Ads (728x90)

Securing Network Devices


Here you will find answers to Securing Network Devices Questions

Question 1
As a network engineer at securitytut.com, you are responsible for the network. Which one will be necessarily taken into consideration when implementing Syslogging in your network?
A. Log all messages to the system buffer so that they can be displayed when accessing the router.
B. Use SSH to access your Syslog information.
C. Enable the highest level of Syslogging available to ensure you log all possible event messages.
D. Syncronize clocks on the network with a protocol such as Network Time Protocol.
Answer: D
Question 2
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?
A. All vty ports are automatically enabled for SSH to provide secure management.
B. The SSH protocol is automatically enabled.
C. You must then zeroize the keys to reset secure shell before configuring other parameters.
D. You must then specify the general-purpose key size used for authentication with the crypto key generate rsa general-keys modulus command.
Answer: B
Question 3
As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the command “enable secret level 5 password” in the global mode, what does it indicate?
A. Set the enable secret command to privilege level 5.
B. The enable secret password is hashed using SHA.
C. The enable secret password is hashed using MD5.
D. The enable secret password is encrypted using Cisco proprietary level 5 encryption.
E. The enable secret password is for accessing exec privilege level 5.

Answer: E
Question 4
Please choose the correct description about Cisco Self-Defending Network characteristics.
1 Interaction amongst services and devices to mitigate attacks
2 Enabling elements in the networks to be a point of policy enforcement
3 Security technologies that evolve with emerging attacks
A. INTEGRATED – 1
COLLABORATIVE – 2
ADAPTIVE – 3
B. INTEGRATED – 2
COLLABORATIVE – 1
ADAPTIVE – 3
C. INTEGRATED – 2
COLLABORATIVE – 3
ADAPTIVE – 1
D. INTEGRATED – 3
COLLABORATIVE – 2
ADAPTIVE – 1

Answer: B
Question 5
Which three items are Cisco best-practice recommendations for securing a network? (Choose three)
A. Deploy HIPS software on all end-user workstations.
B. Routinely apply patches to operating systems and applications.
C. Disable unneeded services and ports on hosts.
D. Require strong passwords, and enable password expiration.

Answer: B C D
Question 6
Given the exhibit below. You are a network manager of your company. You are reading your Syslog server reports. On the basis of the Syslog message shown, which two descriptions are correct? (Choose two)
Feb 1 10:12:08 PST: %SYS-5-CONFIG_1: Configured from console by vty0 (10.2.2.6)
A.    This message is a level 5 notification message.
B.    This message is unimportant and can be ignored.
C.    This is a normal system-generated information message and does not require further investigation.
D.    Service timestamps have been globally enabled.

Answer: A D
Explanation
Time stamps can be enabled on a router to either debugging or logging messages independently (sometimes it is really important for the administrators to solve the problems)
This Syslog message indicates that someone has configured the router using the vty 0 port.
Service timestamps have been enabled with the command “service timestamps” in the global configuration mode. For example, we can create a similar message as shown above with the command:
Router(config)# service timestamps log datetime localtime show-timezone
For your information, below are the Cisco Log Severity Messages:
Syslog Level Definition Example
0: LOG_EMERG A panic condition normally broadcast to all
users
Cisco IOS Software
could not load.
1: LOG_ALERT A condition that should be corrected immedi-
ately, such as a corrupted system database
Temperature too high.
2: LOG_CRIT Critical conditions; for example, hard device
errors
Unable to allocate
memory.
3 : LOG_ERR Errors Invalid memory size.
4: LOG_WARNING Warning messages Crypto operation
failed.
5: LOG_NOTICE Conditions that are not error conditions, but
should possibly be handled specially
Interface changed
state, up or down.
6: LOG_INFO Informational messages Packet denied by ACL
7: LOG_DEBUG Messages that contain information normally of
use only when debugging a program
Packet type invalid.
(Reference: Implementing Cisco IOS Network Security Self-Study)
Question 7
Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and antiphishing features?
A. Cisco 4200 series IPS appliance
B. Cisco ASA 5500 series security appliance
C. Cisco IOS router
D. Cisco PIX 500 series security appliance

Answer: B
Explanation
Cisco ASA 5500 series Adaptive Security Appliances are easy-to-deploy solutions that integrate world-class firewall, Cisco Unified Communications (voice and video) security, Secure Sockets Layer (SSL) and IPsec VPN, IPS, and content security services in a flexible, modular product family.
Cisco IPS 4200 series: Cisco IPS 4200 series sensors offer significant protection to your network by helping to detect, classify, and stop threats, including worms, spyware and adware, network viruses, and application abuse.
The Cisco PIX 500 series Security Appliances deliver robust user and application policy enforcement, multivector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions.
Question 8
For the following items, which management topology keeps management traffic isolated from production traffic?
A. OOB
B. SAFE
C. MARS
D. OTP

Answer: A
Explanation
Two primary schools of thought exist about how management traffic should be sent between a management station and a managed device. One approach is to allow management traffic to traverse a production data network. The other approach is to use a separate network to transport management traffic. This approach, where management
traffic is isolated from production data traffic, is called out-of-band (OOB) management.
(Reference: CCNA Security Official Exam Certification Guide)
Question 9
Information about a managed device resources and activity is defined by a series of objects. What defines the structure of these management objects?
A. FIB
B. LDAP
C. CEF
D. MIB

Answer: D
Explanation
Management Information Base (MIB) is the database of confguration variables that resides on the networking device.
Question 10
Which item is correct regarding Cisco IOS IPS on Cisco IOS Release 12.4(11)T and later?
A. uses Cisco IPS 5.x signature format
B. supports SDEE, SYSLOG, and SNMP for sending Cisco IPS alerts
C. requires the Basic or Advanced Signature Definition File
D. uses the built-in signatures that come with the Cisco IOS image as backup

Answer: A
Question 11
If a switch is working in the fail-open mode, what will happen when the switch’s CAM table fills to capacity and a new frame arrives?
A. The switch sends a NACK segment to the frame’s source MAC address.
B. A copy of the frame is forwarded out all switch ports other than the port the frame was received on.
C. The frame is dropped.
D. The frame is transmitted on the native VLAN.

Answer: B
Explanation
If that component defaults to a mode in which it forwards traffic, rather than performing its previous security function on that traffic, the component is said to be operating in fail-open mode. However, if a security component denies traffic that it cannot inspect, the component is said to be operating in fail-closed (also known as fail-safe) mode, which would be the more secure of the two modes.
(Reference: CCNA Security Official Exam Certification Guide)
Question 12
What is the purpose of the secure boot-config global configuration?
A. backs up the Cisco IOS image from flash to a TFTP server
B. enables Cisco IOS image resilience
C. takes a snapshot of the router running configuration and securely archives it in persistent storage
D. stores a secured copy of the Cisco IOS image in its persistent storage

Answer: C
Question 13
What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX?
A. Network interceptor
B. Configuration interceptor
C. Execution space interceptor
D. File system interceptor

Answer: B
Explanation
Configuration interceptor: Read/write requests to the Registry in Windows or to rc configuration files on UNIX are intercepted. This interception occurs because modification of the operating system configuration can have serious consequences. Therefore, Cisco Security Agent tightly controls read/write requests to the Registry.
Question 14
Which two statements are correct regarding a Cisco IP phone’s web access feature? (Choose two)
A. It is enabled by default.
B. It uses HTTPS.
C. It can provide IP address information about other servers in the network.
D. It requires login credentials, based on the UCM user database.

Answer: A C
Question 15
When configuring role-based CLI on a Cisco router, which action will be taken first?
A. Create a parser view called “root view”
B. Log in to the router as the root user
C. Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command
D. Enable the root view on the router

Answer: D
Question 16
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?
A. Signature-based detection
B. Anomaly-based detection
C. Honey pot detection
D. Policy-based detection

Answer: A
Question 17
Which one of the following items may be added to a password stored in MD5 to make it more secure?
A. Rainbow table
B. Cryptotext
C. Ciphertext
D. Salt

Answer: D

Post a Comment