CCNA Security Chapter 3 Exam v2

CCNA Security Chapter 3 Exam v2 Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this? accounting accessibility auditing authorization authentication Why is authentication with AAA preferred over a local database method? It provides a fallback authentication method if the administrator forgets the username or password. […]
Continue reading…

 

CCNA Security Chapter 2 Exam v2

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) Enable inbound vty SSH sessions. Generate two-way pre-shared keys. Configure DNS on the router. Configure the IP domain name on […]
Continue reading…

 

CCNA Security Chapter 1 Exam v2

CCNA Security Chapter 1 Exam v2 What method can be used to mitigate ping sweeps? using encrypted or hashed authentication protocols installing antivirus software on hosts deploying antisniffer software on all network devices blocking ICMP echo and echo-replies at the network edge What are the three major components of a worm attack? (Choose three.) a […]
Continue reading…