If you have 3 interfaces, S1, S0, and E0, and you implement the following configuration, what attack will you
You are concerned about attacks against your network, and have decided to implement some defensive measure on your routers. If you have 3 interfaces, S1, S0, and E0, and you implement the following configuration, what attack will you be defending against?
Router#config terminal
Router(config)# Interface Ethernet 0
Router(config-if)#no ip directed broadcast
Router(config-if)#Interface Serial 0
Router(config-if)#no ip directed broadcast
Router(config-if)#Interface Serial 1
Router(config-if)#no ip directed broadcast
Router(config)#^Z
Router#
What is the command to turn off CDP for the entire router?
You are configuring your new Cisco router. During your configuration you wish to eliminate any security risks you can, as based on your organizational security policy. The policy states that the Cisco Discovery Protocol is not to be used on any interface on any of the routers. What is the command to turn off CDP for the entire router?
Which of the following shows the correct syntax to modify the password for all the Terminal sessions?
You have been given the task of router configuration and security in your network. One of the first things you wish to do is to modify the Terminal password. Which of the following shows the correct syntax to modify the password for all the Terminal sessions?
Which of the following shows the correct syntax for the banner creation?
When you took over the security responsibilities at your office, you noticed there were no warning banners on any of the equipment. You have decided to create a warning login banner on your Cisco router.
Which of the following shows the correct syntax for the banner creation?
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 13 deny 10.10.10.0 0.0.0.255 Router(config)#access-list 13 permit 10.10.11.0 0.0.0.255 Router(config)#access-list 15 deny 10.10.12.0 0.0.0.255 Router(config)#access-list 15 permit 10.10.11.0 0.0.0.255 Router(config)#interface Ethernet 0
Router(config-if)#ip access-group 15 out
Router(config-if)#interface Ethernet 2
Router(config-if)#ip access-group 15 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
The AutoSecure security features are divided into which two planes?
You wish to configure a new Cisco router, which will take advantage of the AutoSecure feature. The AutoSecure security features are divided into which two planes?
What does SSH use to establish a secure channel of communication?
You have decided to implement SSH for communicating to your router. What does SSH use to establish a secure channel of communication?
What are the two types of Access Control that may be implemented in a network?
You have been chosen to manage the new security system that is to be implemented next month in your network. You are determining the type of access control to use. What are the two types of Access Control that may be implemented in a network?
Which of the following best describes Integrity?
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Integrity in network security is. Which of the following best describes Integrity?
Which of the following best describes Confidentiality?
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Confidentiality in network security is. Which of the following best describes Confidentiality?