ImageVerifierCode 换一换
格式:DOC , 页数:6 ,大小:124.04KB ,
资源ID:4132593      下载积分:6 金币
快捷注册下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/4132593.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请

   平台协调中心        【在线客服】        免费申请共赢上传

权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。

注意事项

本文(网络安全第二章.doc)为本站上传会员【精****】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

网络安全第二章.doc

1、 窗体顶端 What are two characteristics of the SDM Security Audit wizard? (Choose two。) It uses interactive dialogs and prompts to implement AAA。 It automatically enables Cisco IOS firewall and implements Cisco IOS IPS security configurations to secure the router。 It displays a screen with

2、Fix—it check boxes to let you choose which potential security—related configuration changes to implement. It requires users to first identify which router interfaces connect to the inside network and which connect to the outside network。 It is initiated from CLI and executes a script in whic

3、h the managment plane functions and forwarding plane services are tested against known vulnerabilities 窗体底端 窗体顶端 Which statement matches the CLI commands to the SDM wizard that performs similar configuration functions? aaa configuration commands and the SDM Basic Firewall wizard auto se

4、cure privileged EXEC command and the SDM One—Step Lockdown wizard class-maps, policy—maps, and service-policy configuration commands and the SDM IPS wizard setup privileged EXEC command and the SDM Security Audit wizard 窗体底端 窗体顶端 Refer to the exhibit. What is the significance of se

5、cret 5 in the generated output? The ADMIN password is encrypted using DH group 5. The ADMIN password is encrypted via the service password-encryption command。 The ADMIN password is hashed using MD5。 The ADMIN password is hashed using SHA。 窗体底端 窗体顶端 Which two operations are requir

6、ed to implement Cisco SDM One-Step Lockdown? (Choose two.) Choose the One-Step Lockdown feature。 Apply the documented network policies. Deliver the configuration changes to the router. Compare the router configuration against recommended settings. Select the Firewall and ACL task

7、 on the SDM Configuration screen。 窗体顶端 Refer to the exhibit. Which two statements describe the current SDM logging setup? (Choose two.) Buffered logging will be enabled on the router for Logging Level 7 messages. Buffered logging will be enabled on the syslog server for Logging Level

8、7 messages。 All messages with a trap level of 4 and higher (less critical) will be logged。 All messages with a trap level of 4 and lower (more critical) will be logged. The router interface IP address that is connected to the syslog server is 192。168。1.3。 The syslog server IP address

9、 is 192。168。1.3. Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.) This message is a level five notification message. This message appeared because a minor error occurred requiring further investigation. This message ap

10、peared because a major error occurred requiring immediate action。 This message indicates that service timestamps have been globally enabled. This message indicates that enhanced security was configured on the vty ports。 Which three areas of router security must be maintained to secure an e

11、dge router at the network perimeter? (Choose three.) physical security flash security operating system security remote access security router hardening zone isolation 窗体顶端 Which set of commands are required to create a username of admin, hash the password using MD5, and

12、force the router to access the internal username database when a user attempts to access the console? R1(config)# username admin password Admin01pa55 R1(config)# line con 0 R1(config-line)# login local R1(config)# username admin password Admin01pa55 R1(config)# line con 0 R1(config—l

13、ine)# login internal R1(config)# username admin Admin01pa55 encr md5 R1(config)# line con 0 R1(config-line)# login local R1(config)# username admin secret Admin01pa55 R1(config)# line con 0 R1(config-line)# login local R1(config)# username admin secret Admin01pa55 R1(config)# l

14、ine con 0 R1(config—line)# login internal 窗体底端 By default, how many seconds of delay between virtual login attempts is invoked when the login block-for command is configured? one two three four five 窗体顶端 An administrator defined a local user account with a secret passwo

15、rd on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) configure the IP domain name on the router enable inbound vty Telnet sessions generate the SSH keys configure DNS on the router en

16、able inbound vty SSH sessions generate two-way pre—shared keys 窗体底端 Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode? Keep a secure copy of the router Cisco IOS imag

17、e and router configuration file as a backup。 Disable all unused ports and interfaces to reduce the number of ways that the router can be accessed. Configure secure administrative control to ensure that only authorized personnel can access the router。 Locate the router in a secure locked

18、room that is accessible only to authorized personnel。 Provision the router with the maximum amount of memory possible. 窗体顶端 Refer to the exhibit. Which statement regarding the JR-Admin account is true? JR-Admin can issue show, ping, and reload commands。 JR—Admin can issue ping a

19、nd reload commands。 JR—Admin can issue only ping commands。 JR-Admin can issue debug and reload commands. JR-Admin cannot issue any command because the privilege level does not match one of those 窗体底端 窗体顶端 Refer to the exhibit。 Based on the output of the show running—config comman

20、d, which type of view is SUPPORT? secret view, with a level 5 encrypted password root view, with a level 5 encrypted secret password superview, containing SHOWVIEW and VERIFYVIEW views CLI view, containing SHOWVIEW and VERIFYVIEW commands 窗体顶端 Which two characteristics apply to Ro

21、le—Based CLI Access superviews? (Choose two。) CLI views have passwords, but superviews do not have passwords。 Users logged in to a superview can access all commands specified within the associated CLI views. A single superview can be shared among multiple CLI views。 Commands cannot b

22、e configured for a specific superview. Deleting a superview deletes all associated CLI views. 窗体顶端 If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.) assign a secret password to the view assign commands to the vi

23、ew assign users who can use the view associate the view with the root view create a superview using the parser view view—name command create a view using the parser view view—name command 窗体底端 窗体顶端 What are three requirements that must be met if an administrator wants to mainta

24、in device configurations via secure in—band management? (Choose three。) network devices configured to accommodate SSH a separate network segment connecting all management devices at least one router acting as a terminal server encryption of all remote access management traffic co

25、nnection to network devices through a production network or the Internet direct access to the console ports of all network devices 窗体底端 窗体顶端 What are two characteristics of SNMP community strings? (Choose two。) A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community

26、 strings in plaintext。 Commonly known community strings should be used when configuring secure SNMP. If the manager sends one of the correct read—only community strings, it can get information and set information in an agent. SNMP read—only community strings can be used to get informatio

27、n from an SNMP—enabled device。 SNMP read-write community strings can be used to set information on an SNMP-enabled device. 窗体顶端 Refer to the exhibit。 Routers R1 and R2 are connected via a serial link。 One router is configured as the NTP master, and the other is an NTP client. Which two

28、pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two。) Both routers are configured to use NTPv2. Router R1 is the master, and R2 is the client。 Router R2 is the master, and R1 is the client. The IP address of R1

29、is 192.168.1。2. The IP address of R2 is 192。168.1。2. 窗体底端 窗体顶端 Which three commands are required to restore a primary bootset from a secure archive on a router on which Cisco IOS resilience is enabled? (Choose three。) Restart the router in ROM monitor mode and display the secure bootset

30、Cisco IOS image name using the dir command. Restart the router, enter privileged EXEC mode, and display the secure bootset Cisco IOS image name using the show flash command。 Boot the secure bootset Cisco IOS image using the boot command with the filename. Copy the secure bootset Cisco IO

31、S image to flash using the copy IOS—backup—image flash command. Restore the secure configuration file using the copy config—backup flash command. Restore the secure configuration file using the secure boot-config restore filename command. 窗体顶端 Which three options can be configured by Cisc

32、o AutoSecure? (Choose three。) CBAC SNMP syslog security banner interface IP address enable secret password 窗体顶端 What is the minimum recommended modulus key length for keys generated to use with SSH? 256 512 768 1024 2048 窗体底端 窗体顶端 An administrator

33、 needs to create a user account with custom access to most privileged EXEC commands。 Which privilege command is used to create this custom account? privilege exec level 0 privilege exec level 1 privilege exec level 2 privilege exec level 15 窗体顶端 Refer to the exhibit. What tw

34、o facts can be determined from the output? (Choose two。) The Cisco IOS image and configuration files have been properly secured。 ROMmon mode will be inaccessible upon entering the privileged EXEC reload command。 The Cisco IOS Resilient Configuration feature is enabled。 The Cisco IOS

35、Resilient Configuration feature has detected an image version mismatch。 The Cisco IOS configuration files have been erased. 窗体底端 Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

36、 HTTP CDP FTP NTP TFTP 窗体顶端 Which statement describes the operation of the Cisco SDM Security Audit wizard? The wizard configures a router to prevent unauthorized access。 The wizard compares a router configuration against recommended settings。 The wizard monitors ne

37、twork data and logs possible unauthorized or malicious traffic。 The wizard logs the effectiveness of network security measures for baseline comparisons 窗体底端 窗体顶端 Which three services on a router does Cisco SDM One—Step Lockdown enable? (Choose three.) SNMP TCP intercepts SSH access to the router Cisco Discovery Protocol password encryption service firewall on all outside interfaces 窗体底端 窗体底端 窗体底端 窗体底端 窗体底端 窗体底端 窗体底端 窗体底端 窗体底端

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服