Cisco Network Configuration and Security Quiz
49 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary security feature of port-security on Cisco switches?

  • Restricting the number of valid MAC addresses on a port (correct)
  • Prioritizing port traffic
  • Encrypting traffic through switch ports
  • Filtering traffic by IP address
  • When a Cisco router's interface is configured with NAT, what is the purpose of the overload keyword?

  • To prioritize NAT traffic
  • To increase the speed of NAT processing
  • To enable the router to handle more traffic
  • To allow multiple internal hosts to share a single public IP address (correct)
  • What does the service password-encryption command on a Cisco device do?

  • It enables two-factor authentication
  • It encrypts passwords in the device's configuration file (correct)
  • It creates an encrypted tunnel for password transmission
  • It sets up a password for the encryption service
  • Why might you use a named ACL instead of a numbered ACL on a Cisco router?

    <p>Named ACLs allow for easier management and readability</p> Signup and view all the answers

    What is the purpose of using login local under the VTY lines configuration on a Cisco device?

    <p>To specify that the local username/password database should be used for authentication</p> Signup and view all the answers

    In the context of Cisco IOS services, why would you disable HTTP and HTTPS services?

    <p>To reduce the attack surface by disabling unnecessary management interfaces</p> Signup and view all the answers

    What is the primary purpose of network security?

    <p>To prevent unauthorized access and data breaches</p> Signup and view all the answers

    Why is SSH preferred over Telnet for remote management?

    <p>Encryption of data in transit</p> Signup and view all the answers

    What is the purpose of RBAC (Role-Based Access Control) in network devices?

    <p>Assign different access rights based on user roles</p> Signup and view all the answers

    What should a secure password policy enforce?

    <p>A minimum password length and complexity</p> Signup and view all the answers

    What is the main risk of using Telnet over SSH for remote access?

    <p>Telnet does not encrypt the session</p> Signup and view all the answers

    What does port security on a switch do?

    <p>Prevent unauthorized physical access to switch ports</p> Signup and view all the answers

    Why is it important to have a firewall in a network?

    <p>To prevent unauthorized access and data breaches</p> Signup and view all the answers

    What is the purpose of intrusion detection systems (IDS) in network security?

    <p>To monitor and detect potential security threats</p> Signup and view all the answers

    What is the primary purpose of NAT in IPv4?

    <p>Conserving public IP addresses</p> Signup and view all the answers

    What does a Syslog message with severity level 0 indicate?

    <p>An emergency situation</p> Signup and view all the answers

    What is the purpose of a console password on a Cisco device?

    <p>Preventing unauthorized physical access</p> Signup and view all the answers

    When should the service password-encryption command be used when configuring a Cisco device?

    <p>For security reasons</p> Signup and view all the answers

    What does the AutoSecure feature in Cisco devices do?

    <p>Disables unnecessary services and secures management access</p> Signup and view all the answers

    What does port security sticky learning on a switch do?

    <p>Learns and saves MAC addresses in the running-config</p> Signup and view all the answers

    Where does an access-list applied with 'in' (inbound) on a Cisco router interface filter traffic?

    <p>Before it enters the interface</p> Signup and view all the answers

    What does the switchport mode trunk command use by default to encapsulate VLAN tags?

    <p>802.1Q</p> Signup and view all the answers

    What does the command switchport port-security mac-address sticky enable on a switch port?

    <p>Dynamic learning and saving of MAC addresses</p> Signup and view all the answers

    How can Telnet be disabled on a Cisco device?

    <p>Using the command 'line vty 0 4 transport input ssh'</p> Signup and view all the answers

    What can an extended ACL filter by?

    <p>Protocol, source IP, destination IP, and port numbers</p> Signup and view all the answers

    When managing Cisco device passwords, what is a best practice for enhancing security?

    <p>Using the service password-encryption command</p> Signup and view all the answers

    What is the purpose of port-security mac-address sticky in Cisco switches?

    <p>To dynamically learn and add MAC addresses to the running configuration</p> Signup and view all the answers

    Which statement about ACLs is true?

    <p>Standard ACLs only filter by source IP address</p> Signup and view all the answers

    What is the purpose of disabling small services like echo and chargen in Cisco devices?

    <p>To reduce the risk of denial-of-service attacks</p> Signup and view all the answers

    What is the preferred order for securely configuring an ACL?

    <p>To match the network security policy</p> Signup and view all the answers

    What is the purpose of NAT in networking?

    <p>To convert private IP addresses to public IP addresses</p> Signup and view all the answers

    Why are named ACLs preferred over numbered ACLs in Cisco IOS?

    <p>Because they are easier to identify and manage</p> Signup and view all the answers

    What is the primary function of syslog in network devices?

    <p>To monitor and log system events</p> Signup and view all the answers

    What is the purpose of TFTP in network devices?

    <p>For transferring configuration files and IOS images</p> Signup and view all the answers

    What is the purpose of SSH configuration on a Cisco device?

    <p>To provide secure remote access</p> Signup and view all the answers

    What is the purpose of disabling unused services like HTTP or Telnet on a Cisco router?

    <p>To enhance security by decreasing the router's attack surface</p> Signup and view all the answers

    What is the primary function of RBAC in network security?

    <p>To align access rights with job functions</p> Signup and view all the answers

    What is the purpose of encrypting passwords in the configuration file of a Cisco device?

    <p>To secure sensitive data</p> Signup and view all the answers

    What is the primary function of RBAC (Role-Based Access Control) in Cisco network devices?

    <p>Managing user roles and access levels</p> Signup and view all the answers

    What does the transport input none command on a Cisco switch VTY line do?

    <p>Disables all inbound connections on the line</p> Signup and view all the answers

    What is the primary purpose of using TFTP in managing Cisco devices?

    <p>To transfer configuration files and IOS images</p> Signup and view all the answers

    What does the log keyword at the end of an ACE in a Cisco ACL do?

    <p>Logs the traffic that matches the ACE</p> Signup and view all the answers

    What is the default behavior regarding traffic not explicitly permitted by an ACL?

    <p>Automatically denied</p> Signup and view all the answers

    Why is setting a domain name necessary when configuring SSH on a Cisco device?

    <p>To generate RSA keys for encryption</p> Signup and view all the answers

    How can an ACL be used in conjunction with NAT on a Cisco router?

    <p>To define which addresses are to be translated</p> Signup and view all the answers

    What does configuring switchport port-security maximum 1 on a Cisco switch port allow?

    <p>Only one MAC address to communicate through the port</p> Signup and view all the answers

    What is the purpose of disabling CDP on a Cisco device?

    <p>To prevent the advertisement of the device's presence to others</p> Signup and view all the answers

    What does the ip ssh version 2 command do when configuring SSH on a Cisco device?

    <p>Sets the SSH version to the more secure version 2</p> Signup and view all the answers

    What does the switchport port-security mac-address sticky command do on a switch port?

    <p>Configures the port to automatically learn and save the connected device's MAC address as secure</p> Signup and view all the answers

    Study Notes

    Cisco Network Device Configuration and Security

    • ACLs can restrict input to an interface by limiting MAC addresses
    • Syslog is used in network devices to monitor and log system events
    • TFTP is used on network devices for transferring configuration files and IOS images
    • Disabling small services like echo and chargen in Cisco devices helps reduce the risk of denial-of-service attacks
    • Standard ACLs only filter by source IP address
    • Best practice for securely configuring an ACL is to order the entries to match the network security policy
    • NAT is used to convert private IP addresses to public IP addresses
    • Named ACLs in Cisco IOS are preferred over numbered ACLs because they are easier to identify and manage
    • Port-security mac-address sticky in Cisco switches is used to dynamically learn and add MAC addresses to the running configuration
    • SSH configuration on a Cisco device typically involves generating RSA keys, setting a domain-name, and configuring VTY lines for SSH
    • Disabling unused services on a Cisco router, like HTTP or Telnet, enhances security by decreasing the router's attack surface
    • RBAC provides a way to align access rights with job functions

    Cisco Network Device Management Key Points

    • Purpose of encrypting passwords in the configuration file is to secure sensitive data
    • RBAC (Role-Based Access Control) primarily used for managing user roles and access levels in network devices
    • The transport input none command on a Cisco switch VTY line disables all inbound connections on the line
    • TFTP in managing Cisco devices is used to transfer configuration files and IOS images
    • The log keyword at the end of an ACE in a Cisco ACL logs the traffic that matches the ACE
    • To automatically deny any traffic not explicitly permitted by an ACL, no additional step is necessary; this is the default behavior
    • When configuring SSH on a Cisco device, setting a domain name is necessary to generate RSA keys for encryption
    • An ACL can be used in conjunction with NAT on a Cisco router to define which addresses are to be translated
    • Configuring switchport port-security maximum 1 on a Cisco switch port allows only one MAC address to communicate through the port
    • Disabling CDP on a Cisco device is done to prevent the advertisement of the device's presence to others
    • The ip ssh version 2 command sets the SSH version to the more secure version 2
    • The switchport port-security mac-address sticky command configures a switch port to automatically learn the MAC address of the device connected to it and save it as a secure address

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Q4.docx

    Description

    Test your knowledge of Cisco network device configuration and security with this quiz. Covering topics such as ACLs, TFTP, SSH configuration, port security, and best practices for securing and managing network devices, this quiz will help you assess your understanding of key concepts in Cisco network management.

    More Like This

    Use Quizgecko on...
    Browser
    Browser