PANERA BREAD

A detailed, modern illustration of a network router with security features, showing locks and shields, surrounded by digital elements that represent network connectivity and data security.

Router Security Quiz

Test your knowledge on router security with this comprehensive quiz designed for network administrators and IT professionals. This 24-question quiz covers crucial concepts like AAA configurations, SSH management, and OSPF routing protocol authentication.

Challenge yourself and see how well you can secure your network edge with questions covering:

  • Router hardening techniques
  • CLI access control
  • Secure management of Cisco devices
24 Questions6 MinutesCreated by GuardingByte257
Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)
Remote access security
Zone isolation
Router hardening
Operating system security
Flash security
Physical security
Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?
Locate the router in a secure locked room that is accessible only to authorized personnel.
Configure secure administrative control to ensure that only authorized personnel can access the router.
Keep a secure copy of the router Cisco IOS image and router configuration file as a backup.
Provision the router with the maximum amount of memory possible.
Disable all unused ports and interfaces to reduce the number of ways that the router can be accessed.
Which two characteristics apply to role-based CLI access superviews? (Choose two.)
A specific superview cannot have commands added to it directly.
CLI views have passwords, but superviews do not have passwords.
A single superview can be shared among multiple CLI views.
Deleting a superview deletes all associated CLI views.
Users logged in to a superview can access all commands specified within the associated CLI views.
Users logged in to a superview can access all commands specified within the associated CLI views.
Superview
Admin view
Root view
Superuser view
CLI view
Config view
If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.)
Create a superview using the parser view view-name command.
Associate the view with the root view.
Assign users who can use the view.
Create a view using the parser view view-name command.
Assign a secret password to the view.
Assign commands to the view.
What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?
The keys must be zeroized to reset Secure Shell before configuring other parameters.
All vty ports are automatically configured for SSH to provide secure management.
The general-purpose key size must be specified for authentication with the crypto key generate rsa general-keys moduluscommand.
The generated keys can be used by SSH.
Which three statements describe limitations in using privilege levels for assigning command authorization? (Choose three.)
Creating a user account that needs access to most but not all commands can be a tedious process.
Views are required to define the CLI commands that each user can access.
Commands set on a higher privilege level are not available for lower privilege users.
It is required that all 16 privilege levels be defined, whether they are used or not.
There is no access control to specific interfaces on a router.
The root user must be assigned to each privilege level that is defined.
What command must be issued to enable login enhancements on a Cisco router?
Privilege exec level
Login delay
Login block-for
Banner motd
An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)
Enable inbound vty SSH sessions.
Generate two-way pre-shared keys.
Configure DNS on the router.
Configure the IP domain name on the router.
Enable inbound vty Telnet sessions.
Generate the SSH keys.
Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console?
R1(config)# username admin password Admin01pa55 R1(config)# line con 0 R1(config-line)# login local
R1(config)# username admin secret Admin01pa55 R1(config)# line con 0 R1(config-line)# login local
R1(config)# username admin Admin01pa55 encr md5 R1(config)# line con 0 R1(config-line)# login local
R1(config)# username admin password Admin01pa55 R1(config)# line con 0 R1(config-line)# login
R1(config)# username admin secret Admin01pa55 R1(config)# line con 0 R1(config-line)# login
Refer to the exhibit. Which statement about the JR-Admin account is true?
JR-Admin can issue only ping commands.
JR-Admin can issue show, ping, and reload commands.
JR-Admin cannot issue any command because the privilege level does not match one of those defined.
JR-Admin can issue debug and reload commands.
JR-Admin can issue ping and reload commands
What is the default privilege level of user accounts created on Cisco routers?
0
15
1
16
A network administrator notices that unsuccessful login attempts have caused a router to enter quiet mode. How can the administrator maintain remote access to the networks even during quiet mode?
Quiet mode behavior can be enabled via an ip access-group command on a physical interface.
Quiet mode behavior will only prevent specific user accounts from attempting to authenticate.
Quiet mode behavior can be overridden for specific networks by using an ACL.
Quiet mode behavior can be disabled by an administrator by using SSH to connect.
What is a characteristic of the Cisco IOS Resilient Configuration feature?
It maintains a secure working copy of the bootstrap startup program.
Once issued, the secure boot-config command automatically upgrades the configuration archive to a newer version after new configuration commands have been entered.
A snapshot of the router running configuration can be taken and securely archived in persistent storage.
The secure boot-image command works properly when the system is configured to run an image from a TFTP server.
What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)
To provide data security through encryption
To ensure faster network convergence
To ensure more efficient routing
To prevent data traffic from being redirected and then discarded
To prevent redirection of data traffic to an insecure link
Which two options can be configured by Cisco AutoSecure? (Choose two.)
Enable secret password
Interface IP address
SNMP
Security banner
Syslog
Which three functions are provided by the syslog logging service? (Choose three.)
Setting the size of the logging buffer
Specifying where captured information is stored
Gathering logging information
Authenticating and encrypting data sent over the network
Distinguishing between information to be captured and information to be ignored
Retaining captured messages on the router when a router is rebooted
What is the Control Plane Policing (CoPP) feature designed to accomplish?
Disable control plane services to reduce overall traffic
Prevent unnecessary traffic from overwhelming the route processor
Direct all excess traffic away from the route process
Manage services provided by the control plane
What is a requirement to use the Secure Copy Protocol feature?
At least one user with privilege level 1 has to be configured for local authentication.
A command must be issued to enable the SCP server side functionality.
A transfer can only originate from SCP clients that are routers.
The Telnet protocol has to be configured on the SCP server side.
What is a characteristic of the MIB?
The OIDs are organized in a hierarchical structure.
Information in the MIB cannot be changed.
A separate MIB tree exists for any given device in the network.
Information is organized in a flat manner so that SNMP can access it quickly.
Which three items are prompted for a user response during interactive AutoSecure setup? (Choose three.)
IP addresses of interfaces
Content of a security banner
Enable secret password
Services to disable
Enable password
A network engineer is implementing security on all company routers. Which two commands must be issued to force authentication via the password 1A2b3C for all OSPF-enabled interfaces in the backbone area of the company network? (Choose two.)
Area 0 authentication message-digest
Ip ospf message-digest-key 1 md5 1A2b3C
Username OSPF password 1A2b3C
Enable password 1A2b3C
Area 1 authentication message-digest
What is the purpose of using the ip ospf message-digest-key key md5 password command and the area area-id authentication message-digest command on a router?
To configure OSPF MD5 authentication globally on the router
To enable OSPF MD5 authentication on a per-interface basis
To facilitate the establishment of neighbor adjacencies
To encrypt OSPF routing updates
Which three actions are produced by adding Cisco IOS login enhancements to the router login process? (Choose three.)
Permit only secure console access
Create password authentication
Automatically provide AAA authentication
Create syslog messages
Slow down an active attack
Disable logins from specified hosts
{"name":"PANERA BREAD", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on router security with this comprehensive quiz designed for network administrators and IT professionals. This 24-question quiz covers crucial concepts like AAA configurations, SSH management, and OSPF routing protocol authentication.Challenge yourself and see how well you can secure your network edge with questions covering:Router hardening techniquesCLI access controlSecure management of Cisco devices","img":"https:/images/course1.png"}
Powered by: Quiz Maker