CCNP Secure FAQ Implementing and Configuring Cisco IOS Management Plane Security
Q1. Which type of management plane attack type works by creating or taking over a management session?
A. Slow-path denial of service
B. Management session spoofing
C. Man-in-the-middle attacks
D. DoS session spoofing
Q2. Which of the following type of password is used to secure SSH connections?
A. Terminal line
B. Console
C. Async
D. Enable
Q3. Which of the following is the highest level of privilege supported?
A. 1
B. 16
C. 15
D. 0
Q4. What is the minimum modulus (key size) that must be used to enable SSH version 2?
A. 2048
B. 512
C. 1024
D. 768
Q5. Which of the following SNMP components is run directly on the device?
A. Manager
B. Agent
C. MIB
D. Supervisor
Q6. Which of the following SNMP operations notify the manager of an event without requiring an acknowledgment?
A. Get
B. Trap
C. Put
D. Inform
Q7. Which of the following authentication mechanisms can be used with SNMP version 3?
A. MD5
B. 3DES
C. AES
D. SHA
Q8. Which of the following protocols are supported by MPP?
A. CDP
B. Rsync
C. SSH
D. FTP
Q9. Which of the following global services are disabled by the AutoSecure feature?
A. HTTP server
B. SSH
C. NTP
D. AAA
Q10. Which of the following are valid types of keys when using digitally signed Cisco software?
A. Rollover
B. Development
C. Global
D. Special
Q11. The highest available configuration mode is _____, which is used to configure feature options for the entire device.
Q12. When using the enable secret command, the password is secured using the _____ algorithm.
Q13. Role-based CLI access provides the ability to set up as many as _____ CLI views, which are configured to run commands that are configured for different job functions.
Q14. The configuration of SSH without the use of labels requires that the _____ and _____ be configured first.
Q15. The _____ is a virtual information storage location that contains collections of managed objects.
Q16. The _____ and _____ versions of SNMP utilize community name-based security.
Q17. The _____ SNMP security model supports both authentication and encryption.
Q18. _____ gives you the ability to limit the source of management traffic to a specific interface on a device.
Q19. Cisco recommends that the _____ feature not be used in production environments.
Q20. A _____ threshold is triggered when the CPU utilization exceeds a configured threshold
More Resources