Vous êtes sur la page 1sur 4

QUIZ5_CCNP2_V5.

0 Sida 1 av 4

1 Port scans, packet sniffers, and ping sweeps are classified as which type of tools?
access attack tools
application layer attack tools
DoS tools
DDoS tools
reconnaissance tools
trust exploitation tools

Refer to the exhibit. Routers RTA and RTB have full connectivity between LANs. However, the clock on RTB cannot
synchronize with RTA. Which configuration would correct this situation?
RTB(config)# interface fa0/0
RTB(config)# ntp broadcast client
RTB(config)# no ntp authentication-key 2
RTB(config)# ntp authentication-key 1 md5 cisco
RTB(config)# no ntp server 10.10.10.1
RTB(config)# ntp server 10.0.0.1
RTB(config)# ntp authenticate
RTB(config)# ntp peer 10.0.0.1

3 The act of asking for a username and password credentials and evaluating those credentials is known as which of the
following?
authentication
authorization
administration
access control
accounting

Refer to the exhibit. On the basis of the information that is provided, which two Cisco AutoSecure configuration statements are true?
(Choose two.)
Cisco AutoSecure will prompt the user to enter a banner.
By default, Cisco AutoSecure will automatically configure the ip cef command.
By default, Cisco AutoSecure will use a key modulus size of 512 bits when configuring SSH.
Cisco1 could be used for the enable secret function and the enable password function.
Cisco would be a valid enable secret password.
When prompted to enter the interface facing the Internet, entering Fa0/0 would be valid assuming that the router
has a FastEthernet 0/0 interface.

5 Which response indicates that the security server did not reply and the next authentication method will be accessed?
ERROR
FAIL
ABORT
no response
Which sequence of steps is recommended for worm attack mitigation?
Step 1: Containment
Step 2: Inoculation
Step 3: Quarantine
Step 4: Treatment
Step 1: Containment
Step 2: Quarantine
Step 3: Inoculation
Step 4: Treatment
Step 1: Inoculation
Step 2: Containment

Create PDF files without this message


mhtml:file://D:\Mina by purchasing
dokument\NIT novaPDF
-09\CCNP 2 - printer (http://www.novapdf.com)
WAN\QUIZ5_CCNP2_V5.0.mht 2011-05-26
QUIZ5_CCNP2_V5.0 Sida 2 av 4

Step 3: Quarantine
Step 4: Treatment
Step 1: Inoculation
Step 2: Quarantine
Step 3: Containment
Step 4: Treatment
Step 1: Quarantine
Step 2: Containment
Step 3: Inoculation
Step 4: Treatment
Step 1: Quarantine
Step 2: Inoculation
Step 3: Containment
Step 4: Treatment

7 Which keyword is used for minimal accounting and sends a stop record accounting notice at the end of the requested
user process?
stop-only
start-stop
wait-stop
end-stop

8 Which tool can notify an administrator if a reconnaissance attack is under way?


network-based IPS
port scans
antivirus software
syslog server

9 Which two statements about network attacks that use intelligence are true? (Choose two.)
DoS, DDos, trust exploitation, and viruses, are examples of network attacks that are based on intelligence.
DoS, DDos, viruses, Trojan horses, and worms are examples of network attacks that are based on intelligence.
Human interaction is required to facilitate the spread of a virus.
Human interaction is required to facilitate the spread of a worm.
The anatomy of a worm consists of containment, inoculation, and quarantine.
The anatomy of a worm consists of the enabling vulnerability, a propagation mechanism, and the payload.

10 Which range of custom privilege levels can be configured?


1 through 15
0 through 14
1 through 16
2 through 14
2 through 15
0 through 15
11

Refer to the exhibit. A router located at IP address 192.168.10.1 has been configured to support SSH. Which TCP
port number should be configured in the Tera Term utility to connect to the router using SSH?
port 15
port 22
port 23
port 61
port 78
port 79

Create PDF files without this message


mhtml:file://D:\Mina by purchasing
dokument\NIT novaPDF
-09\CCNP 2 - printer (http://www.novapdf.com)
WAN\QUIZ5_CCNP2_V5.0.mht 2011-05-26
QUIZ5_CCNP2_V5.0 Sida 3 av 4

12 If AutoSecure fails to complete its operations, the running-configuration may be corrupted. Within the context of IOS
version 12.4, which command or command sequence would be appropriate in this situation?
erase running-config and reload
copy startup-config running-config
reload
configure replace flash:pre_autosec.cfg

13 What command enables AAA authentication for privileged EXEC mode access?
authentication login
aaa authentication enable
enable authentication exec
aaa authentication exec

14 Which statement identifies the distinction between a worm and a virus?


A worm spreads automatically over the network from one computer to the next.
Worm attacks are often based on using malicious code, intelligence gathered in the earlier attacks, or insider
access to the network.
A worm appears desirable but actually contains something harmful.
A worm is a malicious program that attaches itself to other programs and executes an unwanted function on a
user workstation.

15 To mitigate probes and scans, which two services should be disabled? (Choose two.)
SNMP
Finger
ICMP Unreachable
ICMP redirects
TCP minor services

16 Which two statements are true about network attacks that use intelligence? (Choose two.)
A Trojan horse can contain a worm.
A virus can contain a Trojan horse and worms.
A worm can contain a Trojan horse.
A worm can contain a Trojan horse and viruses.
A worm executes and installs copies of itself in the memory of the infected computer.

17 The command crypto key gernerate rsa general-keys modulus 1024 must be issued to generate keys
used by SSH. Which two tasks must be completed before this command is entered? (Choose two.)
A modulus of 512 bits must be initially generated.
A hostname other than Router must be configured.
SSH must be globally enabled.
The domain name must be configured.
The SSH server IP address must be configured.
The vty lines must be configured to accept SSH input.

18 Which command would replace the current running configuration with the configuration file that was saved by the
Cisco AutoSecure feature?
Router# copy flash:pre-autosec running-config
Router# copy nvram:pre_autosec running-config
Router# copy flash:pre-autosec.cfg running-config
Router# copy nvram:pre_autosec.cfg running-config
Router# configure replace pre_autosec
Router# configure replace flash:pre_autosec.cfg

19

Create PDF files without this message


mhtml:file://D:\Mina by purchasing
dokument\NIT novaPDF
-09\CCNP 2 - printer (http://www.novapdf.com)
WAN\QUIZ5_CCNP2_V5.0.mht 2011-05-26
QUIZ5_CCNP2_V5.0 Sida 4 av 4

Refer to the exhibit. Assume the AutoSecure configuration has been applied to the router. The configuration displayed
in the exhibit will generate the login block-for 60 attempts within 30 command in the running configuration. What is
the significance of this command?
After 5 failed attempts within a 30 second time frame, the router will not accept any additional login attempts for
60 seconds.
After 5 failed attempts within a 60 second time frame, the router will not accept any additional login attempts for
30 seconds.
After 5 failed attempts within a 30 minute time frame, the router will not accept any additional login attempts for
60 minutes.
After 5 failed attempts within a 60 minute time frame, the router will not accept any additional login attempts for
30 minutes.

20 Which two procedures could be used to specifically mitigate IP spoofing attacks? (Choose two.)
Configure access control.
Configure DHCP spoofing.
Configure dynamic ARP inspection (DAI).
Configure RFC 3704 filtering.
Configure traffic rate limiting.
Keep your operating system and applications current with the latest patches.

Create PDF files without this message


mhtml:file://D:\Mina by purchasing
dokument\NIT novaPDF
-09\CCNP 2 - printer (http://www.novapdf.com)
WAN\QUIZ5_CCNP2_V5.0.mht 2011-05-26

Vous aimerez peut-être aussi