IINS Implementing Cisco IOS Network Security
Which consideration is important when implementing Syslogging in your network?
A. Use SSH to access your Syslog information.
B. Enable the highest level of Syslogging available to ensure you log all possible event
C. Log all messages to the system buffer so that they can be displayed when accessing
D. Syncronize clocks on the network with a protocol such as Network Time Protocol.
Which statement is true when you have generated RSA keys on your Cisco router to
prepare for secure device management?
A. You must then zeroize the keys to reset secure shell before configuring other
B. The SSH protocol is automatically enabled.
C. You must then specify the general-purpose key size used for authentication with the
crypto key generate rsa general-keys modulus command.
D. All vty ports are automatically enabled for SSH to provide secure management.
What does level 5 in the following enable secret global configuration mode command
indicate? router# enable secret level 5 password
A. The enable secret password is hashed using MD5.
B. The enable secret password is hashed using SHA.
C. The enable secret password is encrypted using Cisco proprietary level 5 encryption.
D. Set the enable secret command to privilege level 5.
E. The enable secret password is for accessing exec privilege level 5.
Which of these correctly matches the CLI command(s) to the equivalent SDM wizard that
performs similar configuration functions?
A. Cisco Common Classification Policy Language configuration commands and the
SDM Site- to-Site VPNn wizard
B. Auto secure exec command and the SDM One-Step Lockdown wizard
C. Setup exec command and the SDM Security Audit wizard