How to Configure Banner Motd on Cisco Router

EXPERIMENT No-4

OBJECT: How to Configure Banner Login & Banner Motd in Cisco Router
REQUIRED SOFTWARE: Cisco Packet Tracer 8.1.1

Network Diagram

Setup this network:

How to Configure Banner Motd on Cisco Router
Router>enable
Router#config t
Router(config)#hostname CISCO
CISCO(config)# line con 0
CISCO(config-line)# password cisco 
CISCO(config-line)# login
CISCO(config-line)# exit
CISCO(config)# banner login # Welcome to Integral University #
CISCO(config)# banner motd  / Today is Orientation Program /
CISCO(config)#exit
CISCO)#

For Security Purpose All Password is Encrypted not plaint text

!!! Encrypted  password
CISCO(config)# service password-encryption



Download Cisco Packet Tracer 6.22
Download Cisco Packet Tracer 8.1.1

MCQ SET-1

Dear Students, This Purpose of Preparation of Computer Network Online Test is in 30 Questions English. There is a collection of questions asked in the CCNA Exam. On answering each question one point will be given. And it is mandatory to bring 50% marks to pass. To start the test you have to click on Start Button. All the questions will have to be answered. Go to Last and click on Finish Button, after which your Result will appear on the screen. After clicking Finish, there will be three option shows below 1.Restart Quiz 2.View Question 3.Show Leader-board. After filling your name and e-mail id by clicking on the show leader-board, click on send, after which your result will be shown.

 

MCQ SET-2

1. What are the drawbacks of asymmetric encryption?




Answer is A)
Key length weakness


2. What is the main use for asymmetric encryption?




Answer is C)
Generating shared secret keys


3. Who and what possess the public key?




Answer is A)
Anyone who requests it

4. You have selected a logging level of 4 for your Syslog messages. Which of the following are not also included in this level?




Answer is A)
Notification

5. Which of the following is not one of the destinations for log messages?




Answer is D)
NTP

6. Which of the following services can be exploited to perform denial of service attacks?




Answer is B)
Proxy – arp

7. Which port does SNMP use for trap messages?




Answer is C)
UDP 162

8. Which one of the following is the port used in NTP?




Answer is A)
UDP 123

9. You have been asked to configure SSH using the command line interface. However, you have discovered that some keys were left over on the router. What command is used to clear the RSA keys so that you can regenerate them?




Answer is B)
Router1#(config) crypto key zeroize rsa

10. Which of the following are not security levels used in the security model in SNMP v2c?




Answer is A)
authPriv

11. Which of the following is not enabled in SDM one – step lockdown but is configured using AutoSecure?




Answer is D)
AAA

12. Which of the following is not one of the features that are enabled during lockdown of the forwarding plane of a router?




Answer is A)
SSH

13. Which one of the following is not an OPSEC best practice?




Answer is B)
Threat containment

14. When performing a risk analysis, which of the following is the formula for determining the annual loss expectancy (ALE)?




Answer is D)
SLE * ARO

15. Transferring credit card processing from your data center to a third – party processor is an example of what?




Answer is A)
Risk transference

16. A computer virus that combines several different technologies is known as what?




Answer is C)
Blended threat

17. The SDLC process includes a formal risk assessment. Which phase does it belong to?




Answer is D)
Acquisition and development

18. What product can be considered to be part of the threat containment architecture?




Answer is A)
Cisco Security Agent (CSA)

19. Which of the following is not a characteristic of the Cisco Self – Defending Network?




Answer is C)
Intelligent

20. Which of the following is the foundation component of the Cisco Self – Defending Network architecture?




Answer is D)
Secure network

21. Which would not be, by itself, a component of the Cisco Self – Defending Network?




Answer is A)
Cisco NetFlow

22. Which of the following is part of the management component of the Cisco Self – Defending Network?




Answer is A)
MARS

23. The SDLC process does not include which of the following components?




Answer is D)
Remediation

24. Which one of the following is not a component of operations security best practices?




Answer is B)
High availability

25. Which one of the following is not a component of a good security policy?




Answer is A)
User training

26. When performing a risk analysis, which of the following is the number of times an event might happen in a year?




Answer is C)
ARO

27. Which one of the following is defined as a means to compartmentalize information such as not to compromise security?




Answer is A)
OPSEC

28. What type of encryption is used with a Type 5 encrypted password in a Cisco router configuration?




Answer is D)
MD5

29. Which of the following are not wizards that can be used with Cisco SDM?




Answer is A)
BGP

30. What feature must be enabled prior to configuring command – line interface (CLI) views?




Answer is D)
AAA Explain : AAA is required and must be enabled prior to confi guring CLI views.

How to Configure Telnet in Cisco Packet Tracer
Download Cisco Packet Tracer 7.3.0
About me