______ allows the device to display login failure messages.

A

login on-failure log

This feature helps track failed login attempts to detect potential security threats.

17
Q

What command logs failed login attempts and temporarily locks accounts?

A

login block-for < time> attempts < number> within < seconds>

This protects against brute-force attacks by locking accounts after repeated failures.

18
Q

List two commands to remove passwords from a Cisco device.

A
  1. no enable secret
  2. no username < user>

These commands delete passwords but should be used with caution.

19
Q

True or False:

The show version command displays password settings.

A

False

Passwords are visible in show running-config, not show version.

20
Q

What command removes all user-configured passwords?

A

write erase’ followed by ‘reload

This resets the device to factory defaults, erasing all configurations.

21
Q

List two commands to verify password configurations.

A
  1. show running-config
  2. show startup-config

These commands display stored passwords and security configurations.