encouraged to promote better security. The password
characters, which can differ from version to version of IOS.
. The sub-command
login for the line. The commands
are incorrect. The command
is incorrect.
. If the enable secret or
user exec prompt. A VTY line cannot be administratively shut
down.
31. B. The hostname and domain name are required before you
attempt to generate the encryption keys for SSH. Setting the
time and date is recommended but not required for generating
the encryption keys for SSH on a router or switch. Setting the
key strength is also recommended but not required. The key
strength should be set over 768 bits so that SSH version 2 can be
used. The key repository does not need to be set; it normally
defaults to NVRAM on routers and switches and differs from
platform to platform.
32. A. The command
ip ssh version 2
will set your SSH version to
2. This command is to be entered at a global configuration
prompt. The command
version 2
is incorrect, regardless of
where it is configured. The command
ssh version 2
must be
preceded with the
ip
command.
33. C. The command
transport ssh telnet
will configure the VTY
line to accept SSH as a login protocol and fallback to Telnet. The
command
login ssh telnet
is incorrect regardless of where it is
configured. The command
transport ssh telnet
is incorrect
when it is configured from a global configuration prompt.
34. D. SSH is encrypted and Telnet is in clear text. To keep
passwords and configuration safe, SSH should always be used.
Telnet contains no encryption whatsoever, and all usernames,
passwords, and commands are sent in clear text. SSH allows for
file copy if it is turned on in the IOS, but it is not a main reason
to replace Telnet. Telnet and SSH make it equally easy to create
ACLs for access.
35. C. You must first create an access list to permit the host that will
manage the router or switch with the command
access-list 1
permit host 192.168.1.5
. Then enter the VTY line in which it
will be applied with the command
line vty 0 5
. Then apply it
with the command
ip access-class 1 in
, which differs from the
command
ip access-group
, which is used on interfaces. All of
the other options are incorrect.
36. B. When you’re configuring a switch or router for SSH version
2, the key strength must be at least 768 bits for the modulus.
The default is normally 512 bits, and it is standard practice to
double the number to 1024 bits. The time and date do not
necessarily need to be correct to enable SSH version 2. The DNS
server does not need to be configured to enable SSH version 2.
DNS and host records are used strictly for connectivity and will
not affect enabling SSH version 2.
37. A. The command
username user1 password Password20!
will
create a user account called user1 with a password of
Do'stlaringiz bilan baham: