.
Key exchange
Authentication
Encryption
Data integrity
Rate this question:
Syslog Server, NVRAM
Syslog Server, FTP Server
NVRAM, FTP Server
Secure Web Server, FTP Server
Rate this question:
Not enough information is provided.
The password is - T@C@c$P@ssW0rd!
No password is required with TACACS
The password is configured using the username command and is not shown in this configuration.
Rate this question:
Data plane
Network plane
Management plane
Control plane
Rate this question:
R1>no service daytime
R1(config)#no service udp-small-servers
R1(config)#no service daytime
R1(config)#no service tcp-small-servers
Rate this question:
10.10.30.1
203.193.193.222
172.32.254.1
192.167.23.11
Rate this question:
Use SSH only for remote management
Use SNMP v1 for management
Shutdown unused ports
Disable CDP
Rate this question:
Central Intelligence Agency
Confidentiality, Integrity, Avoidance
Confidentiality, Integrity, Availability
Contextual Internet Availability
Rate this question:
SNMP traps would not be received by the syslog server.
All management access to the router would be lost.
Packets would be dropped at increasing rates until the memory buffers overflowed.
CPU cycles would be wasted.
Rate this question:
True
False
Rate this question:
Inbound on ethernet 0
Outbound on ethernet 0
Outbound on ethernet 1
Direction is not specified
Rate this question:
Deny 172.20.4.0 0.0.0.255 any eq http
Deny 172.20.4.0 0.0.0.255 any eq secure
Deny 172.20.4.0 0.0.0.255 any eq https
Deny 172.20.4.0 0.0.0.255 any eq ssh
Rate this question:
0.0.0.255
0.0.3.255
0.0.1.255
0.0.16.255
Rate this question:
Standard
Extended
Reflexive
Dynamic
Rate this question:
Dynamic Access List
Standard Access List
Reflexive Access List
Time-Based Access List
Rate this question:
A feature of firewall software which intelligently filters TCP and UDP packets based on application layer protocol session information.
A feature of router software that detects abnormal traffic patterns.
A feature of router software that controls authentication processes on the local router.
A feature of router software that blocks traffic based on specific patterns of behavior.
Rate this question:
Access-list 50 deny 192.168.1.1 0.0.0.255
Access-list 110 permit ip any any
Access-list 2500 deny tcp any host 192.168.1.1 eq 22
Access-list 101 deny tcp any host 192.168.1.1
Rate this question:
Access-list 10 permit ip 172.17.146.0 0.0.1.255
Access-list 10 permit ip 172.17.147.0 0.0.255.255
Access-list 10 permit ip 172.17.148.0 0.0.1.255
Access-list 10 permit ip 172.17.149.0 0.0.255.255
Access-list 10 permit ip 172.17.146.0 0.0.0.255
Access-list 10 permit ip 172.17.146.0 255.255.255.0
Rate this question:
You can apply only one access list on any interface
You can configure one access list, per direction, per layer 3 protocol
You can place as many access lists as you want on any interface
You can configure one access list, per direction, per layer 2 protocol
Rate this question:
Reflexive
Extended
Standard
Dynamic
Rate this question:
Install a firewall
Install an IPS
Update servers and PCs with the latest patches & AV signatures
Develop a security policy
Rate this question:
The password encryptions service
Telnet access with the password "password
SSL
SSH
Rate this question:
Remote side of the WAN
As close to the source as possible
On the local side of the WAN
As close to the destination as possible
Rate this question:
Proxy
NAT
Packet filtering
Stateful filtering
Rate this question:
Inside local
Inside global
Outside local
Outside global
Rate this question:
Denied
Permitted
Inspected
Logged
Rate this question:
Deny
Permit
Inspect
Log
Rate this question:
Stateful entries (from the initial flow) are matched, which dynamically allows return traffic.
Return traffic is not allowed because it is a firewall.
Explicit ACL rules need to be placed on the return path to allow the return traffic.
A zone pair in the opposite direction of the initial zone pair
Rate this question:
Policy-based routing
TCP resets are used.
The IPS is inline with the traffic.
The IPS is in promiscuous mode
Rate this question:
IDS
IPS
Out of band
Hardware appliance
Rate this question:
Reputation-based IPS
Policy-based IPS
Signature-based IPS
Anomaly-based IPS
Rate this question:
Promiscuous
Out-of-band
IPS
IDS
Rate this question:
Changing the default severity level
Changing password by own
Disabling it if it was enabled by default
Changing the default action
Rate this question:
CPU utilization
Memory utilization
The size of NVRAM
Not a best practice
Rate this question:
Data integrity
Confidentiality
Antireplay
Authentication
Rate this question:
MD5
SHA-1
AES
3DES
Rate this question:
SSL
TLS
HTTPS
IPsec
Rate this question:
Because the public already has it.
Because it is shared publicly.
Because it is a well-known algorithm that is published.
The last name of the creator was publica, which is Latin for public.
Rate this question:
Hashing
DH group
Hex Encryption
Authentication method
Rate this question:
Uses the IKE Phase 1 tunnel
Uses the IPsec tunnel
Uses the IKE Phase 2 tunnel
Uses RSA
Rate this question:
It is encapsulated into another packet, and the Internet only sees the outside valid IP destination address.
It cannot be sent. It will always be dropped.
The Internet does not filter private addresses, only some public addresses, based on policy.
NAT is used to change the destination IP address before the packet is sent.
Rate this question:
Incompatible IKE Phase 2 transform sets
Incorrect pre-shared keys or missing digital certificates
Incorrect dns
Incorrect routing
Rate this question:
Performing filtering at the router and the firewall
Requiring authentication for the administrator to connect
Implementing multiple security features on the firewall only, because of the dedicated appliance having the CPU and resources to implement all of them
Don't use proxy
Rate this question:
Eavesdropping
Cross-site scripting
Denial of service
Social engineering
Rate this question:
IPS
CSM
IDS
CCP
Rate this question:
Lines 15 through 100 are parsed as a group object.
The ACL acts on the packet, and no further list processing is done for that packet.
The ACL is processed all the way through line 100, to see whether there is a more strict policy that should be applied
There cannot be a line 14 because the only lines permitted start with 10 and increment by 10.
Rate this question:
HTTP
Telnet
HTTPS
SSH
Rate this question:
AbC123!
SlE3peR1#
Tough-passfraze
NterEstIng-PaSsW0Rd
Rate this question:
Provide the password for a custom privilege level to users in a given role
Associate user accounts with specific views
Use access lists to specify which devices can connect remotely
Use AAA to authorize specific users for specific sets of permissions
Rate this question:
IOS Zone-Based Firewall
Port Security
Proxy
IPS
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.