Which of the following best describes Integrity?
You have been hired at a large company to manage network security issues. Prior to your arrival,
there was no one dedicated to security, so you are starting at the beginning. You hold a meeting
and are discussing the main functions and features of network security. One of your assistants
asks what the function of Integrity in network security is. Which of the following best describes
Integrity?
What are the two types of Access Control that may be implemented in a network?
You have been chosen to manage the new security system that is to be implemented next month
in your network. You are determining the type of access control to use. What are the two types of
Access Control that may be implemented in a network?
What does SSH use to establish a secure channel of communication?
You have decided to implement SSH for communicating to your router. What does SSH use to
establish a secure channel of communication?
which two planes?
You wish to configure a new Cisco router, which will take advantage of the AutoSecure feature.
The AutoSecure security features are divided into which two planes?
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands
that are entered into the router for the list configuration.
Router(config)#access-list 13 deny 10.10.10.0 0.0.0.255
Router(config)#access-list 13 permit 10.10.11.0 0.0.0.255
Router(config)#access-list 15 deny 10.10.12.0 0.0.0.255
Router(config)#access-list 15 permit 10.10.11.0 0.0.0.255
Router(config)#interface Ethernet 0
Router(config-if)#ip access-group 15 out
Router(config-if)#interface Ethernet 2
Router(config-if)#ip access-group 15 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
Which of the following shows the correct syntax for the banner creation?
When you took over the security responsibilities at your office, you noticed there were no warning
banners on any of the equipment. You have decided to create a warning login banner on your
Cisco router.
Which of the following shows the correct syntax for the banner creation?
Which of the following shows the correct syntax to modify the password for all the Terminal sessions?
You have been given the task of router configuration and security in your network. One of the first
things
you wish to do is to modify the Terminal password. Which of the following shows the correct
syntax to modify the password for all the Terminal sessions?
What is the command to turn off CDP for the entire router?
You are configuring your new Cisco router. During your configuration you wish to eliminate any
security risks you can, as based on your organizational security policy. The policy states that the
Cisco Discovery
Protocol is not to be used on any interface on any of the routers. What is the command to turn off
CDP for the entire router?
what attack will you be defending against?
You are concerned about attacks against your network, and have decided to implement some
defensive measure on your routers. If you have 3 interfaces, S1, S0, and E0, and you implement
the following configuration, what attack will you be defending against?
Router#config terminal
Router(config)# Interface Ethernet 0
Router(config-if)#no ip directed broadcast
Router(config-if)#Interface Serial 0
Router(config-if)#no ip directed broadcast
Router(config-if)#Interface Serial 1
Router(config-if)#no ip directed broadcast
Router(config)#^Z
Router#
what do you add to the end of an ACL statement?
In order to add to your layered defense, you wish to implement some security configurations on
your router. If you wish to have the router work on blocking TCP SYN attacks, what do you add to
the end of an ACL statement?