O'Reilly logo

CCIE Security Exam Certification Guide by Henry Benjamin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8 “Do I Know This Already?” Quiz Answers

1: A remote user tries logging into a remote network but fails after three additional tries and is disconnected. What useful information should the network administrator gather? (Select the best two answers.)
  1. Username

  2. Invalid password

  3. Invalid username

  4. Valid username

A1: Answer: b and c

Network administrators need the invalid username (because it is not an allowable username) and the invalid password used to see if the intruder is using a text-based algorithm to generate passwords.

2: What is the first step that should be implemented in securing any network?
  1. Create a database of secure passwords.

  2. Create the IP address scheme.

  3. Run NetRanger or NetSonar.

  4. Define a security policy.

  5. Configure access lists on all ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required