Between a client and host
Between two local networks
Between a computer and a switch
Between an ISP and an Enterprise network
Router(config)# enable password class Router(config)# line con 0 Router(config-line)# login Router(config-line)# password cisco
Router(config)# ip host 192.168.1.1 NewYork Router(config)# enable password cisco
Router(config)# line aux 0 Router(config-line)# login Router(config-line)# password cisco
Router(config)# enable password class Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco
Maintenance time periods
Intrusion monitoring records
Offsite data storage procedures
Alternate IT processing locations
Problem resolution escalation steps
IP address
Telnet password
Hostname
Console password
Subnet mask
Enable secret password
Demarc
IP security (IPSec)
Data Service Unit (DSU)
Intrusion Prevention System (IPS)
Intrusion Detection System (IDS)
Remove all VLAN associations from the interfaces
Remove the 802.1q encapsulation from the interface.
Issue the command copy start run
Issue the command delete flash:vlan.dat
Issue the command erase start
Reload the switch
Physical point where the ISP responsibilty ends and the customer responsibilty begins
Physical location where all server farm connections meet before being distributed into the Core
point of entry for outside attacks and is often vulnerable
Point of entry for all Access Layer connections from the Distribution Layer devices
Router
Switch
CSU/DSU
IDS Device
Cisco IOS filename
Configured routing protocol
Status of each interface
IP addresses of all interfaces
Network links to the router are down.
No Telnet password has been configured on the router
The administrator can only connect to the router using SSH
The network interfaces of the router are not configured with IP addresses
Company security policy requires that only HTTPS be used to connect to routers
Configure a special link at the POP to allow external entry from the home computer.
Set up VPN access between the home computer and the network
Install a cable modem in the home to link to the network.
Configure ACLs on the edge routers that allow only authorized users to access management ports on network devices
Configure a server in the DMZ with a special username and password to allow external access.
Business security plan
Business continuity plan
Network solvency plan
Service level agreement
Network maintenance plan
Install security devices with IDS and IPS at the enterprise edge
Reset all user passwords every 30 days
Filter packets based on IP address, traffic pattern, and protocol
Deny external workers VPN access to internal resources
Ensure critical devices are physically secure and placed behind the demarc
Business security plan
Business continuity plan
Service level agreement
Network maintenance plan
Business security plan
Business continuity plan
Network maintenance plan
Service level agreement
Business continuity plan
Business security plan
Network maintenance plan
Service level agreement
When a violation is detected, the port will log the information to a syslog server
When a violation is detected, the port will go into err-disable mode
There have been 11 security violations since the last reload
The port is currently in a shutdown state
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.