Which privilege level is predefined for the privileged EXEC mode?
a) level 0
b) level 1
c) level 15
d) level 16
Answer:
c) level 15
Explanation:
Privileged EXEC mode (level 15) is reserved for enable-mode privileges (full configuration and view of config files).
What is a requirement to use the Secure Copy Protocol feature?
a) At least one user with privilege level 1 has to be configured for local authentication.
b) A command must be issued to enable the SCP server side functionality.
c) A transfer can only originate from SCP clients that are routers.
d) The Telnet protocol has to be configured on the SCP server side.
Answer:
b) A command must be issued to enable the SCP server side functionality. ✔
Explanation:
SCP relies on SSH and AAA. You must enable the server with ip scp server enable; local user should be privilege 15.
Which three items are prompted for a user response during interactive AutoSecure setup? (Choose three.)
a) IP addresses of interfaces
b) content of a security banner
c) enable secret password
d) services to disable
e) enable password
f) interfaces to enable
Answer:
b) content of a security banner
c) enable secret password
e) enable password
Explanation:
Interactive AutoSecure prompts for banner and passwords (enable/enable secret) while it auto-secures services and interfaces.
Which syslog message type is accessible only to an administrator and only via the Cisco CLI?
a) errors
b) alerts
c) debugging
d) emergency
Answer:
c) debugging
Explanation:
Debug-level messages go to the internal logging buffer and are accessible via the CLI (show logging).
Refer to the exhibit. What two statements describe the NTP status of the router? (Choose two.)
a) The router is serving as an authoritative time source.
b) The software clock must be set with clock set for NTP to function.
c) The router is attached to a stratum 2 device.
d) The router is serving as a time source for 192.168.1.1.
e) The IP address of the time source for the router is 192.168.1.1.
Answer:
c) The router is attached to a stratum 2 device; e) The IP address of the time source for the router is 192.168.1.1.
Explanation:
Output shows sync to 192.168.1.1; router is stratum 3, hence its source is stratum 2.
An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?
a) privilege exec level 15
b) privilege exec level 0
c) privilege exec level 1
d) privilege exec level 2
Answer:
d) privilege exec level 2
Explanation:
Custom user levels are 2–14. Use privilege exec level <2-14> <command></command> to assign commands.
What are two features supported by SNMPv3 but not by SNMPv1/SNMPv2c? (Choose two.)
a) message encryption
b) community-based security
c) SNMP trap mechanism
d) message source validation
e) bulk retrieval of MIB information
Answer:
a) message encryption
d) message source validation
Explanation:
SNMPv3 adds integrity/authentication (source validation) and encryption; v1/v2c use community strings.
A network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.)
a) TCP port 40
b) encryption for all communication
c) single process for authentication and authorization
d) UDP port 1645
e) encryption for only the password of a user
f) separate processes for authentication and authorization
Answer:
b) encryption for all communication
f) separate processes for authentication and authorization
Explanation:
TACACS+ encrypts the entire payload and separates auth and authorization (uses TCP 49)
What are two characteristics of the RADIUS protocol? (Choose two.)
a) encryption of the entire body of the packet
b) encryption of the password only
c) the use of UDP ports for authentication and accounting
d) the separation of the authentication and authorization processes
e) the use of TCP port 49
Answer:
b) encryption of the password only
c) the use of UDP ports for authentication and accounting
Explanation:
RADIUS uses UDP 1645/1812 (auth) and 1646/1813 (acct), and encrypts only the password.
What is the one major difference between local AAA authentication and using the login local command?
a) The login local command requires manual username/password configuration, but local AAA does not.
b) Local AAA allows more than one user account; login local does not.
c) Local AAA provides a way to configure backup authentication methods; login local does not.
d) The login local command uses local usernames/passwords, but local AAA does not.
Answer:
c) Local AAA provides a way to configure backup authentication methods; login local does not.
Explanation:
Both use local accounts, but AAA lets you specify fallback methods.
Which two UDP port numbers may be used for server-based AAA RADIUS authentication? (Choose two.)
a) 1812
b) 1645
c) 1813
d) 1646
e) 49
Answer:
a) 1812
b) 1645
Explanation:
RADIUS auth: 1645/1812; acct: 1646/1813. TACACS+ uses TCP 49.
Which command will move the show access-lists command to privilege level 14?
a) router(config)# privilege level 14 command show access-lists
b) router(config)# privilege exec level 14 show access-lists
c) router(config)# set privilege level 14 show access-lists
d) router(config)# show access-lists privilege level 14
Answer:
b) router(config)# privilege exec level 14 show access-lists
Explanation:
Use privilege exec level <level> <command></command>.</level>
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
a) server-based AAA over TACACS+
b) local AAA over RADIUS
c) server-based AAA
d) local AAA over TACACS+
e) local AAA
f) server-based AAA over RADIUS
Answer:
e) local AAA
Explanation:
Local AAA stores credentials on the device—simple and suitable for small deployments.
What are three characteristics of superviews in the Cisco role-based CLI access feature? (Choose three.)
a) A user uses enable view superview-name to enter a superview.
b) A user uses a superview to configure commands inside associated CLI views.
c) Commands cannot be configured for a superview.
d) Level 15 privilege access is used to configure a new superview.
e) Deleting a superview does not delete the associated CLI views.
f) A single CLI view can be shared within multiple superviews.
Answer:
c) Commands cannot be configured for a superview
e) Deleting a superview does not delete the associated CLI views
f) A single CLI view can be shared within multiple superviews.
Explanation:
Commands are added to CLI views, then views are included in superviews; CLI views persist independently and can be shared.
A student enters Router(config)# parser view TECH-view. What is the purpose of this command?
a) to create a CLI view named TECH-view
b) to enter the superview named TECH-view
c) to check the current setup of the CLI view named TECH-view
d) to enter the CLI view named TECH-view
Answer:
a) to create a CLI view named TECH-view
Explanation:
parser view <name> creates a CLI view. (parser view <name> superview creates a superview.) named TECH-view</name></name>
show parser view all shows * JR-ADMIN. What does the * indicate?
a) It is a root view.
b) It is a CLI view without a command configured.
c) It is a superview.
d) It is a CLI view.
Answer:
c) It is a superview.
Explanation:
An asterisk in the summary marks a superview.
What are two characteristics of the Cisco IOS Resilient Configuration feature? (Choose two.)
a) It maintains a mirror image of the configuration file in RAM.
b) It sends a backup copy of the IOS image to a TFTP server.
c) It saves a secure copy of the primary image and device configuration that cannot be removed by a user.
d) It minimizes the downtime of a device that has had the image and configuration deleted.
e) It is a universal feature on all Cisco devices.
Answer:
c) It saves a secure copy of the primary image and device configuration that cannot be removed by a user
d) It minimizes the downtime of a device that has had the image and configuration deleted.
Explanation:
Resilient Configuration stores secure, undeletable copies to speed recovery; it’s platform-dependent (not universal).
What IOS privilege levels are available to assign for custom user-level privileges?
a) levels 1 through 15
b) levels 0, 1, and 15
c) levels 2 through 14
d) levels 0 and 1
Answer:
c) levels 2 through 14
Explanation:
Predefined: 0, 1, 15. Customization available at 2–14.
Refer to the exhibit. What information in the syslog message identifies the facility?
a) ADJCHG
b) Loading Done
c) OSPF
d) level 5
Answer:
c) OSPF
Explanation:
Facility categorizes the source (here, OSPF). level 5 is severity; ADJCHG is the mnemonic.
What is the biggest issue with local implementation of AAA?
a) Local implementation supports only TACACS+ servers.
b) Local implementation cannot provide secure authentication.
c) Local implementation does not scale well.
d) Local implementation supports only RADIUS servers.
Answer:
c) Local implementation does not scale well.
Explanation:
Local AAA relies on device-local databases, which becomes unmanageable across many devices/users.
Which task is necessary to encrypt the transfer of data between the ACS server and the AAA-enabled router?
a) Configure the key exactly the same way on the server and the router.
b) Specify the single-connection keyword.
c) Create a VPN tunnel between the server and the router.
d) Use identical reserved ports on the server and the router.
Answer:
a) Configure the key exactly the same way on the server and the router. ✔
Explanation:
AAA servers/clients use a shared secret key for encryption/authentication; it must match.
Based on show running-config, which type of view is SUPPORT?
a) CLI view, containing SHOWVIEW and VERIFYVIEW commands
b) superview, containing SHOWVIEW and VERIFYVIEW views
c) secret view, with a level 5 encrypted password
d) root view, with a level 5 encrypted secret password
Answer:
b) superview, containing SHOWVIEW and VERIFYVIEW views
Explanation:
SUPPORT is a superview that includes CLI views SHOWVIEW and VERIFYVIEW.
Which command should be used first for creating a CLI view named TECH-View?
a) Router# enable view
b) Router(config)# aaa new-model
c) Router# enable view TECH-view
d) Router(config)# parser view TECH-view
Answer:
b) Router(config)# aaa new-model
Explanation:
Role-based views require AAA enabled first; then create the view with parser view.
Which two commands must be issued to force OSPF MD5 authentication (password 1A2b3C) for all backbone interfaces? (Choose two.)
a) area 0 authentication message-digest
b) ip ospf message-digest-key 1 md5 1A2b3C
c) username OSPF password 1A2b3C
d) enable password 1A2b3C
e) area 1 authentication message-digest
Answer:
a) area 0 authentication message-digest
b) ip ospf message-digest-key 1 md5 1A2b3C
Explanation:
Global area 0 MD5 plus per-interface key enforces OSPF authentication.