Which three items are Cisco best-practice recommendations for securing a network?
Which three items are Cisco best-practice recommendations for securing a network? (Choose three.) A. Deploy HIPS software on all end-user workstations. B. Routinely apply patches to operating systems and applications. C. Disable unneeded services and ports on hosts. D. Require strong passwords, and enable password expiration.
Which method is of gaining access to a system that bypasses normal security measures?
Which method is of gaining access to a system that bypasses normal security measures? A. Creating a back door B. Starting a Smurf attack C. Conducting social engineering D. Launching a DoS attack
if you input the command “enable secret level 5 password” in the global mode , what does it indica
As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the command "enable secret level 5 password" in the global mode , what does it indicate? A. Set the enable secret command to privilege level 5. B. The enable secret password is hashed using SHA. C. The enable […]
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
Which will be necessarily taken into consideration when implementing Syslogging in your network?
As a network engineer at Cisco.com, you are responsible for Cisco network. Which will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest […]
Which classes does the U.S. government place classified data into?
Which classes does the U.S. government place classified data into? (Choose three.) A. SBU B. Confidential C. Secret D. Top-secret Explanation/Reference: Table: Government and Military Data Classification: