Scribd

• •

Explore Community

Upload a Document
þÿ

Search Books, Presentations, Business, Academics...
• • • •

Login Sign Up | Log In

þÿ þÿ

/ 14

Download this Document for Free
Ads by Google

Cisco Configurations
Cisco router configurations IOS, ASA, IPS, and others
startup-config.com

CCNA Boot Camp
Intense CCNA Boot Camp training Guaranteed CCNA Pass
IntenseSchool.com/CCNA-Course

Network Certification
Network Security Certification. Try QualysGuard today - Free Trial
network.certification.qualys.com

CCNAS FINAL 100% 1 Which Cisco IOS configuration option instructs the IPS to compile a signature category namedios_ips into memory and use it to scan traffic? R1(config)# ip ips signature-category R1(config-ips-category)# category all R1(config-ips-category-action)# retired false R1(config)# ip ips signature-category R1(config-ips-category)# category ios_ips basic R1(config-ips-category-action)# retired false R1(config)# ip ips signature-category R1(config-ips-category)# category all R1(config-ips-category-action)# enabled true R1(config)# ip ips signature-category .

Network IPS is operating system-dependent and must be customized for each platform. Pass Guaranteed. An administrator has configured router R1 as indicated. Supply Chain Risk with BSI www.Unitek. However. SDEE messages fail to log. Network IPS is incapable of examining encrypted traffic. Which solution corrects this problem? Issue the logging on command in global configuration. Issue the clear ip ips sdee events command to clear the SDEE buffer.com/CCNP Cisco Certified All Inclusive Boot Easily assess and manage your Camps. Issue the ip audit notify log command in global configuration.R1(config-ips-category)# category ios_ips basic R1(config-ips-category-action)# enabled true 2 Refer to the exhibit.com port security . Sign Up.) adaptability collaboration insulation integration mitigation scalability 4What are two disadvantages of using network IPS? (Choose two. Ads by Google Cisco CCNP Course www. 3 Which three principles are enabled by a Cisco Self-Defending Network? (Choose three. Network IPS is unable to provide a clear indication of the extent to which the network is being attacked. Issue the ip ips notify sdee command in global configuration.securemysupplychain.) Network IPS has a difficult time reconstructing fragmented traffic to determine if an attack was successful.

.

.

.

.

0 0.0.168.0 eq www access-list 101 permit tcp 10.0.255.1. 5 Which access list statement permits HTTP traffic that is sourced from host 10.30.1.0.0 0.1.1.255 eq 4300 192.0 0.10 eq 80 10.255 access-list 101 permit tcp 10.10? access-list 101 permit tcp any eq 4300 access-list 101 permit tcp 192.0 0.0.0.30.15 eq www access-list 101 permit tcp host 192.168.0.255 eq 4300 6Which type of SDM rule is created to govern the traffic that can enter and leave the network based on protocol and port number? .0.0.30.10 0.255 eq www 192.100 port 4300 and destined to host 192.168.10 0.0.128.0.0 eq 80 10.255.1.0.129.168.0.1.129.30.0.168.30.0 0.Network IPS sensors are difficult to deploy when new networks are added.

Choose Additional Tasks > Router Properties > Netflow to generate the RSA keys. Choose Additional Tasks > Router Access > Management Access to specify SSH as the input and output protocol.) Choose Additional Tasks > Router Access > SSH to generate the RSA keys. Choose Additional Tasks > Router Properties > Logging to specify SSH as the input and output protocol. Choose Additional Tasks > Router Access > AAA to generate the RSA keys. Choose Additional Tasks > Router Access > VTY to specify SSH as the input and output protocol. When configuring SSH on a router using SDM from the Configure menu. 8 .NAC rule NAT rule IPsec rule access rule 7 Refer to the exhibit. which two steps are required? (Choose two.

.

.

.

.

.

.

1 percent of the total bandwidth. 10Which type of Layer 2 attack makes a host appear as the root bridge for a LAN? LAN storm MAC address spoofing MAC address table overflow STP manipulation VLAN attack 11 What occurs after RSA keys are generated on a Cisco router to prepare for secure device management? . an administrator can log in from host 172. Which three things occur if a user attempts to log in four times within 10 seconds using an incorrect password? (Choose three. Port Fa0/5 storm control for multicasts will be activated if traffic exceeds 80. Port Fa0/6 storm control for multicasts and broadcasts will be activated if traffic exceeds 2.000 packets per second.000.1. No user can log in virtually from any host for 60 seconds. Port Fa0/6 storm control for multicasts will be activated if traffic exceeds 2.Refer to the exhibit.000 packets per second. During the quiet mode. Port Fa0/5 storm control for broadcasts and multicasts will be activated if traffic exceeds 80.2.1. During the quiet mode.000. Which two statements are correct regarding the configuration on switch S1? (Choose two.) Subsequent virtual login attempts from the user are blocked for 60 seconds.) Port Fa0/5 storm control for broadcasts will be activated if traffic exceeds 80. 9 Refer to the exhibit.1 percent of 2. an administrator can virtually log in from any host on network 172. Subsequent console login attempts are blocked for 60 seconds.1 percent of the total bandwidth.16.000.000 packets per second. A message is generated indicating the username and source IP address of the user.16.0/24.

.

.

.

.

The keys must be zeroized to reset secure shell before configuring other parameters. Which type of VPN allows these workers to securely access all of the client/server applications of the organization? clientless SSL VPN remote-access IPsec VPN . 12An organization has mobile workers who use corporate-owned laptops at customer sites to view inventory and place orders.All vty ports are automatically configured for SSH to provide secure management. The general-purpose key size must be specified for authentication with the crypto key generate rsa general-keys mo command. The generated keys can be used by SSH.

) Apply in-band management only to devices that must be managed on the production network. Deploy a terminal server with console connections to each network device. Whichprivilege command is used to create this custom account? privilege exec level 0 privilege exec level 1 privilege exec level 2 privilege exec level 15 16 Ads by Google port security Easily assess and manage your Supply Chain Risk with BSI www. SSH.com Ccna Get an IT Certificate from Kaplan University.securemysupplychain. or SSL. Attach all network devices to the same management network. Apply Today! . 14Which three commands are required to configure SSH on a Cisco router? (Choose three. Implement separate network segments for the production network and the management network.site-to-site IPsec VPN HTTPS-enabled SSL VPN 13 Which two guidelines relate to in-band network management? (Choose two. Use IPSec.) ip domain-namename in global configuration mode transport input ssh on a vty line no ip domain-lookup in global configuration mode passwordpassword on a vty line service password-encryption in global configuration mode crypto key generate rsa in global configuration mode 15 An administrator needs to create a user account with custom access to most privileged EXEC commands.

Sign Up.www. www. IDS.edu Astaro Firewall An all-in-one Firewall. more www.ca LANguard Port Scanner Test your network security from a .Unitek.839 Uploaded: 11/20/2009 Category: Uncategorized.edu/IT CCIE 360 Training Enroll in a CCIE Boot Camp and Get a Free Retake on Lab Exam. Spam Spyware.astaro. Tags: sourced host applied access list two options statement permits (More) Rated: (5 Ratings) Download this Document for FreePrintMobileCollectionsReport Document This is a private document.com/CCIE CCNA Security Final 100% Reads: 20. Business and Computers www.ContinuingEd. Virus Protection. lapodadorabermt Follow Ads by Google The School of Your Future Accelerated programs in Medical.Kaplan.interface.

CompTIA.IINS . .640-553 ..com Advanced USB Security Unmatched Endpoint Encryption And Trusted Data Protection by Credant www. Cisco. CCNA Security .hackers point of view! Free trial www. www.Credant. cisco Reads: 0 294 p..com IT Exam Practice Tests Realistic and accurate.gfi. 294 p.itexamvouchers.S. and many more test bundles.com Share & Embed Link / URL: Embed Size & Settings: • • • • þÿ Width: Height: þÿ þÿ þÿ Auto Start on page: Preview View: þÿ þÿ Related 1.

400 p.Reads: 0 400 p. .Lab . What Is the Prevalence of Network . 640-553 Practice Questions Reads: 246 3..ILM . CCNA Security .. 640-553 Exam Questions & Answers Reads: 417 283 p.V10 Reads: 0 2.. Reads: 2047 41 p..Configuring Intrusion . Reads: 332 10 p. Lecture 11.168.1..2 181.. 10 p. Radius-server Host 192.

Testinside 640-553 exam Reads: 30 5. 642-503 Exam Questions & Answers Reads: 148 4. 6 p.Reads: 243 10 p. 6 p. 29885979-ccnp2-mod6 Reads: 0 7 p. CCNA Security Module 5 Reads: 0 9 p. Ccnp2 Mod6 Reads: 734 9 p. Testinside 640-553 Exam .

9 p. Seminar . 2 p. Common Grammatical Mistakes Reads: 0 7. Reads: 0 32 p.. testinside 640-553 exam Reads: 62 6. Frequency Guidelines for ICU Proto..Reads: 76 9 p. free 640-553 pdf testinside Reads: 195 7 p. CCNA Security Ch05 Reads: 0 4 p.

Emerging Markets Economics Aug 31 . . Fruit Jam HACCP Plan Reads: 0 60 p. 3 p. 16 p. Formulae Reads: 0 2 p. 14 p.Reads: 0 1 p. Reads: 0 More from this user 1... Dance Fever Question Sheet Reads: 0 9. Membership Application Reads: 0 8.

CCNA Security Module 8 From: lapodadorabermt Reads: 7. CCNA Security Module 7 From: lapodadorabermt Reads: 5.848 5 p.815 .133 8 p.866 4 p. CCNA Security Module 9 From: lapodadorabermt Reads: 8. 5 p.CCNA Security Final 100% From: lapodadorabermt Reads: 20.631 2. CCNA Security Module 6 From: lapodadorabermt Reads: 5.523 7 p. CCNA Security Module 5 100% From: lapodadorabermt Reads: 5.

CCNA Security Module 2 100% From: lapodadorabermt Reads: 6. 4 p. CCNA Security Module 3 100% From: lapodadorabermt Reads: 7.231 6 p.3. CCNA Security Module 1 100% From: lapodadorabermt Reads: 7. CCNA Security Module 4 100% From: lapodadorabermt Reads: 5.323 4.037 7 p. 6 p.895 Login to Add a Comment .

lizpa22 readcast this about 24 hours agoLearn more about Readcast.Submit Ádám Fischer readcast this about 3 hours agoLearn more about Readcast. dblackhole readcast this 1 day agoLearn more about Readcast.com CCNA Boot Camp Intense CCNA Boot Camp training Guaranteed CCNA Pass . stenyo readcast this 1 day agoLearn more about Readcast. Ads by Google Cisco Configurations Cisco router configurations IOS. and others startup-config. IPS. Chris Konowal readcast this 1 day agoLearn more about Readcast. ivelaste readcast this 1 day agoLearn more about Readcast. Kimberly Ortiz Padilla readcast this about 23 hours agoLearn more about Readcast. bigbagi readcast this 2 days agoLearn more about Readcast. soccerguru readcast this about 12 hours agoLearn more about Readcast. Evert Soldado readcast this about 14 hours agoLearn more about Readcast. ASA.

Kaplan.com/CCIE The School of Your Future Accelerated programs in Medical.ContinuingEd. Apply Today! www.Free Trial network.securemysupplychain.com Ccna Get an IT Certificate from Kaplan University.Unitek.com/DeviceExpert Send me the Scribd Newsletter. Academics.. Discover and connect with people of similar interests.certification. Scribd .IntenseSchool. www.edu Cisco Configuration tool Free Configuration Management tool for Cisco Routers Switches Firewall ManageEngine.. Publish your documents quickly and easily.qualys. Business. Share your reading interests on Scribd and social sites. Sign Up.edu/IT CCIE 360 Training Enroll in a CCIE Boot Camp and Get a Free Retake on Lab Exam. Business and Computers www.com port security Easily assess and manage your Supply Chain Risk with BSI www. Email address: þÿ Submit Upload a Document þÿ Search Books.interface. and occasional account related communications.com/CCNA-Course Network Certification Network Security Certification. Try QualysGuard today . Presentations.

General Terms .• • • • • • Legal • • • • About Press Jobs Contact Blog Scribd Store Terms .API Terms .Privacy Copyright Help & Tools • • • • Getting Started Community Guidelines Support & FAQ Web Stuff Partners • • • Partners Branded Reader Developers / API Subscribe to Us • • • On Scribd On Twitter On Facebook What's New • • • We have updated our Terms of Service Branded Reader Desktop Uploader .

Sign up to vote on this title
UsefulNot useful