Qa

As mentioned in the section "How to Use This Book" in the Introduction, you have two choices for review questions: the Q&A questions here or the exam simulation questions on the CD-ROM. The questions that follow present a bigger challenge than the exam itself because they use an open-ended question format. By using this more difficult format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. You can find the answers to these questions in the appendix.

1. Which steps can be taken to secure administrative access to a network device?

2. What is level 15 access called on the Cisco command-line interface?

3. Access to the Cisco device console can be secured using which two methods?

4. Can the same password be used for the enable password and enable secret password?

5. If you set the privilege level of the show ip route command, what other effects need to be considered?

6. What are the two modes of interactive access to lines on a Cisco router, and what is a good rule of thumb for these connections?

7. Which command enables you to implement secured vty access using only the telnet and ssh commands?

8. Describe the two methods for configuring SSH on a Cisco router or switch.

9. If an incorrect MAC address is detected on a switch that has port security enabled, the port can be configured to go to_.

0 0

Post a comment