Device Security Flashcards

(16 cards)

1
Q

Which option is a valid configuration to restrict remote users by applying an ACL to vty lines?

router(config)# line vty 0 15 router(config-line)# access-group 1 in

router(config)# line vty 0 15 router(config-line)# access-list 1 in

router(config)# line vty 0 15 router(config-line)# access-class 1 in

router(config)# line vty 0 15 router(config-line)# ip access-group 1 in

A

router(config)# line vty 0 15 router(config-line)# access-class 1 in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command enables you to configure the parameters for the console access?

line console 0

line console

login console 0

login console

A

line console 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command encrypts plaintext passwords on routers?

password encryption

service password-encryption

service encryption

enable secret

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement correctly describes the authenticator and its responsibility?

The authenticator, which is usually the switch, acts as an intermediary between the authentication server and the client.

The authenticator is the server that is responsible for authenticating the client.

Both the authenticator and authentication server act as the login server.

The authenticator is usually a switch that authenticates the newly connected client to access the network.

A

The authenticator, which is usually the switch, acts as an intermediary between the authentication server and the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command generates RSA keys for user authentication, used when connecting via SSH?

crypto key generate rsa

crypto generate key rsa

crypto rsa generate key

crypto generate rsa key

A

crypto key generate rsa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which banner should be used to show information that is hidden from unauthorized users?

MOTD

login

EXEC

slip-ppp

A

login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two statements are true about Cisco Discovery Protocol? (Choose two.)

It enables Cisco network devices to announce themselves to their neighbors.

It is disabled by default.

It provides an easy reconnaissance vector to any attacker with an Ethernet connection.

It can be useful for network troubleshooting when checking connectivity to non Cisco devices.

You can use the no cdp enable command to disable it globally.

A

It enables Cisco network devices to announce themselves to their neighbors.

It provides an easy reconnaissance vector to any attacker with an Ethernet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two practices would you follow to prevent VLAN attacks on a network? (Choose two.)

Set all ports to STP PortFast.

Disable DTP on all ports.

Disable Cisco Discovery Protocol on all ports.

Explicitly configure trunking mode or access mode.

Disable the HTTP service.

A

Disable DTP on all ports and Explicitly configure trunking mode or access mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker has bypassed physical security and was able to connect a laptop to an Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to the default, which action is taken against the attacker?

Packets with unknown source addresses are dropped and there is no notification that a security violation has occurred.

Packets with unknown source addresses are dropped and there is a notification that a security violation has occurred.

Packets with unknown source addresses are dropped, there is a notification that a security violation has occurred, and the interface becomes error-disabled.

Packets with unknown source addresses are forwarded and there is a notification to the syslog server.

A

Packets with unknown source addresses are dropped and there is a notification that a security violation has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamic ARP Inspection depends on which of the following options in environments that use DHCP?

Port Security

DHCP snooping binding

Cisco Discovery Protocol

HTTP Services

A

DHCP snooping binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You plan to implement an iACL on the internet router in your company to protect the infrastructure devices. Which three options should you use when configuring the iACL? (Choose three.)

Deny all noninitial fragments.

Permit all noninitial fragments.

Permit RFC 1918 IPv4 address space.

Implement ingress filtering according to RFC 2827.

Deny the flow of transit traffic to noninfrastructure destinations.

Permit protocols that are used on the devices, such as BGP, SSH, and SNMP, from specific source addresses.

A

Deny all noninitial fragments, Implement ingress filtering according to RFC 2827 and Permit protocols that are used on the devices, such as BGP, SSH, and SNMP, from specific source addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Referring to the command output, in what state is the port?

SwitchX# show port-security interface FastEthernet 0/5
Port Security : Enabled
Port Status : Secure-up
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses : 1
Configured MAC Addresses : 0
Sticky MAC Addresses : 0
Last Source Address:Vlan : fc99.47e5.2598:1
Security Violation Count : 0

forwarding

error-disabled

shutdown

listening

A

forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of threat requires mitigation by ensuring that the cable runs are neat?

remote access threats

environmental threats

electrical threats

maintenance threats

A

maintenance threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command protects a switched network from a hacker who is trying to preempt an election of STP?

spanning-tree portfast default

spanning-tree guard root

switchport port-security violation

spanning-tree guard

A

spanning-tree guard root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these options is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters?

DHCP spoofing

Dynamic ARP Inspection

port security

ARP spoofing

DHCP snooping

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of shutting down a VLAN?

Shutting down a VLAN disables all interfaces that are part of the VLAN.

Shutting down a VLAN prevents data exchange between the ports in a VLAN.

Shutting down a VLAN makes all the ports routed ports.

Shutting down a VLAN disables all interfaces that are not part of that VLAN.

A

Shutting down a VLAN disables all interfaces that are part of the VLAN.