Module 16 17
Module 16 17
configuration?
ip domain-name cisco.com
transport input ssh
enable secret class
service password-encryption
5On which two interfaces or ports can security be improved by configuring executive
timeouts? (Choose two.)
vty ports
console ports
Fast Ethernet interfaces
serial interfaces
loopback interfaces
6What is considered the most effective way to mitigate a worm attack?
Ensure that all systems have the most current virus definitions.
Download security updates from the operating system vendor and patch all vulnerable systems.
Change system passwords every 30 days.
Ensure that AAA is configured in the network
7A network technician is troubleshooting an issue and needs to verify all of the IPv6
interface addresses on a router. What is the best command to use to accomplish the
task?
show ip nat translations
show ip route
show interfaces
show ipv6 interface
8What is the role of an IPS?
authenticating and validating traffic
connecting global threat information to Cisco network security devices
detecting and blocking of attacks in real time
filtering of nefarious websites
9A user is redesigning a network for a small company and wants to ensure security at
a reasonable price. The user deploys a new application-aware firewall with intrusion
detection capabilities on the ISP connection. The user installs a second firewall to
separate the company network from the public network. Additionally, the user installs
an IPS on the internal network of the company. What approach is the user
implementing?
structured
risk based
attack based
layered
0
What is the purpose of the network security authentication function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
17Which attack involves a compromise of data that occurs between two end points?
man-in-the-middle attack
denial-of-service
username enumeration
extraction of security parameters
18Which firewall feature is used to ensure that packets coming into a network are
legitimate responses to requests initiated from internal hosts?
stateful packet inspection
application filtering
URL filtering
packet filtering
Telnet
show cdp neighbors
an extended ping
traceroute
29What is an accurate description of redundancy?
configuring a router with a complete MAC address database to ensure that all frames can be forwarded to
the correct destination
designing a network to use multiple paths between switches to ensure there is no single point of failure
configuring a switch with proper security to ensure that all traffic forwarded through an interface is filtered
designing a network to use multiple virtual devices to ensure that all traffic uses the best path through the
internetwork
29What is an accurate description of redundancy?
configuring a router with a complete MAC address database to ensure that all frames can be forwarded to
the correct destination
designing a network to use multiple paths between switches to ensure there is no single point of failure
configuring a switch with proper security to ensure that all traffic forwarded through an interface is filtered
designing a network to use multiple virtual devices to ensure that all traffic uses the best path through the
internetwork
30Which command can an administrator issue on a Cisco router to send debug
messages to the vty lines?
logging synchronous
terminal monitor
logging buffered
logging console
31What is the purpose of a small company using a protocol analyzer utility to capture
network traffic on the network segments where the company is considering a network
upgrade?
to document and analyze network traffic requirements on each network segment
to capture the Internet connection bandwidth requirement
to identify the source and destination of local network traffic
to establish a baseline for security analysis after the network is upgraded
31What is the purpose of a small company using a protocol analyzer utility to capture
network traffic on the network segments where the company is considering a network
upgrade?
to document and analyze network traffic requirements on each network segment
to capture the Internet connection bandwidth requirement
to identify the source and destination of local network traffic
to establish a baseline for security analysis after the network is upgraded
32Why would a network administrator use the tracert utility?
to check information about a DNS name in the DNS server
to determine the active TCP connections on a PC
to display the IP address, default gateway, and DNS server address for a PC
to identify where a packet was lost or delayed on a network
Something is causing a time delay between the networks.
Connectivity between H1 and H3 is fine.
H3 is not connected properly to the network.
Performance between the networks is within expected parameters.
Something is causing interference between H1 and R1.
34A network administrator is upgrading a small business network to give high priority
to real-time applications traffic. What two types of network services is the network
administrator trying to accommodate? (Choose two.)
SNMP
instant messaging
FTP
video
voice
35An administrator decides to use "RobErT" as the password on a newly installed
router. Which statement applies to the password choice?
It is weak since it uses easily found personal information.
It is strong because it contains 10 numbers and special characters.
It is strong because it uses a passphrase.
It is strong because it uses a minimum of 10 numbers, letters and special characters.