What are two examples of multifactor authentication? (Choose two.) A. single sign-on B. soft tokens C. passwords that expire D. shared password repository E. unique user knowledge
A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards including replacing.
Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.) A. transport input ssh B. transport input all C. crypto key generate rsa modulus 2048 D. crypto key generate rsa general-keys modulus 1024 E. crypto key generate rsa usage-keys
What is a zero-day exploit? A. It is when the network is saturated with malicious traffic that overloads resources and bandwidth. B. It is when an attacker inserts malicious code into a SQL server. C. It is when a new network vulnerability is discovered before a fix is available. D. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.
After a recent security breach and a RADIUS failure, an engineer must secure the console port of each enterprise router with a local username and password. Which configuration must the engineer apply to accomplish this task? A. aaa new-model
line con 0
password plaintextpassword
privilege level 15 B. aaa new-model
aaa authorization exec default local
aaa authentication login default radius
username localuser privilege 15 secret plaintextpassword C. username localuser secret plaintextpassword
line con 0
no login local
privilege level 15 D. username localuser secret plaintextpassword
line con 0
login authentication default
privilege level 15
Which two components comprise part of a PKI? (Choose two.) A. preshared key that authenticates connections B. one or more CRLs C. RSA token D. CA that grants certificates E. clear-text password that authenticates connections
Which type if network attack overwhelms the target server by sending multiple packets to a port until the half- open TCP resources of the target are exhausted? A. SYN flood B. reflection C. teardrop D. amplification
An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration for a Secure Shell access RSA key? A. crypto key import rsa pem B. crypto key generate rsa C. crypto key zeroize rsa D. crypto key pubkey-chain rsa
How does authentication differ from authorization? A. Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access. B. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access. C. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network. D. Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.
Correct Answer: B
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.