359
24. C. Anti-malware software covers a wide array of security threats to users, including
Trojans, viruses, and phishing emails. Multifactor authentication combines two or more
single-factor authentication methods to create very secure authentication for users.
Software firewalls will not prevent threats such as Trojans, viruses, and phishing emails.
Antivirus software protects you only from viruses and Trojans, not phishing emails.
25. B. Using mantraps (small rooms that limit access to one or a few individuals) is a great
way to stop tailgating. User authentication will not prevent or stop tailgating. Strong
passwords will not prevent tailgating because tailgating is a physical security problem.
Changing SSIDs will not stop tailgating because tailgating does not pertain to wireless.
26. C. The command
enable secret Password20! will set the enable password and encrypt
the Password20! password. The command
password enable Password20! is incorrect.
The command
enable Password20! is incorrect. The command secret enable
Password20! is incorrect.
27. D. The command
line vty 0 5 will enter you into the line for the virtual teletype,
which is where you configure your Telnet password. The command
interface vlan 1 is
incorrect; this command will set the focus to the switched virtual interface (SVI) of VLAN
1. The command
line console 1 is incorrect; this command will set the focus to the
console line 1. The command
line aux 1 is incorrect; this command will set the focus to
the auxiliary line 1.
28. B. If the enable password is set and the enable secret is set, the enable password will
be ignored. Therefore, the enable secret is being used to authenticate the user, and
you are typing the wrong password. The command
enable password exists for
backward compatibility with pre-10.3 IOSs and should no longer be used. Although
the originally entered password could be wrong, the enable password is ignored. The
password Password20! contains a special character, but this is encouraged to promote
better security. The password Password20! is not too long. The maximum length is 64
characters, which can differ from version to version of IOS.
29. C. The command
password Password20! will set the login password to Password20!.
The sub-command
login will require login for the line. The commands set password
Password20! and request login are incorrect. The commands of password
Password20! and login password are incorrect. The command login password
Password20! is incorrect.
30. C. The VTY line login password is not set when you receive the error
Password
required, but none set. If the enable secret or enable password was not set, you would
just not be able to get to a privileged exec prompt, but you would still be able to get to a
user exec prompt. A VTY line cannot be administratively shut down.
31. B. The hostname and domain name are required before you attempt to generate the
encryption keys for SSH. Setting the time and date is recommended but not required for
generating the encryption keys for SSH on a router or switch. Setting the key strength is
also recommended but not required. The key strength should be set over 768 bits so that
SSH version 2 can be used. The key repository does not need to be set; it normally defaults
to NVRAM on routers and switches and differs from platform to platform.
Do'stlaringiz bilan baham: |