CCNA Security Chapter 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Man04
M
Man04
Community Contributor
Quizzes Created: 14 | Total Attempts: 6,627
| Attempts: 481 | Questions: 17
Please wait...
Question 1 / 17
0 %
0/100
Score 0/100
1. Refer to the exhibit. What is the significance of secret 5 in the generated output?

Explanation

The significance of secret 5 in the generated output is that it indicates that the ADMIN password is hashed using MD5.

Submit
Please wait...
About This Quiz
CCNA Security Quizzes & Trivia

This CCNA Security Chapter 2 quiz assesses knowledge on creating user accounts with custom EXEC commands, SSH key lengths, analyzing login command outputs, and understanding configurations in Cisco... see moredevices. It's designed for learners aiming to enhance their network security skills. see less

2. Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console?

Explanation

The correct answer is R1(config)# username admin secret Admin01pa55 R1(config)# line con 0 R1(config-line)# login local. This set of commands creates a username of "admin" with a password of "Admin01pa55" and sets the login method to "local" for the console line. This means that when a user attempts to access the console, the router will check the internal username database for authentication.

Submit
3. 19. What is the minimum recommended modulus key length for keys generated to use with SSH?

Explanation

The minimum recommended modulus key length for keys generated to use with SSH is 1024. This means that the key should be at least 1024 bits long in order to provide sufficient security for SSH communication. A longer key length would provide even stronger security, but 1024 bits is considered the minimum acceptable length.

Submit
4. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Explanation

To configure R1 to accept only encrypted SSH connections, the administrator needs to perform the following three additional steps:
1. Configure the IP domain name on the router: This step is necessary to generate the RSA key pair used for SSH encryption.
2. Generate the SSH keys: This step involves generating the RSA key pair that will be used for encryption and authentication during SSH connections.
3. Enable inbound vty SSH sessions: This step allows the router to accept incoming SSH connections on the virtual terminal lines (vtys). By enabling SSH sessions, the router will only accept encrypted SSH connections, ensuring secure communications.

Submit
5. Refer to the exhibit. Based on the output of the show running-config command, which type of view is SUPPORT?

Explanation

Based on the output of the show running-config command, the SUPPORT view is a superview. This is indicated by the fact that it contains the SHOWVIEW and VERIFYVIEW views.

Submit
6. By default, how many seconds of delay between virtual login attempts is invoked when the login block-for command is configured?

Explanation

When the login block-for command is configured, by default, there is a delay of one second between virtual login attempts.

Submit
7. Which statement matches the CLI commands to the SDM wizard that performs similar configuration functions?

Explanation

The auto secure privileged EXEC command and the SDM One-Step Lockdown wizard both perform similar configuration functions. The auto secure command is used to automatically secure the router by applying a set of recommended security configurations. Similarly, the SDM One-Step Lockdown wizard in the Cisco Security Device Manager (SDM) provides a guided interface to quickly and easily apply a comprehensive set of security configurations to the router. Both options aim to enhance the security of the router by implementing recommended security measures.

Submit
8. Refer to the exhibit. Which statement regarding the JR-Admin account is true?

Explanation

The correct answer is JR-Admin can issue ping and reload commands. This is because in the exhibit, the privilege level of the JR-Admin account is set to 5, which allows the user to issue both ping and reload commands.

Submit
9. An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?

Explanation

The correct answer is "privilege exec level 2". This command is used to create a user account with custom access to most privileged EXEC commands. The "privilege exec level" command is used to specify the privilege level for a particular command. In this case, a privilege level of 2 is being set, which allows access to a subset of privileged EXEC commands.

Submit
10. Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?

Explanation

not-available-via-ai

Submit
11. What are two characteristics of SNMP community strings? (Choose two.)

Explanation

SNMP community strings are used for authentication and access control in SNMP-enabled devices. The first characteristic states that SNMPv1, SNMPv2, and SNMPv3 send community strings in plaintext, making them vulnerable to interception. The second characteristic suggests that commonly known community strings should not be used for secure SNMP configurations. The last two characteristics explain the functionality of SNMP read-only and read-write community strings. The read-only community strings allow the manager to retrieve information from the SNMP-enabled device, while the read-write community strings enable the manager to both retrieve and set information on the device.

Submit
12. Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)

Explanation

From the partial output of the show ntp associations detail command on R2, we can determine that R1 is configured as the NTP master and R2 is configured as the NTP client. Additionally, we can obtain the information that the IP address of R1 is 192.168.1.2.

Submit
13. Which two characteristics apply to Role-Based CLI Access superviews? (Choose two.)

Explanation

Role-Based CLI Access superviews allow users logged in to a superview to access all commands specified within the associated CLI views. This means that users with the appropriate role and permissions can execute any command within the specified CLI views. Additionally, commands cannot be configured for a specific superview, meaning that the commands available within the superview are determined by the associated CLI views and cannot be customized for individual superviews.

Submit
14. Refer to the exhibit.what two pieces of information can be gathered from the generated message? choose two

Explanation

The two pieces of information that can be gathered from the generated message are that the message is a level five notification message and that service timestamps have been globally enabled.

Submit
15. Refer to the exhibit. What two facts can be determined from the output? (Choose two.)

Explanation

The two facts that can be determined from the output are: The Cisco IOS image and configuration files have been properly secured, and The Cisco IOS Resilient Configuration feature is enabled.

Submit
16. Refer to the exhibit. Which information can be gathered based on the show login command output?

Explanation

Based on the "show login" command output, the information that can be gathered is that five or more login requests have failed within 90 seconds. This can be inferred because the login block-for command is configured to block login hosts for 82 seconds, indicating that there have been failed login attempts. Additionally, the statement "All logins from all sources are blocked for another 90 seconds" suggests that there is a temporary block in place due to the failed login attempts.

Submit
17. What are two characteristics of the SDM Security Audit wizard? (Choose two.)

Explanation

The SDM Security Audit wizard offers two characteristics. Firstly, it presents a screen with Fix-it check boxes, allowing the user to select which security-related configuration changes they want to implement. This provides flexibility and control over the changes made. Secondly, it requires users to identify the router interfaces connecting to the inside and outside networks. This step ensures that the appropriate security measures are applied to the correct interfaces, enhancing network security.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 16, 2010
    Quiz Created by
    Man04
Cancel
  • All
    All (17)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Refer to the exhibit. What is the significance of secret 5 in the...
Which set of commands are required to create a username of admin, hash...
19. What is the minimum recommended modulus key length for keys...
An administrator defined a local user account with a secret password...
Refer to the exhibit. Based on the output of the show running-config...
By default, how many seconds of delay between virtual login attempts...
Which statement matches the CLI commands to the SDM wizard that...
Refer to the exhibit. Which statement regarding the JR-Admin account...
An administrator needs to create a user account with custom access to...
Which recommended security practice prevents attackers from performing...
What are two characteristics of SNMP community strings? (Choose two.)
Refer to the exhibit. Routers R1 and R2 are connected via a serial...
Which two characteristics apply to Role-Based CLI Access superviews?...
Refer to the exhibit.what two pieces of information can be gathered...
Refer to the exhibit. What two facts can be determined from the...
Refer to the exhibit. Which information can be gathered based on the...
What are two characteristics of the SDM Security Audit wizard? (Choose...
Alert!

Advertisement