Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CCNA Sec V2

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show probe, penetrate, persist, propagate, and paralyze  
🗑
Which two are characteristics of DoS attacks? (Choose   show
🗑
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?   show
🗑
show buffer overflow* port redirection* trust exploitation*  
🗑
5. What occurs during a spoofing attack?   show
🗑
show A Trojan Horse can be carried in a virus or worm.*  
🗑
Which phase of worm mitigation requires compartmentalization and segmentation of the network to slow down or stop the worm and prevent currently infected hosts from targeting and infecting other systems?   show
🗑
Which two statements are characteristics of a virus? (Choose two.)   show
🗑
What is a ping sweep?   show
🗑
show virus*  
🗑
show reconnaissance*  
🗑
What occurs during the persist phase of a worm attack?   show
🗑
show enabling vulnerability* payload* propagation mechanism*  
🗑
show An FTP Trojan Horse is executing.*  
🗑
show determine potential vulnerabilities* identify active services* identify operating systems*  
🗑
How is a Smurf attack conducted?   show
🗑
Which access attack method involves a software program attempting to discover a system password by using an electronic dictionary?   show
🗑
show anti-spoofing technologies* intrusion protection systems*  
🗑
Which phase of worm mitigation involves terminating the worm process, removing modified files or system settings that the worm introduced, and patching the vulnerability that the worm used to exploit the system?   show
🗑
Which characteristic best describes the network security Compliance domain as specified by the ISO/IEC?   show
🗑
Which statement describes phone freaking?   show
🗑
Which two statements describe access attacks? (Choose two.)   show
🗑
show Internal threats can cause even greater damage than external threats.*  
🗑
show The containment phase requires the use of incoming and outgoing ACLs on routers and firewalls.* The inoculation phase patches uninfected systems with the appropriate vendor patch for the vulnerability.* The treatment phase disinfe  
🗑
show man in the middle*  
🗑
What is considered a valid method of securing the control plane in the Cisco NFP framework?   show
🗑
A port scan is classified as what type of attack?   show
🗑
Which type of software typically uses a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN?   show
🗑
show to protect against DoS attacks* to provide bandwidth control*  
🗑
show availability* confidentiality* integrity*  
🗑
show security policy*  
🗑
show CERT*  
🗑
How would limiting the type and number of input characters on a web page help with network security?   show
🗑
show Malware is contained in a seemingly legitimate executable program.*  
🗑
What causes a buffer overflow?   show
🗑
show This message is a level five notification message.* This message indicates that service timestamps have been globally enabled.*  
🗑
show one*  
🗑
Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2?   show
🗑
. What are two characteristics of the SDM Security Audit wizard? (Choose two. )   show
🗑
show It requires users to first identify which router interfaces connect to the inside network and which connect to the outside network.*  
🗑
If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three. )   show
🗑
show JR-Admin can issue ping and reload commands.*  
🗑
Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?   show
🗑
show CBAC* security banner* enable secret password*  
🗑
Refer to the exhibit. Based on the output of the show running-config command, which type of view is SUPPORT?   show
🗑
Which three services on a router does Cisco SDM One-Step Lockdown enable? (Choose three. )   show
🗑
An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three. )   show
🗑
Which statement describes the operation of the Cisco SDM Security Audit wizard?   show
🗑
An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?   show
🗑
Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)   show
🗑
Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?   show
🗑
Which two operations are required to implement Cisco SDM One-Step Lockdown? (Choose two. )   show
🗑
show auto secure privileged EXEC command and the SDM One-Step Lockdown wizard*  
🗑
Refer to the exhibit. What is the significance of secret 5 in the generated output?   show
🗑
show Restart the router in ROM monitor mode and display the secure bootset Cisco IOS image name using the dir command.* Boot the secure bootset Cisco IOS image using the boot command with the filename.*  
🗑
show R1(config)# username admin secret Admin01pa55 R1(config)# line con 0 R1(config-line)# login local***********  
🗑
show All messages with a trap level of 4 and lower (more critical) will be logged.* The syslog server IP address is 192. 168. 1. 3.*  
🗑
What are two characteristics of SNMP community strings? (Choose two. )   show
🗑
show 1024*  
🗑
Which two characteristics apply to Role-Based CLI Access superviews? (Choose two. )   show
🗑
show The Cisco IOS image and configuration files have been properly secured.* The Cisco IOS Resilient Configuration feature is enabled.*  
🗑
show network devices configured to accommodate SSH* encryption of all remote access management traffic* connection to network devices through a production network or the Internet*  
🗑
Why is the usernamenamesecretpassword command preferred over the usernamenamepasswordpassword command?   show
🗑
show ICMP unreachable notifications are enabled by default but should be disabled on untrusted interfaces.* TCP keepalives are disabled by default but should be enabled globally to prevent certain DoS attacks.*  
🗑
Which command is used to verify the existence of a secure Cisco IOS image file?   show
🗑
Which three types of views are available when configuring the Role-Based CLI Access feature? (Choose three.)   show
🗑
show It uses the MD5 algorithm for encrypting passwords.*  
🗑
Which statement describes the operation of the CCP Security Audit wizard?   show
🗑
Which three services does CCP One-Step Lockdown enable? (Choose three.)   show
🗑
show Subsequent virtual login attempts from the user are blocked for 60 seconds.* A message is generated that indicates the username and source IP address of the user.* During the quiet mode, an administrator can log in from host 172.16.1.2.*  
🗑
show BAC* Security banner* Enable secret password*  
🗑
Which statement describes the CCP Security Audit wizard?   show
🗑
show Ntp master 1*  
🗑
show It provides for authentication and accountability.*  
🗑
Which authentication method stores usernames and passwords in the router and is ideal for small networks?   show
🗑
In regards to Cisco Secure ACS, what is a client device?   show
🗑
When configuring a Cisco Secure ACS, how is the configuration interface accessed?   show
🗑
What is a difference between using the login local command and using local AAA authentication for authenticating administrator access?   show
🗑
Due to implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?   show
🗑
show Character mode provides users with administrative privilege EXEC access and requires use of the console, vty, or tty ports.* Packet mode provides remote users with access to network resources and requires use of dialup or VPN.*  
🗑
show TACACS+ provides authorization of router commands on a per-user or per-group basis.*  
🗑
. Refer to the exhibit. Router R1 is configured as shown. An administrative user attempts to use Telnet from router R2 to router R1 using the interface IP address 10.10.10.1. However, Telnet access is denied. Which option corrects this problem?   show
🗑
efer to the exhibit. In the network shown, which AAA command logs the use of EXEC session commands?   show
🗑
show It accepts a locally configured username, regardless of case.*  
🗑
What is the result if an administrator configures the aaa authorization command prior to creating a user with full access rights?   show
🗑
Which statement identifies an important difference between TACACS+ and RADIUS?   show
🗑
show Cisco Secure ACS supports LDAP.* Cisco Secure ACS supports both TACACS+ and RADIUS protocols.*  
🗑
show reduces delays in the authorization queries by using persistent TCP sessions*  
🗑
How does a Cisco Secure ACS improve performance of the TACACS+ authorization process?   show
🗑
show Authenticated users are granted full access rights.*  
🗑
Refer to the exhibit. Router R1 has been configured as shown, with the resulting log message. On the basis of the information presented, which two AAA authentication statements are true? (Choose two.)   show
🗑
show authentication, authorization, and accounting*  
🗑
show character mode* packet mode*  
🗑
show password encryption* utilization of transport layer protocols*  
🗑
After accounting is enabled on an IOS device, how is a default accounting method list applied?   show
🗑
A company is deploying user device access control through a NAC appliance as part of the Cisco TrustSec solution. Which device is needed to serve as the central management for the access control?   show
🗑
show to accommodate any difference in the authorization process between the ACS and an external database.*  
🗑
show Pa$$w0rD*  
🗑
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?   show
🗑
. Refer to the exhibit. A network administrator configures AAA authentication on R1. Which statement describes the effect of the keyword single-connection in the configuration?   show
🗑
show Security Intelligence Operations  
🗑
The Cisco Network Foundation Protection framework has three functional areas. The data plane of a router is responsible for routing packets correctly.   show
🗑
What is hyperjacking?   show
🗑
show antivirus software  
🗑
show worm  
🗑
show by continuously sending packets of unexpected size or unexpected data  
🗑
show Devices in networks should not access and use one another unnecessarily and unconditionally.  
🗑
show A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.  
🗑
Antivirus software can prevent viruses from entering the network.   show
🗑
show A virus has infected the computers.  
🗑
show A virus is triggered by an event on the host system.  
🗑
show to scan for accessibility to gather information about the network and devices  
🗑
show management plane  
🗑
Which security measure is typically found both inside and outside a data center facility?   show
🗑
What is a main purpose of launching an access attack on network systems?   show
🗑
show SNMP agent  
🗑
show login block-for 180 attempts 3 within 120  
🗑
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)   show
🗑
The is a Layer 2 open standard network discovery protocol.   show
🗑
show CDP  
🗑
What tool is available through the Cisco IOS CLI to initiate security audits and to make recommended configuration changes with or without administrator input?   show
🗑
Which packet type is user-generated and forwarded by a router?   show
🗑
Which two options provide secure remote access to a router? (Choose two.)   show
🗑
Why is the username name algorithm-type scrypt secret password command preferred over the username name secret password command?   show
🗑
What IOS privilege levels are available to assign for custom user-level privileges?   show
🗑
show securing administrative access disabling unused ports and interfaces  
🗑
show spoofing  
🗑
show Assign a secret password to the view. Assign commands to the view. Create a view using the parser view view-name command.  
🗑
show Root  
🗑
What is the first required task when configuring server-based AAA authentication?   show
🗑
show Configure the key exactly the same way on the server and the router.  
🗑
show authentication who are u Authorzizatiion What u can do accounting What has happened  
🗑
What is the purpose of the none keyword in an AAA authentication configuration?   show
🗑
When 802.1X port-based authentication is enabled, only eap traffic will be allowed through the switch port that a workstation is connected to until the workstation is authenticated.   show
🗑
What port state is used by 802.1X if a workstation fails authorization?   show
🗑
Which statement describes a difference between RADIUS and TACACS+?   show
🗑
show ISE  
🗑
Refer to the exhibit. What part of the AAA status message helps a network administrator determine which method list is being referenced?   show
🗑
What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?   show
🗑
Which statement describes a characteristic of authorization in an AAA solution?   show
🗑
show No configuration is necessary.  
🗑
show Local implementation does not scale well.  
🗑
show A user was successfully authenticated.  
🗑
show the administrative user should use the username Admin and password Str0ngPa55w0rd.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: fluffyhuffy
Popular Engineering sets