Вы находитесь на странице: 1из 3

CCNA 4E Chapter 4 Accessing the WAN (Network Security) Gwinnett Technical College

4.1.1.1 Why is network security important? How has the cyber criminal and their tools evolved over the years?

What types of computer crimes can be mitigated by diligent network management? What is the balance that network administrators are trying to achieve with various forms and levels of security? What is the first and most important step in securing your network? ?.?.?.? What DOD directive is based on this idea and provides guidance to prepare and educate network security administrators? What are three vulnerabilities inherent to your network and its devices? What are four physical threats that can bring down your network?

Describe ways to mitigate the four physical threats:

?.?.?.?

What is a way to control both physical and remote access to network devices and how should your policy define the implementation? Describe the four threats to your network? What is social engineering? Describe the four primary forms of attacks:

Describe general mitigation techniques for host and servers: What is an IDS?

What are some common Cisco security devices and appliances?

Developed by L. Clarke

CCNA 4E Chapter 4 Accessing the WAN (Network Security) Gwinnett Technical College
Describe the Network Security Wheel (Or as people in the business might call it The Prophecy of the Never Ending Battle): What is the MOST important aspect of the security policy as a living, breathing, and constantly adjusting company document? 4.2.1.1 As one of the first lines of defense, what are some ways you can protect your exposed router? What are the six steps in securing a router using its own IOS?

The first thing to protect the router and the network from is human interaction. What can be done to mitigate this problem? What command is used to encrypt all passwords on the router? What command is used to encrypt the enable password? What affect does the following command have on the router? C# security passwords min-length 13 What commands would be used to allow both telnet and ssh access to the router?

4.2.4.5

What affect does the following command have on the router? Config-line# exec-timeout SSH uses what telnet port? What are the four parameters of enabling SSH on a router and how are they configured?

4.3.1.1

Describe vulnerable router services and interfaces:

What are some of the commands that can be used to disable unnecessary services and interfaces? Describe the SNMP, NTP, and DNS Vulnerabilities:

What is the best way to protect the exchange of routing protocol information between routers from being successfully attacked? 2

Developed by L. Clarke

CCNA 4E Chapter 4 Accessing the WAN (Network Security) Gwinnett Technical College

What commands are used to secure EIGRP?

What commands are used to secure OSPF?

What is Cisco AutoSecure and how can it be implemented? What is the GUI alternative to AutoSecure? Where does the SDM software reside? SDM is a web-based tool that allows easy configuration of what key & special router features? What must be configured on the router to allow SDM access? On SDM, what information is supplied by About Your Router? On SDM, what information is supplied by Configuration Overview? On SDM, what are the six tasks that can be completed under the Configuration option? What is One-Step-Lockdown and how is it configured? What are the steps for reloading an IOS to a router using an Ethernet port and a TFTP server? What are the steps for reloading an IOS to a router using the Console port? What are the password recovery steps for a Cisco router?

4.4.1.1

4.5.1.1

Developed by L. Clarke

Вам также может понравиться