Cisco Certified Network Associate (200-301 CCNA) – Question680

A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards including replacing.
Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)

A.
transport input ssh
B. transport input all
C. crypto key generate rsa modulus 2048
D. crypto key generate rsa general-keys modulus 1024
E. crypto key generate rsa usage-keys

Correct Answer: AC

Cisco Certified Network Associate (200-301 CCNA) – Question679

What is a zero-day exploit?

A.
It is when the network is saturated with malicious traffic that overloads resources and bandwidth.
B. It is when an attacker inserts malicious code into a SQL server.
C. It is when a new network vulnerability is discovered before a fix is available.
D. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.

Correct Answer: C

Cisco Certified Network Associate (200-301 CCNA) – Question677

After a recent security breach and a RADIUS failure, an engineer must secure the console port of each enterprise router with a local username and password. Which configuration must the engineer apply to accomplish this task?

A.
aaa new-model
line con 0
password plaintextpassword
privilege level 15
B. aaa new-model
aaa authorization exec default local
aaa authentication login default radius
username localuser privilege 15 secret plaintextpassword
C. username localuser secret plaintextpassword
line con 0
no login local
privilege level 15
D. username localuser secret plaintextpassword
line con 0
login authentication default
privilege level 15

Correct Answer: A

Cisco Certified Network Associate (200-301 CCNA) – Question673

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration for a Secure Shell access RSA key?

A.
crypto key import rsa pem
B. crypto key generate rsa
C. crypto key zeroize rsa
D. crypto key pubkey-chain rsa

Correct Answer: B

Cisco Certified Network Associate (200-301 CCNA) – Question672

How does authentication differ from authorization?

A.
Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access.
B. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.
C. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network.
D. Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.

Correct Answer: B