Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
9 Cards in this Set
- Front
- Back
When you have generated RSA keys on your Cisco router to prepare for secure device management, is the SSH protocol automatically enabled?
|
Yes
|
|
What is an example of a method of gaining access to a system that bypasses normal security measures?
|
Creating a backdoor
|
|
If you input the command "enable secret level 5 password" in the global mode, what does it indicate?
|
The enable secret password is for accessing exec privilege level 5
|
|
What is a Smurf attack?
|
An attack that sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a target system.
|
|
Describe the Cisco Self-Defending Network characteristic 'Integrated'.
|
Enabling elements in the networks to be a point of policy enforcement.
|
|
Describe the Cisco Self-Defending Network characteristic 'Collaborative'.
|
Interaction amongst services and devices to mitigate attacks
|
|
Describe the Cisco Self-Defending Network characteristic 'Adaptive'.
|
Security technologies that evolve with emerging attacks
|
|
What are three items that are Cisco best-practice recommendations for securing a network?
|
1. Routinely apply patches to operating systems and applications.
2. Disable unneeded services and ports on hosts. 3. Require strong passwords, and enable password expiration. |
|
What does an organization implement to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information systems changes do not compromise a system's security?
|
Operations security
|