
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Router Security Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/router-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://168.138.42.164/tag/router-security/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Sun, 12 Apr 2020 01:06:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>Router Security Archives - TECHNIG</title>
	<link>https://168.138.42.164/tag/router-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>How to Configure DHCP Snooping in Cisco Switches?</title>
		<link>https://www.technig.com/configure-dhcp-snooping-cisco-switche/</link>
					<comments>https://www.technig.com/configure-dhcp-snooping-cisco-switche/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Fri, 12 Oct 2018 23:49:44 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[Configure DHCP Snooping]]></category>
		<category><![CDATA[DHCP Spoofing]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mitigate DHCP Attacks]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Router Security]]></category>
		<category><![CDATA[Switch Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15318</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Mitigate DHCP Spoofing Attack" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>In the network switching, you can easily configure DHCP snooping to prevent DHCP spoofing attack and DHCP starvation attack. Before you mitigating DHCP attacks in the network, you need to know about DHCP functions and features. The DHCP servers dynamically provide IP configuration information including IP address, subnet mask, default gateway, DNS servers, and more to [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-dhcp-snooping-cisco-switche/">How to Configure DHCP Snooping in Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Mitigate DHCP Spoofing Attack" decoding="async" srcset="https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack.jpg 840w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/Mitigate-DHCP-Spoofing-Attack-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>In the network switching, you can easily configure DHCP snooping to prevent DHCP spoofing attack and DHCP starvation attack. Before you mitigating DHCP attacks in the network, you need to know about DHCP functions and features. The DHCP servers dynamically provide IP configuration information including IP address, subnet mask, default gateway, DNS servers, and more to clients. The sequence of DHCP message exchange between client and server.</p>
<h2>Types of DHCP Attacks</h2>
<p>There are some DHCP attacks that hackers can use to hack your network systems and access the information. The DHCP Spoofing attack and the DHCP Starvation attack.</p>
<p><strong>1. DHCP Spoofing Attack</strong></p>
<p>A DHCP spoofing attack occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients. A rogue server can provide a variety of misleading information:</p>
<ul>
<li><b>Wrong default gateway</b> &#8211; Attacker provides an invalid gateway or the IP address of its host to create a man-in-the-middle attack. This may go entirely undetected as the intruder intercepts the data flow through the network.</li>
</ul>
<ul>
<li><b>Wrong DNS server</b> &#8211; Attacker provides an incorrect DNS server address pointing the user to a nefarious website.</li>
</ul>
<ul>
<li><b>Wrong IP address</b> &#8211; Attacker provides an invalid default gateway IP address and creates a DoS attack on the DHCP client.</li>
</ul>
<p><strong>2. DHCP Starvation Attack</strong></p>
<p>Another DHCP attack is the DHCP starvation attack. The goal of this attack is to create a DoS for connecting clients. DHCP starvation attacks require an attack tool such as Gobbler.</p>
<p>Gobbler has the ability to look at the entire scope of leasable IP addresses and tries to lease them all. Specifically, it creates DHCP discovery messages with bogus MAC addresses.</p>
<h2 class="p_H_Head1">Mitigating DHCP Attacks</h2>
<p>It is easy to mitigate DHCP starvation attacks using port security. However, mitigating DHCP spoofing attacks requires more protection.</p>
<p><strong>Related articles:</strong> <a href="https://www.technig.com/dhcp-configuration-guide/" target="_blank" rel="noopener noreferrer">Configure DHCP in Cisco Router and Windows Server</a></p>
<p>For instance, Gobbler uses a unique MAC address for each DHCP request and port security. Port security could be configured to mitigate this. However, Gobbler can also be configured to use the same interface MAC address with a different hardware address for every request. This would render port security ineffective.</p>
<p>DHCP spoofing attacks can be mitigated using DHCP snooping on trusted ports. DHCP snooping also helps mitigate against DHCP starvation attacks by rate limiting the number of DHCP discovery messages that an untrusted port can receive. DHCP snooping builds and maintains a DHCP snooping binding database that the switch can use to filter DHCP messages from untrusted sources. The DHCP snooping binding table includes the client MAC address, IP address, DHCP lease time, binding type, VLAN number, and interface information on each untrusted switchport or interface.</p>
<p><b>Note</b>: In a large network, the DHCP binding table may take time to build after it is enabled. For example, it could take 2 days for DHCP snooping to complete the table if DHCP lease time is 4 days.</p>
<p><strong>1. DHCP Snooping </strong></p>
<p>DHCP snooping acts like a firewall between untrusted hosts and trusted DHCP servers. DHCP snooping performs the following activities:</p>
<ul style="list-style-type: circle;">
<li>Validates DHCP messages received from untrusted sources and filters out invalid messages.</li>
<li>Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses.</li>
<li>Uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts.</li>
</ul>
<p>Dynamic ARP inspection (DAI) and IP Source Guard also use information stored in the DHCP snooping binding database.</p>
<p>DHCP snooping is enabled on a per-VLAN basis. By default, the feature is inactive on all VLANs. You can enable the feature on a single VLAN or a range of VLANs. <a href="https://www.technig.com/mitigate-vlan-attacks/" target="_blank" rel="noopener noreferrer">Mitigate VLAN attack</a>.</p>
<h2>Configure DHCP Snooping to Mitigate DHCP Attack</h2>
<p>When you configure DHCP snooping or enabling on an interface or VLAN, the switch receives a packet on an untrusted port, the switch compares the source packet information with that held in the DHCP snooping binding table.</p>
<figure id="attachment_15320" aria-describedby="caption-attachment-15320" style="width: 1123px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches.jpg"><img decoding="async" class="wp-image-15320 size-full" src="http://3.90.216.52/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches.jpg" alt="Configure DHCP Snooping in Cisco switches" width="1123" height="303" srcset="https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches.jpg 1123w, https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches-300x81.jpg 300w, https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches-768x207.jpg 768w, https://www.technig.com/wp-content/uploads/2018/10/Configure-DHCP-Snooping-in-Cisco-switches-1024x276.jpg 1024w" sizes="(max-width: 1123px) 100vw, 1123px" /></a><figcaption id="caption-attachment-15320" class="wp-caption-text">Configure DHCP Snooping in Cisco switches</figcaption></figure>
<ul>
<li><b>Trusted DHCP ports</b> &#8211; Only ports connecting to upstream DHCP servers should be trusted. These ports that are expected to reply with DHCP offer and DHCP Ack messages. Trusted ports must be explicitly identified in the configuration.</li>
<li><b>Untrusted ports</b> &#8211; These ports connect to hosts that should not be providing DHCP server messages. By default, all switch ports are untrusted.</li>
</ul>
<p>The general rule when configuring DHCP snooping is to “trust the port and enable DHCP snooping by VLAN”. Therefore, the following steps should be used to enable or configure DHCP snooping:</p>
<ul>
<li><b>Step 1</b>. Enable DHCP snooping using the<b> ip dhcp snooping </b>global configuration command.</li>
</ul>
<ul>
<li><b>Step 2</b>. On trusted ports, use the<b> ip dhcp snooping trust </b>interface configuration command.</li>
</ul>
<ul>
<li><b>Step 3</b>. Enable DHCP snooping by VLAN, or by a range of VLANs.</li>
</ul>
<p>Configuring a Maximum Number of MAC Addresses</p>
<pre class="lang:default decode:true ">S1(config)# ip dhcp snooping
S1(config)#
S1(config)# interface f0/1
S1(config-if)# ip dhcp snooping trust
S1(config-if)# exit
S1(config)#  
S1(config)# interface range f0/5 - 24
S1(config-if-range)# ip dhcp snooping limit rate 4  
S1(config-if-range)# exit
S1(config)#
S1(config)# ip dhcp snooping vlan 5,10,50-52
S1(config)#</pre>
<p>Try to displays the resulting output of the<b> &#8220;show ip dhcp snooping&#8221; </b>privileged EXEC command.</p>
<pre class="lang:default decode:true ">S1# show ip dhcp snooping</pre>
<p>Try to displays the resulting output of the<b> &#8220;show ip dhcp snooping binding&#8221; </b>command. Another way to verify is with the<b> &#8220;show ip dhcp snooping database&#8221; </b>command.</p>
<pre class="lang:default decode:true ">S1# show ip dhcp snooping binding</pre>
<p>Untrusted ports should also rate limit the number of DHCP discovery messages they can receive per second using the<b> ip dhcp snooping limit rate</b> interface configuration command.<b></b></p>
<p><b>Note</b>: Rate limiting further mitigates the risk of DHCP starvation attacks.</p>
<p>Similar mitigation techniques are available for DHCPv6 and IPv6 clients. Because IPv6 devices can also receive their addressing information from the router’s Router Advertisement (RA) message, there are also mitigation solutions to prevent any rogue RA messages.</p>
<p class="p_H_Head2"><strong>Trusted and Untrusted Sources</strong></p>
<p>You can configure whether DHCP snooping trusts traffic sources. An untrusted source may initiate traffic attacks or other hostile actions. To prevent such attacks, DHCP snooping filters messages from untrusted sources.</p>
<p>In an enterprise network, a trusted source is a device that is under your administrative control. These devices include the switches, routers, and servers in the network. Any device beyond the firewall or outside the network is an untrusted source. Generally, host ports are treated as untrusted sources.</p>
<p>In a service provider environment, any device that is not in the service provider network is an untrusted source (such as a customer switch). Host ports are untrusted sources.</p>
<p>In the NX-OS device, you indicate that a source is trusted by configuring the trust state of its connecting interface.</p>
<p>The default trust state of all interfaces is untrusted. You must configure DHCP server interfaces as trusted. You can also configure other interfaces as trusted if they connect to devices (such as switches or routers) inside your network. You usually do not configure host port interfaces as trusted.</p>
<p><strong>Source</strong>: <a href="https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_dhcpsnoop.html" target="_blank" rel="noopener noreferrer">Cisco</a> Configure DHCP Snooping</p>
<p>The post <a href="https://www.technig.com/configure-dhcp-snooping-cisco-switche/">How to Configure DHCP Snooping in Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-dhcp-snooping-cisco-switche/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15318</post-id>	</item>
		<item>
		<title>CCNA Security Chapter 3 Exam Questions With Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 05:57:45 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 3 Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Router Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15044</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="675" height="237" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 3 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png 675w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated-300x105.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></div>
<p>Looking for CCNA Security Exam Answers? Here you can test and review all updated CCNA Security Chapter 3 exam questions and answers. It is just for educational purposes. These questions are the latest CCNA security chapter 3 exam questions with answers. Please share the new questions through the comment section. We will reply it with [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/">CCNA Security Chapter 3 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="675" height="237" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 3 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png 675w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated-300x105.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></div><p>Looking for CCNA Security Exam Answers? Here you can test and review all updated CCNA Security Chapter 3 exam questions and answers. It is just for educational purposes.</p>
<p>These questions are the latest CCNA security chapter 3 exam questions with answers. Please share the new questions through the comment section. We will reply it with the correct answer.</p>
<h3>CCNA Security Chapter 3 Exam Questions and Answers</h3>
<figure id="attachment_15046" aria-describedby="caption-attachment-15046" style="width: 680px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers.jpg"><img loading="lazy" decoding="async" class="wp-image-15046 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers.jpg" alt="CCNA Security Chapter 3 Exam Questions With Answers" width="680" height="104" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers.jpg 680w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-300x46.jpg 300w" sizes="(max-width: 680px) 100vw, 680px" /></a><figcaption id="caption-attachment-15046" class="wp-caption-text">CCNA Security Chapter 3 Exam Questions With Answers</figcaption></figure>
<div class="ai-stem">
<div class="rTableRow">
<div class="coreContent">
<p><strong>1:</strong> Refer to the exhibit. Which statement describes the configuration of the ports for Server1?</p>
</div>
</div>
</div>
<p style="padding-left: 30px;">The configuration is using the default ports for a Cisco router.</p>
<p style="padding-left: 30px;">The configuration will not be active until it is saved and Rtr1 is rebooted.</p>
<p style="padding-left: 30px;">The configuration of the ports requires 1812 be used for the authentication and the authorization ports.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The ports configured for Server1 on the router must be identical to those configured on the RADIUS server.</span></strong></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>2:</strong> Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis?</div>
<div></div>
</div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">SSH</p>
<p style="padding-left: 30px;">RADIUS</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">TACACS+</span></strong></p>
<p style="padding-left: 30px;">ACS</p>
</div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>3: </strong>Why would a network administrator include a local username configuration, when the AAA-enabled router is also configured to authenticate using several ACS servers?</div>
</div>
</div>
</div>
<p style="padding-left: 30px;">The local username database will provide a backup for authentication in the event the ACS servers become unreachable.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>A local username database is required when configuring authentication using ACS servers.</strong></span></p>
<p style="padding-left: 30px;">Because ACS servers only support remote user access, local users can only authenticate using a local username database.</p>
<p style="padding-left: 30px;">Without a local username database, the router will require successful authentication with each ACS server.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>4: </strong>Which debug command is used to focus on the status of a TCP connection when using TACACS+ for authentication?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">debug tacacs accounting</p>
<p style="padding-left: 30px;">debug aaa authentication</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">debug tacacs events</span></strong></p>
<p style="padding-left: 30px;">debug tacacs</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>5:</strong> What difference exists when using Windows Server as an AAA server, rather than Cisco Secure ACS?</div>
<div></div>
</div>
</div>
</div>
<p style="padding-left: 30px;">Windows Server only supports AAA using TACACS.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Windows Server uses its own Active Directory (AD) controller for authentication and authorization.</strong></span></p>
<p style="padding-left: 30px;">Windows Server cannot be used as an AAA server.</p>
<p style="padding-left: 30px;">Windows Server requires more Cisco IOS commands to configure.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>6:</strong> What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">MD5</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">RADIUS</span></strong></p>
<p style="padding-left: 30px;">SSH</p>
<p style="padding-left: 30px;">TACACS+</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>7:</strong> Which solution supports AAA for both RADIUS and TACACS+ servers?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Implement Cisco Secure Access Control System (ACS) only.</strong></span></p>
<p style="padding-left: 30px;">RADIUS and TACACS+ servers cannot be supported by a single solution.</p>
<p style="padding-left: 30px;">Implement both a local database and Cisco Secure Access Control System (ACS).</p>
<p style="padding-left: 30px;">Implement a local database.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>8:</strong> What is a characteristic of TACACS+?</div>
<div></div>
</div>
</div>
</div>
<div class="coreContent">
<p style="padding-left: 30px;">TACACS+ is backward compatible with TACACS and XTACACS.</p>
<p style="padding-left: 30px;">TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646 or 1813 for accounting.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">TACACS+ provides authorization of router commands on a per-user or per-group basis.</span></strong></p>
<p style="padding-left: 30px;">TACACS+ is an open IETF standard.</p>
</div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div class="qNum"><strong>9:</strong> Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">accessibility</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>authorization</strong></span></p>
<p style="padding-left: 30px;">authentication</p>
<p style="padding-left: 30px;">auditing</p>
<p style="padding-left: 30px;">accounting</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>10:</strong> When a method list for AAA authentication is being configured, what is the effect of the keyword <b>local</b>?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">The login succeeds, even if all methods return an error.</p>
<p style="padding-left: 30px;">It uses the enable password for authentication.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>It accepts a locally configured username, regardless of case.</strong></span></p>
<p style="padding-left: 30px;">It defaults to the vty line password for authentication.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>11:</strong> Why is authentication with AAA preferred over a local database method?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">It uses less network bandwidth.</p>
<p style="padding-left: 30px;">It requires a login and password combination on the console, vty lines, and aux ports.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">It provides a fallback authentication method if the administrator forgets the username or password.</span></strong></p>
<p style="padding-left: 30px;">It specifies a different password for each line or port.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>12:</strong> Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>accounting</strong></span></p>
<p style="padding-left: 30px;">accessibility</p>
<p style="padding-left: 30px;">authentication</p>
<p style="padding-left: 30px;">authorization</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>13:</strong> What is a characteristic of AAA accounting?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">Accounting can only be enabled for network connections.</p>
<p style="padding-left: 30px;">Users are not required to be authenticated before AAA accounting logs their activities on the network.</p>
<p style="padding-left: 30px;">Accounting is concerned with allowing and disallowing authenticated users access to certain areas and programs on the network.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Possible triggers for the aaa accounting exec default command include start-stop and stop-only.</strong></span></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>14:</strong> A user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Use the login delay command for authentication attempts.</strong></span></p>
<p style="padding-left: 30px;">Use the none keyword when configuring the authentication method list.</p>
<p style="padding-left: 30px;">Use the aaa local authentication attempts max-fail global configuration mode command with a higher number of acceptable failures.</p>
<p style="padding-left: 30px;">Use the login local command for authenticating user access.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>15:</strong> What device is considered a supplicant during the 802.1X authentication process?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">the switch that is controlling network access</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>the client that is requesting authentication</strong></span></p>
<p style="padding-left: 30px;">the router that is serving as the default gateway</p>
<p style="padding-left: 30px;">the authentication server that is performing client authentication</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>16:</strong> Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>password encryption</strong></span></p>
<p style="padding-left: 30px;">separate authentication and authorization processes</p>
<p style="padding-left: 30px;">802.1X support</p>
<p style="padding-left: 30px;">SIP support</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>utilization of transport layer protocols</strong></span></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>17:</strong> Which characteristic is an important aspect of authorization in an AAA-enabled network device?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">The authorization feature enhances network performance.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">User access is restricted to certain services.</span></strong></p>
<p style="padding-left: 30px;">A user must be identified before network access is granted.</p>
<p style="padding-left: 30px;">User actions are recorded for use in audits and troubleshooting events.</p>
<figure id="attachment_15047" aria-describedby="caption-attachment-15047" style="width: 675px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png"><img loading="lazy" decoding="async" class="wp-image-15047 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png" alt="CCNA Security Chapter 3 Exam Questions With Answers – Updated" width="675" height="237" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated.png 675w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-3-Exam-Questions-With-Answers-–-Updated-300x105.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></a><figcaption id="caption-attachment-15047" class="wp-caption-text">CCNA Security Chapter 3 Exam Questions With Answers – Updated</figcaption></figure>
<div class="ai-stem">
<div class="rTableRow">
<div class="qNum"><strong>18:</strong> <span style="text-transform: initial;">Refer to the exhibit. Router R1 has been configured as shown, with the resulting log message. On the basis of the information that is presented, which two statements describe the result of AAA authentication operation? (Choose two.)</span></div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The locked-out user stays locked out until the clear aaa local user lockout username Admin command is issued.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The locked-out user failed authentication.</span></strong></p>
<p style="padding-left: 30px;">The locked-out user stays locked out until the interface is shut down then re-enabled.</p>
<p style="padding-left: 30px;">The locked-out user should have used the username admin and password Str0ngPa55w0rd.</p>
<p style="padding-left: 30px;">The locked-out user is locked out for 10 minutes by default.</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>19:</strong> True or False? The <b>single-connection</b> keyword prevents the configuration of multiple TACACS+ servers on a AAA-enabled router.</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionCell"></div>
</div>
<p style="padding-left: 30px;">true</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">false</span></strong></p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>20:</strong> What is the result of entering the <b>aaa accounting network </b>command on a router?</div>
</div>
</div>
</div>
<div class="rTableOptionCell"></div>
<div class="ai-stem">
<div>
<div class="rTableRow">
<p style="padding-left: 30px;">The router outputs accounting data for all outbound connections such as SSH and Telnet.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The router collects and reports usage data related to network-related service requests.</span></strong></p>
<p style="padding-left: 30px;">The router provides data for only internal service requests.</p>
<p style="padding-left: 30px;">The router outputs accounting data for all EXEC shell sessions.</p>
<div></div>
<div class="qNum"><strong>21:</strong> Which authentication method stores usernames and passwords in the router and is ideal for small networks?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>local AAA</strong></span></p>
<p style="padding-left: 30px;">server-based AAA over TACACS+</p>
<p style="padding-left: 30px;">server-based AAA</p>
<p style="padding-left: 30px;">local AAA over TACACS+</p>
<p style="padding-left: 30px;">local AAA over RADIUS</p>
<p style="padding-left: 30px;">server-based AAA over RADIUS</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>22:</strong> A user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<p style="padding-left: 30px;">Use the show aaa user command.</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>Use the show aaa local user lockout command .</strong></span></p>
<p style="padding-left: 30px;">Use the show aaa sessions command .</p>
<p style="padding-left: 30px;">Use the show running-configuration command .</p>
<div class="ai-stem">
<div>
<div class="rTableRow">
<div></div>
<div class="qNum"><strong>23:</strong> When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?</div>
</div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell"></div>
</div>
</div>
<div class="coreContent">
<div class="rTableOptionRow">
<div class="rTableOptionCell">
<p style="padding-left: 30px;">the supplicant</p>
<p style="padding-left: 30px;">the authentication server</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">the switch that the client is connected to</span></strong></p>
<p style="padding-left: 30px;">the router that is serving as the default gateway</p>
</div>
</div>
</div>
<p>That&#8217;s all the latest CCNA Security chapter 3 exam questions and answers. Please share the new CCNA Security exam questions via the comment section.</p>
<hr />
<p><strong> Related Questions:</strong></p>
<p>CCNA security chapter 3 exam answers 2018<br />
CCNA security 2.0 hands-on skills exam<br />
CCNA security chapter 3 exam answers<br />
CCNA Security exam questions and answers pdf<br />
CCNA security v2.0 exam answers<br />
CCNA security final exam packet tracer<br />
Which solution supports aaa for both radius and tacacs+ servers?<br />
What is a characteristic of aaa accounting?<br />
CCNA security final exam answers 2018<br />
CCNA security netacad</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/">CCNA Security Chapter 3 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-3-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15044</post-id>	</item>
	</channel>
</rss>
