
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CCNA Security Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/ccna-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/ccna-security/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Wed, 23 Jun 2021 08:18:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>CCNA Security Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/ccna-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>How to Configure DHCP Snooping in Cisco Switches?</title>
		<link>https://www.technig.com/configure-dhcp-snooping-cisco-switche/</link>
					<comments>https://www.technig.com/configure-dhcp-snooping-cisco-switche/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Fri, 12 Oct 2018 23:49:44 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[Configure DHCP Snooping]]></category>
		<category><![CDATA[DHCP Spoofing]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mitigate DHCP Attacks]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Router Security]]></category>
		<category><![CDATA[Switch Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15318</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Mitigate DHCP Spoofing Attack" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>In the network switching, you can easily configure DHCP snooping to prevent DHCP spoofing attack and DHCP starvation attack. Before you mitigating DHCP attacks in the network, you need to know about DHCP functions and features. The DHCP servers dynamically provide IP configuration information including IP address, subnet mask, default gateway, DNS servers, and more to [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-dhcp-snooping-cisco-switche/">How to Configure DHCP Snooping in Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Mitigate DHCP Spoofing Attack" decoding="async" srcset="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>In the network switching, you can easily configure DHCP snooping to prevent DHCP spoofing attack and DHCP starvation attack. Before you mitigating DHCP attacks in the network, you need to know about DHCP functions and features. The DHCP servers dynamically provide IP configuration information including IP address, subnet mask, default gateway, DNS servers, and more to clients. The sequence of DHCP message exchange between client and server.</p>
<h2>Types of DHCP Attacks</h2>
<p>There are some DHCP attacks that hackers can use to hack your network systems and access the information. The DHCP Spoofing attack and the DHCP Starvation attack.</p>
<p><strong>1. DHCP Spoofing Attack</strong></p>
<p>A DHCP spoofing attack occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients. A rogue server can provide a variety of misleading information:</p>
<ul>
<li><b>Wrong default gateway</b> &#8211; Attacker provides an invalid gateway or the IP address of its host to create a man-in-the-middle attack. This may go entirely undetected as the intruder intercepts the data flow through the network.</li>
</ul>
<ul>
<li><b>Wrong DNS server</b> &#8211; Attacker provides an incorrect DNS server address pointing the user to a nefarious website.</li>
</ul>
<ul>
<li><b>Wrong IP address</b> &#8211; Attacker provides an invalid default gateway IP address and creates a DoS attack on the DHCP client.</li>
</ul>
<p><strong>2. DHCP Starvation Attack</strong></p>
<p>Another DHCP attack is the DHCP starvation attack. The goal of this attack is to create a DoS for connecting clients. DHCP starvation attacks require an attack tool such as Gobbler.</p>
<p>Gobbler has the ability to look at the entire scope of leasable IP addresses and tries to lease them all. Specifically, it creates DHCP discovery messages with bogus MAC addresses.</p>
<h2 class="p_H_Head1">Mitigating DHCP Attacks</h2>
<p>It is easy to mitigate DHCP starvation attacks using port security. However, mitigating DHCP spoofing attacks requires more protection.</p>
<p><strong>Related articles:</strong> <a href="https://www.technig.com/dhcp-configuration-guide/" target="_blank" rel="noopener noreferrer">Configure DHCP in Cisco Router and Windows Server</a></p>
<p>For instance, Gobbler uses a unique MAC address for each DHCP request and port security. Port security could be configured to mitigate this. However, Gobbler can also be configured to use the same interface MAC address with a different hardware address for every request. This would render port security ineffective.</p>
<p>DHCP spoofing attacks can be mitigated using DHCP snooping on trusted ports. DHCP snooping also helps mitigate against DHCP starvation attacks by rate limiting the number of DHCP discovery messages that an untrusted port can receive. DHCP snooping builds and maintains a DHCP snooping binding database that the switch can use to filter DHCP messages from untrusted sources. The DHCP snooping binding table includes the client MAC address, IP address, DHCP lease time, binding type, VLAN number, and interface information on each untrusted switchport or interface.</p>
<p><b>Note</b>: In a large network, the DHCP binding table may take time to build after it is enabled. For example, it could take 2 days for DHCP snooping to complete the table if DHCP lease time is 4 days.</p>
<p><strong>1. DHCP Snooping </strong></p>
<p>DHCP snooping acts like a firewall between untrusted hosts and trusted DHCP servers. DHCP snooping performs the following activities:</p>
<ul style="list-style-type: circle;">
<li>Validates DHCP messages received from untrusted sources and filters out invalid messages.</li>
<li>Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses.</li>
<li>Uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts.</li>
</ul>
<p>Dynamic ARP inspection (DAI) and IP Source Guard also use information stored in the DHCP snooping binding database.</p>
<p>DHCP snooping is enabled on a per-VLAN basis. By default, the feature is inactive on all VLANs. You can enable the feature on a single VLAN or a range of VLANs. <a href="https://www.technig.com/mitigate-vlan-attacks/" target="_blank" rel="noopener noreferrer">Mitigate VLAN attack</a>.</p>
<h2>Configure DHCP Snooping to Mitigate DHCP Attack</h2>
<p>When you configure DHCP snooping or enabling on an interface or VLAN, the switch receives a packet on an untrusted port, the switch compares the source packet information with that held in the DHCP snooping binding table.</p>
<figure id="attachment_15320" aria-describedby="caption-attachment-15320" style="width: 1123px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches.jpg"><img decoding="async" class="wp-image-15320 size-full" src="http://3.90.216.52/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches.jpg" alt="Configure DHCP Snooping in Cisco switches" width="1123" height="303" srcset="https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches.jpg 1123w, https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches-300x81.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches-768x207.jpg 768w, https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches-1024x276.jpg 1024w" sizes="(max-width: 1123px) 100vw, 1123px" /></a><figcaption id="caption-attachment-15320" class="wp-caption-text">Configure DHCP Snooping in Cisco switches</figcaption></figure>
<ul>
<li><b>Trusted DHCP ports</b> &#8211; Only ports connecting to upstream DHCP servers should be trusted. These ports that are expected to reply with DHCP offer and DHCP Ack messages. Trusted ports must be explicitly identified in the configuration.</li>
<li><b>Untrusted ports</b> &#8211; These ports connect to hosts that should not be providing DHCP server messages. By default, all switch ports are untrusted.</li>
</ul>
<p>The general rule when configuring DHCP snooping is to “trust the port and enable DHCP snooping by VLAN”. Therefore, the following steps should be used to enable or configure DHCP snooping:</p>
<ul>
<li><b>Step 1</b>. Enable DHCP snooping using the<b> ip dhcp snooping </b>global configuration command.</li>
</ul>
<ul>
<li><b>Step 2</b>. On trusted ports, use the<b> ip dhcp snooping trust </b>interface configuration command.</li>
</ul>
<ul>
<li><b>Step 3</b>. Enable DHCP snooping by VLAN, or by a range of VLANs.</li>
</ul>
<p>Configuring a Maximum Number of MAC Addresses</p>
<pre class="lang:default decode:true ">S1(config)# ip dhcp snooping
S1(config)#
S1(config)# interface f0/1
S1(config-if)# ip dhcp snooping trust
S1(config-if)# exit
S1(config)#  
S1(config)# interface range f0/5 - 24
S1(config-if-range)# ip dhcp snooping limit rate 4  
S1(config-if-range)# exit
S1(config)#
S1(config)# ip dhcp snooping vlan 5,10,50-52
S1(config)#</pre>
<p>Try to displays the resulting output of the<b> &#8220;show ip dhcp snooping&#8221; </b>privileged EXEC command.</p>
<pre class="lang:default decode:true ">S1# show ip dhcp snooping</pre>
<p>Try to displays the resulting output of the<b> &#8220;show ip dhcp snooping binding&#8221; </b>command. Another way to verify is with the<b> &#8220;show ip dhcp snooping database&#8221; </b>command.</p>
<pre class="lang:default decode:true ">S1# show ip dhcp snooping binding</pre>
<p>Untrusted ports should also rate limit the number of DHCP discovery messages they can receive per second using the<b> ip dhcp snooping limit rate</b> interface configuration command.<b></b></p>
<p><b>Note</b>: Rate limiting further mitigates the risk of DHCP starvation attacks.</p>
<p>Similar mitigation techniques are available for DHCPv6 and IPv6 clients. Because IPv6 devices can also receive their addressing information from the router’s Router Advertisement (RA) message, there are also mitigation solutions to prevent any rogue RA messages.</p>
<p class="p_H_Head2"><strong>Trusted and Untrusted Sources</strong></p>
<p>You can configure whether DHCP snooping trusts traffic sources. An untrusted source may initiate traffic attacks or other hostile actions. To prevent such attacks, DHCP snooping filters messages from untrusted sources.</p>
<p>In an enterprise network, a trusted source is a device that is under your administrative control. These devices include the switches, routers, and servers in the network. Any device beyond the firewall or outside the network is an untrusted source. Generally, host ports are treated as untrusted sources.</p>
<p>In a service provider environment, any device that is not in the service provider network is an untrusted source (such as a customer switch). Host ports are untrusted sources.</p>
<p>In the NX-OS device, you indicate that a source is trusted by configuring the trust state of its connecting interface.</p>
<p>The default trust state of all interfaces is untrusted. You must configure DHCP server interfaces as trusted. You can also configure other interfaces as trusted if they connect to devices (such as switches or routers) inside your network. You usually do not configure host port interfaces as trusted.</p>
<p><strong>Source</strong>: <a href="https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_dhcpsnoop.html" target="_blank" rel="noopener noreferrer">Cisco</a> Configure DHCP Snooping</p>
<p>The post <a href="https://www.technig.com/configure-dhcp-snooping-cisco-switche/">How to Configure DHCP Snooping in Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-dhcp-snooping-cisco-switche/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15318</post-id>	</item>
		<item>
		<title>How to prevent MAC Flooding Attack?</title>
		<link>https://www.technig.com/prevent-mac-flooding-attack/</link>
					<comments>https://www.technig.com/prevent-mac-flooding-attack/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 00:01:12 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CAM Table Attack]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[IP Sniffing Attack]]></category>
		<category><![CDATA[MAC Spoofing Attack]]></category>
		<category><![CDATA[Mitigate MAC Spoofing]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Securing Switch]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15274</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Prevent MAC Flooding Attack in Switches - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Before you can prevent MAC flooding attack on layer 2 devices, you must know enough about basic switch operation and MAC table attack.  A Layer 2 LAN switch builds a table of MAC addresses that are stored in its Content Addressable Memory (CAM). A CAM table is the same thing as a MAC address table. The CAM [&#8230;]</p>
<p>The post <a href="https://www.technig.com/prevent-mac-flooding-attack/">How to prevent MAC Flooding Attack?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Prevent MAC Flooding Attack in Switches - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Before you can prevent MAC flooding attack on layer 2 devices, you must know enough about basic switch operation and <strong>MAC </strong>table attack<strong>.  </strong>A Layer 2 LAN switch builds a table of MAC addresses that are stored in its Content Addressable Memory (CAM). A CAM table is the same thing as a MAC address table. The CAM table binds and stores MAC addresses and associated VLAN parameters that are connected to the physical switch ports. Switches then compare the destination MAC unicast addresses of incoming frames to the entries in the CAM table to make port forwarding decisions. If the destination MAC address is in the CAM table, the switch forwards the frame accordingly. However, if the destination MAC address is not in the CAM table, the switch will flood the frame out of all ports except for the frame’s port of ingress. This is called an unknown unicast flood.</p>
<h3>How does CAM Table attack work?</h3>
<p>All CAM tables have a fixed size and consequently, a switch can run out of resources in which to store MAC addresses. CAM table overflow attacks (also called MAC address overflow attacks) take advantage of this limitation by bombarding the switch with fake source MAC addresses until the switch MAC address table is full.</p>
<p>If enough entries are entered into the CAM table before older entries expire, the table fills up to the point that no new entries can be accepted. When this occurs, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic to all ports without referencing the CAM table. The switch, in essence, acts as a hub. As a result, the attacker can capture all of the frames sent from one host to another.</p>
<p><strong>NOTE</strong>: Traffic is flooded only within the local VLAN, so the intruder sees only traffic within the local VLAN to which the intruder is connected.</p>
<h3>MAC Flooding Tools for Windows and Linux</h3>
<p><strong>Macof</strong> tools flood the local network with random MAC addresses (causing some switches to fail open in repeating mode, facilitating sniffing). What makes these tools so dangerous is that an attacker can create a CAM table overflow attack in a matter of seconds. For instance, a Catalyst 6500 switch can store 132,000 MAC addresses in its CAM table. A tool such as Macof can flood a switch with up to 8,000 bogus frames per second; creating a CAM table overflow attack in a matter of a few seconds.</p>
<p>Another reason why these attack tools are dangerous is that they not only affect the local switch, they can also affect other connected Layer 2 switches. When the CAM table of a switch is full, it starts broadcasting out all ports including those connecting to other Layer 2 switches.</p>
<figure id="attachment_15280" aria-describedby="caption-attachment-15280" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-15280 size-full" src="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg" alt="How to Prevent MAC Flooding Attack in Switches - Technig" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/How-to-Prevent-MAC-Flooding-Attack-in-Switches-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-15280" class="wp-caption-text">Prevent MAC Flooding Attack in Switches &#8211; Technig</figcaption></figure>
<h3>How to Prevent Mac Flooding Attack?</h3>
<p>In order to mitigate CAM table overflow attacks, network administrators must implement port security. It is the simplest and most effective method to prevent MAC flooding attack and CAM table overflow. Port security allows an administrator to statically specify MAC addresses for a port or to permit the switch to dynamically learn a limited number of MAC addresses. By limiting the number of permitted MAC addresses on a port to one, port security can be used to control the unauthorized expansion of the network.</p>
<p>After configuring or enabling port security, the MAC addresses are assigned to a secure port, the port does not forward frames with source MAC addresses outside the group of defined addresses. When a port configured with port security receives a frame, the source MAC address of the frame is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port.</p>
<p>To enable port security, use the<b> switchport port-security </b>interface configuration command on an access port. The port must be configured as an access port before port security can be enabled. This is because port security can only be configured on access ports and, by default, Layer 2 switch ports are set to dynamic auto (trunking on). Therefore, the port must be initially configured with the<b> switchport mode access </b>interface configuration command.</p>
<p>To set the maximum number of MAC addresses allowed on a port using the<b> switchport port-security maximum </b><i>value</i> command</p>
<p><b>Note</b>: The actual maximum number of secure MAC addresses that can be configured is set by the maximum number of available MAC addresses allowed by the active Switch Database Management (SDM) template. Use the<b> show sdm prefer </b>command to view the current template settings.</p>
<p><strong>The switch can be configured to learn about MAC addresses on a secure port in one of two ways:</strong></p>
<ul>
<li><b>Manually configured</b> &#8211; Manually configures the MAC address(es) using the<b> switchport port-security mac-address</b> interface configuration command.</li>
</ul>
<ul>
<li><b>Dynamically learned</b> &#8211; Enables the switch to dynamically learn the MAC address using the<b> switchport port-security mac-address sticky </b>interface configuration command.</li>
</ul>
<pre class="lang:default decode:true">S4(config)# interface fastEthernet 0/10
S4(config-if)# switchport mode access
S4(config-if)# switchport port-security
S4(config-if)# switchport port-security maximum 5
S4(config-if)# switchport port-security violation shutdown
S4(config-if)# switchport port-security mac-address sticky</pre>
<p>To view the result, just type the &#8220;<strong>show port-security interface FastEthernet 0/10</strong>&#8220;.</p>
<pre class="lang:default decode:true">S4#show port-security interface fastEthernet 0/10
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
               (Count)       (Count)        (Count)
--------------------------------------------------------------------
       Fa0/10        5          0                 0         Shutdown
----------------------------------------------------------------------
Port Security              : Enabled
Port Status                : Secure-down
Violation Mode             : Shutdown
Aging Time                 : 0 mins
Aging Type                 : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses      : 5
Total MAC Addresses        : 0
Configured MAC Addresses   : 0
Sticky MAC Addresses       : 0
Last Source Address:Vlan   : 0000.0000.0000:0
Security Violation Count   : 0
 
S4#</pre>
<p>That&#8217;s good. The configuration to prevent MAC flooding attack works perfectly on the Cisco switch.</p>
<h3>Port Security Violations Modes</h3>
<div id="htmlMedia">
<div id="mediaContainer">
<div id="commonMediaText">
<div id="slide_1">
<div id="ID_s1_title" tabindex="0">There are three security violation modes, Restrict, Shutdown, and Protect modes to prevent MAC flooding attack.</div>
<div tabindex="0"></div>
<div id="textBoxDiv_1">
<div id="textBoxDiv_1_title">
<ul style="list-style-type: circle;">
<li id="ID_s1_titleTxt01" tabindex="0"><strong>Protect</strong>: This is the least secure of the security violation modes. When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.</li>
</ul>
</div>
<div id="textBoxDiv_1_body">
<ul style="list-style-type: circle;">
<li tabindex="0"><span style="text-transform: initial;"><strong>Restrict</strong>: </span>When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.</li>
</ul>
</div>
</div>
<div id="textBoxDiv_2">
<div id="textBoxDiv_2_body">
<ul style="list-style-type: circle;">
<li tabindex="0"><span style="text-transform: initial;"><strong>Shutdown</strong>: </span>In this (default) security violation mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. It increments the violation counter. When a secure port is in the error-disabled state, it can be brought out of this state by entering the shutdown and no shutdown interface configuration mode commands. More importantly, the port must be re-enabled manually by an administrator.</li>
</ul>
<h3>Prot Security Aging</h3>
<p>The port-security aging can be used to set the aging time for static and dynamic secure addresses on a port. Two types of aging are supported per port:</p>
<ul>
<li><b>Absolute</b> <b></b>&#8211; The secure addresses on the port are deleted after the specified aging time.</li>
</ul>
<ul>
<li><b>Inactivity</b> <b></b>&#8211; The secure addresses on the port are deleted only if they are inactive for the specified aging time.</li>
</ul>
<p>Use aging to remove secure MAC addresses on a secure port without manually deleting the existing secure MAC addresses. Aging time limits can also be increased to ensure past secure MAC addresses remain, even while new MAC addresses are added. Keep in mind the maximum number of secure addresses per port can be configured. Aging of statically configured secure addresses can be enabled or disabled on a per-port basis.</p>
<pre class="lang:default decode:true">S4(config-if)#switchport port-security aging time 150</pre>
</div>
</div>
</div>
</div>
</div>
</div>
<p>That is not all you get to know about how to prevent MAC Flooding attack in the network. This is a simple guide to know the function of <a href="https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/72846-layer2-secftrs-catl3fixed.html" target="_blank" rel="noopener noreferrer">MAC table attack</a> and simple port-security configuration.</p>
<p>Source: NetAcad, My local CCNA Security Lab, and Google.</p>
<p>The post <a href="https://www.technig.com/prevent-mac-flooding-attack/">How to prevent MAC Flooding Attack?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/prevent-mac-flooding-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15274</post-id>	</item>
		<item>
		<title>CCNA Security Chapter 5 Exam Questions With Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Tue, 25 Sep 2018 03:22:51 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Exam Questions]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 5 Answers]]></category>
		<category><![CDATA[CCNA Security Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15194</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="654" height="384" src="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 5 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg 654w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-300x176.jpeg 300w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-357x210.jpeg 357w" sizes="(max-width: 654px) 100vw, 654px" /></div>
<p>These are all updated CCNA Security chapter 5 exam questions with answers. If you have the new question on this test, please comment question. We will update answers for you in the shortest time. 1. An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/">CCNA Security Chapter 5 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="654" height="384" src="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 5 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg 654w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-300x176.jpeg 300w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-357x210.jpeg 357w" sizes="(max-width: 654px) 100vw, 654px" /></div><p>These are all updated CCNA Security chapter 5 exam questions with answers. If you have the new question on this test, please comment question. We will update answers for you in the shortest time.</p>
<p><strong>1.</strong> An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger and signature type does this describe?</p>
<ul style="list-style-type: circle;">
<li><strong>Trigger: Pattern-based detection</strong><br />
<strong>Type: Composite signature</strong></li>
<li>Trigger: Policy-based detection<br />
Type: Composite signature</li>
<li>Trigger: Pattern-based detection<br />
Type: Atomic signature</li>
<li>Trigger: Anomaly-based detection<br />
Type: Composite signature</li>
<li>Trigger: Policy-based detection<br />
Type: Atomic signature</li>
<li>Trigger: Anomaly-based detection<br />
Type: Atomic signature</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Pattern-based detection (also called signature-based detection) searches for a specific pattern that can be textual, binary, or a series of function calls. It can be detected in a single packet (atomic) or in a packet sequence (composite).</p>
</div>
<p><strong>2.</strong> What is a required condition to enable IPS activity reporting using the SDEE format?</p>
<ul style="list-style-type: circle;">
<li>Issue the ip ips notify log command.</li>
<li>Configure the signature category.</li>
<li>Create an IOS IPS configuration directory in flash.</li>
<li><strong>Enable an HTTP or HTTPS service on the router.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>To enable IPS activity reporting format using SDEE, the HTTP or HTTPS server must first be enabled on the router. If the HTTP server is not enabled, the router cannot respond to the SDEE clients because it cannot see the requests. The ip ips notify log command will send notification using syslog. The tasks of configuring the signature category and creating an IOS IPS configuration directory in flash are necessary to implement IOS IPS, but they are not directly associated with SDEE feature.</p>
</div>
<figure id="attachment_15200" aria-describedby="caption-attachment-15200" style="width: 654px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg"><img loading="lazy" decoding="async" class="size-full wp-image-15200" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg" alt="CCNA Security Chapter 5 Exam Questions With Answers – Updated" width="654" height="384" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg 654w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-300x176.jpeg 300w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-357x210.jpeg 357w" sizes="(max-width: 654px) 100vw, 654px" /></a><figcaption id="caption-attachment-15200" class="wp-caption-text">CCNA Security Chapter 5 Exam Questions With Answers – Updated</figcaption></figure>
<p><strong>3.</strong> Refer to the exhibit. Based on the configuration, which traffic will be examined by the IPS that is configured on router R1?</p>
<ul style="list-style-type: circle;">
<li>return traffic from the web server</li>
<li>traffic that is destined to LAN 1 and LAN 2</li>
<li>traffic that is initiated from LAN 1 and LAN 2</li>
<li><strong>no traffic will be inspected</strong></li>
<li>http traffic that is initiated from LAN 1</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Because the IPS inspection is configured on the S0/0/0 interface with inbound direction, but the ACL source address range is 192.168.0.0/16 and the traffic type is http established, there will be no traffic to match these criteria (note, there is no web server on LAN 1 or LAN 2). Hence no traffic inspection will take place.</p>
</div>
<p><strong>4</strong>. A network administrator is configuring an IOS IPS with the command</p>
<p>R1(config)# ip ips<strong> signature-definition</strong></p>
<p>Which configuration task can be achieved with this command?</p>
<ul style="list-style-type: circle;">
<li>Retire or unretire the ios_ips basic signature category.</li>
<li>Retire or unretire the all atomic signatures category.</li>
<li><strong>Retire or unretire an individual signature.</strong></li>
<li>Retire or unretire the all signature category.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The IOS command ip ips signature-definition is used to configure a specific signature, including retire/unretire and event action. To configure a signature category, the command ip ips signature-category is used.</p>
</div>
<p><strong>5.</strong> What information must an IPS track in order to detect attacks matching a composite signature?</p>
<ul style="list-style-type: circle;">
<li><strong>the state of packets related to the attack</strong></li>
<li>the network bandwidth consumed by all packets</li>
<li>the attacking period used by the attacker</li>
<li>the total number of packets in the attack</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>A composite signature is called a stateful signature. It identifies a sequence of operations distributed across multiple hosts over an arbitrary period of time. Because this type of attack involves multiple packets, an IPS sensor must maintain the state information. However, an IPS sensor cannot maintain the state information indefinitely. A composite signature is configured with a time period to maintain the state for the specific attack when it is first detected. Thus, an IPS may not be able to maintain all the information related to an attack such as total number of packets, total length of attack time, and the amount of bandwidth consumed by the attack.</p>
</div>
<figure id="attachment_15201" aria-describedby="caption-attachment-15201" style="width: 341px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions.png"><img loading="lazy" decoding="async" class="size-full wp-image-15201" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions.png" alt="CCNA Security Exam Questions" width="341" height="42" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions.png 341w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions-300x37.png 300w" sizes="(max-width: 341px) 100vw, 341px" /></a><figcaption id="caption-attachment-15201" class="wp-caption-text">CCNA Security Exam Questions</figcaption></figure>
<p><strong>6.</strong> Refer to the exhibit. A network administrator enters the command on a Cisco IOS IPS router. What is the effect?</p>
<ul style="list-style-type: circle;">
<li>Alert messages are sent in Security Device Event Exchange (SDEE) format.</li>
<li><strong>Alert messages are sent in syslog format.</strong></li>
<li>Alert messages are sent in trace file format.</li>
<li>Alert messages are sent in event log format.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The ip ips notify command is used to set the IPS event notification. This command has two options, log and sdee. The log option is to specify that notifications are sent in syslog format. The sdee option is to specify that notifications are sent in SDEE format. If no option is specified, by default, notifications are sent in syslog format.</p>
</div>
<p><strong>7.</strong> What is the purpose in configuring an IOS IPS crypto key when enabling IOS IPS on a Cisco router?</p>
<ul style="list-style-type: circle;">
<li>to enable Cisco Configuration Professional to be launched securely</li>
<li>to secure the IOS image in flash</li>
<li><strong>to verify the digital signature for the master signature file</strong></li>
<li>to encrypt the master signature file</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The crypto key verifies the digital signature for the master signature file (sigdef-default.xml). The content of the file is signed by a Cisco private key to guarantee its authenticity and integrity.</p>
</div>
<p><strong>8.</strong> What is a disadvantage of network-based IPS as compared to host-based IPS?</p>
<ul style="list-style-type: circle;">
<li>Network-based IPS should not be used with multiple operating systems.</li>
<li>Network-based IPS does not detect lower level network events.</li>
<li>Network-based IPS is less cost-effective.</li>
<li><strong>Network-based IPS cannot examine encrypted traffic.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Network-based IPS devices are implemented as inline mode to actively monitor the traffic on networks. They can take immediate actions when security criteria match. One limitation of them is that they cannot monitor/inspect encrypted packets.</p>
</div>
<p><strong>9.</strong> True or False?<br />
A Cisco IDS does not affect the flow of traffic when it operates in promiscuous mode.</p>
<ul style="list-style-type: circle;">
<li><strong>true</strong></li>
<li>false</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>In promiscuous mode, also known as passive mode, the flow of traffic is unaffected because the IDS sensor analyzes copies of traffic instead of actual forwarded packets.</p>
</div>
<p><strong>10.</strong> What is a disadvantage of a pattern-based detection mechanism?</p>
<ul style="list-style-type: circle;">
<li>The normal network traffic pattern must be profiled first.</li>
<li>It is difficult to deploy in a large network.</li>
<li><strong>It cannot detect unknown attacks.</strong></li>
<li>Its configuration is complex.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>An IDS/IPS with pattern-based detection, also known as signature-based detection, compares the network traffic to a database of known attacks (signature files) and triggers an alarm or prevents communication if a match is found. The signatures must be created first. Hence this type of intrusion detection cannot detect unknown attacks. It is easy to configure and to deploy. Its operation does not depend on the information of normal network behavior (or baseline).</p>
</div>
<p><strong>11.</strong> A security specialist configures an IPS so that it will generate an alert when an attack is first detected. Alerts for the subsequent detection of the same attack are suppressed for a pre-defined period of time. Another alert will be generated at the end of the period indicating the number of the attack detected. Which IPS alert monitoring mechanism is configured?</p>
<ul style="list-style-type: circle;">
<li>atomic alert</li>
<li>correlation alert</li>
<li>composite alert</li>
<li><strong>summary alert</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Alerts generated by an IPS should be monitored closely to ensure proper actions are taken against malicious attacks. IPS solutions incorporate two types of alerts, atomic alerts and summary alerts. Atomic alerts are generated every time a signature triggers. A summary alert is a single alert that indicates multiple occurrences of the same signature from the same source address or port. With a summary alter, the first detection of the attack triggers a normal alert. Subsequent detection of the same attack is counted until the end of the signature summary interval. When the length of time specified by the summary interval has elapsed, a summary alarm is sent, indicating the number of alarms that occurred during the time interval.</p>
</div>
<p><strong>12.</strong> What are two disadvantages of using an IDS? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li><strong>The IDS does not stop malicious traffic.</strong></li>
<li>The IDS works offline using copies of network traffic.</li>
<li>The IDS has no impact on traffic.</li>
<li>The IDS analyzes actual forwarded packets.</li>
<li><strong>The IDS requires other devices to respond to attacks.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The disadvantage of operating with mirrored traffic is that the IDS cannot stop malicious single-packet attacks from reaching the target before responding to the attack. Also, an IDS often requires assistance from other networking devices, such as routers and firewalls, to respond to an attack. An advantage of an IDS is that by working offline using mirrored traffic, it has no impact on traffic flow.</p>
</div>
<figure id="attachment_15202" aria-describedby="caption-attachment-15202" style="width: 414px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers.png"><img loading="lazy" decoding="async" class="size-full wp-image-15202" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers.png" alt="CCNA Security Questions and Answers" width="414" height="147" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers.png 414w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers-300x107.png 300w" sizes="(max-width: 414px) 100vw, 414px" /></a><figcaption id="caption-attachment-15202" class="wp-caption-text">CCNA Security Questions and Answers</figcaption></figure>
<p><strong>13.</strong> Refer to the exhibit. Based on the IPS configuration provided, which conclusion can be drawn?</p>
<ul style="list-style-type: circle;">
<li>The signatures in all categories will be retired and not be used by the IPS.</li>
<li>The signatures in all categories will be compiled into memory and used by the IPS.</li>
<li><strong>Only the signatures in the ios_ips basic category will be compiled into memory and used by the IPS.</strong></li>
<li>The signatures in the ios_ips basic category will be retired and the remaining signatures will be compiled into memory and used by the IPS.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The IPS signature in the all category is retired, which means no signatures are compiled into memory. The IPS signature ios_ips basic category is unretired (by the command retired false), resulting in the signatures in the ios_ips basic being compiled into RAM for traffic inspection.</p>
</div>
<p><strong>14.</strong> What are two drawbacks to using HIPS? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li><strong>With HIPS, the network administrator must verify support for all the different operating systems used in the network.</strong></li>
<li>HIPS installations are vulnerable to fragmentation attacks or variable TTL attacks.</li>
<li><strong>HIPS has difficulty constructing an accurate network picture or coordinating events that occur across the entire network.</strong></li>
<li>If the network traffic stream is encrypted, HIPS is unable to access unencrypted forms of the traffic.</li>
<li>With HIPS, the success or failure of an attack cannot be readily determined.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Network-based IPS devices are implemented in inline mode to actively monitor the traffic on networks. They can take immediate actions when security criteria match. They can be implemented with dedicated appliances or as a feature on a Cisco router. Multiple types of detection mechanisms can be implemented in IPS, including signature-based and anomaly-based detection. One limitation of an IPS is that it cannot monitor or inspect encrypted packets.</p>
</div>
<p><strong>15.</strong> Which two benefits does the IPS version 5.x signature format provide over the version 4.x signature format? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li>support for IPX and AppleTalk protocols</li>
<li><strong>addition of a signature risk rating</strong></li>
<li><strong>support for encrypted signature parameters</strong></li>
<li>addition of signature micro engines</li>
<li>support for comma-delimited data import</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Since IOS 12.4(11)T, Cisco introduced version 5.x IPS signature format. The new version supports encrypted signature parameters and other features such as signature risk rating, which rates the signature on security risk.</p>
</div>
<p><strong>16.</strong> In configuring a Cisco router to prepare for IPS and VPN features, a network administrator opens the file realm-cisco.pub.key.txt, and copies and pastes the contents to the router at the global configuration prompt. What is the result after this configuration step?</p>
<ul style="list-style-type: circle;">
<li>A pair of public/secret keys is created for IPsec VPN operation.</li>
<li>The router is authenticated with the Cisco secure IPS resource web server.</li>
<li><strong>A crypto key is created for IOS IPS to verify the master signature file.</strong></li>
<li>A pair of public/secret keys is created for the router to serve as an SSH server.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The third step in implementing IOS IPS is to configure the Cisco IOS IPS public key that is located in the realm-cisco.pub.key.txt file. This public key is used to verify digital signature for the master signature file, and can be downloaded from cisco.com. To configure the IOS IPS crypto key, open the text file, and copy and paste the contents to the router at the global configuration prompt. Public/private key pairs for IPsec VPN and SSH server are generated using different methods.</p>
</div>
<figure id="attachment_15203" aria-describedby="caption-attachment-15203" style="width: 492px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-15203" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions.jpg" alt="CCNA Security Exam Chapter 5 Exam Questions" width="492" height="186" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions.jpg 492w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions-300x113.jpg 300w" sizes="(max-width: 492px) 100vw, 492px" /></a><figcaption id="caption-attachment-15203" class="wp-caption-text">CCNA Security Exam Chapter 5 Exam Questions</figcaption></figure>
<p><strong>17.</strong> Refer to the exhibit. Which statement best describes how incoming traffic on serial 0/0 is handled?</p>
<ul style="list-style-type: circle;">
<li>Traffic not matching ACL 100 will be scanned and reported.</li>
<li><strong>Traffic matching ACL 100 will be scanned and reported.</strong></li>
<li>Traffic that is sourced from 172.31.235.0/24 will be scanned and reported.</li>
<li>Traffic that is coming from any source other than 172.31.235.0/24 will be scanned and reported.</li>
<li>Traffic not matching ACL 100 will be dropped.</li>
<li>Traffic that is sourced from 172.31.235.0/24 will be sent directly to its destination without being scanned or reported.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>From the configuration, ACL 100 is used to identify matching packets to be inspected. However, since the ACL 100 configuration is unknown (not displayed), the only conclusion we can draw for sure is that “Traffic matching ACL 100 will be scanned and reported.”</p>
</div>
<p><strong>18.</strong> Which type of IPS signature detection is used to distract and confuse attackers?</p>
<ul style="list-style-type: circle;">
<li>anomaly-based detection</li>
<li><strong>honeypot-based detection</strong></li>
<li>pattern-based detection</li>
<li>policy-based detection</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The honeypot-based detection method uses dummy servers to attract attacks. The purpose of the honey pot approach is to distract attacks away from real network devices. After capturing the attack activities on honeypot servers, network administrators can analyze incoming types of attacks and malicious traffic patterns.</p>
</div>
<figure id="attachment_15204" aria-describedby="caption-attachment-15204" style="width: 434px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/Cisco-IPS-Configuration.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-15204" src="http://3.90.216.52/wp-content/uploads/2018/09/Cisco-IPS-Configuration.jpg" alt="Cisco IPS Configuration" width="434" height="106" srcset="https://www.technig.com/wp-content/uploads/2018/09/Cisco-IPS-Configuration.jpg 434w, https://www.technig.com/wp-content/uploads/2018/09/Cisco-IPS-Configuration-300x73.jpg 300w" sizes="(max-width: 434px) 100vw, 434px" /></a><figcaption id="caption-attachment-15204" class="wp-caption-text">Cisco IPS Configuration</figcaption></figure>
<p><strong>19.</strong> Refer to the exhibit. What is the result of issuing the Cisco IOS IPS commands on router R1?</p>
<ul style="list-style-type: circle;">
<li>All traffic that is denied by the ACL is subject to inspection by the IPS.</li>
<li>A named ACL determines the traffic to be inspected.</li>
<li>A numbered ACL is applied to S0/0/0 in the outbound direction.</li>
<li><strong>All traffic that is permitted by the ACL is subject to inspection by the IPS.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>In configuring IOS IPS with the command ip ips, an optional extended or standard ACL can be used to filter the scanned traffic. All traffic that is permitted by the ACL is subject to inspection by the IPS. Traffic that is denied by the ACL is not inspected by the IPS.</p>
</div>
<p><strong>20.</strong> A system analyst is configuring and tuning a recently deployed IPS appliance. By examining the IPS alarm log, the analyst notices that the IPS does not generate alarms for a few known attack packets. Which term describes the lack of alarms by the IPS?</p>
<ul style="list-style-type: circle;">
<li>false positive</li>
<li><strong>false negative</strong></li>
<li>true positive</li>
<li>true negative</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The alarms generated by an IPS can be classified into 4 types:<br />
A false positive occurs when an IPS generates an alarm on normal user traffic that should not have triggered an alarm.<br />
A false negative occurs when an IPS fails to generate an alarm after processing attack traffic the IPS is configured to detect.<br />
A true positive occurs when an IPS generates an alarm in response to known attack traffic.<br />
A true negative occurs when normal network traffic does not generate an alarm.</p>
</div>
<p><strong>21.</strong> Which statement is true about an atomic alert that is generated by an IPS?</p>
<ul style="list-style-type: circle;">
<li><strong>It is an alert that is generated every time a specific signature has been found.</strong></li>
<li>It is a single alert sent for multiple occurrences of the same signature.</li>
<li>It is both a normal alarm and a summary alarm being sent simultaneously at set intervals.</li>
<li>It is an alert that is used only when a logging attack has begun.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The two main alert generation mechanisms for IDS/IPS devices are atomic and summary alerts. Atomic alerts are generated every time a signature triggers. With a summary alert, a single atomic alert is generated for the first detection of an attack. Then the duplicate alarms are counted, but not sent, for a specific time period. When it reaches the specified time period, an alert is sent that indicates the number of alarms that occurred during the time interval.</p>
</div>
<p><strong>22.</strong> What are two shared characteristics of the IDS and the IPS? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li><strong>Both are deployed as sensors.</strong></li>
<li>Both analyze copies of network traffic.</li>
<li><strong>Both use signatures to detect malicious traffic.</strong></li>
<li>Both rely on an additional network device to respond to malicious traffic.</li>
<li>Both have minimal impact on network performance.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Both the IDS and the IPS are deployed as sensors and use signatures to detect malicious traffic. The IDS analyzes copies of network traffic, which results in minimal impact on network performance. The IDS also relies on an IPS to stop malicious traffic.</p>
</div>
<p><strong>23.</strong> A network administrator suspects the default setting of the ip ips notify sdee command has caused performance degradation on the Cisco IOS IPS router. The network administrator enters the ip sdee events 50 command in an attempt to remedy the performance issues. What is the immediate effect of this command?</p>
<ul style="list-style-type: circle;">
<li>The newest 50 events from the original buffer are saved and all others are deleted.</li>
<li>The oldest 50 events of the original buffer are deleted.</li>
<li>All events that were stored in the original buffer are saved, while a new buffer is created to store new events.</li>
<li><strong>All events that were stored in the previous buffer are lost.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>When sending IPS notification with SDEE format, the buffer on the router stores up to 200 events by default. If a smaller buffer is requested, all stored events are lost. If a larger buffer is requested, all stored events are saved. The default buffer can be altered with the ip sdee events command. All stored events are lost when Cisco SDEE notification is disabled. A new buffer is allocated when the notifications are re-enabled.</p>
</div>
<div class="ui-widget ui-widget-content"></div>
<div class="ui-widget ui-widget-content">
<p>That is all the <a href="https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-security.html" target="_blank" rel="noopener noreferrer">CCNA Security</a> chapter 5 exam questions and answers with description. Please share new CCNA Security Chapter 5 exam questions via the comment section. We will update and share the new CCNA security questions and answers.</p>
<hr />
<p><strong> Related Queries:</strong> CCNA Security chapter 5 exam questions with Answers</p>
<p>CCNA security chapter 5 exam answers<br />
CCNA security pretest exam answers<br />
CCNA security final exam answers 2018<br />
CCNAs chapter 2 exam answers<br />
CCNA security v2 chapter 6 exam answers<br />
Cisco cybersecurity final exam answers<br />
CCNA security v2 chapter 7 exam answers<br />
CCNA security NetAcad</p>
</div>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/">CCNA Security Chapter 5 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15194</post-id>	</item>
		<item>
		<title>CCNA Security Chapter 4 Exam Questions with Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 30 Aug 2018 01:29:07 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 4 Answers]]></category>
		<category><![CDATA[CCNA Security Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15054</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="583" height="213" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Exam Questions and Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></div>
<p>The latest update of CCNA Security chapter 4 exam questions and answers are available for review and educational purposes. You can find this questions on netacad CCNA Security chapter 4 exam test. Please don&#8217;t forget to share the CCNA Security chapter 4 exam questions via comment section for keeping this list up-to-date. CCNA Security Chapter [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/">CCNA Security Chapter 4 Exam Questions with Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="583" height="213" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Exam Questions and Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></div><p>The latest update of CCNA Security chapter 4 exam questions and answers are available for review and educational purposes. You can find this questions on <a href="https://netacad.com/" target="_blank" rel="noopener noreferrer">netacad</a> CCNA Security chapter 4 exam test.</p>
<p>Please don&#8217;t forget to share the CCNA Security chapter 4 exam questions via comment section for keeping this list up-to-date.</p>
<h3>CCNA Security Chapter 4 Exam Questions with Answers</h3>
<p><strong>1:</strong> What is one benefit of using a stateful firewall instead of a proxy server?</p>
<p style="padding-left: 30px;">prevention of Layer 7 attacks</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">better performance</span></strong></p>
<p style="padding-left: 30px;">ability to perform user authentication</p>
<p style="padding-left: 30px;">ability to perform packet filtering</p>
<p><a style="font-weight: bold; background-color: #ffffff; display: inline !important;" href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-Latest-Update.png"><img loading="lazy" decoding="async" class="wp-image-15056 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-Latest-Update.png" alt="CCNA Security Chapter 4 Exam Questions with Answers Latest Update" width="300" height="90" /></a></p>
<p>CCNA Security Chapter 4 Exam Questions</p>
<p><strong>2:</strong> Refer to the exhibit. Which statement describes the function of the ACEs?</p>
<p style="padding-left: 30px;">These ACEs automatically appear at the end of every IPv6 ACL to allow IPv6 routing to occur.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">These ACEs allow for IPv6 neighbor discovery traffic.</span></strong></p>
<p style="padding-left: 30px;">These are optional ACEs that can be added to the end of an IPv6 ACL to allow ICMP messages that are defined in object groups named nd-na and nd-ns.</p>
<p style="padding-left: 30px;">These ACEs must be manually added to the end of every IPv6 ACL to allow IPv6 routing to occur.</p>
<p><strong>3:</strong> When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?</p>
<p style="padding-left: 30px;">ACEs to prevent SNMP traffic</p>
<p style="padding-left: 30px;">ACEs to prevent broadcast address traffic</p>
<p style="padding-left: 30px;">ACEs to prevent ICMP traffic</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ACEs to prevent traffic from private address spaces</span></strong></p>
<p style="padding-left: 30px;">ACEs to prevent HTTP traffic</p>
<p><strong>4:</strong> Which type of packet is unable to be filtered by an outbound ACL?</p>
<p style="padding-left: 30px;">ICMP packet</p>
<p style="padding-left: 30px;">multicast packet</p>
<p style="padding-left: 30px;">broadcast packet</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">router-generated packet</span></strong></p>
<p><strong>5:</strong> Which command will verify a Zone-Based Policy Firewall configuration?</p>
<p style="padding-left: 30px;">show protocols</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">show running-config</span></strong></p>
<p style="padding-left: 30px;">show zones</p>
<p style="padding-left: 30px;">show interfaces</p>
<figure id="attachment_15055" aria-describedby="caption-attachment-15055" style="width: 427px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png"><img loading="lazy" decoding="async" class="wp-image-15055 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png" alt="CCNA Security Chapter 4 Exam Questions with Answers" width="427" height="399" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png 427w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers--300x280.png 300w" sizes="(max-width: 427px) 100vw, 427px" /></a><figcaption id="caption-attachment-15055" class="wp-caption-text">CCNA Security Chapter 4 Exam Questions with Answers</figcaption></figure>
<p><strong>6:</strong> Refer to the exhibit. The network &#8220;A&#8221; contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as &#8220;A&#8221;?</p>
<p style="padding-left: 30px;">internal network</p>
<p style="padding-left: 30px;">perimeter security boundary</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">DMZ</span></strong></p>
<p style="padding-left: 30px;">untrusted network</p>
<p><strong>7:</strong> A company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?</p>
<p style="padding-left: 30px;">traffic that originates from the public network and that is destined for the DMZ</p>
<p style="padding-left: 30px;">traffic that is returning from the DMZ after originating from the private network</p>
<p style="padding-left: 30px;">traffic that is returning from the public network after originating from the private network</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">traffic that is going from the private network to the DMZ</span></strong></p>
<p><strong>8:</strong> When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?</p>
<p style="padding-left: 30px;">Design the physical infrastructure.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Establish policies between zones.</span></strong></p>
<p style="padding-left: 30px;">Assign interfaces to zones.</p>
<p style="padding-left: 30px;">Identify subsets within zones.</p>
<figure id="attachment_15057" aria-describedby="caption-attachment-15057" style="width: 583px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png"><img loading="lazy" decoding="async" class="wp-image-15057 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" alt="CCNA Security Exam Questions and Answers" width="583" height="213" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></a><figcaption id="caption-attachment-15057" class="wp-caption-text">CCNA Security Exam Questions and Answers</figcaption></figure>
<p><strong>9:</strong> Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?</p>
<p style="padding-left: 30px;">The initial packet is dropped, but subsequent packets are forwarded.</p>
<p style="padding-left: 30px;">The packet is forwarded, and no alert is generated.</p>
<p style="padding-left: 30px;">The packet is forwarded, and an alert is generated.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The packet is dropped.</span></strong></p>
<p><strong>10:</strong> Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?</p>
<p style="padding-left: 30px;">ipv6 access-class ENG_ACL in</p>
<p style="padding-left: 30px;">ipv6 traffic-filter ENG_ACL out</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ipv6 traffic-filter ENG_ACL in</span></strong></p>
<p style="padding-left: 30px;">ipv6 access-class ENG_ACL out</p>
<p><strong>11:</strong> Consider the following access list.</p>
<p><strong>access-list 100 permit ip host 192.168.10.1 any</strong><br />
<strong>access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo</strong><br />
<strong>access-list 100 permit ip any any</strong></p>
<p>Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)</p>
<p style="padding-left: 30px;">Only the network device assigned the IP address 192.168.10.1 is allowed to access the router.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.</span></strong></p>
<p style="padding-left: 30px;">Devices on the 192.168.10.0/24 network are not allowed to reply to any ping requests.</p>
<p style="padding-left: 30px;">Only Layer 3 connections are allowed to be made from the router to any other network device.</p>
<p><strong>12:</strong> In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic?</p>
<p style="padding-left: 30px;">IP source and destination addresses</p>
<p style="padding-left: 30px;">TCP/UDP source and destination port numbers</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">application layer protocol session information</span></strong></p>
<p style="padding-left: 30px;">TCP/IP protocol numbers</p>
<p><strong>13:</strong> To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?</p>
<p style="padding-left: 30px;">time-stamp request</p>
<p style="padding-left: 30px;">router advertisement</p>
<p style="padding-left: 30px;">time-stamp reply</p>
<p style="padding-left: 30px;">echo request</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">echo reply</span></strong></p>
<p><a style="font-weight: bold; background-color: #ffffff; display: inline !important;" href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-15058 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg" alt="CCNA Security Exam Answers" width="572" height="46" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg 572w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers--300x24.jpg 300w" sizes="(max-width: 572px) 100vw, 572px" /></a></p>
<p>CCNA Security Exam Answers</p>
<p><strong>14:</strong> Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)</p>
<p style="padding-left: 30px;">SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.</p>
<p style="padding-left: 30px;">Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.</p>
<p style="padding-left: 30px;">Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.</span></strong></p>
<p style="padding-left: 30px;">SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.</p>
<p><strong>15:</strong> Which two rules about interfaces are valid when implementing a Zone-Based Policy Firewall? (Choose two.)</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">If neither interface is a zone member, then the action is to pass traffic.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">If both interfaces are members of the same zone, all traffic will be passed.</span></strong></p>
<p style="padding-left: 30px;">If one interface is a zone member and a zone-pair exists, all traffic will be passed.</p>
<p style="padding-left: 30px;">If one interface is a zone member, but the other is not, all traffic will be passed.</p>
<p style="padding-left: 30px;">If both interfaces belong to the same zone-pair and a policy exists, all traffic will be passed.</p>
<p><strong>16:</strong> When a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)</p>
<p style="padding-left: 30px;">hold</p>
<p style="padding-left: 30px;">copy</p>
<p style="padding-left: 30px;">forward</p>
<p style="padding-left: 30px;">log</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>drop</strong></span></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">inspect</span></strong></p>
<p><strong>17:</strong> If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?</p>
<p style="padding-left: 30px;">permit tcp 172.16.0.0 0.0.3.255 any established</p>
<p style="padding-left: 30px;">permit udp any any range 10000 20000</p>
<p style="padding-left: 30px;">deny tcp any any eq telnet</p>
<p style="padding-left: 30px;">permit ip any any</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap</span></strong></p>
<p style="padding-left: 30px;">deny udp any host 172.16.1.5 eq snmptrap</p>
<p><strong>18:</strong> What is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?</p>
<p style="padding-left: 30px;">tracking the state of connections between zones</p>
<p style="padding-left: 30px;">inspecting traffic between zones for traffic control</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">forwarding traffic from one zone to another</span></strong></p>
<p style="padding-left: 30px;">logging of rejected or dropped packets</p>
<p><strong>19:</strong> A router has been configured as a classic firewall and an inbound ACL applied to the external interface. Which action does the router take after inbound-to-outbound traffic is inspected and a new entry is created in the state table?</p>
<p style="padding-left: 30px;">When traffic returns from its destination, it is reinspected, and a new entry is added to the state table.</p>
<p style="padding-left: 30px;">The internal interface ACL is reconfigured to allow the host IP address access to the Internet.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A dynamic ACL entry is added to the external interface in the inbound direction.</span></strong></p>
<p style="padding-left: 30px;">The entry remains in the state table after the session is terminated so that it can be reused by the host.</p>
<p><strong>20:</strong> Which statement describes a typical security policy for a DMZ firewall configuration?</p>
<p style="padding-left: 30px;">Traffic that originates from the inside interface is generally blocked entirely or very selectively permitted to the outside interface.</p>
<p style="padding-left: 30px;">Return traffic from the inside that is associated with traffic originating from the outside is permitted to traverse from the inside interface to the outside interface.</p>
<p style="padding-left: 30px;">Return traffic from the outside that is associated with traffic originating from the inside is permitted to traverse from the outside interface to the DMZ interface.</p>
<p style="padding-left: 30px;">Traffic that originates from the outside interface is permitted to traverse the firewall to the inside interface with few or no restrictions.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Traffic that originates from the DMZ interface is selectively permitted to the outside interface.</span></strong></p>
<p><strong>21:</strong> A network administrator is implementing a Classic Firewall and a Zone-Based Firewall concurrently on a router. Which statement best describes this implementation?</p>
<p style="padding-left: 30px;">A Classic Firewall and Zone-Based Firewall cannot be used concurrently.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The two models cannot be implemented on a single interface.</span></strong></p>
<p style="padding-left: 30px;">An interface must be assigned to a security zone before IP inspection can occur.</p>
<p style="padding-left: 30px;">Both models must be implemented on all interfaces.</p>
<p><strong>22:</strong> What is one limitation of a stateful firewall?</p>
<p style="padding-left: 30px;">poor log information</p>
<p style="padding-left: 30px;">cannot filter unnecessary traffic</p>
<p style="padding-left: 30px;">weak user authentication</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>not as effective with UDP- or ICMP-based traffic</strong></span></p>
<p><strong>23:</strong> Which security tool monitors network traffic as it flows into and out of the organization and determines whether packets belong to an existing connection or are from an unauthorized source?</p>
<p style="padding-left: 30px;">web security appliance</p>
<p style="padding-left: 30px;">application proxy</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>stateful firewall</strong></span></p>
<p style="padding-left: 30px;">intrusion protection system</p>
<p>That&#8217;s all the updated CCNA Security chapter 4 exam questions and answers you need to review and test to learn more about CCNA security chapter 4 exam questions.</p>
<hr />
<p><strong> Related Questions: CCNA Security chapter 4 exam questions and answers</strong></p>
<p>CCNA security chapter 4 exam answers<br />
CCNA security chapter 4 exam answers 2018<br />
CCNA security final exam answers 2018<br />
CCNAs chapter 2 exam answers<br />
The inspect action in a cisco ios zone-based policy firewall configures cisco ios packet inspection.<br />
CCNA security netacad<br />
CCNA security chapter 5 exam answers 2018<br />
A Cisco ids does not affect the flow of traffic when it operates in promiscuous mode.</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/">CCNA Security Chapter 4 Exam Questions with Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15054</post-id>	</item>
		<item>
		<title>CCNA Security Chapter 3 Exam Questions With Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 05:57:45 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 3 Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Router Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15044</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="675" height="237" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 3 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png 675w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated-300x105.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></div>
<p>Looking for CCNA Security Exam Answers? Here you can test and review all updated CCNA Security Chapter 3 exam questions and answers. It is just for educational purposes. These questions are the latest CCNA security chapter 3 exam questions with answers. Please share the new questions through the comment section. We will reply it with [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/">CCNA Security Chapter 3 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="675" height="237" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 3 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png 675w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated-300x105.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></div><p>Looking for CCNA Security Exam Answers? Here you can test and review all updated CCNA Security Chapter 3 exam questions and answers. It is just for educational purposes.</p>
<p>These questions are the latest CCNA security chapter 3 exam questions with answers. Please share the new questions through the comment section. We will reply it with the correct answer.</p>
<h3>CCNA Security Chapter 3 Exam Questions and Answers</h3>
<figure id="attachment_15046" aria-describedby="caption-attachment-15046" style="width: 680px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers.jpg"><img loading="lazy" decoding="async" class="wp-image-15046 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers.jpg" alt="CCNA Security Chapter 3 Exam Questions With Answers" width="680" height="104" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers.jpg 680w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-300x46.jpg 300w" sizes="(max-width: 680px) 100vw, 680px" /></a><figcaption id="caption-attachment-15046" class="wp-caption-text">CCNA Security Chapter 3 Exam Questions With Answers</figcaption></figure>
<div class="ai-stem">
<div class="rTableRow">
<div class="coreContent">
<p><strong>1:</strong> Refer to the exhibit. Which statement describes the configuration of the ports for Server1?</p>
</div>
</div>
</div>
<p style="padding-left: 30px;">The configuration is using the default ports for a Cisco router.</p>
<p style="padding-left: 30px;">The configuration will not be active until it is saved and Rtr1 is rebooted.</p>
<p style="padding-left: 30px;">The configuration of the ports requires 1812 be used for the authentication and the authorization ports.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The ports configured for Server1 on the router must be identical to those configured on the RADIUS server.</span></strong></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>2:</strong> Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis?</div>
<div></div>
</div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">SSH</p>
<p style="padding-left: 30px;">RADIUS</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">TACACS+</span></strong></p>
<p style="padding-left: 30px;">ACS</p>
</div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>3: </strong>Why would a network administrator include a local username configuration, when the AAA-enabled router is also configured to authenticate using several ACS servers?</div>
</div>
</div>
</div>
<p style="padding-left: 30px;">The local username database will provide a backup for authentication in the event the ACS servers become unreachable.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>A local username database is required when configuring authentication using ACS servers.</strong></span></p>
<p style="padding-left: 30px;">Because ACS servers only support remote user access, local users can only authenticate using a local username database.</p>
<p style="padding-left: 30px;">Without a local username database, the router will require successful authentication with each ACS server.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>4: </strong>Which debug command is used to focus on the status of a TCP connection when using TACACS+ for authentication?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">debug tacacs accounting</p>
<p style="padding-left: 30px;">debug aaa authentication</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">debug tacacs events</span></strong></p>
<p style="padding-left: 30px;">debug tacacs</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>5:</strong> What difference exists when using Windows Server as an AAA server, rather than Cisco Secure ACS?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Windows Server only supports AAA using TACACS.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Windows Server uses its own Active Directory (AD) controller for authentication and authorization.</strong></span></p>
<p style="padding-left: 30px;">Windows Server cannot be used as an AAA server.</p>
<p style="padding-left: 30px;">Windows Server requires more Cisco IOS commands to configure.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>6:</strong> What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">MD5</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">RADIUS</span></strong></p>
<p style="padding-left: 30px;">SSH</p>
<p style="padding-left: 30px;">TACACS+</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>7:</strong> Which solution supports AAA for both RADIUS and TACACS+ servers?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Implement Cisco Secure Access Control System (ACS) only.</strong></span></p>
<p style="padding-left: 30px;">RADIUS and TACACS+ servers cannot be supported by a single solution.</p>
<p style="padding-left: 30px;">Implement both a local database and Cisco Secure Access Control System (ACS).</p>
<p style="padding-left: 30px;">Implement a local database.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>8:</strong> What is a characteristic of TACACS+?</div>
<div></div>
</div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">TACACS+ is backward compatible with TACACS and XTACACS.</p>
<p style="padding-left: 30px;">TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646 or 1813 for accounting.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">TACACS+ provides authorization of router commands on a per-user or per-group basis.</span></strong></p>
<p style="padding-left: 30px;">TACACS+ is an open IETF standard.</p>
</div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>9:</strong> Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">accessibility</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>authorization</strong></span></p>
<p style="padding-left: 30px;">authentication</p>
<p style="padding-left: 30px;">auditing</p>
<p style="padding-left: 30px;">accounting</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>10:</strong> When a method list for AAA authentication is being configured, what is the effect of the keyword <b>local</b>?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">The login succeeds, even if all methods return an error.</p>
<p style="padding-left: 30px;">It uses the enable password for authentication.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>It accepts a locally configured username, regardless of case.</strong></span></p>
<p style="padding-left: 30px;">It defaults to the vty line password for authentication.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>11:</strong> Why is authentication with AAA preferred over a local database method?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">It uses less network bandwidth.</p>
<p style="padding-left: 30px;">It requires a login and password combination on the console, vty lines, and aux ports.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">It provides a fallback authentication method if the administrator forgets the username or password.</span></strong></p>
<p style="padding-left: 30px;">It specifies a different password for each line or port.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>12:</strong> Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>accounting</strong></span></p>
<p style="padding-left: 30px;">accessibility</p>
<p style="padding-left: 30px;">authentication</p>
<p style="padding-left: 30px;">authorization</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>13:</strong> What is a characteristic of AAA accounting?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">Accounting can only be enabled for network connections.</p>
<p style="padding-left: 30px;">Users are not required to be authenticated before AAA accounting logs their activities on the network.</p>
<p style="padding-left: 30px;">Accounting is concerned with allowing and disallowing authenticated users access to certain areas and programs on the network.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Possible triggers for the aaa accounting exec default command include start-stop and stop-only.</strong></span></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>14:</strong> A user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Use the login delay command for authentication attempts.</strong></span></p>
<p style="padding-left: 30px;">Use the none keyword when configuring the authentication method list.</p>
<p style="padding-left: 30px;">Use the aaa local authentication attempts max-fail global configuration mode command with a higher number of acceptable failures.</p>
<p style="padding-left: 30px;">Use the login local command for authenticating user access.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>15:</strong> What device is considered a supplicant during the 802.1X authentication process?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">the switch that is controlling network access</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>the client that is requesting authentication</strong></span></p>
<p style="padding-left: 30px;">the router that is serving as the default gateway</p>
<p style="padding-left: 30px;">the authentication server that is performing client authentication</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>16:</strong> Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>password encryption</strong></span></p>
<p style="padding-left: 30px;">separate authentication and authorization processes</p>
<p style="padding-left: 30px;">802.1X support</p>
<p style="padding-left: 30px;">SIP support</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>utilization of transport layer protocols</strong></span></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>17:</strong> Which characteristic is an important aspect of authorization in an AAA-enabled network device?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">The authorization feature enhances network performance.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">User access is restricted to certain services.</span></strong></p>
<p style="padding-left: 30px;">A user must be identified before network access is granted.</p>
<p style="padding-left: 30px;">User actions are recorded for use in audits and troubleshooting events.</p>
<figure id="attachment_15047" aria-describedby="caption-attachment-15047" style="width: 675px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png"><img loading="lazy" decoding="async" class="wp-image-15047 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png" alt="CCNA Security Chapter 3 Exam Questions With Answers – Updated" width="675" height="237" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png 675w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated-300x105.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></a><figcaption id="caption-attachment-15047" class="wp-caption-text">CCNA Security Chapter 3 Exam Questions With Answers – Updated</figcaption></figure>
<div class="ai-stem">
<div class="rTableRow">
<div class="qNum"><strong>18:</strong> <span style="text-transform: initial;">Refer to the exhibit. Router R1 has been configured as shown, with the resulting log message. On the basis of the information that is presented, which two statements describe the result of AAA authentication operation? (Choose two.)</span></div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The locked-out user stays locked out until the clear aaa local user lockout username Admin command is issued.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The locked-out user failed authentication.</span></strong></p>
<p style="padding-left: 30px;">The locked-out user stays locked out until the interface is shut down then re-enabled.</p>
<p style="padding-left: 30px;">The locked-out user should have used the username admin and password Str0ngPa55w0rd.</p>
<p style="padding-left: 30px;">The locked-out user is locked out for 10 minutes by default.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>19:</strong> True or False? The <b>single-connection</b> keyword prevents the configuration of multiple TACACS+ servers on a AAA-enabled router.</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">true</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">false</span></strong></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>20:</strong> What is the result of entering the <b>aaa accounting network </b>command on a router?</div>
</div>
</div>
</div>
<div class="rTableOptionCell"></div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<p style="padding-left: 30px;">The router outputs accounting data for all outbound connections such as SSH and Telnet.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The router collects and reports usage data related to network-related service requests.</span></strong></p>
<p style="padding-left: 30px;">The router provides data for only internal service requests.</p>
<p style="padding-left: 30px;">The router outputs accounting data for all EXEC shell sessions.</p>
<div></div>
<div class="qNum"><strong>21:</strong> Which authentication method stores usernames and passwords in the router and is ideal for small networks?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>local AAA</strong></span></p>
<p style="padding-left: 30px;">server-based AAA over TACACS+</p>
<p style="padding-left: 30px;">server-based AAA</p>
<p style="padding-left: 30px;">local AAA over TACACS+</p>
<p style="padding-left: 30px;">local AAA over RADIUS</p>
<p style="padding-left: 30px;">server-based AAA over RADIUS</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>22:</strong> A user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">Use the show aaa user command.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Use the show aaa local user lockout command .</strong></span></p>
<p style="padding-left: 30px;">Use the show aaa sessions command .</p>
<p style="padding-left: 30px;">Use the show running-configuration command .</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>23:</strong> When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell">
<p style="padding-left: 30px;">the supplicant</p>
<p style="padding-left: 30px;">the authentication server</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">the switch that the client is connected to</span></strong></p>
<p style="padding-left: 30px;">the router that is serving as the default gateway</p>
</div>
</div>
</div>
<p>That&#8217;s all the latest CCNA Security chapter 3 exam questions and answers. Please share the new CCNA Security exam questions via the comment section.</p>
<hr />
<p><strong> Related Questions:</strong></p>
<p>CCNA security chapter 3 exam answers 2018<br />
CCNA security 2.0 hands-on skills exam<br />
CCNA security chapter 3 exam answers<br />
CCNA Security exam questions and answers pdf<br />
CCNA security v2.0 exam answers<br />
CCNA security final exam packet tracer<br />
Which solution supports aaa for both radius and tacacs+ servers?<br />
What is a characteristic of aaa accounting?<br />
CCNA security final exam answers 2018<br />
CCNA security netacad</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/">CCNA Security Chapter 3 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15044</post-id>	</item>
		<item>
		<title>CCNA Security Chapter 2 Exam Questions with Answers &#8211; Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 04:28:18 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 2 Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Questions and Answers]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15030</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 2 Exam Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png 840w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Here is the all CCNA Security Chapter 2 Exam Questions with answers. It is just for review and educational purposes. You can use this to learn more about CCNA security exam questions and answers. This exam will cover material from Chapter 2 of CCNAS 2.0 of the curriculum. This exam will be scored using the Weighted [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/">CCNA Security Chapter 2 Exam Questions with Answers &#8211; Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 2 Exam Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png 840w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Here is the all CCNA Security Chapter 2 Exam Questions with answers. It is just for review and educational purposes. You can use this to learn more about CCNA security exam questions and answers. This exam will cover material from Chapter 2 of CCNAS 2.0 of the curriculum.</p>
<p>This exam will be scored using the Weighted Model where each MCSA (Multiple-Choice Single-Answer) is worth two points and each MCMA (Multiple-Choice Multiple-Answer) is worth one point for each correct option. If more options are selected than required, the student will receive a score of zero.</p>
<h3>CCNA Security Chapter 2 Exam Questions and Answers</h3>
<div class="qNum"><strong>4:</strong> A network administrator notices that unsuccessful login attempts have caused a router to enter quiet mode. How can the administrator maintain remote access to the networks even during quiet mode?</div>
<div></div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Quiet mode behavior can be overridden for specific networks by using an ACL.</span></strong></p>
<p style="padding-left: 30px;">Quiet mode behavior can be enabled via an ip access-group command on a physical interface.</p>
<p style="padding-left: 30px;">Quiet mode behavior will only prevent specific user accounts from attempting to authenticate.</p>
<p style="padding-left: 30px;">Quiet mode behavior can be disabled by an administrator by using SSH to connect.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>5:</strong> What is the Control Plane Policing (CoPP) feature designed to accomplish?</div>
</div>
</div>
</div>
<div>
<p style="padding-left: 30px;">manage services provided by the control plane</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">prevent unnecessary traffic from overwhelming the route processor</span></strong></p>
<p style="padding-left: 30px;">direct all excess traffic away from the route processor</p>
<p style="padding-left: 30px;">disable control plane services to reduce overall traffic</p>
</div>
<div class="coreContent">
<div class="ai-stem">
<div>
<div class="rTableRow">
<p>&nbsp;</p>
<div class="qNum"><strong>6:</strong> What is a characteristic of the Cisco IOS Resilient Configuration feature?</div>
<div></div>
</div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">The secure boot-image command works properly when the system is configured to run an image from a TFTP server.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>A snapshot of the router running configuration can be taken and securely archived in persistent storage.</strong></span></p>
<p style="padding-left: 30px;">Once issued, the secure boot-config command automatically upgrades the configuration archive to a newer version after new configuration commands have been entered.</p>
<p style="padding-left: 30px;">It maintains a secure working copy of the bootstrap startup program.</p>
<p>&nbsp;</p>
<div>
<div class="ai-stem">
<div class="rTableRow">
<div class="qNum"><strong>7:</strong> <span style="text-transform: initial;">What is the purpose of using the </span><strong style="text-transform: initial;">ip ospf message-digest-key</strong><span style="text-transform: initial;"> key </span><strong style="text-transform: initial;">md5</strong><span style="text-transform: initial;"> password command and the </span><strong style="text-transform: initial;">area</strong><span style="text-transform: initial;"> area-id </span><strong style="text-transform: initial;">authentication message-digest</strong><span style="text-transform: initial;"> command on a router?</span></div>
</div>
<div class="rTableRow">
<div></div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">to enable OSPF MD5 authentication on a per-interface basis</p>
<p style="padding-left: 30px;">to encrypt OSPF routing updates</p>
<p style="padding-left: 30px;">to facilitate the establishment of neighbor adjacencies</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">to configure OSPF MD5 authentication globally on the router</span></strong></p>
<p>&nbsp;</p>
</div>
<div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>8:</strong> If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
</div>
<div>
<p style="padding-left: 30px;">Assign commands to the view.</p>
<p style="padding-left: 30px;">Associate the view with the root view.</p>
<p style="padding-left: 30px;">Create a superview using the parser view view-name command.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Create a view using the parser view view-name command.</strong></span></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Assign a secret password to the view.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Assign users who can use the view.</span></strong></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>9:</strong> Which two characteristics apply to role-based CLI access superviews? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">A single superview can be shared among multiple CLI views.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Users logged in to a superview can access all commands specified within the associated CLI views.</span></strong></p>
<p style="padding-left: 30px;">Deleting a superview deletes all associated CLI views.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A specific superview cannot have commands added to it directly.</span></strong></p>
<p style="padding-left: 30px;">CLI views have passwords, but superviews do not have passwords.</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>10:</strong> What is the default privilege level of user accounts created on Cisco routers?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">0</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">1</span></strong></p>
<p style="padding-left: 30px;">15</p>
<p style="padding-left: 30px;">16</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>11:</strong> Which three statements describe limitations in using privilege levels for assigning command authorization? (Choose three.)</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Views are required to define the CLI commands that each user can access.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">There is no access control to specific interfaces on a router.</span></strong></p>
<p style="padding-left: 30px;">The root user must be assigned to each privilege level that is defined.</p>
<p style="padding-left: 30px;">It is required that all 16 privilege levels be defined, whether they are used or not.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Creating a user account that needs access to most but not all commands can be a tedious process.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Commands set on a higher privilege level are not available for lower privilege users.</span></strong></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>12:</strong> Which three items are prompted for a user response during interactive AutoSecure setup? (Choose three.)</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">content of a security banner</span></strong></p>
<p style="padding-left: 30px;">IP addresses of interfaces</p>
<p style="padding-left: 30px;">interfaces to enable</p>
<p style="padding-left: 30px;">services to disable</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>enable password</strong></span></p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>enable secret password</strong></span></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>13:</strong> Which three functions are provided by the syslog logging service? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">retaining captured messages on the router when a router is rebooted</p>
<p style="padding-left: 30px;">setting the size of the logging buffer</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">gathering logging information</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">specifying where captured information is stored</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">distinguishing between information to be captured and information to be ignored</span></strong></p>
<p style="padding-left: 30px;">authenticating and encrypting data sent over the network</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>14:</strong> What command must be issued to enable login enhancements on a Cisco router?</div>
</div>
</div>
</div>
<div class="rTableOptionCell"></div>
<p style="padding-left: 30px;">banner motd</p>
<p style="padding-left: 30px;">privilege exec level</p>
<p style="padding-left: 30px;">login delay</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">login block-for</span></strong></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>15:</strong> What is a requirement to use the Secure Copy Protocol feature?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">The Telnet protocol has to be configured on the SCP server side.</p>
<p style="padding-left: 30px;">A transfer can only originate from SCP clients that are routers.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A command must be issued to enable the SCP server side functionality.</span></strong></p>
<p style="padding-left: 30px;">At least one user with privilege level 1 has to be configured for local authentication</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>16:</strong> A network engineer is implementing security on all company routers. Which two commands must be issued to force authentication via the password 1A2b3C for all OSPF-enabled interfaces in the backbone area of the company network? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ip ospf message-digest-key 1 md5 1A2b3C</span></strong></p>
<p style="padding-left: 30px;">username OSPF password 1A2b3C</p>
<p style="padding-left: 30px;">area 1 authentication message-digest</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">area 0 authentication message-digest</span></strong></p>
<p style="padding-left: 30px;">enable password 1A2b3C</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>17:</strong> Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">R1(config)# username admin password Admin01pa55<br />
R1(config)# line con 0<br />
R1(config-line)# login local</p>
<p style="padding-left: 30px;">R1(config)# username admin Admin01pa55 encr md5<br />
R1(config)# line con 0<br />
R1(config-line)# login local</p>
<p style="padding-left: 30px;">R1(config)# username admin secret Admin01pa55<br />
R1(config)# line con 0<br />
R1(config-line)# login</p>
<p style="padding-left: 30px;">R1(config)# username admin password Admin01pa55<br />
R1(config)# line con 0<br />
R1(config-line)# login</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">R1(config)# username admin secret Admin01pa55</span></strong><br />
<strong><span style="color: #339966;">R1(config)# line con 0</span></strong><br />
<strong><span style="color: #339966;">R1(config-line)# login local</span></strong></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>18:</strong> Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Disable all unused ports and interfaces to reduce the number of ways that the router can be accessed.</p>
<p style="padding-left: 30px;">Provision the router with the maximum amount of memory possible.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Locate the router in a secure locked room that is accessible only to authorized personnel.</span></strong></p>
<p style="padding-left: 30px;">Keep a secure copy of the router Cisco IOS image and router configuration file as a backup.</p>
<p style="padding-left: 30px;">Configure secure administrative control to ensure that only authorized personnel can access the router.</p>
<div></div>
<div class="ai-stem">
<div class="rTableRow">
<div><a href="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-15037" src="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated.jpg" alt="CCNA Security Chapter 2 Exam Questions with Answers - Updated" width="492" height="90" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated.jpg 492w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated-300x55.jpg 300w" sizes="(max-width: 492px) 100vw, 492px" /></a></div>
<div class="qNum"><strong>19:</strong> <span style="text-transform: initial;">Refer to the exhibit. Which statement about the JR-Admin account is true?</span></div>
</div>
</div>
<div class="rTableOptionCell"></div>
<p style="padding-left: 30px;">JR-Admin can issue debug and reload commands.</p>
<p style="padding-left: 30px;">JR-Admin can issue show, ping, and reload commands.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">JR-Admin can issue ping and reload commands.</span></strong></p>
<p style="padding-left: 30px;">JR-Admin can issue only ping commands.</p>
<p style="padding-left: 30px;">JR-Admin cannot issue any command because the privilege level does not match one of those defined.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>20:</strong> Which two options can be configured by Cisco AutoSecure? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>security banner</strong></span></p>
<p style="padding-left: 30px;">SNMP</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>enable secret password</strong></span></p>
<p style="padding-left: 30px;">interface IP address</p>
<p style="padding-left: 30px;">syslog</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div><a href="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-15038" src="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated.jpg" alt="" width="357" height="151" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated.jpg 357w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated-300x127.jpg 300w" sizes="(max-width: 357px) 100vw, 357px" /></a><strong style="text-transform: initial;">21:</strong><span style="text-transform: initial;"> </span><span style="text-transform: initial;">The exhibit displays a router prompt, the command </span><b style="text-transform: initial;">show running-config</b><span style="text-transform: initial;">, and the following partial output:</span></div>
<div>
<div class="rTableRow">
<div class="coreContent">
<div id="matimage-knet-it_229325-N65553-description" class="material-description sr-only">&lt;ouput omitted&gt;<br />
!<br />
Parser view SUPPORT superview<br />
secret 5 $1$Vp10$BBB1N68Z2ekr/aLH1edts.<br />
view SHOWVIEW<br />
view VERIFYVIEW</div>
<p>Refer to the exhibit. Based on the output of the <b>show running-config</b> command, which type of view is SUPPORT?</p>
<p style="padding-left: 30px;"><strong><span style="text-transform: initial; color: #339966;">superview, containing SHOWVIEW and VERIFYVIEW views</span></strong></p>
</div>
</div>
</div>
</div>
<p style="padding-left: 30px;">secret view, with a level 5 encrypted password</p>
<p style="padding-left: 30px;">CLI view, containing SHOWVIEW and VERIFYVIEW commands</p>
<p style="padding-left: 30px;">root view, with a level 5 encrypted secret password</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>22:</strong> What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>The generated keys can be used by SSH.</strong></span></p>
<p style="padding-left: 30px;">The general-purpose key size must be specified for authentication with the crypto key generate rsa general-keys moduluscommand.</p>
<p style="padding-left: 30px;">All vty ports are automatically configured for SSH to provide secure management.</p>
<p style="padding-left: 30px;">The keys must be zeroized to reset Secure Shell before configuring other parameters.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>23:</strong> What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">to ensure more efficient routing</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">to prevent redirection of data traffic to an insecure link</span></strong></p>
<p style="padding-left: 30px;">to provide data security through encryption</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>to prevent data traffic from being redirected and then discarded</strong></span></p>
<p style="padding-left: 30px;">to ensure faster network convergence</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>24:</strong> Which three types of views are available when configuring the role-based CLI access feature? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">superuser view</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">superview</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">CLI view</span></strong></p>
<p style="padding-left: 30px;">admin view</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">root view</span></strong></p>
<p style="padding-left: 30px;">config view</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>25:</strong> An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">Enable inbound vty Telnet sessions.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Enable inbound vty SSH sessions.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Configure the IP domain name on the router.</span></strong></p>
<p style="padding-left: 30px;">Generate two-way pre-shared keys.</p>
<p style="padding-left: 30px;">Configure DNS on the router.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Generate the SSH keys.</span></strong></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>26:</strong> What is a characteristic of the MIB?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Information is organized in a flat manner so that SNMP can access it quickly.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The OIDs are organized in a hierarchical structure.</span></strong></p>
<p style="padding-left: 30px;">A separate MIB tree exists for any given device in the network.</p>
<p style="padding-left: 30px;">Information in the MIB cannot be changed.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>27:</strong> Which three actions are produced by adding Cisco IOS login enhancements to the router login process? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">disable logins from specified hosts</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">slow down an active attack</span></strong></p>
<p style="padding-left: 30px;">automatically provide AAA authentication</p>
<p style="padding-left: 30px;">create password authentication</p>
<p style="padding-left: 30px;">permit only secure console access</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">create syslog messages</span></strong></p>
<p>&nbsp;</p>
<div class="coreContent">
<div>
<div class="coreContent">
<div>
<div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>28:</strong> Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)</div>
</div>
</div>
</div>
</div>
</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">flash security</p>
<p style="padding-left: 30px;">zone isolation</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">router hardening</span></strong></p>
<p style="padding-left: 30px;">remote access security</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">operating system security</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">physical security</span></strong></p>
<hr />
<p><strong>Related search:</strong></p>
<p>CCNA security final exam answers 2018<br />
CCNA security chapter 2 exam answers<br />
CCNA security chapter 3 exam answers 2018<br />
CCNA security final exam packet tracer<br />
CCNA security v2.0 skills assessment &#8211; b<br />
Cisco cybersecurity final exam answers<br />
What is the default privilege level of user accounts created on Cisco routers?</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/">CCNA Security Chapter 2 Exam Questions with Answers &#8211; Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15030</post-id>	</item>
		<item>
		<title>How to Configure Switch Port Security on Cisco Switches?</title>
		<link>https://www.technig.com/configure-switch-port-security-cisco-switches/</link>
					<comments>https://www.technig.com/configure-switch-port-security-cisco-switches/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 09 May 2018 05:00:34 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Switch Port Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14693</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline. Download Switch Port Security [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline.</p>
<p><strong>Download</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Port-Security-on-Cisco-Switches-Technig.zip" target="_blank" rel="noopener noreferrer">Switch Port Security Configuration</a> Packet Tracer Lab.</p>
<figure id="attachment_14695" aria-describedby="caption-attachment-14695" style="width: 841px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14695 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg" alt="How to Configure Switch Port Security on Cisco Switches - Technig" width="841" height="490" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-300x175.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-768x447.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></a><figcaption id="caption-attachment-14695" class="wp-caption-text">How to Configure Switch Port Security on Cisco Switches &#8211; Technig</figcaption></figure>
<h2 class="p_H_Head1">Port Security Guidelines and Restrictions</h2>
<p class="pB1_Body1">Follow these guidelines when configuring port security.</p>
<ul style="list-style-type: circle;">
<li class="pBu1_Bullet1">A secure port cannot be a trunk port.</li>
<li class="pBu1_Bullet1">A secure port cannot be a destination port for Switch Port Analyzer (SPAN).</li>
<li class="pBu1_Bullet1">A secure port cannot belong to an EtherCha<img loading="lazy" decoding="async" style="text-transform: initial;" src="https://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" width="19" height="2" border="0" /><span style="text-transform: initial;">nnel port-channel interface.</span></li>
<li class="pBu1_Bullet1">A secure port and static MAC address configuration are mutually exclusive.</li>
</ul>
<h2 class="p_H_Head1">Configure Switch Port Security</h2>
<p class="pB1_Body1">These sections describe how to configure port security using the Packet Tracer &#8211; Configuring Switch Port Security Lab.</p>
<p>In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic to the port.</p>
<p><strong>Part 1:</strong> Configure Port Security</p>
<p>a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1&gt;enable 
SW1#configure terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface range fastEthernet 0/1-2
SW1(config-if-range)#switchport mode access 
SW1(config-if-range)#
SW1(config-if-range)#switchport port-security 
SW1(config-if-range)#</pre>
<p>b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security maximum 1
SW1(config-if-range)#</pre>
<p>c. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security mac-address sticky 
SW1(config-if-range)#</pre>
<p>d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security violation restrict 
SW1(config-if-range)#</pre>
<p>e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports simultaneously.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config)#interface range fastEthernet 0/3-24, gigabitEthernet 0/1-2
SW1(config-if-range)#shutdown</pre>
<p>It&#8217;s all and enough to configure switch port security on this lab. Let&#8217;s test it.</p>
<p><strong>Part 2:</strong> Verify Port Security</p>
<p>Try to test your switch port security configuration with ping command and testing with the rogue laptop on the lab</p>
<ul>
<li>a. From PC1, ping PC2.</li>
<li>b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration with &#8220;<strong>show run</strong>&#8221; command.</li>
<li>c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red.</li>
<li>d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification shut down the port connected to Rogue Laptop.</li>
<li>e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1.</li>
<li>f. Display the port security violations for the port Rogue Laptop is connected to.</li>
<li>g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1.</li>
<li>h. Why is PC2 able to ping PC1, but the Rouge Laptop is not?</li>
</ul>
<p>That&#8217;s all, you need to learn about to configure switch port security on Cisco switches. If you need to study more about switch port security, try to read a book or simply read the below materials.</p>
<h3 class="p_H_Head1">Default Port Security Configuration</h3>
<table id="wp1047723table1047720" border="1" width="80%" cellspacing="0" cellpadding="3">
<tbody>
<tr align="left" valign="bottom">
<th scope="col">
<section class="pCH1_CellHead1">Feature</section>
</th>
<th scope="col">
<section class="pCH1_CellHead1">Default Setting</section>
</th>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Port security</p>
</td>
<td>
<p class="pB1_Body1">Disabled on a port</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Maximum number of secure MAC addresses</p>
</td>
<td>
<p class="pB1_Body1">1</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Violation mode</p>
</td>
<td>
<p class="pB1_Body1">Shutdown. The port shuts down when the maximum number of secure MAC addresses is exceeded, and an SNMP trap notification is sent.</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging type</p>
</td>
<td>
<p class="pB1_Body1">Absolute</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Static Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Sticky</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
</tbody>
</table>
<h2 class="p_H_Head1">Overview of Configure Switch Port Security</h2>
<p class="pBu1_Bullet1">You can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. Although sticky secure addresses can be manually configured, it is not recommended.</p>
<p class="pB1_Body1">You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling <em class="cEmphasis">sticky learning</em>. To enable sticky learning, enter the <b class="cBold">switchport</b> <b class="cBold">port-security mac-address sticky</b> command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.</p>
<p class="pB1_Body1">The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup<em class="cEmphasis"> </em>configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the configuration, they are lost</p>
<p class="pB1_Body1">If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration.</p>
<p class="pB1_Body1">After the maximum number of secure MAC addresses is configured, they are stored in an address table. To ensure that an attached device has the full bandwidth of the port, configure the MAC address of the attached device and set the maximum number of addresses to one, which is the default.</p>
<p class="pB1_Body1">A security violation occurs if the maximum number of secure MAC addresses has been added to the address table and a workstation whose MAC address is not in the address table attempts to access the interface.</p>
<p class="pB1_Body1">You can configure the interface for one of these violation modes, based on the action to be taken if a violation occurs:</p>
<ul>
<li class="pBu1_Bullet1"><strong>Restrict</strong>—A port security violation restricts data, causes the SecurityViolation counter to increment, and causes an SNMP Notification to be generated. The rate at which SNMP traps are generated can be controlled by the SNMP-server enable traps port-security trap-rate command. The default value (&#8220;0&#8221;) causes an SNMP trap to be generated for every security violation.</li>
<li class="pBu1_Bullet1"><strong>Shutdown</strong>—A port security violation causes the interface to shut down immediately. When a secure port is in the error-disabled state, you can bring it out of this state by entering the <b class="cBold">errdisable recovery cause</b> psecure-violation global configuration command or you can manually re-enable it by entering the <b class="cBold">shutdown</b> and <b class="cBold">no shutdown</b> interface configuration commands. This is the default mode.</li>
</ul>
<p class="pB2_Body2">You can also customize the time to recover from the specified error-disable cause (default is 300 seconds) by entering the <b class="cBold">errdisable recovery interval </b>command.</p>
<p>Source: <a href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html" target="_blank" rel="noopener noreferrer">Cisco</a></p>
<h3>Related Search Queries:</h3>
<ul>
<li>Cisco port security violation</li>
<li>Switchport port-security maximum 2</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Port security configuration in packet tracer</li>
<li>Switchport port-security mac-address sticky</li>
<li>Port security in networking</li>
<li>Port security pdf</li>
<li>Switchport port-security maximum</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security mac-address sticky</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-switch-port-security-cisco-switches/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14693</post-id>	</item>
		<item>
		<title>How to Configure Banner MOTD on Cisco Switch and Router?</title>
		<link>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/</link>
					<comments>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Mon, 07 May 2018 02:24:13 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14609</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Banner Motd on Cisco Switch and Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>If you faced with the below error when you try to configure banner motd on Cisco switch or router. You can easily fix Cisco Motd banner ASCII art using this MOTD Banner configuration guide. SW1(config-line)#motd-banner !No Access for You?! ^ % Invalid input detected at '^' marker. It means that you did not type the banner [&#8230;]</p>
<p>The post <a href="https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/">How to Configure Banner MOTD on Cisco Switch and Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Banner Motd on Cisco Switch and Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>If you faced with the below error when you try to configure banner motd on Cisco switch or router. You can easily fix Cisco Motd banner ASCII art using this MOTD Banner configuration guide.</p>
<pre class=""><code class="language-markup">SW1(config-line)#motd-banner !No Access for You?!
^
% Invalid input detected at '^' marker.</code></pre>
<p>It means that you did not type the banner motd command correctly. Let&#8217;s test it and configure banner motd on Cisco switch and router using packet tracer.</p>
<h3>What is MOTD Banner?</h3>
<p>A <i>banner</i> is a message presented to a user who is using the Cisco switch. The type of banner you configured for use determines when this message is shown. You can configure three main types of banners on your Cisco switch, as shown here:</p>
<ul class="level-one">
<li>
<p class="first-para"><b>The message of the Day (MOTD):</b> This type of login message has been around for a long time on Unix and mainframe systems. The idea of the message is to display a temporary notice to users, such as issues with system availability.</p>
<p class="child-para">However, because the message displays when a user connects to the device before login, most network administrators are now using it to display legal notices regarding access to the switch, such as <i>unauthorized access to this device is prohibited and violators will be prosecuted to the full extent of the law</i> and other such cheery endearments.</p>
</li>
<li>
<p class="first-para"><b>Login:</b> This banner is displayed before login to the system, but after the MOTD banner is displayed. Typically, this banner is used to display a permanent message to the users.</p>
</li>
<li>
<p class="first-para"><b>Exec:</b> This banner displays after the login is complete when the connecting user enters User EXEC mode. Whereas all users who attempt to connect to the switch see the other banners, only users who successfully log on to the switch see this banner, which can be used to post reminders to your network administrators.</p>
</li>
</ul>
<figure id="attachment_14615" aria-describedby="caption-attachment-14615" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png"><img loading="lazy" decoding="async" class="wp-image-14615 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" alt="Configure Banner Motd on Cisco Switch and Router - Technig" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-14615" class="wp-caption-text">Configure Banner Motd on Cisco Switch and Router &#8211; Technig</figcaption></figure>
<div class="ad x2">
<h2 id="article_page_content_ad" class="du-ad-region row"> Configure Banner MOTD on Cisco Switch and Router</h2>
<div>
<p>To configure each of these banners and set them up on your switch, follow these commands:</p>
</div>
</div>
<pre class="code">SW1#enable 
SW1#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)#banner motd #Admin Access only!#
SW1(config)#</pre>
<p>Now, the Motd banner has configured on a Cisco switch. Let&#8217;s test it what is going on?</p>
<pre class="nums:false lang:default decode:true">Press RETURN to get started!
Admin Access Only
User Access Verification
Password: 
</pre>
<p>Yes, you can see the message that prompts you before user authentication.</p>
<h3>Related Search Queries:</h3>
<p>Motd banner examples<br />
Cisco MOTD banner ASCII art<br />
Why should every switch have a motd banner?<br />
Show banner motd<br />
Cisco banner motd examples<br />
Banner motd packet tracer<br />
Cisco banner motd multiple lines<br />
Banner exec</p>
<p>The post <a href="https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/">How to Configure Banner MOTD on Cisco Switch and Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14609</post-id>	</item>
		<item>
		<title>How to Configure PAP and CHAP in Cisco Router?</title>
		<link>https://www.technig.com/configure-pap-and-chap-in-cisco-router/</link>
					<comments>https://www.technig.com/configure-pap-and-chap-in-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 03 May 2018 11:27:16 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14577</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="841" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure PAP and CHAP in Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></div>
<p>It&#8217;s a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication protocols in a Cisco router. Configure PAP and CHAP in Cisco Router [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-pap-and-chap-in-cisco-router/">How to Configure PAP and CHAP in Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="841" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure PAP and CHAP in Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></div><p>It&#8217;s a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication protocols in a Cisco router.</p>
<figure id="attachment_14578" aria-describedby="caption-attachment-14578" style="width: 1024px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14578 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" alt="Configure PAP and CHAP in Cisco Router - Technig" width="1024" height="432" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 1024w, https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x127.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x324.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption id="caption-attachment-14578" class="wp-caption-text">Configure PAP and CHAP in Cisco Router &#8211; Technig</figcaption></figure>
<h2>Configure PAP and CHAP in Cisco Router</h2>
<p>In this activity, you will practice configuring PPP encapsulation on serial links. You will also configure PPP PAP<br />
authentication and PPP CHAP authentication.</p>
<h3><strong>Part 1:</strong> Review Routing Configurations</h3>
<p><strong>Step 1:</strong> View running configurations on all routers.</p>
<ul>
<li>While reviewing the router configurations, note the use of both static and dynamic routes in the topology.</li>
</ul>
<p><strong>Step 2:</strong> Test connectivity between computers and the web server.</p>
<ul>
<li>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</li>
</ul>
<h3><strong>Part 2:</strong> Configure PPP as the Encapsulation Method</h3>
<p><strong>Step 1:</strong> Configure R1 to use PPP encapsulation with R3.</p>
<p>Enter the following commands on R1:</p>
<pre class="nums:false lang:default decode:true">R1(config)# interface s0/0/0
R1(config-if)# encapsulation ppp</pre>
<p><strong>Step 2:</strong> Configure R2 to use PPP encapsulation with R3.</p>
<p>Enter the appropriate commands on R2:</p>
<pre class="nums:false lang:default decode:true ">R2(config)# interface s0/0/1
R2(config-if)# encapsulation ppp</pre>
<p><strong>Step 3:</strong> Configure R3 to use PPP encapsulation with R1, R2, and ISP.</p>
<p>Enter the appropriate commands on R3:</p>
<pre class="nums:false lang:default decode:true">R3(config)# interface s0/0/0
R3(config-if)# encapsulation ppp
R3(config)# interface s0/0/1
R3(config-if)# encapsulation ppp
R3(config)# interface s0/1/0
R3(config-if)# encapsulation ppp</pre>
<p><strong>Step 4:</strong> Configure ISP to use PPP encapsulation with R3.</p>
<p><strong>a.</strong> Click the Internet cloud, then ISP. Enter the following commands:</p>
<pre class="nums:false lang:default decode:true ">Router(config)# interface s0/0/0
Router(config-if)# encapsulation ppp</pre>
<p><strong>b.</strong> Exit the Internet cloud by clicking Back in the upper left corner or by pressing Alt+left arrow.</p>
<p><strong>Step 5:</strong> Test connectivity to the web server.</p>
<p>PC and Laptop should be able to ping the web server at 209.165.200.2. This may take some time as<br />
interfaces start working again and EIGRP reconverges.</p>
<h3><strong>Part 3:</strong> Configure PPP Authentication</h3>
<p><strong>Step 1:</strong> Configure PPP PAP Authentication Between R1 and R3.</p>
<p><strong>Note:</strong> Instead of using the keyword password as shown in the curriculum, you will use the keyword secret to<br />
provide a better encryption of the password.</p>
<p><strong>a.</strong> Enter the following commands into R1:</p>
<pre class="nums:false lang:default decode:true ">R1(config)# username R3 secret class
R1(config)# interface s0/0/0
R1(config-if)# ppp authentication pap
R1(config-if)# ppp pap sent-username R1 password cisco</pre>
<p><strong>b.</strong> Enter the following commands into R3:</p>
<pre class="nums:false lang:default decode:true ">R3(config)# username R1 secret cisco
R3(config)# interface s0/0/0
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class</pre>
<p><strong>Step 2:</strong> Configure PPP PAP Authentication Between R2 and R3.</p>
<p>Repeat step 1 to configure authentication between R2 and R3 changing the usernames as needed. Note that<br />
each password sent to each serial port matches the password expected by the opposite router.</p>
<pre class="nums:false lang:default decode:true ">R2(config-if)# username R3 secret class
R2(config)# interface s0/0/1
R2(config-if)# ppp authentication pap
R2(config-if)# ppp pap sent-username R2 password cisco</pre>
<pre class="nums:false lang:default decode:true ">R3(config-if)# username R2 secret cisco
R3(config)# interface s0/0/1
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class</pre>
<h3><strong>Step 3:</strong> Configure PPP CHAP Authentication Between R3 and ISP</h3>
<p><strong>a.</strong> Enter the following commands into ISP. The hostname is sent as the username:</p>
<pre class="nums:false lang:default decode:true ">Router(config)# hostname ISP
ISP(config)# username R3 secret cisco
ISP(config)# interface s0/0/0
ISP(config-if)# ppp authentication chap</pre>
<p><strong>b.</strong> Enter the following commands into R3. The passwords must match for CHAP authentication:</p>
<pre class="nums:false lang:default decode:true ">R3(config)# username ISP secret cisco
R3(config)# interface serial0/1/0
R3(config-if)# ppp authentication chap</pre>
<p><strong>Step 4:</strong> Test connectivity between computers and the web server.</p>
<p>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</p>
<p><strong>Step 4:</strong> Test connectivity between computers and the web server.</p>
<p>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</p>
<p><strong>Note:</strong> This is the Cisco Network Academy lab, you can join the netacad.com website to learn the entire CCNA.</p>
<p><strong>Download the Lab:</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/2.3.2.6-Packet-Tracer-Configuring-PAP-and-CHAP-Authentication.zip" target="_blank" rel="noopener noreferrer">PAP and CHAP Configuration</a> or <a href="https://www.technig.com/tag/ccna-packet-tracer-lab/" target="_blank" rel="noopener noreferrer">CCNA Packet Tracer Lab</a></p>
<p>That is all you need to learn to configure PAP and CHAP in Cisco Router. Let&#8217;s see what is the difference between PAP and CHAP authentication protocols?</p>
<h2>What is the Difference Between PAP and CHAP?</h2>
<p>The password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) are both used to authenticate PPP sessions and can be used with many VPNs. Basically, PAP works like a standard login procedure; the remote system authenticates itself to the user a static username and password combination. The password can be encrypted for additional security, but PAP is subject to numerous attacks. In particular, since the information is static, it is subject to password guessing as well as snooping.</p>
<p>CHAP takes a more sophisticated and secure approach to authentication by creating a unique challenge phrase (a randomly generated string) for each authentication. The challenge phrase is combined with device hostnames using one-way hashing functions to authenticate in a way where no static secret information is ever transmitted over the wire. Because all transmitted information is dynamic, CHAP is significantly more robust than PAP.</p>
<p>Another advantage of CHAP over PAP is that CHAP can be set up to do repeated midsession authentications. This is useful for dial-up PPP sessions and other sessions where a port may be left open even though the remote device has disconnected. In this case, its possible for someone else to pick up the connection mid-session simply by establish physical connectivity.</p>
<h3>Related Search:</h3>
<ul>
<li>PPP pap configuration</li>
<li>PPP chap configuration</li>
<li>Configure chap authentication on s0/0/0</li>
<li>pap chap configuration</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-pap-and-chap-in-cisco-router/">How to Configure PAP and CHAP in Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-pap-and-chap-in-cisco-router/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14577</post-id>	</item>
		<item>
		<title>CCNA Security Path to Cyber Security Certifications</title>
		<link>https://www.technig.com/ccna-security-path-guide/</link>
					<comments>https://www.technig.com/ccna-security-path-guide/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 17 Nov 2016 07:17:44 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[Cyber Security Certifications]]></category>
		<category><![CDATA[Information Security Certifications]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=8552</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"></div>
<p>This is a CCNA Security path guide that helps you pursuit the cyber security certifications for empowering your job opportunity. Most CCNA security certified are just follow up directly to CCIE Security certification. It&#8217;s good for working only in the field of Cisco network devices. But if you want to have a better job opportunity, you [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-path-guide/">CCNA Security Path to Cyber Security Certifications</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"></div><p>This is a CCNA Security path guide that helps you pursuit the cyber security certifications for empowering your job opportunity. Most CCNA security certified are just follow up directly to CCIE Security certification. It&#8217;s good for working only in the field of Cisco network devices. But if you want to have a better job opportunity, you should study-wide variety knowledge of security certifications and get wider your information security knowledge.</p>
<p>CCNA security is the point where you start to become a security specialist for Cisco network devices. The new CCNA Routing and Switching focus on security objectives as well.</p>
<p><strong>Related:</strong> <a href="https://www.technig.com/new-ccna-v3-exams-guides/" target="_blank" rel="noopener noreferrer">What is New in CCNA v3 Exams 100-105, 200-105, 200-125</a>?</p>
<h2>CCNA Security Path to Cyber Security Certifications</h2>
<p>Generally, information security begins from CompTIA security+ certification. It has a good theoretical general knowledge of cyber security. But it&#8217;s not enough, just for beginners. To follow-up to the high-level computer security, follow them step by step and work hard to get experience.</p>
<p><strong>Related:</strong> <a href="https://www.technig.com/top-cyber-security-certifications/">Top 15 Most Wanted Cyber Security Certifications</a></p>
<p>Some prerequisite certification required for CCNA Security. The only thing you should do is just pass the CCENT certification and have the knowledge of common Cisco network devices.</p>
<blockquote><p>Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.</p></blockquote>
<p><strong>Prerequisites for CCNA Security:</strong></p>
<p>Any valid Cisco CCENT, CCNA Routing and Switching, or any CCIE certification can act as a prerequisite.</p>
<figure id="attachment_8628" aria-describedby="caption-attachment-8628" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2016/11/Cisco-Certifications-Roadmap-Technig.png"><img loading="lazy" decoding="async" class="size-full wp-image-8628" src="https://www.technig.com/wp-content/uploads/2016/11/Cisco-Certifications-Roadmap-Technig.png" alt="Cisco Certifications Roadmap - Technig" width="840" height="374" /></a><figcaption id="caption-attachment-8628" class="wp-caption-text">Cisco Certifications Roadmap &#8211; Technig</figcaption></figure>
<p>The chart indicates the CCNA Security path to CCIE Security. Notice that the beginning point of CCNA security is CCENT, that is not good to begin study directly the Cisco security certification. If you would have the CCNA Routing and Switching certification, the CCNA security will become easy to you.</p>
<p>Another security certification Cisco provides for security specialist is Cisco Cybersecurity Specialist certification. It recognizes security professionals who have attained specialized in-depth expertise and proven knowledge in the essential areas of proactive cyber threat detection and mitigation.</p>
<p><strong>Related: </strong><a href="https://www.technig.com/packet-tracer-ccna-practical-labs/" target="_blank" rel="noopener noreferrer">Packet Tracer CCNA Practical Labs</a></p>
<p>Designed for professional security analysts and leveraging the features of Cisco and other network security products used today, the Cisco Cybersecurity Specialist certification focuses on the topics of event monitoring, security event/alarm/traffic analysis, and incident response. For achieving this certification, there is no prerequisite required. However, a thorough understanding of TCP/IP and a working knowledge of CCNA Security is highly recommended.</p>
<h2>Cisco Certifications Roadmap</h2>
<p>To understand more and find your way easy in Cisco certifications, check the below Cisco Certification Roadmap that where will your path take you?</p>
<figure id="attachment_8629" aria-describedby="caption-attachment-8629" style="width: 3264px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2016/11/Cisco-Certifications-Roadmap-CCNA-Security-Path.png"><img loading="lazy" decoding="async" class="size-full wp-image-8629" src="https://www.technig.com/wp-content/uploads/2016/11/Cisco-Certifications-Roadmap-CCNA-Security-Path.png" alt="Cisco Certifications Roadmap - CCNA Security Path" width="3264" height="2112" /></a><figcaption id="caption-attachment-8629" class="wp-caption-text">Cisco Certifications Roadmap &#8211; CCNA Security Path</figcaption></figure>
<p>This chart shows you the Cisco certification path you would like to follow and build your career for future. Selecting your favorite certification path will help you quickly achieve your demanded certification.</p>
<p>The post <a href="https://www.technig.com/ccna-security-path-guide/">CCNA Security Path to Cyber Security Certifications</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-path-guide/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8552</post-id>	</item>
	</channel>
</rss>
