You are on page 1of 7

Principio del formulario

Which privilege level has the most access to the Cisco IOS?
level 0

level 1

level 7

level 15

level 16

level 20
Final del formulario

2 Principio del formulario

A partial router configuration is shown in the graphic. The network administrator adds the following command at the router p

router(config)# security passwords min-length 10

Which of the following is correct?


The current password will continue to be used as a valid password until changed.

No password is required.

The current password is invalid and will not allow a login.

A password that is at least ten characters long must immediately be implemented for a successful login.
Final del formulario

3 Principio del formulario


What are three major functions performed by the security management subsystem, CiscoWorks VMS? (Choose three.)
to manage access control lists for Cisco PIX Security Appliances

to enforce access control policies between two processes running on a server

to capture and analyze network traffic, and respond to network intrusions

to identify sensitive network resources

to respond to first-stage denial of service network attacks

to monitor and log access to network resources


Final del formulario

4 Principio del formulario


A network administrator has just completed security training and has decided to change from HIDS to HIPS to protect hosts.
these would be a major advantage gained from the change?
HIPS does not require host-based client software.
HIPS would prevent the need to update signature files as often.

HIPS would be able to prevent intrusions.

HIPS would consume fewer system resources.


Final del formulario

5 Principio del formulario


Which two steps are necessary to ensure that your HIDS and HIPS do not miss any exploits? (Choose two.)
upgrade the HIDS and HIPS software as new versions are released

perform periodic vulnerability assessment

monitor alerts and logs

update signatures on a regular basis

ensure that all security patches are loaded on the host machine
Final del formulario

6 Principio del formulario


Real-time intrusion detection occurs at which stage of the Security Wheel?
securing stage

monitoring stage

testing stage

improvement stage

reconnaissance stage
Final del formulario

7 Principio del formulario


Which command will encrypt all passwords in the router configuration file?
enable secret

password encrypt all

enable password-encryption

service password-encryption

no clear-text password
Final del formulario

8 Principio del formulario


Which router command will result in the router only accepting passwords of 16 characters or more?
service password-encryption

enable secret min-length 16

security passwords min-length 16

security passwords max-length 16


Final del formulario

9 Principio del formulario


A security team is charged with hardening network devices. What must be accomplished first before deciding how to configu
on any device?
Audit all relevant network devices.

Document all router configurations.


Create or update security policies.

Complete a vulnerability assessment.


Final del formulario

10 Principio del formulario


Why does SSH provide better security than Telnet?
SSH compresses data while Telnet does not compress data.

SSH encrypts data with private key while Telnet uses public key.

SSH encrypts data while Telnet uses clear text in transmitting data.

SSH encrypts data with public key while Telnet uses hashing algorithm.
Final del formulario
Principio del formulario
On a Monday morning, network engineers notice that the log files on the central server are larger than normal. Examining the log
the majority of the entries are from sensors deployed on the perimeter of the network. The logs reveal that a worm attack was su
stopped by the perimeter devices. Based on this information, which of these technologies is this company using?
NIDS using passive technology

HIPS using passive technology

NIDS using active technology

HIDS using passive technology

HIPS using active technology


Final del formulario

12 Principio del formulario


Which two objectives must a security policy accomplish? (Choose two.)
provide a checklist for the installation of secure servers

describe how the firewall must be configured

document the resources to be protected

identify the security objectives of the organization

identify the specific tasks involved in hardening a router


Final del formulario

13 Principio del formulario


MD5 can be used for authenticating routing protocol updates for which three protocols? (Choose three.)
RIPv1

RIPv2

IGRP

EIGRP

BGP
Final del formulario

14 Principio del formulario


The network administrator of company XYZ likes to secure routers by disabling the password recovery procedure for anyone
physical access to the router. Which command would be used to achieve this goal?
router(config)# no rommon-mode

router(config)# no password-recovery

router(config)# no service password-recovery

router(config)# no rommon-password recovery


Final del formulario

15 Principio del formulario


Which command sets the inactivity timer, for a particular line or group of lines, to four minutes and fifteen seconds?
router(config)# line-timeout 4 15

router(config-line)# line-timeout 4 15

router(config-line)# exec-timeout 255

router(config-line)# timeout 255

router(config-line)# exec-timeout 4 15
router(config-line)# line-timeout 255
Final del formulario

16 Principio del formulario


What is the effect of applying this command to a Cisco router?

router(config)# no service finger


UNIX commands are disabled on the router.

All TCP/IP services are disabled.

PING usage is disabled.

Users logged into the router remotely will not be able to see if other users are logged into the router.
Final del formulario

17 Principio del formulario


A network administrator installs a new stateful firewall. Which type of security solution is this?
secure connectivity

threat defense

policy enforcement
trust and identity

authentication
Final del formulario

18 Principio del formulario


Which configuration will allow an administrator to access the console port using a password of password?
router(config)# line aux 0
router(config-line)# login
router(config-line)# password password
router(config)# line console 0
router(config-line)# login
router(config-line)# password password
router(config)# line console 0
router(config-line)# password password
router(config)# line console 0
router(config-line)# access
router(config-line)# password password
router(config)# line vty 0
router(config-line)# password password
router(config)# line vty 0
router(config-line)# access
router(config-line)# password password
Final del formulario

19 Principio del formulario


After providing for all operational requirements of the network, the network support team has determined that the servers sh
hardened against security threats so that the network can operate at full potential. At which stage of the network life cycle do
hardening occur?
planning

design

implementation

operation

optimization
Final del formulario

20 Principio del formulario


XYZ Company recently adopted software for installation on critical servers that will detect malicious attacks as they occur. In
the software will stop the execution of the attacks and send an alarm to the network administrator. Which technology does th
utilize?
host-based intrusion detection

host-based intrusion protection

host-based intrusion prevention

host-based intrusion notification


Final del formulario
Principio del formulario
Which encryption type uses the MD5 hash algorithm?
Type 0

Type 1

Type 5

Type 7
Final del formulario

22 Principio del formulario


The Security Wheel promotes a continuous process to retest and reapply updated security measures. What is the core or “h
component of the Security Wheel?
testing policy

monitor

improve

security policy
Final del formulario

You might also like