CCNA Security: 4-What Are Two Characteristics of The SDM Security Audit Wizard?
CCNA Security: 4-What Are Two Characteristics of The SDM Security Audit Wizard?
1- Refer to the exhibit. What two pieces of information can be gathered from the
generated message?
2- By default, how many seconds of delay between virtual login attempts is invoked
when the login block-for command is configured?
3- Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router
is configured as the NTP master, and the other is an NTP client. Which two pieces of
information can be obtained from the partial output of the show ntp associations
detail command on R2?
5- If AAA is already enabled, which three CLI steps are required to configure a router
with a specific view?
Nouf Al Khajeh 1
CCNA Security [CHAPTER 2]
6- Refer to the exhibit. Which statement regarding the JR-Admin account is true?
9- Refer to the exhibit. Based on the output of the show running-config command,
which type of view is SUPPORT?
10- Which three services on a router does Cisco SDM One-Step Lockdown enable?
11- An administrator defined a local user account with a secret password on router
R1 for use with SSH. Which three additional steps are required to configure R1 to
accept only encrypted SSH connections?
12- Which statement describes the operation of the Cisco SDM Security Audit wizard?
Nouf Al Khajeh 2
CCNA Security [CHAPTER 2]
13- An administrator needs to create a user account with custom access to most
privileged EXEC commands. Which privilege command is used to create this custom
account?
14- Which three areas of router security must be maintained to secure an edge router
at the network perimeter?
15- Which service is enabled on a Cisco router by default that can reveal significant
information about the router and potentially make it more vulnerable to attack?
16- Which two operations are required to implement Cisco SDM One-Step Lockdown?
17- Which statement matches the CLI commands to the SDM wizard that performs
similar configuration functions?
18- Refer to the exhibit. What is the significance of secret 5 in the generated output?
19- Which three commands are required to restore a primary bootset from a secure
archive on a router on which Cisco IOS resilience is enabled?
20- Which set of commands are required to create a username of admin, hash the
password using MD5, and force the router to access the internal username database
when a user attempts to access the console?
Nouf Al Khajeh 3
CCNA Security [CHAPTER 2]
21- Refer to the exhibit. Which two statements describe the current SDM logging
setup?
23- What is the minimum recommended modulus key length for keys generated to
use with SSH?
25- Refer to the exhibit. What two facts can be determined from the output?
Nouf Al Khajeh 4
CCNA Security [CHAPTER 2]
26- What are three requirements that must be met if an administrator wants to
maintain device configurations via secure in-band management?
Nouf Al Khajeh 5