• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

CCNA Security: Implementing Intrusion Prevention

Collapse
This is a sticky topic.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • CCNA Security: Implementing Intrusion Prevention

    Question 1

    When configuring Cisco IOS login enhancements for virtual connections, what is the “quiet period”?
    A. A period of time when no one is attempting to log in
    B. The period of time in which virtual logins are blocked as security services fully initialize
    C. The period of time in which virtual login attempts are blocked, following repeated failed login attempts
    D. The period of time between successive login attempts


    Answer: C

    Explanation

    If the configured number of connection attempts fails within a specified time period, the Cisco IOS device does not accept any additional connections for a period of time that is called the quiet period. This feature is not enabled by default, we can enable its default settings, issue the login block-for command in global configuration mode. Administrators can use this feature to protect from DoS and/or dictionary attacks.

    Question 2

    Which result is of securing the Cisco IOS image by use of the Cisco IOS image resilience feature?
    A. When the router boots up, the Cisco IOS image will be loaded from a secured FTP location.
    B. The Cisco IOS image file will not be visible in the output from the show flash command.
    C. The show version command will not show the Cisco IOS image file location.
    D. The running Cisco IOS image will be encrypted and then automatically backed up to a TFTP server.


    Answer: B

    Explanation

    We can enable this feature with the secure boot-image command in the global configuration mode to secure the Cisco IOS image. The running image is secured and the image file is not included in any directory listing of the disk.

    Question 3

    Which description is true about the show login command output displayed in the exhibit?
Router# show login

A default login delay of 1 seconds is applied.
No Quiet-Mode access list has been configured.
All successful login is logged and generate SNMP traps.
All failed login is logged and generate SNMP traps.
Router enabled to watch for login Attacks.
If more than 2 login failures occur in 100 seconds or less, logins will be disabled
for 100 seconds.
Router presently in Quiet-Mode, will remain in Quiet-Mode for 93 seconds.
Denying logins from all sources.
A. All logins from any sources are blocked for another 193 seconds.
B. The login block-for command is configured to block login hosts for 93 seconds.
C. When the router goes into quiet mode, any host is permitted to access the router via Telnet, SSH, and HTTP, since the quiet-mode access list has not been configured.
D. Three or more login requests have failed within the last 100 seconds.


Answer: D


Question 4

After enabling port security on a Cisco Catalyst switch, what is the default action when the configured maximum of allowed MAC addresses value is exceeded?
A. The port is shut down.
B. The port’s violation mode is set to restrict.
C. The MAC address table is cleared and the new MAC address is entered into the table.
D. The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out.


Answer: A


Question 5

When configuring SSH, which is the Cisco minimum recommended modulus value?

A. 2048 bits
B. 256 bits
C. 1024 bits
D. 512 bits

Answer: C


Question 6

Examine the following options , which Spanning Tree Protocol (STP) protection mechanism disables a switch port if the port receives a Bridge Protocol Data Unit (BPDU)?
A. PortFast
B. BPDU Guard
C. UplinkFast
D. Root Guard


Answer: B


Question 7

For the following options, which feature is the foundation of Cisco Self-Defending Network technology?
A. policy management
B. secure connectivity
C. threat control and containment
D. secure network platform


Answer: D


Question 8

Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?
A. rule-based
B. protocol analysis-based
C. signature-based
D. profile-based


Answer: C


Question 9

What will be enabled by the scanning technology – The Dynamic Vector Streaming (DVS)?
A. Firmware-level virus detection
B. Layer 4 virus detection
C. Signature-based spyware filtering
D. Signature-based virus filtering


Answer: C

Explanation

The DVS engine is a new scanning technology that enables signature-based spyware filtering. This solution is complemented by a comprehensive set of management and reporting tools that provide ease of administration and complete visibility into threat-related activities.

Question 10

Which statement is not a reason for an organization to incorporate a SAN in its enterprise infrastructure?

A. To increase the performance of long-distance replication, backup, and recovery
B. To decrease the threat of viruses and worm attacks against data storage devices
C. To decrease both capital and operating expenses associated with data storage
D. To meet changing business priorities, applications, and revenue growth


Answer: B


Question 11

Which two functions are required for IPsec operation? (Choose two)
A. using AH protocols for encryption and authentication
B. using SHA for encryption
C. using DifTie-Hellman to establish a shared-secret key
D. using PKI for pre-shared-key authentication
E. using IKE to negotiate the SA



Answer: C E


Question 12

In your company’s network, an attacker who has configured a rogue layer 2 device is intercepting traffic from multiple VLANS to capture potentially sensitive data. How to solve this problem? (Choose two)
A. Secure the native VLAN, VLAN 1 with encryption
B. Disable DTP on ports that require trunking
C. Place unused active ports in an unused VLAN
D. Set the native VLAN on the trunk ports to an unused VLAN



Answer: B D
Tags:


  • #2
    In PP giá rẻ nhất

    TKV
    banner cuốn thường.
    In băng rôn giá rẻ



    IN PP CHO CÔNG TY THỜI TRANG GẮN STANDEE
    In PP cho công ty thời trang gắn standee chất lượng cao, in pp trọn bộ với standee chỉ có 150.000đ, in pp cán màng bòng, màng mờ cho khách hàng.
    Công ty BCV chuyên cung cấp dịch vụ in pp chất lượng cao cho các công ty thời trang tại TPHCM, nếu quý khách hàng có nhu cầu xin liên hệ theo thông tin sau:
    Văn Phòng TP.HCM
    180 Cộng Hòa, P.12, Q.Tân Bình, TP.HCM
    Hotline:0866836359 - 0939514770 Ms Le
    Email: buocchanvietgroup@gmail.com
    TKV giá chữ x các loại.

    In PP cho các công ty
    Xưởng in pp TKV chuyên in pp giá rẻ nhất TPHCM, cung cấp các dịch vụ in: in pp giá rẻ tại TPHCM, in pp quảng cáo, in pp trong nhà, in pp ngoài trời chất lượng.

    Comment

    • Working...
      X