Module 1-4

Module 1-4

Professional Development

24 Qs

quiz-placeholder

Similar activities

CANAL+ Netflix Partnership Quiz

CANAL+ Netflix Partnership Quiz

Professional Development

25 Qs

ROTY Level 2

ROTY Level 2

Professional Development

20 Qs

SDG, PYDP, RA 10742

SDG, PYDP, RA 10742

3rd Grade - Professional Development

20 Qs

Process 101

Process 101

Professional Development

22 Qs

Hosler Middle Trivia

Hosler Middle Trivia

KG - Professional Development

20 Qs

Telkom Witel Pasuruan

Telkom Witel Pasuruan

University - Professional Development

20 Qs

YASS! Trivia Game

YASS! Trivia Game

Professional Development

20 Qs

NAME THAT ENGLISH MOVIE SHAWCNX

NAME THAT ENGLISH MOVIE SHAWCNX

6th Grade - Professional Development

20 Qs

Module 1-4

Module 1-4

Assessment

Quiz

Fun

Professional Development

Easy

Created by

who areyou

Used 2+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Configure a host name other than "Router".

Configure DNS on the router.

Generate crypto keys.

Generate two-way pre-shared keys.

Configure the IP domain name on the router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 10 attempts 2 within 30

RouterA(config)# login block-for 30 attempts 2 within 10

RouterA(config)# login block-for 2 attempts 30 within 10

RouterA(config)# login block-for 30 attempts 10 within 2

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two practices are associated with securing the features and performance of router operating systems? (Choose two.)

Install a UPS.

Keep a secure copy of router operating system images.

Configure the router with the maximum amount of memory possible.

Disable default router services that are not necessary.

Reduce the number of ports that can be used to access the router.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface

Ethernet interface

console interface

privileged EXEC mode

boot IOS mode

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command encrypts passwords as they are transmitted across serial WAN links.

This command prevents someone from viewing the running configuration passwords.

This command enables a strong encryption algorithm for the enable secret password command.

This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

Fast Ethernet interfaces

console ports

serial interfaces

vty ports

loopback interfaces

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?

data loss through access to personal or corporate instant messaging and social media sites

the path by which a threat actor can gain access to a server, host, or network

intercepted emails that reveal confidential corporate or personal information

the unauthorized transfer of data containing valuable corporate information to a USB drive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?