CCNP TSHOOT FAQ: Security Troubleshooting
Q1. What are the three planes of router and switch operation that should be secured? (Choose the three best answers.)
a. Management plane
b. Architectural plane
c. Data plane
d. Control plane
Q2. What command can you use to prevent an attacker from performing password recovery on some platforms?
a. config-reg 0x2124
b. service password-encryption
c. no service password-recovery
d. enable secret 5
Q3. What alternative to Telnet provides secure access to a router’s command-line interface? (Choose the best answer.)
a. TACACS+
b. SSL
c. HTTPS
d. SSH
Q4. Identify two Cisco Catalyst switch features that can mitigate the introduction of a rogue switch into a network by an attacker, where the attacker attempts to make the newly added rogue switch become the root bridge for the topology. (Choose the two best answers.)
a. Root Guard
b. Backbone Fast
c. Uplink Fast
d. BPDU Guard
Q5. What Cisco IOS feature, available on some router platforms, can recognize the signature of well-known attacks, and prevent traffic from those attacks from entering the network?
a. VPN
b. IPS
c. Cisco IOS firewall
d. ACL
Q6. Which of the following steps should be performed first when troubleshooting a secured network environment? (Choose the best answer.)
a. Disable the network security features to eliminate them as potential sources of the reported issue.
b. Begin your troubleshooting at Layer 1, and work your way up to the levels where the security features reside.
c. Determine whether the reported behavior is actually appropriate behavior, based on the network’s security policy.
d. Begin your troubleshooting at Layer 7, and work your way down to the levels where the security features reside.
Q7. What are two types of Cisco IOS firewalls? (Choose the two best answers.)
a. MQC-Based Policy Firewall
b. Classic Cisco IOS Firewall
c. Zone-Based Policy Firewall
d. Basic Cisco IOS Firewall
Q8. Which two of the following are true concerning TACACS+ but not true concerning RADIUS? (Choose the two best answers.)
a. TCP-based
b. Encrypts the entire packet
c. Standards-based
d. Offers robust accounting features
More Resources