Cisco Networking Fundamentals Quiz

RefreshingViolet avatar
RefreshingViolet
·
·
Download

Start Quiz

Study Flashcards

100 Questions

What is an effective mechanism to warn users about restricted access to Cisco networking equipment?

MOTD (Message-of-the-day)

In which mode should you enter the banner motd command to configure a message-of-the-day?

Global configuration mode

What is the purpose of an MOTD (Message-of-the-day) in Cisco networking equipment?

To warn users about restricted access

Which protocol is known for transmitting data in plaintext and has largely been replaced by SSH?

Telnet

Which protocol offers multiple authentication methods, including certificates and username/password?

SSH

Which method provides secure access control and accountability for authorized users?

AAA

Which method is used to authenticate users against a specific dataset?

RADIUS

Which protocol is a directory query protocol for querying data from directories like Active Directory?

LDAP

What does remote authentication allow the use of, eliminating the need for password sharing and maintaining access records?

Directory-stored credentials

What is the best practice in enterprise networks involving emergency access?

Keeping a backup 'breakglass' account

Which protocol is the default remote access protocol when configuring VTY?

Telnet

What does SSH configuration involve for RSA key generation?

Specifying a domain

Which protocol enables the creation of privilege levels, including predefined levels 0, 1, and 15?

SSH

What is provided for creating users with different privilege levels, such as full administrative access and user access with Privileged EXEC mode?

Examples

What command is used to create custom roles with specific privileges in Cisco switches?

privilege exec level

How are users assigned to specific roles in Role-Based Access Control (RBAC) in Cisco switches?

With specific privileges and passwords

What is one reason RBAC in Cisco switches and routers can be complex?

Due to granularity and requirements

What does port security in Cisco switches restrict access based on?

Connected devices and MAC addresses

In port security, what happens when violations are set to 'protect' or 'restrict' modes?

They require manual reset

What action is taken when port security violations are set to 'shutdown' mode?

The port operation halts and requires a reset

How can violations in port security be found?

By checking syslog server notifications or using specific show commands

How are port security counters reset?

By disabling and re-enabling port security

What is one step involved in enabling port security in Cisco switches?

Selecting the interface and enabling port security

What parameters are included in configuring port security in Cisco switches?

Maximum allowed MAC addresses, violation type, aging time, and sticky MAC addresses

What action should be taken for unused ports in terms of security?

They should be shut down

What does the banner motd command do?

Configures a message of the day (MOTD) with a specified termination character

What type of encryption is used for the enable secret password?

MD5

What does the service password-encryption command do?

Encrypts plaintext passwords in the configuration file

What does the 7 or 5 prefix in passwords indicate?

Level of encryption (7 for Vigenere, 5 for MD5)

What is the vulnerability associated with Vigenere encryption?

Well-known key and trivial decryption with modern technology

How are console configurations secured?

By setting a password and enabling the login process for user authentication

How can enable-mode passwords be set?

As plaintext with optional Vigenere encryption or as MD5-based passwords

What is the primary method for remote management of Cisco devices?

Virtual Terminal Lines (VTY) using Telnet, SSH, and RADIUS for authentication

What are the configurable 'trap' levels in Syslog?

0 to 7

What is the primary vulnerability associated with TFTP?

No authentication

What is the process for using TFTP to restore configuration to a device?

Copying the startup-config from the designated TFTP server location to the device

What are the prerequisites for using TFTP to backup configuration?

Port 69 open and a TFTP server installed, and ensuring connectivity from the device to the TFTP server

Which newer technologies are available as alternatives to TFTP?

FTP and SCP

What is recommended for testing and future assignments related to TFTP?

Installing and trying the Kiwi Syslog and Solarwinds TFTP software

What is the primary purpose of SNMP (Simple Network Management Protocol)?

Active monitoring and metric collection of devices

What is the primary function of Syslog in network monitoring?

Logging events such as port-security violations and configuration changes

What is the primary function of TFTP (Trivial File Transfer Protocol)?

Writing and reading files from a centralized location

What is the primary purpose of setting up a Syslog server?

Logging and centralizing events for network monitoring

What is the primary benefit of using SNMP for network management?

Enabling active monitoring and metric collection of devices

What is the primary purpose of TFTP server setup for backup and restore?

Copying configuration files to and from a centralized location

What is the primary purpose of setting up a Syslog server?

To monitor and store log messages for network devices

What does the banner motd command do?

Configures a message-of-the-day to warn users about restricted access

What is the primary function of SNMP (Simple Network Management Protocol)?

To manage and monitor network devices

How are violations in port security found?

By examining the port security violation log

What is the vulnerability associated with TFTP (Trivial File Transfer Protocol)?

Lack of authentication and encryption

What is the primary benefit of using SNMP for network management?

Centralized management of network devices

What is one reason RBAC in Cisco switches and routers can be complex?

Managing multiple user roles and permissions

What is the primary purpose of an MOTD (Message-of-the-day) in Cisco networking equipment?

To warn users about restricted access to the equipment

Which protocol is a directory query protocol for querying data from directories like Active Directory?

LDAP

What is the primary vulnerability associated with TFTP?

Data confidentiality vulnerability

What is the primary benefit of using SNMP for network management?

Centralized network monitoring and management

What action should be taken for unused ports in terms of security?

Disable the ports

Which protocol offers multiple authentication methods, including certificates and username/password?

SSH

What is the primary function of Syslog in network monitoring?

Centralized logging and event management

What is the primary purpose of setting up a Syslog server?

Centralized logging and event management

What is the emphasis of Week 4 in this course?

Remote authentication methods

What does the 7 or 5 prefix in passwords indicate?

Password complexity level

What is the primary method for remote management of Cisco devices?

SSH

What is the primary purpose of TFTP (Trivial File Transfer Protocol)?

File transfer with minimal security

What is recommended for testing and future assignments related to TFTP?

Exploring alternative technologies to TFTP

What is the command used to create custom roles with specific privileges in Cisco switches?

privilege exec level

How can port security violations be found in Cisco switches?

By using the 'show port-security' command

What steps are involved in enabling port security in Cisco switches?

Selecting the interface and enabling port security

What is the primary vulnerability associated with TFTP?

Weak authentication vulnerability

What happens when port security violations are set to 'protect' or 'restrict' modes?

The violation is logged and reported

What is the process for using TFTP to restore configuration to a device?

Enable TFTP server, configure device IP, and initiate file transfer

What does the 'service password-encryption' command do?

Encrypts passwords in configuration files

What is the primary purpose of setting up a Syslog server?

To centralize and store log messages

What is the primary benefit of using SNMP for network management?

Standardized framework for network device management

What is the primary function of TFTP (Trivial File Transfer Protocol)?

Backup and restoration of device configurations

What does the 'banner motd' command do?

Displays a message to users when they log in

What is the emphasis of Week 4 in this course?

Port security in Cisco switches

What is the primary purpose of Syslog in network monitoring?

To log events such as port-security violations and configuration changes

What are the configurable 'trap' levels in Syslog?

0 to 6

What is the primary function of TFTP (Trivial File Transfer Protocol)?

To provide a simple and easy-to-use service for writing and reading files from a centralized location

What is the vulnerability associated with TFTP?

It has no authentication, making it vulnerable to unauthorized access

What is the process for using TFTP to backup configuration to a device?

Copying the startup-config from the designated TFTP server location to the device

What is the process for using TFTP to restore configuration to a device?

Copying the startup-config from the designated TFTP server location to the device

What are the prerequisites for using TFTP to backup configuration?

Having port 69 open and a TFTP server installed, and ensuring connectivity from the device to the TFTP server

What is recommended for testing and future assignments related to TFTP?

Installing and trying the Kiwi Syslog and Solarwinds TFTP software

What is the primary purpose of SNMP (Simple Network Management Protocol)?

To allow for active monitoring and metric collection of devices, and it enables configuration changes remotely

What is the significance of newer technologies like FTP and SCP as alternatives to TFTP?

They provide secure and authenticated file transfer

What is the primary benefit of using SNMP for network management?

It allows for active monitoring and metric collection of devices

What type of encryption is used for the enable secret password in Cisco devices?

MD5 hashing

What command is used to convert plaintext passwords to type 7 (Vigenere) encryption in Cisco devices?

service password-encryption

What is the vulnerability associated with Vigenere encryption?

Age and well-known key

What is the primary method for remote management of Cisco devices through Virtual Terminal Lines (VTY)?

Telnet

What command is used to set enable-mode passwords with optional Vigenere encryption or as MD5-based passwords in Cisco devices?

enable secret

What is the significance of the 7 or 5 prefix in Cisco device passwords?

It indicates the level of encryption

What is the primary purpose of the banner motd command in Cisco device configuration?

To configure a message of the day (MOTD)

What is the default storage format for Cisco device passwords in configuration files?

Plaintext

What is the purpose of enabling password encryption through the service password-encryption command in Cisco devices?

To prevent users from viewing plaintext passwords in configuration files

What is the primary function of console/line access in Cisco device configuration?

To allow limited user-level commands

What is the primary security concern associated with malicious access to the running-config in Cisco devices?

Revealing critical infrastructure information

What is the recommended encryption method for storing enable-mode passwords in Cisco devices?

MD5 hashing

Study Notes

Cisco Device Configuration and Security Basics

  • The banner motd command is used to configure a message of the day (MOTD) with a termination character specified after the message.
  • Passwords are fundamental security mechanisms, including console/line passwords and enable-mode passwords, which restrict access to critical configurations for network administrators.
  • Console/Line access allows limited user-level commands, such as viewing configuration and system status information.
  • Malicious access to the running-config can reveal critical infrastructure information, potentially leading to follow-up attacks.
  • Cisco device passwords are stored as plaintext in configuration files by default, but the enable secret password is encrypted using MD5.
  • Password encryption must be enabled through the service password-encryption command to prevent users from viewing plaintext passwords in configuration files.
  • The 7 or 5 prefix in passwords indicates the level of encryption, with 7 representing Vigenere encryption and 5 representing MD5 hashing.
  • The service password-encryption command converts plaintext passwords to type 7 (Vigenere) encryption, but cannot force type 5 (MD5) encryption.
  • Vigenere encryption is vulnerable due to its age, well-known key, and trivial decryption with modern technology.
  • Console configurations secure the physical connection and require setting a password and enabling the login process for user authentication.
  • Enable-mode passwords can be set as plaintext with optional Vigenere encryption or as MD5-based passwords using the enable password and enable secret commands.
  • Remote management of Cisco devices is primarily done through the Virtual Terminal Lines (VTY) using Telnet, SSH, and RADIUS for authentication and access.

Network Monitoring and Backup Protocols

  • Syslog is a standardized system for messaging that logs events such as port-security violations and configuration changes.
  • Syslog has configurable 'trap' levels from 0 to 7, each corresponding to different types of events.
  • The setup of Syslog involves the use of a Syslog server and network connectivity to the server.
  • SNMP (Simple Network Management Protocol) allows for active monitoring and metric collection of devices, and it enables configuration changes remotely.
  • TFTP (Trivial File Transfer Protocol) is a simple and easy-to-use service for writing and reading files from a centralized location.
  • TFTP has no authentication, making it vulnerable to unauthorized access, and it requires port 69 to be open.
  • The process for using TFTP to backup configuration involves copying the startup-config to a designated TFTP server location.
  • Restoring using TFTP involves copying the startup-config from the designated TFTP server location to the device.
  • TFTP prerequisites include having port 69 open and a TFTP server installed, and ensuring connectivity from the device to the TFTP server.
  • Newer technologies like FTP and SCP are available as alternatives to TFTP and are supported by most newer Cisco protocols.
  • Setting up TFTP involves installing Solarwinds TFTP software on the laptop and ensuring it is ready for use.
  • It is recommended to install and try the Kiwi Syslog and Solarwinds TFTP software for testing and future assignments.

Configuring Role-Based Access Control (RBAC) and Port Security in Cisco Switches

  • RBAC allows creation of custom roles with specific privileges, assigned to users
  • Custom roles are created using the "privilege exec level" command, specifying allowed commands
  • Users are assigned to roles with specific privileges and passwords
  • RBAC in Cisco switches and routers can be complex due to granularity and requirements
  • Port security restricts access based on criteria such as connected devices and MAC addresses
  • Port security violations can be set to protect, restrict, or shutdown modes
  • Dealing with violations depends on the type, with "protect" and "restrict" requiring manual reset
  • "Shutdown" violations halt port operation and require a reset of the port
  • Violations can be found by checking syslog server notifications or using specific show commands
  • Port security counters can only be reset by disabling and re-enabling port security
  • Enabling port security involves several steps, including selecting the interface and enabling port security
  • Configuring port security includes setting maximum allowed MAC addresses, violation type, aging time, and sticky MAC addresses. Unused ports should be shut down for security.

Cisco Device Configuration and Security Basics

  • The banner motd command is used to configure a message of the day (MOTD) with a termination character specified after the message.
  • Passwords are fundamental security mechanisms, including console/line passwords and enable-mode passwords, which restrict access to critical configurations for network administrators.
  • Console/Line access allows limited user-level commands, such as viewing configuration and system status information.
  • Malicious access to the running-config can reveal critical infrastructure information, potentially leading to follow-up attacks.
  • Cisco device passwords are stored as plaintext in configuration files by default, but the enable secret password is encrypted using MD5.
  • Password encryption must be enabled through the service password-encryption command to prevent users from viewing plaintext passwords in configuration files.
  • The 7 or 5 prefix in passwords indicates the level of encryption, with 7 representing Vigenere encryption and 5 representing MD5 hashing.
  • The service password-encryption command converts plaintext passwords to type 7 (Vigenere) encryption, but cannot force type 5 (MD5) encryption.
  • Vigenere encryption is vulnerable due to its age, well-known key, and trivial decryption with modern technology.
  • Console configurations secure the physical connection and require setting a password and enabling the login process for user authentication.
  • Enable-mode passwords can be set as plaintext with optional Vigenere encryption or as MD5-based passwords using the enable password and enable secret commands.
  • Remote management of Cisco devices is primarily done through the Virtual Terminal Lines (VTY) using Telnet, SSH, and RADIUS for authentication and access.

Test your knowledge of Cisco device configuration and security basics, as well as network monitoring and backup protocols with this informative quiz. Topics include password encryption, console and enable-mode security, syslog, SNMP, TFTP, and more. Perfect for networking professionals and students looking to strengthen their understanding of Cisco networking fundamentals.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser