Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Refer to the exhibit. Using the command _show running-config, what security vulnerabilities can be found on the configuration of Switch _SW1? (Choose Three)
The virtual terminal lines are protected using the local authentication database.
The phrasing in the banner motd is inappropriate.
The username and its password are weak and unencrypted.
The privilege mode is secured using an unencrypted password.
By default, a privilege level 15 will be given to the username _cisco.
The Telnet protocol can be used to manage the Switch remotely.
The enable password cisco privilege mode password is unencrypted and weak. This can be resolved by either using the _service password-encryption [password] global command or using the _enable secret [password]. Appropriate wording in the banner message should be considered for giving security notice for those attempting to access an unauthorized device. The _username [] secret [] command can be used to hide the password with a hash. The users with its correspondent passwords build the local authentication database, where either the _line vty or _line console with the _login local command is used to provide access to the Switch. If the command _transport input ssh is used the protocol SSH is enabled and the inbound Telnet connections are disabled. The privileged EXEC mode is set by default to privilege level 15. For more information refer to: [http://www.cisco.com/c/en/us/td/docs/ios/122/termserv/command/reference/ftersvr/trfabout.html ] and [http://www.cisco.com/c/en/us/td/docs/ios/secuserservices/configuration/guide/124/secsecuringuserservices12-4book/seccfgsec4cli.html#wp1054229]
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.