CCIE Theory Implement Security
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | Import the public RSA key from the Cisco IPS team that allows the router to verify that a signature update (which was signed by this key) comes from cisco
🗑
|
||||
Class-map match-all telnet-allowed match input-interface fa0/0 match access-list telnet Class-map telnet-deny match access-list telnet Policy-map telnet class tenet-allowed bandwidth 64 class telnet-deny drop control-plane service-policy input | show 🗑
|
||||
show | CEF
🗑
|
||||
Which protocol and port have been assigned by IANA for RADIUS authentication? | show 🗑
|
||||
show | 1 hostname
2 domain name
🗑
|
||||
show | NTP is not configured on the router
🗑
|
||||
Refer to the exhibit: Jun 5 12 :55:44.359: %sec-6-IPACCESSLOGP: list MYACL permitted tcp 192.168.16.1 (38402) - 192.168.16.2 (23), 1 packet [0x723E6E12] Which two statements are correct? | show 🗑
|
||||
show | inspect IP packets encapsulated in tunnels, such as GRE
🗑
|
||||
Which IOS feature is configured by the IP inspect inspection-name {in|out} command? | show 🗑
|
||||
show | 768 bits
🗑
|
||||
show | The DHCP server must support option 82, or the client is not assigned an IP address
🗑
|
||||
show | A potential man-in-the-middle attack can be used againt the clients
🗑
|
||||
show | 1 It is a Cisco proprietary protocol
2 Authentication and authorization are done at different stages
3 TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header
🗑
|
||||
show | Configure port security
🗑
|
||||
show | ip nat outside static x.x.x.x y.y.y.y and ip nat inside static x.x.x.x y.y.y.y
🗑
|
||||
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP source addresses? | show 🗑
|
||||
show | 1 an IP address of an inside host as it appears to the outside network
2 If the enterprise is connected to the global Internet, this address can be allocated from a globally unique address space.
🗑
|
||||
show | 1 It is used in multihome network scenarios
2 It can be used with BGP to mitigate DoS and DDoS
🗑
|
||||
show | Remove the log keyword from each ACL entry
🗑
|
||||
show | it will create a class map that matches the content of ACL101 and the HTTP protocol, and will then create an inspection policy that will drop packets at the class map.
🗑
|
||||
show | port security with statically configured MAC addresses
🗑
|
||||
What is also called Type o authentication in OSPF on Cisco routers? | show 🗑
|
||||
show | ip verify unicast source reachable-via any
🗑
|
||||
show | Port Address Translation
🗑
|
||||
What does Cisco recommend when you are enabling Cisc IOS ips? | show 🗑
|
||||
show | ip http client secure-trustpoint-name
🗑
|
||||
show | The DHCL server reply will be dropped and the client will not be able to otain an IP address
🗑
|
||||
Which of these mandatory when configuring CISCO IOS firewall? | show 🗑
|
||||
show | 1 ICMP
2 BGP
3 SSH
🗑
|
||||
show | 1 a domain name
2 an RSA key
3 a hostname
🗑
|
||||
show | uRPF is performed with the CEF switching
🗑
|
||||
show | if the tacacs+ server failed, no authentication
would be required
🗑
|
||||
What is the purpose of an explicit "deny any" statement at the end of an ACL? | show 🗑
|
||||
show | 1 ICMP
2 BGP
3 SSH
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
100000429226399
Popular Computers sets