CCNA Routing & Switching courses and prepares you for Cisco Security certification, Let's begin this quiz now!
The violation mode for the port is set to restrict.
The MAC address table is cleared, and the new MAC address is entered into the table.
The port remains enabled, but the bandwidth is throttled until the old MAC addresses are aged out.
The port is shut down.
Rate this question:
This is a notification message for a normal but significant condition
This is an alert message for which immediate action is needed
This is an error message for which warning conditions exist.
This is an error message indicating the system is unusable
Rate this question:
All vty ports are automatically configured for SSH to provide secure management.
The general-purpose key size must be specified for authentication with the crypto key generate rsa general-keys mo command.
The keys must be zeroized to reset secure shell before configuring other parameters.
The generated keys can be used by SSH.
Rate this question:
Aaa new-model global configuration command.
Change to the configuration register.
Password encryption service.
Ability to access ROMmon.
Rate this question:
All vty ports are automatically configured for SSH to provide secure management.
The general-purpose key size must be specified for authentication with the crypto key generate rsa general-keys mo command.
The generated keys can be used by SSH.
Rate this question:
Remote-access GRE VPN
Remote-access IPsec VPN
Remote-access SSL VPN
Site-to-site GRE VPN
Site-to-site IPsec VPN
Rate this question:
Exec-timeout
Login block-for
Privilege exec level
Service password-encryption
Rate this question:
The Cisco IOS image file is not visible in the output of the show flash command.
The Cisco IOS image is encrypted and then automatically backed up to a TFTP server.
The Cisco IOS image is encrypted and then automatically backed up to the NVRAM.
When the router boots up, the Cisco IOS image is loaded from a secure FTP location
Rate this question:
The resulting action is determined by the destination IP address.
The resulting action is determined by the destination IP address and portnumber.
The source IP address is checked and, if a match is not found, traffic isrouted out interface serial 0/0/1.
The traffic is dropped
Rate this question:
It mitigates MAC address overflow attacks.
It mirrors traffic that passes through a switch port or VLAN to another port for traffic analysis.
It protects the switched network from receiving BPDUs on ports that should not be receiving them.
It copies traffic that passes through a switch interface and sends the data directly to a syslog or SNMP server for analysis.
It inspects voice protocols to ensure that SIP, SCCP, H.323, and MGCP requests conform to voice standards.
The passwords in the configuration files are in clear text.
IOS recovery requires a new system flash with the IOS image.
When the password is lost, access to the device will be terminated.
The device must use simple password authentication and cannot have user authentication.
Rate this question:
Root guard
BPDU guard
Storm control
Switchport security
Rate this question:
2
3
5
6
Rate this question:
LAN storm
MAC address spoofing
MAC address table overflow
STP manipulation
VLAN attack
Rate this question:
Clientless SSL VPN
Remote-access IPsec VPN
Site-to-site IPsec VPN
HTTPS-enabled SSL VPN
Rate this question:
Authenticates a packet using the SHA algorithm only.
Authenticates a packet by a string match of the username or community string.
Authenticates a packet by using either the HMAC with MD5 method or the SHA method.
Authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and encrypts the packet using either the DES, 3DES or AES algorithms.
Rate this question:
An interface can belong to multiple zones.
The router always filters the traffic between interfaces in the same zone.
The router always filters the traffic between interfaces in the same zone.
A zone must be configured with the zone security global command before it can be used in the zone-member security command.
Rate this question:
Auditing
Accounting
Authorization
Authentication
Rate this question:
Access-list 101 permit tcp any eq 4300
Access-list 101 permit tcp 192.168.30.10 0.0.0.0 eq 80 10.1.0.0 0.0.255.255
Access-list 101 permit tcp 10.1.129.0 0.0.0.255 eq www 192.168.30.10 0.0.0.0 eq www
Access-list 101 permit tcp 10.1.128.0 0.0.1.255 eq 4300 192.168.30.0 0.0.0.15 eq www
Access-list 101 permit tcp host 192.168.30.10 eq 80 10.1.0.0 0.0.255.255 eq 4300
Rate this question:
Cisco NAC
Cisco IronPort
Cisco Security Agent
Cisco Catalyst switch
Rate this question:
NAC rule
NAT rule
IPsec rule
Access rule
Rate this question:
Privilege exec level 0
Privilege exec level 1
Privilege exec level 2
Privilege exec level 15
Rate this question:
Authentication with the NTP master will be successful, and R1 will get the time from the NTP master.
Authentication with the NTP master will be successful, but R1 will not get the time from the NTP master.
Authentication with the NTP master will fail, and R1 will get the time from the NTP master.
Authentication with the NTP master will fail, and R1 will not get the time from the NTP master.
Rate this question:
R1(config)# ip ips signature-category R1(config-ips-category)# category all R1(config-ips-category-action)# retired false
R1(config)# ip ips signature-category R1(config-ips-category)# category ios_ips basic R1(config-ips-category-action)# retired false
R1(config)# ip ips signature-category R1(config-ips-category)# category all R1(config-ips-category-action)# enabled true
R1(config)# ip ips signature-category R1(config-ips-category)# category ios_ips basic R1(config-ips-category-action)# enabled true
Rate this question:
Issue the logging on command in global configuration.
Issue the ip ips notify sdee command in global configuration.
Issue the ip audit notify log command in global configuration.
Issue the clear ip ips sdee events command to clear the SDEE buffer.
Rate this question:
Traffic must match all of the match criteria specified in the statement.
Traffic must match the first criteria in the statement.
Traffic must match at least one of the match criteria statements.
Traffic must match according to an exclusive disjunction criteria.
Rate this question:
Port Fa0/5 storm control for broadcasts will be activated if traffic exceeds 80.1 percent of the total bandwidth.
Port Fa0/6 storm control for multicasts and broadcasts will be activated if traffic exceeds 2,000,000 packets per second.
Port Fa0/6 storm control for multicasts will be activated if traffic exceeds 2,000,000 packets per second.
Port Fa0/5 storm control for multicasts will be activated if traffic exceeds 80.1 percent of the total bandwidth.
Port Fa0/5 storm control for broadcasts and multicasts will be activated if traffic exceeds 80.1 percent of 2,000,000 packets per second.
Rate this question:
It combines authentication and authorization as oneprocess.
It encrypts the entire body of the packet for more secure communications.
It utilizes UDP to provide more efficient packet transfer.
It hides passwords during transmission using PAP and sends the rest of thepacket in plain text.
Rate this question:
CBAC firewall
Reflexive ACL firewall
Zone-based policy firewall
AAA access control firewall
Rate this question:
Enable the highest level of syslog available to ensurelogging of all possible event messages.
Log all messages to the system buffer so that they can be displayed whenaccessing the router.
Synchronizeclocks on all network devices with a protocol such as Network Time Protocol.
UseSSH to access syslog information.
Rate this question:
The ACL must be applied to each vty line individually.
The ACL is applied to the Telnet port with the ip access-group command.
Apply the ACL to the vty lines without thein orout option required when applying ACLs to interfaces.
The ACL should be applied to all vty lines in thein direction to prevent anunwanted user from connecting to an unsecured port.
Rate this question:
Switchport mode access
Switchport mode trunk
Switchportport-security
Switchport port-security maximum 2
Switchportport-security mac-address sticky
Switchport port-security mac-addressmac-address
Rate this question:
Ip domain-name name in global configuration mode
Transport input ssh on a vty line
No ip domain-lookup in global configuration mode
Passwordpassword on a vty line
Service password-encryption in global configuration mode
Crypto keygenerate rsa in global configuration mode
Rate this question:
The signatures in all categories will be retired and not be used by the IPS.
The signatures in all categories will be compiled into memory and used by the IPS.
Only the signatures in the ios_ips basic category will be compiled into memory and used by the IPS.
The signatures in the ios_ips basic category will be retired and the remaining signatures will be compiled into memory and used by the IPS.
Rate this question:
Traffic that is initiated from LAN 1 and LAN 2
Http traffic that is initiated from LAN 1
Return traffic from the web server
Traffic that is destined to LAN 1 and LAN 2
No traffic will be inspected
Rate this question:
Choose Additional Tasks > Router Access > SSH to generate the RSA keys.
Choose Additional Tasks > Router Access > VTY to specify SSH as the input and output protocol.
Choose Additional Tasks > Router Properties > Netflow to generate the RSA keys.
Choose Additional Tasks > Router Properties > Logging to specify SSH as the input and output protocol.
Choose Additional Tasks > Router Access > AAA to generate the RSA keys.
Choose Additional Tasks > Router Access > Management Access to specify SSH as the input and output protocol
Rate this question:
The authentication method list used for Telnet is named ACCESS.
The authentication method list used by the consoleport is named ACCESS.
The local database is checked first whenauthenticating console and Telnet access to the router.
If the TACACS+ AAA server is not available, nousers can establish a Telnet session with the router.
If the TACACS+ AAA server is not available, consoleaccess to the router can be authenticated using the local database.
Rate this question:
There is no access control to specific interfaces on a router.
The root user must be assigned to each privilege level defined.
Commands set on a higher privilege level are not available for lower privileged users.
Views are required to define the CLI commands that each user can access.
Creating a user account that needs access to most but not all commands can be a tediousprocess.
It is required that all 16 privilege levels be defined, whether they are usedor not.
Rate this question:
NTPv1 is being configured.
The IP address of the NTP server is 10.1.1.2.
The IP address of the NTP client is 10.1.1.2.
NTP messages will be sent and received on interface Serial0/0/0 for this router.
NTP routing updates will be sent and received on interface Serial0/0/0 of the NTP server.
Rate this question:
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
Rate this question:
Superuser view
Root view
Superview
CLI view
Admin view
Config view
Rate this question:
Host-based IPS is more scalable than network-basedIPS.
Host-based IPS can work in promiscuous mode or inline mode.
Network-based IPS is better suited for inspection of SSL and TLS encrypted dataflows.
Network-based IPS provides better protection against OS kernel-level attacks onhosts and servers.
Network-basedIPS can provide protection to hosts without the need of installing specializedsoftware on each one.
Rate this question:
TACACS+ because it separates authentication and authorization, allowing for more customization.
RADIUS because it supports multiple protocols, including ARA and NetBEUI.
TACACS+ because it supports extensive accounting on a per-user or per-group basis.
RADIUS because it implements authentication and authorization as one process.
Rate this question:
Attacks that prevent users from accessing network services
Attacks that modify or corrupt traffic as that traffic travels across the network
Attacks that exploit vulnerabilities to gain access to sensitive information
Attacks that involve the unauthorized discovery and mapping of systems, services, and vulnerability
FTP
HTTPS
SDEE
SSH
SYSLOG
TFTP
Rate this question:
Router# dir
Router# show archive
Router# show secure bootset
Router# show flash
Rate this question:
The client is authorizing commands using the TACACS+protocol.
The client is authorizing commands using the RADIUS protocol.
The client is authenticating using the RADIUS protocol.
The client is authenticating using the TACACS+protocol
Rate this question:
Authentication
Confidentiality
Diffie-Hellman
Integrity
Nonrepudiation
Rate this question:
Quiz Review Timeline (Updated): Mar 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.