Questions and Answers
Which encryption type is recommended for configuring secret passwords on Cisco devices?
Type 9 scrypt encryption
What hashing algorithm does type 8 encryption on Cisco devices use?
SHA-256
What is the purpose of using the 'username name algorithm-type' command in Cisco device configurations?
Specifying encryption type for passwords
Which step is not part of configuring a Cisco device to support SSH from the given list?
Signup and view all the answers
What does the 'enable secret' command do in Cisco device configurations?
Signup and view all the answers
What is the purpose of an edge router in a company's network?
Signup and view all the answers
What should be avoided when creating passphrases?
Signup and view all the answers
In what scenario is the Defense-in-Depth approach to edge router security used?
Signup and view all the answers
What makes a password weak?
Signup and view all the answers
Which of the following is a strong password?
Signup and view all the answers
Why is it important to maintain physical security in router configuration?
Signup and view all the answers
What is the primary function of a UPS or diesel backup power generator in router security?
Signup and view all the answers
How can strong passwords be more useful?
Signup and view all the answers
What is the best practice for managing passwords?
Signup and view all the answers
How does the DMZ setup provide additional security in a network?
Signup and view all the answers
Why is it recommended to use the latest stable version of OS that meets router specifications?
Signup and view all the answers
What action should be taken to help ensure passwords remain secret on network devices?
Signup and view all the answers
What command is used to encrypt all plaintext passwords on a Cisco router?
Signup and view all the answers
What does the command 'service password-encryption' do on a Cisco router?
Signup and view all the answers
Why should 'service password-encryption' not be used with the intention of protecting config files from serious attacks?
Signup and view all the answers
What information is revealed by the command 'show running-config' in Cisco devices?
Signup and view all the answers
What are the potential consequences of protocol spoofing in routing systems?
Signup and view all the answers
Why is MD5 authentication now considered vulnerable for OSPF routing protocol?
Signup and view all the answers
In which Cisco IOS release was support added for OSPF SHA authentication?
Signup and view all the answers
What is the purpose of using OSPF SHA authentication instead of MD5?
Signup and view all the answers
What are the three areas of router security mentioned in the text?
Signup and view all the answers
What feature allows devices to send log messages of chosen severity to a specific destination?
Signup and view all the answers