• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back
When you have generated RSA keys on your Cisco router to prepare for secure device management, is the SSH protocol automatically enabled?
Yes
What is an example of a method of gaining access to a system that bypasses normal security measures?
Creating a backdoor
If you input the command "enable secret level 5 password" in the global mode, what does it indicate?
The enable secret password is for accessing exec privilege level 5
What is a Smurf attack?
An attack that sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a target system.
Describe the Cisco Self-Defending Network characteristic 'Integrated'.
Enabling elements in the networks to be a point of policy enforcement.
Describe the Cisco Self-Defending Network characteristic 'Collaborative'.
Interaction amongst services and devices to mitigate attacks
Describe the Cisco Self-Defending Network characteristic 'Adaptive'.
Security technologies that evolve with emerging attacks
What are three items that are Cisco best-practice recommendations for securing a network?
1. Routinely apply patches to operating systems and applications.
2. Disable unneeded services and ports on hosts.
3. Require strong passwords, and enable password expiration.
What does an organization implement to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information systems changes do not compromise a system's security?
Operations security