
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Questions and Answers Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/questions-and-answers/feed/" rel="self" type="application/rss+xml" />
	<link>https://168.138.42.164/tag/questions-and-answers/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Wed, 29 Aug 2018 04:28:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>Questions and Answers Archives - TECHNIG</title>
	<link>https://168.138.42.164/tag/questions-and-answers/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>CCNA Security Chapter 2 Exam Questions with Answers &#8211; Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 04:28:18 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 2 Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Questions and Answers]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15030</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 2 Exam Answers" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png 840w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Here is the all CCNA Security Chapter 2 Exam Questions with answers. It is just for review and educational purposes. You can use this to learn more about CCNA security exam questions and answers. This exam will cover material from Chapter 2 of CCNAS 2.0 of the curriculum. This exam will be scored using the Weighted [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/">CCNA Security Chapter 2 Exam Questions with Answers &#8211; Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 2 Exam Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers.png 840w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Answers-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Here is the all CCNA Security Chapter 2 Exam Questions with answers. It is just for review and educational purposes. You can use this to learn more about CCNA security exam questions and answers. This exam will cover material from Chapter 2 of CCNAS 2.0 of the curriculum.</p>
<p>This exam will be scored using the Weighted Model where each MCSA (Multiple-Choice Single-Answer) is worth two points and each MCMA (Multiple-Choice Multiple-Answer) is worth one point for each correct option. If more options are selected than required, the student will receive a score of zero.</p>
<h3>CCNA Security Chapter 2 Exam Questions and Answers</h3>
<div class="qNum"><strong>4:</strong> A network administrator notices that unsuccessful login attempts have caused a router to enter quiet mode. How can the administrator maintain remote access to the networks even during quiet mode?</div>
<div></div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Quiet mode behavior can be overridden for specific networks by using an ACL.</span></strong></p>
<p style="padding-left: 30px;">Quiet mode behavior can be enabled via an ip access-group command on a physical interface.</p>
<p style="padding-left: 30px;">Quiet mode behavior will only prevent specific user accounts from attempting to authenticate.</p>
<p style="padding-left: 30px;">Quiet mode behavior can be disabled by an administrator by using SSH to connect.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>5:</strong> What is the Control Plane Policing (CoPP) feature designed to accomplish?</div>
</div>
</div>
</div>
<div>
<p style="padding-left: 30px;">manage services provided by the control plane</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">prevent unnecessary traffic from overwhelming the route processor</span></strong></p>
<p style="padding-left: 30px;">direct all excess traffic away from the route processor</p>
<p style="padding-left: 30px;">disable control plane services to reduce overall traffic</p>
</div>
<div class="coreContent">
<div class="ai-stem">
<div>
<div class="rTableRow">
<p>&nbsp;</p>
<div class="qNum"><strong>6:</strong> What is a characteristic of the Cisco IOS Resilient Configuration feature?</div>
<div></div>
</div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">The secure boot-image command works properly when the system is configured to run an image from a TFTP server.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>A snapshot of the router running configuration can be taken and securely archived in persistent storage.</strong></span></p>
<p style="padding-left: 30px;">Once issued, the secure boot-config command automatically upgrades the configuration archive to a newer version after new configuration commands have been entered.</p>
<p style="padding-left: 30px;">It maintains a secure working copy of the bootstrap startup program.</p>
<p>&nbsp;</p>
<div>
<div class="ai-stem">
<div class="rTableRow">
<div class="qNum"><strong>7:</strong> <span style="text-transform: initial;">What is the purpose of using the </span><strong style="text-transform: initial;">ip ospf message-digest-key</strong><span style="text-transform: initial;"> key </span><strong style="text-transform: initial;">md5</strong><span style="text-transform: initial;"> password command and the </span><strong style="text-transform: initial;">area</strong><span style="text-transform: initial;"> area-id </span><strong style="text-transform: initial;">authentication message-digest</strong><span style="text-transform: initial;"> command on a router?</span></div>
</div>
<div class="rTableRow">
<div></div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">to enable OSPF MD5 authentication on a per-interface basis</p>
<p style="padding-left: 30px;">to encrypt OSPF routing updates</p>
<p style="padding-left: 30px;">to facilitate the establishment of neighbor adjacencies</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">to configure OSPF MD5 authentication globally on the router</span></strong></p>
<p>&nbsp;</p>
</div>
<div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>8:</strong> If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
</div>
<div>
<p style="padding-left: 30px;">Assign commands to the view.</p>
<p style="padding-left: 30px;">Associate the view with the root view.</p>
<p style="padding-left: 30px;">Create a superview using the parser view view-name command.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Create a view using the parser view view-name command.</strong></span></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Assign a secret password to the view.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Assign users who can use the view.</span></strong></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>9:</strong> Which two characteristics apply to role-based CLI access superviews? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">A single superview can be shared among multiple CLI views.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Users logged in to a superview can access all commands specified within the associated CLI views.</span></strong></p>
<p style="padding-left: 30px;">Deleting a superview deletes all associated CLI views.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A specific superview cannot have commands added to it directly.</span></strong></p>
<p style="padding-left: 30px;">CLI views have passwords, but superviews do not have passwords.</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>10:</strong> What is the default privilege level of user accounts created on Cisco routers?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">0</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">1</span></strong></p>
<p style="padding-left: 30px;">15</p>
<p style="padding-left: 30px;">16</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>11:</strong> Which three statements describe limitations in using privilege levels for assigning command authorization? (Choose three.)</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Views are required to define the CLI commands that each user can access.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">There is no access control to specific interfaces on a router.</span></strong></p>
<p style="padding-left: 30px;">The root user must be assigned to each privilege level that is defined.</p>
<p style="padding-left: 30px;">It is required that all 16 privilege levels be defined, whether they are used or not.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Creating a user account that needs access to most but not all commands can be a tedious process.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Commands set on a higher privilege level are not available for lower privilege users.</span></strong></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>12:</strong> Which three items are prompted for a user response during interactive AutoSecure setup? (Choose three.)</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">content of a security banner</span></strong></p>
<p style="padding-left: 30px;">IP addresses of interfaces</p>
<p style="padding-left: 30px;">interfaces to enable</p>
<p style="padding-left: 30px;">services to disable</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>enable password</strong></span></p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>enable secret password</strong></span></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>13:</strong> Which three functions are provided by the syslog logging service? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">retaining captured messages on the router when a router is rebooted</p>
<p style="padding-left: 30px;">setting the size of the logging buffer</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">gathering logging information</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">specifying where captured information is stored</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">distinguishing between information to be captured and information to be ignored</span></strong></p>
<p style="padding-left: 30px;">authenticating and encrypting data sent over the network</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>14:</strong> What command must be issued to enable login enhancements on a Cisco router?</div>
</div>
</div>
</div>
<div class="rTableOptionCell"></div>
<p style="padding-left: 30px;">banner motd</p>
<p style="padding-left: 30px;">privilege exec level</p>
<p style="padding-left: 30px;">login delay</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">login block-for</span></strong></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>15:</strong> What is a requirement to use the Secure Copy Protocol feature?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">The Telnet protocol has to be configured on the SCP server side.</p>
<p style="padding-left: 30px;">A transfer can only originate from SCP clients that are routers.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A command must be issued to enable the SCP server side functionality.</span></strong></p>
<p style="padding-left: 30px;">At least one user with privilege level 1 has to be configured for local authentication</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>16:</strong> A network engineer is implementing security on all company routers. Which two commands must be issued to force authentication via the password 1A2b3C for all OSPF-enabled interfaces in the backbone area of the company network? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ip ospf message-digest-key 1 md5 1A2b3C</span></strong></p>
<p style="padding-left: 30px;">username OSPF password 1A2b3C</p>
<p style="padding-left: 30px;">area 1 authentication message-digest</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">area 0 authentication message-digest</span></strong></p>
<p style="padding-left: 30px;">enable password 1A2b3C</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>17:</strong> Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">R1(config)# username admin password Admin01pa55<br />
R1(config)# line con 0<br />
R1(config-line)# login local</p>
<p style="padding-left: 30px;">R1(config)# username admin Admin01pa55 encr md5<br />
R1(config)# line con 0<br />
R1(config-line)# login local</p>
<p style="padding-left: 30px;">R1(config)# username admin secret Admin01pa55<br />
R1(config)# line con 0<br />
R1(config-line)# login</p>
<p style="padding-left: 30px;">R1(config)# username admin password Admin01pa55<br />
R1(config)# line con 0<br />
R1(config-line)# login</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">R1(config)# username admin secret Admin01pa55</span></strong><br />
<strong><span style="color: #339966;">R1(config)# line con 0</span></strong><br />
<strong><span style="color: #339966;">R1(config-line)# login local</span></strong></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>18:</strong> Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Disable all unused ports and interfaces to reduce the number of ways that the router can be accessed.</p>
<p style="padding-left: 30px;">Provision the router with the maximum amount of memory possible.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Locate the router in a secure locked room that is accessible only to authorized personnel.</span></strong></p>
<p style="padding-left: 30px;">Keep a secure copy of the router Cisco IOS image and router configuration file as a backup.</p>
<p style="padding-left: 30px;">Configure secure administrative control to ensure that only authorized personnel can access the router.</p>
<div></div>
<div class="ai-stem">
<div class="rTableRow">
<div><a href="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated.jpg"><img decoding="async" class="aligncenter size-full wp-image-15037" src="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated.jpg" alt="CCNA Security Chapter 2 Exam Questions with Answers - Updated" width="492" height="90" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated.jpg 492w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-2-Exam-Questions-with-Answers-Updated-300x55.jpg 300w" sizes="(max-width: 492px) 100vw, 492px" /></a></div>
<div class="qNum"><strong>19:</strong> <span style="text-transform: initial;">Refer to the exhibit. Which statement about the JR-Admin account is true?</span></div>
</div>
</div>
<div class="rTableOptionCell"></div>
<p style="padding-left: 30px;">JR-Admin can issue debug and reload commands.</p>
<p style="padding-left: 30px;">JR-Admin can issue show, ping, and reload commands.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">JR-Admin can issue ping and reload commands.</span></strong></p>
<p style="padding-left: 30px;">JR-Admin can issue only ping commands.</p>
<p style="padding-left: 30px;">JR-Admin cannot issue any command because the privilege level does not match one of those defined.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>20:</strong> Which two options can be configured by Cisco AutoSecure? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>security banner</strong></span></p>
<p style="padding-left: 30px;">SNMP</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>enable secret password</strong></span></p>
<p style="padding-left: 30px;">interface IP address</p>
<p style="padding-left: 30px;">syslog</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div><a href="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated.jpg"><img decoding="async" class="aligncenter size-full wp-image-15038" src="http://3.90.216.52/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated.jpg" alt="" width="357" height="151" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated.jpg 357w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-Updated-300x127.jpg 300w" sizes="(max-width: 357px) 100vw, 357px" /></a><strong style="text-transform: initial;">21:</strong><span style="text-transform: initial;"> </span><span style="text-transform: initial;">The exhibit displays a router prompt, the command </span><b style="text-transform: initial;">show running-config</b><span style="text-transform: initial;">, and the following partial output:</span></div>
<div>
<div class="rTableRow">
<div class="coreContent">
<div id="matimage-knet-it_229325-N65553-description" class="material-description sr-only">&lt;ouput omitted&gt;<br />
!<br />
Parser view SUPPORT superview<br />
secret 5 $1$Vp10$BBB1N68Z2ekr/aLH1edts.<br />
view SHOWVIEW<br />
view VERIFYVIEW</div>
<p>Refer to the exhibit. Based on the output of the <b>show running-config</b> command, which type of view is SUPPORT?</p>
<p style="padding-left: 30px;"><strong><span style="text-transform: initial; color: #339966;">superview, containing SHOWVIEW and VERIFYVIEW views</span></strong></p>
</div>
</div>
</div>
</div>
<p style="padding-left: 30px;">secret view, with a level 5 encrypted password</p>
<p style="padding-left: 30px;">CLI view, containing SHOWVIEW and VERIFYVIEW commands</p>
<p style="padding-left: 30px;">root view, with a level 5 encrypted secret password</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>22:</strong> What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>The generated keys can be used by SSH.</strong></span></p>
<p style="padding-left: 30px;">The general-purpose key size must be specified for authentication with the crypto key generate rsa general-keys moduluscommand.</p>
<p style="padding-left: 30px;">All vty ports are automatically configured for SSH to provide secure management.</p>
<p style="padding-left: 30px;">The keys must be zeroized to reset Secure Shell before configuring other parameters.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>23:</strong> What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">to ensure more efficient routing</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">to prevent redirection of data traffic to an insecure link</span></strong></p>
<p style="padding-left: 30px;">to provide data security through encryption</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>to prevent data traffic from being redirected and then discarded</strong></span></p>
<p style="padding-left: 30px;">to ensure faster network convergence</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>24:</strong> Which three types of views are available when configuring the role-based CLI access feature? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">superuser view</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">superview</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">CLI view</span></strong></p>
<p style="padding-left: 30px;">admin view</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">root view</span></strong></p>
<p style="padding-left: 30px;">config view</p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>25:</strong> An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">Enable inbound vty Telnet sessions.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Enable inbound vty SSH sessions.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Configure the IP domain name on the router.</span></strong></p>
<p style="padding-left: 30px;">Generate two-way pre-shared keys.</p>
<p style="padding-left: 30px;">Configure DNS on the router.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Generate the SSH keys.</span></strong></p>
<p>&nbsp;</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>26:</strong> What is a characteristic of the MIB?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Information is organized in a flat manner so that SNMP can access it quickly.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The OIDs are organized in a hierarchical structure.</span></strong></p>
<p style="padding-left: 30px;">A separate MIB tree exists for any given device in the network.</p>
<p style="padding-left: 30px;">Information in the MIB cannot be changed.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>27:</strong> Which three actions are produced by adding Cisco IOS login enhancements to the router login process? (Choose three.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">disable logins from specified hosts</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">slow down an active attack</span></strong></p>
<p style="padding-left: 30px;">automatically provide AAA authentication</p>
<p style="padding-left: 30px;">create password authentication</p>
<p style="padding-left: 30px;">permit only secure console access</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">create syslog messages</span></strong></p>
<p>&nbsp;</p>
<div class="coreContent">
<div>
<div class="coreContent">
<div>
<div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>28:</strong> Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)</div>
</div>
</div>
</div>
</div>
</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">flash security</p>
<p style="padding-left: 30px;">zone isolation</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">router hardening</span></strong></p>
<p style="padding-left: 30px;">remote access security</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">operating system security</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">physical security</span></strong></p>
<hr />
<p><strong>Related search:</strong></p>
<p>CCNA security final exam answers 2018<br />
CCNA security chapter 2 exam answers<br />
CCNA security chapter 3 exam answers 2018<br />
CCNA security final exam packet tracer<br />
CCNA security v2.0 skills assessment &#8211; b<br />
Cisco cybersecurity final exam answers<br />
What is the default privilege level of user accounts created on Cisco routers?</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/">CCNA Security Chapter 2 Exam Questions with Answers &#8211; Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-2-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15030</post-id>	</item>
	</channel>
</rss>
