网络安全第二章.doc
《网络安全第二章.doc》由会员分享,可在线阅读,更多相关《网络安全第二章.doc(11页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、【精品文档】如有侵权,请联系网站删除,仅供学习与交流网络安全第二章窗体顶端What are two characteristics of the SDM Security Audit wizard? (Choose two.) It uses interactive dialogs and prompts to implement AAA. It automatically enables Cisco IOS firewall and implements Cisco IOS IPS security configurations to secure the router. It displa
2、ys a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement. It requires users to first identify which router interfaces connect to the inside network and which connect to the outside network. It is initiated from CLI and executes a scrip
3、t in which the managment plane functions and forwarding plane services are tested against known vulnerabilities窗体底端窗体顶端Which statement matches the CLI commands to the SDM wizard that performs similar configuration functions? aaa configuration commands and the SDM Basic Firewall wizard auto secure pr
4、ivileged EXEC command and the SDM One-Step Lockdown wizard class-maps, policy-maps, and service-policy configuration commands and the SDM IPS wizard setup privileged EXEC command and the SDM Security Audit wizard 窗体底端窗体顶端Refer to the exhibit. What is the significance of secret 5 in the generated out
5、put? The ADMIN password is encrypted using DH group 5. The ADMIN password is encrypted via the service password-encryption command. The ADMIN password is hashed using MD5. The ADMIN password is hashed using SHA. 窗体底端窗体顶端Which two operations are required to implement Cisco SDM One-Step Lockdown? (Cho
6、ose two.) Choose the One-Step Lockdown feature. Apply the documented network policies. Deliver the configuration changes to the router. Compare the router configuration against recommended settings. Select the Firewall and ACL task on the SDM Configuration screen. 窗体顶端Refer to the exhibit. Which two
7、 statements describe the current SDM logging setup? (Choose two.) Buffered logging will be enabled on the router for Logging Level 7 messages. Buffered logging will be enabled on the syslog server for Logging Level 7 messages. All messages with a trap level of 4 and higher (less critical) will be lo
8、gged. All messages with a trap level of 4 and lower (more critical) will be logged. The router interface IP address that is connected to the syslog server is 192.168.1.3. The syslog server IP address is 192.168.1.3. Refer to the exhibit. What two pieces of information can be gathered from the genera
9、ted message? (Choose two.) This message is a level five notification message. This message appeared because a minor error occurred requiring further investigation. This message appeared because a major error occurred requiring immediate action. This message indicates that service timestamps have bee
10、n globally enabled. This message indicates that enhanced security was configured on the vty ports. Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.) physical security flash security operating system security remote access secur
11、ity router hardening zone isolation 窗体顶端Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console? R1(config)# username admin password Admin01pa55 R1(config)#
12、 line con 0 R1(config-line)# login local R1(config)# username admin password Admin01pa55 R1(config)# line con 0 R1(config-line)# login internal R1(config)# username admin Admin01pa55 encr md5 R1(config)# line con 0 R1(config-line)# login local R1(config)# username admin secret Admin01pa55 R1(config)
13、# line con 0 R1(config-line)# login local R1(config)# username admin secret Admin01pa55 R1(config)# line con 0 R1(config-line)# login internal 窗体底端By default, how many seconds of delay between virtual login attempts is invoked when the login block-for command is configured? one two three four five 窗
14、体顶端An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) configure the IP domain name on the router enable inbound vty Telnet sessions gen
15、erate the SSH keys configure DNS on the router enable inbound vty SSH sessions generate two-way pre-shared keys 窗体底端Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode? Keep a sec
16、ure copy of the router Cisco IOS image and router configuration file as a backup. Disable all unused ports and interfaces to reduce the number of ways that the router can be accessed. Configure secure administrative control to ensure that only authorized personnel can access the router. Locate the r
17、outer in a secure locked room that is accessible only to authorized personnel. Provision the router with the maximum amount of memory possible. 窗体顶端Refer to the exhibit. Which statement regarding the JR-Admin account is true? JR-Admin can issue show, ping, and reload commands. JR-Admin can issue pin
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络安全 第二
限制150内