Network Device Security (ENCOR, CCNP Quiz) Please enter your email: Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Extended Numbered ACL Standard Numbered ACL Extended Named ACL Standard Named ACL Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Extended Named ACL Standard Numbered ACL Extended Numbered ACL Standard Named ACL When implementing port security, which command allows pre-defined quantity of MAC addresses? SW_1(config-if)#switchport port-security maximum 2 SW_1(config)#switchport port security maximum 999999 SW_1(config-router)#switchport port security minimum 1536 SW_1(config-if)#switchport port security all How can we best prevent Data Loss Layer2 attacks? User Awareness Strict FW rules Keep Port Security enabled Layer3 Access Control Lists Which of these is correct method to assign an Access Control List to a physical interface? #line vty 0 #access-class 1 in #line telnet 0 #access-class 1 in #interface fa0/1 #access-group 1 in #interface fa0/1 #access-class 1 in Which of these is correct method to assign ACL to Telnet? #line telnet 0 #access-class 1 in #line vty 0 #access-class 1 in #interface fa0/1 #access-group 1 in #interface fa0/1 #access-class 1 in Phishing falls under which type of Security attacks? Virus attacks Data Loss attacks General attacks Social Engineering attacks What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.0 Which type of Security architecture (security system) is this? Telnet Security AAA C.I.A. ABC What are the individual entries in Access Control Lists called? Access Control Entries Access Control Entrances Access Control Keys Access Control Locks Loading … Written by