Refer to the exhibit. Which two statements about the AAA configuration are true?()
A.A good security practice is to havethe none parameter configured as the final method used toensure that no other authentication method will be used
B.If a TACACS+ server is not available, then a user connecting via the console port would not beable to gain access since no other authentication method has been defined
C.If a TACACS+ server is not available, then the user Bob could be able to enter privileged modeas long as the proper enable password is entered
D.Theaaa new-model command forces the router to override every other authentication methodpreviously configured for the router lines
E.To increase security, group radius should be used instead of group tacacs+
F.Two authentication options are prescribed by the displayedaaa authentication command
您可能感興趣的試卷
你可能感興趣的試題
A.If the radius server returns an error, the enable password will be used
B.If the radius server returns a ’failed’ message, the enable password will be used
C.The command login authentication group will associate the AM authentication to a specifiedinterface
D.If the group database is unavailable, the radius server will be used
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
A.The LIST1 list will disable authentication on the console port
B.All login requests will be authenticated using the group tacacs+ method
C.The default login authentication will automatically be applied to all login connections
D.Because no method list is specified, the LIST1 list will not authenticate anyone on the consoleport
A.to provide a keepalive mechanism
B.to pull event logs from the router
C.to extract relevant SNMP information
D.to perform application-level accounting
A.Disable post scan
B.Use SSH or SSL
C.Enable trust levels
D.Deny echo replies on all edge routers
Network Topology Exhibit:
Configuration Exhibit:
NET(config)# access-list 112 deny icmp any any echo log
NET(config)# access-list 112 deny imp any any redirect log
NET(config)# access-list 112 deny icmp any any mask-request log
NET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255
NET(config)# interface Fa0/1
NET(config-if)# ip access-group 112 in
You work as a network administrator at networkTut.com, study the exhibit carefully. The
configuration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
A.The first three statements of ACL 112 should have permitted the ICMP traffic and the laststatement should deny the identified traffic
B.The last statement of ACL 112 should have been "access-list 112deny icmp any 10.2.1.00.0.0.255"
C.The last statement of ACL 112 should have been "access-list 112permit icmp any 10.2.1.00.0.0.255"
D.ACL 112 should have been applied to interface Fa0/0 in an inbound direction
E.The last statement of ACL 112 should have been "access-list 112deny icmp any 10.1.1.00.0.0.255"
F.ACL 112 should have been applied to interface Fa0/1 in an outbound direction
G.None of the above
最新試題
Match the xDSL type on the above to the most appropriate implementation on the below.
Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
Which statement correctly describes IPsec VPN backup technology?()
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()