- Home
- Networking
- CCNP Troubleshooting 642-832
66.
Which of the following steps should be performed first when troubleshooting a secured network environment? (Choose the best answer.)
- A.Disable the network security features to eliminate them as potential sources of the reported issue.
- B.Begin your troubleshooting at Layer 1, and work your way up to the levels where the security features reside.
- C.Determine whether the reported behavior is actually appropriate behavior, based on the network's security policy
- D.Begin your troubleshooting at Layer 7, and work your way down to the levels where the security features reside.
- Answer
- Report
Answer : [C]
67.
What Cisco IOS feature, available on some router platforms, can recognize the signature of well-known attacks, and prevent traffic from those attacks from entering the network?
- A.VPN
- B.IPS
- C.Cisco IOS Firewall
- D.ACL
- Answer
- Report
Answer : [B]
68.
Identify two Cisco Catalyst switch features that can mitigate the introduction of a rogue switch into a network by an attacker, where the attacker attempts to make the newly added rogue switch become the root bridge for the topology. (Choose the two
best answers.)
- A.Root Guard
- B.Backbone Fast
- C.Uplink Fast
- D.BPDU Guard
- Answer
- Report
Answer : [A, D]
69.
What alternative to Telnet provides secure access to a router's command-line interface? (Choose the best answer.)
- A.TACAC S+
- B.SSL
- C.HTTPS
- D.SSH
- Answer
- Report
Answer : [D]
70.
What command can you use to prevent an attacker from performing password recovery on some platforms?
- A.config-reg 0x2124
- B.service password-encryption
- C.no service password-recovery
- D.enable secret 5
- Answer
- Report
Answer : [C]