Flashcards in security-2 Deck (14)
How do you maintain security in multiple websites?
Which of the following encrypts the traffic on a leased line?
Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?
A. transport type all
B. transport output all
C. transport preferred all
D. transport input all
How to verify SSH connections were secured?
A. ssh -v 1 -l admin IP
B. ssh -v 2 -l admin IP
C. ssh -l admin IP
D. ssh -v 2 admin IP
In order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to meet this requirement?
A. Access control lists on file servers
B. Elimination of shared accounts
C. Group-based privileges for accounts
D. Periodic user account access reviews
Which three feature are represented by A letter in AAA? (Choose three)
Answer: A B C
What are two characteristics of SSH? (Choose two)
A. use port 22
D. most common remote-access method
E. operate at transport
Answer: A C
Which two statements about TACACS+ are true? (Choose two)
A. It can run on a UNlX server.
B. It authenticates against the user database on the local device.
C. It is more secure than AAA authentication.
D. It is enabled on Cisco routers by default. E. It uses a managed database.
Answer: A E
Refer to the exhibit. Which user-mode password has just been set?
R1#config R1(config)#line vty 0 4 R1(config-line)#password C1scO R1(config-line)#login
Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two)
A. tty password
B. enable secret password
C. vty password
D. aux password
E. console password
F. username password
Answer: B C
Which two statements about firewalls are true?
A. They can be used with an intrusion prevention system. B. They can limit unauthorized user access to protect data. C. Each wireless access point requires its own firewall
D. They must be placed only at locations where the private network connects to the internet.
E. They can prevent attacks from the internet only.
Answer: A B
Which three options are types of Layer 2 network attack? (Choose three)
A. Spoofing attacks
B. VLAN Hopping
C. Botnet attacks
D. DDOS attacks
E. ARP Attacks
F. Brute force attacks
Answer: A B E
Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?