OBJECT: How to Configure Banner Login & Banner Motd in Cisco Router REQUIRED SOFTWARE: Cisco Packet Tracer 8.1.1
Network Diagram
Setup this network:
Router>enable
Router#config t
Router(config)#hostname CISCO
CISCO(config)# line con 0
CISCO(config-line)# password cisco
CISCO(config-line)# login
CISCO(config-line)# exit
CISCO(config)# banner login # Welcome to Integral University #
CISCO(config)# banner motd / Today is Orientation Program /
CISCO(config)#exit
CISCO)#
For Security Purpose All Password is Encrypted not plaint text
!!! Encrypted password CISCO(config)# service password-encryption
Dear Students, This Purpose of Preparation of Computer Network Online Test is in 30 Questions English. There is a collection of questions asked in the CCNA Exam. On answering each question one point will be given. And it is mandatory to bring 50% marks to pass. To start the test you have to click on Start Button. All the questions will have to be answered. Go to Last and click on Finish Button, after which your Result will appear on the screen. After clicking Finish, there will be three option shows below 1.Restart Quiz 2.View Question 3.Show Leader-board. After filling your name and e-mail id by clicking on the show leader-board, click on send, after which your result will be shown.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score
Your score
Categories
Not categorized0%
Thanks for attend this Quiz
Your result has been entered into leaderboard
Loading
maximum of 30 points
Pos.
Name
Entered on
Points
Result
Table is loading
No data available
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Answered
Review
Question 1 of 30
1. Question
1 points
Which of the following are not wizards that can be used with Cisco SDM?
Correct
Incorrect
Question 2 of 30
2. Question
1 points
What feature must be enabled prior to configuring command – line interface (CLI) views?
Correct
Incorrect
Question 3 of 30
3. Question
1 points
In generating RSA keys, what does Cisco recommend for the key modulus size?
Correct
Incorrect
Question 4 of 30
4. Question
1 points
What is the command that will reset the RSA keys on a Cisco router?
Correct
Incorrect
Question 5 of 30
5. Question
1 points
Cisco SDM can be installed where?
Correct
Incorrect
Question 6 of 30
6. Question
1 points
You have been asked to configure SSH using the command – line interface. However, you have discovered that some keys were left over on the router. What command is used to clear the RSA keys so that you can regenerate them?
Correct
Incorrect
Question 7 of 30
7. Question
1 points
Which command confers the traceroute command privileges to level 4?
Correct
Incorrect
Question 8 of 30
8. Question
1 points
Which of the following is the command to configure a minimum password length of 8 for any passwords configured on the router?
Correct
Incorrect
Question 9 of 30
9. Question
1 points
Which of the following is the global configuration mode command to encrypt any plaintext passwords in a Cisco configuration?
Correct
Incorrect
Question 10 of 30
10. Question
1 points
If you were working in IOS command – line interface, in a single command, what could you do to determine the interesting traffic for a particular VPN tunnel?
Correct
Incorrect
Question 11 of 30
11. Question
1 points
What is the ” peer address ” when discussing a VPN tunnel?
Correct
Incorrect
Question 12 of 30
12. Question
1 points
True or False? You can have only one transform set to define the type of authentication and encryption.
Correct
Incorrect
Question 13 of 30
13. Question
1 points
What is split tunneling?
Correct
Incorrect
Question 14 of 30
14. Question
1 points
Name a debug command that’s commonly used when troubleshooting VPN connectivity.
Correct
Incorrect
Question 15 of 30
15. Question
1 points
What minimum key length is recommended when implementing asymmetric encryption?
Correct
Incorrect
Question 16 of 30
16. Question
1 points
Who has possession of the private key?
Correct
Incorrect
Question 17 of 30
17. Question
1 points
What are the drawbacks of asymmetric encryption?
Correct
Incorrect
Question 18 of 30
18. Question
1 points
What is the main use for asymmetric encryption?
Correct
Incorrect
Question 19 of 30
19. Question
1 points
Who and what possess the public key?
Correct
Incorrect
Question 20 of 30
20. Question
1 points
You have selected a logging level of 4 for your Syslog messages. Which of the following are not also included in this level?
Correct
Incorrect
Question 21 of 30
21. Question
1 points
Which of the following is not one of the destinations for log messages?
Correct
Incorrect
Question 22 of 30
22. Question
1 points
Which of the following services can be exploited to perform denial of service attacks?
Correct
Incorrect
Question 23 of 30
23. Question
1 points
Which port does SNMP use for trap messages?
Correct
Incorrect
Question 24 of 30
24. Question
1 points
Which one of the following is the port used in NTP?
Correct
Incorrect
Question 25 of 30
25. Question
1 points
You have been asked to configure SSH using the command line interface. However, you have discovered that some keys were left over on the router. What command is used to clear the RSA keys so that you can regenerate them?
Correct
Incorrect
Question 26 of 30
26. Question
1 points
Which of the following are not security levels used in the security model in SNMP v2c?
Correct
Incorrect
Question 27 of 30
27. Question
1 points
Which of the following is not enabled in SDM one – step lockdown but is configured using AutoSecure?
Correct
Incorrect
Question 28 of 30
28. Question
1 points
Which of the following is not one of the features that are enabled during lockdown of the forwarding plane of a router?
Correct
Incorrect
Question 29 of 30
29. Question
1 points
Which one of the following is not an OPSEC best practice?
Correct
Incorrect
Question 30 of 30
30. Question
1 points
When performing a risk analysis, which of the following is the formula for determining the annual loss expectancy (ALE)?
Correct
Incorrect
MCQ SET-2
1. What are the drawbacks of asymmetric encryption?
Answer is A)
Key length weakness
2. What is the main use for asymmetric encryption?
Answer is C)
Generating shared secret keys
3. Who and what possess the public key?
Answer is A)
Anyone who requests it
4. You have selected a logging level of 4 for your Syslog messages. Which of the following are not also included in this level?
Answer is A)
Notification
5. Which of the following is not one of the destinations for log messages?
Answer is D)
NTP
6. Which of the following services can be exploited to perform denial of service attacks?
Answer is B)
Proxy – arp
7. Which port does SNMP use for trap messages?
Answer is C)
UDP 162
8. Which one of the following is the port used in NTP?
Answer is A)
UDP 123
9. You have been asked to configure SSH using the command line interface. However, you have discovered that some keys were left over on the router. What command is used to clear the RSA keys so that you can regenerate them?
Answer is B)
Router1#(config) crypto key zeroize rsa
10. Which of the following are not security levels used in the security model in SNMP v2c?
Answer is A)
authPriv
11. Which of the following is not enabled in SDM one – step lockdown but is configured using AutoSecure?
Answer is D)
AAA
12.
Which of the following is not one of the features that are enabled during lockdown of the forwarding plane of a router?
Answer is A)
SSH
13. Which one of the following is not an OPSEC best practice?
Answer is B)
Threat containment
14. When performing a risk analysis, which of the following is the formula for determining the annual loss expectancy (ALE)?
Answer is D)
SLE * ARO
15. Transferring credit card processing from your data center to a third – party processor is an example of what?
Answer is A)
Risk transference
16. A computer virus that combines several different technologies is known as what?
Answer is C)
Blended threat
17. The SDLC process includes a formal risk assessment. Which phase does it belong to?
Answer is D)
Acquisition and development
18. What product can be considered to be part of the threat containment architecture?
Answer is A)
Cisco Security Agent (CSA)
19. Which of the following is not a characteristic of the Cisco Self – Defending Network?
Answer is C)
Intelligent
20. Which of the following is the foundation component of the Cisco Self – Defending Network architecture?
Answer is D)
Secure network
21. Which would not be, by itself, a component of the Cisco Self – Defending Network?
Answer is A)
Cisco NetFlow
22. Which of the following is part of the management component of the Cisco Self – Defending Network?
Answer is A)
MARS
23. The SDLC process does not include which of the following components?
Answer is D)
Remediation
24. Which one of the following is not a component of operations security best practices?
Answer is B)
High availability
25. Which one of the following is not a component of a good security policy?
Answer is A)
User training
26. When performing a risk analysis, which of the following is the number of times an event might happen in a year?
Answer is C)
ARO
27. Which one of the following is defined as a means to compartmentalize information such as not to compromise security?
Answer is A)
OPSEC
28. What type of encryption is used with a Type 5 encrypted password in a Cisco router configuration?
Answer is D)
MD5
29. Which of the following are not wizards that can be used with Cisco SDM?
Answer is A)
BGP
30. What feature must be enabled prior to configuring command – line interface (CLI) views?
Answer is D)
AAA Explain : AAA is required and must be enabled prior to confi guring CLI views.