Search Header Logo

Module 1-4

Authored by who areyou

Fun

Professional Development

24 Questions

Used 2+ times

Module 1-4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Configure a host name other than "Router".

Configure DNS on the router.

Generate crypto keys.

Generate two-way pre-shared keys.

Configure the IP domain name on the router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 10 attempts 2 within 30

RouterA(config)# login block-for 30 attempts 2 within 10

RouterA(config)# login block-for 2 attempts 30 within 10

RouterA(config)# login block-for 30 attempts 10 within 2

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two practices are associated with securing the features and performance of router operating systems? (Choose two.)

Install a UPS.

Keep a secure copy of router operating system images.

Configure the router with the maximum amount of memory possible.

Disable default router services that are not necessary.

Reduce the number of ports that can be used to access the router.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface

Ethernet interface

console interface

privileged EXEC mode

boot IOS mode

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command encrypts passwords as they are transmitted across serial WAN links.

This command prevents someone from viewing the running configuration passwords.

This command enables a strong encryption algorithm for the enable secret password command.

This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

Fast Ethernet interfaces

console ports

serial interfaces

vty ports

loopback interfaces

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?

data loss through access to personal or corporate instant messaging and social media sites

the path by which a threat actor can gain access to a server, host, or network

intercepted emails that reveal confidential corporate or personal information

the unauthorized transfer of data containing valuable corporate information to a USB drive

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?