Network Device Security (ENCOR, CCNP Quiz) Please enter your email: When implementing port security, which command allows pre-defined quantity of MAC addresses? SW_1(config)#switchport port security maximum 999999 SW_1(config-if)#switchport port-security maximum 2 SW_1(config-if)#switchport port security all SW_1(config-router)#switchport port security minimum 1536 How can we best prevent Data Loss Layer2 attacks? Layer3 Access Control Lists User Awareness Strict FW rules Keep Port Security enabled Which of these is correct method to assign ACL to Telnet? #interface fa0/1 #access-class 1 in #line telnet 0 #access-class 1 in #interface fa0/1 #access-group 1 in #line vty 0 #access-class 1 in Which of these is correct method to assign an Access Control List to a physical interface? #interface fa0/1 #access-class 1 in #line vty 0 #access-class 1 in #line telnet 0 #access-class 1 in #interface fa0/1 #access-group 1 in Phishing falls under which type of Security attacks? General attacks Virus attacks Data Loss attacks Social Engineering attacks What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.0 Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Standard Named ACL Standard Numbered ACL Extended Numbered ACL Extended Named ACL Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Extended Named ACL Standard Numbered ACL Standard Named ACL Extended Numbered ACL Which type of Security architecture (security system) is this? AAA Telnet Security C.I.A. ABC What are the individual entries in Access Control Lists called? Access Control Locks Access Control Entrances Access Control Entries Access Control Keys Loading … Written by