Documente Academic
Documente Profesional
Documente Cultură
Which privilege level has the most access to the Cisco IOS?
level 0
level 1
level 7
level 15
level 16
level 20
Final del formulario
A partial router configuration is shown in the graphic. The network administrator adds the following command at the router p
No password is required.
A password that is at least ten characters long must immediately be implemented for a successful login.
Final del formulario
ensure that all security patches are loaded on the host machine
Final del formulario
monitoring stage
testing stage
improvement stage
reconnaissance stage
Final del formulario
enable password-encryption
service password-encryption
no clear-text password
Final del formulario
SSH encrypts data with private key while Telnet uses public key.
SSH encrypts data while Telnet uses clear text in transmitting data.
SSH encrypts data with public key while Telnet uses hashing algorithm.
Final del formulario
Principio del formulario
On a Monday morning, network engineers notice that the log files on the central server are larger than normal. Examining the log
the majority of the entries are from sensors deployed on the perimeter of the network. The logs reveal that a worm attack was su
stopped by the perimeter devices. Based on this information, which of these technologies is this company using?
NIDS using passive technology
RIPv2
IGRP
EIGRP
BGP
Final del formulario
router(config)# no password-recovery
router(config-line)# line-timeout 4 15
router(config-line)# exec-timeout 4 15
router(config-line)# line-timeout 255
Final del formulario
Users logged into the router remotely will not be able to see if other users are logged into the router.
Final del formulario
threat defense
policy enforcement
trust and identity
authentication
Final del formulario
design
implementation
operation
optimization
Final del formulario
Type 1
Type 5
Type 7
Final del formulario
monitor
improve
security policy
Final del formulario