Exam Prep Questions
Which of the following is not a consideration for setting up technical controls in support of secure logging?
A.
How can the confidentiality of logs as well as communicating log messages be assured?
B.
How do you log events from several devices in one central place?
C.
What are the most critical events to log?
D.
What are the most important logs?
E.
None of the above.
Fill in the blank with the correct term from the choices.
One communication path between management hosts and the devices they manage is __________, meaning that the traffic flows within a network separate from the production network.
A.
In-band
B.
Inter-vlan
C.
Private
D.
Out-of-band
E.
Intranet
True or false. A general management guideline is to ensure that clocks on network devices are not synchronized with an external time source because this is a known vulnerability.
Indicate the number for each logging level:
- Debugging:
- Alerts:
- Emergencies:
- Notifications:
- Critical:
- Informational:
- Warnings:
- ____
- ____
- ____
- ____
- ____
- ____
- ____
To what menus do you have to navigate to setup logging in the SDM?
A.
Configure->Router Management->Additional Tasks->Logging
B.
Configure->Additional Tasks->Router Properties->Logging
C.
Monitor->System Properties->Configure->Syslog
D.
Configure->Additional Tasks->Router Properties->Syslog
E.
Monitor->Logging Options->Syslog Setup
Match the following SNMP terms with their definitions:
- MIB:
- Agent:
- NMS:
- ___
- ___
- ___
- Responds to sets and gets
- Sends sets and gets
- Information database
- True or false. Secure Network Time Protocol (SNTP) is more secure than regular NTP as it requires authentication.
Which of the following is part of Cisco’s list of seven categories of vulnerable router services and interfaces? (Choose all that apply.)
A.
Disable unnecessary services and interfaces.
B.
Disable commonly configured management services.
C.
Ensure path integrity.
D.
Disable probes and scans.
E.
All of the above.
Fill in the blank with the correct term from the choices.
The Cisco SDM Security Audit Wizard and One-Step Lockdown tools are based on the Cisco _________ feature.
A.
Auto-Initiate
B.
SafeAudit
C.
AuditMany-SecureOnce
D.
AutoSecure
E.
None of the above.
- True or false. SNMPv3 is implemented in the Cisco SDM Security Audit Wizard but not in the auto secure CLI command.