<< Prev Question Next Question >>

Question 66/123

A router is being enabled for SSH command line access.
The following steps have been taken:
The vty ports have been configured with transport input SSH and login local.
Local user accounts have been created.
The enable password has been configured.
What additional step must be taken if users receive a 'connection refused' error when attempting to access the router via SSH?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (123q)
Question 1: (Exhibit) Refer to the exhibit. What type of attack is being...
Question 2: What are two high-level task areas in a Cisco Prime Infrastr...
Question 3: Which two SNMPv3 features ensure that SNMP packets have been...
Question 4: Which component does Cisco ASDM require on the host Cisco AS...
Question 5: You have explicitly added the line deny ipv6 any log to the ...
Question 6: Which tool provides the necessary information to determine h...
Question 7: What is a required attribute to configure NTP authentication...
Question 8: Which type of object group will allow configuration for both...
Question 9: Which of the following would need to be created to configure...
Question 10: Which two voice protocols can the Cisco ASA inspect? (Choose...
Question 11: Which two statements about Cisco IOS Firewall are true? (Cho...
Question 12: When a Cisco ASA is configured in transparent mode, how can ...
Question 13: Which four are IPv6 First Hop Security technologies? (Choose...
Question 14: Which two VPN types can you monitor and control with Cisco P...
Question 15: What is the lowest combination of ASA model and license prov...
Question 16: Which two SNMPv3 features ensure that SNMP packets have been...
Question 17: (Exhibit) Refer to the exhibit. Which type of ACL is shown i...
Question 18: Which Cisco Security Manager form factor is recommended for ...
Question 19: Which log level provides the most detail on the Cisco Web Se...
Question 20: Which Cisco product provides a GUI-based device management t...
Question 21: What are three attributes that can be applied to a user acco...
Question 22: What command alters the SSL ciphers used by the Cisco Email ...
Question 23: A Cisco ASA is configured in multiple context mode and has t...
Question 24: What are two enhancements of SSHv2 over SSHv1? (Choose two.)...
Question 25: Which technology provides forwarding-plane abstraction to su...
Question 26: Which set of commands enables logging and displays the log b...
Question 27: When you configure a Botnet Traffic Filter on a Cisco firewa...
Question 28: At which layer does MACsec provide encryption?...
Question 29: Which ASA feature is used to keep track of suspected attacke...
Question 30: Which two parameters must be configured before you enable SC...
Question 31: What is the default violation mode that is applied by port s...
Question 32: To which interface on a Cisco ASA 1000V firewall should a se...
Question 33: Enabling what security mechanism can prevent an attacker fro...
Question 34: Which two device types can Cisco Prime Security Manager mana...
Question 35: What is the maximum jumbo frame size for IPS standalone appl...
Question 36: (Exhibit) Refer to the exhibit. What is the effect of this c...
Question 37: Enabling what security mechanism can prevent an attacker fro...
Question 38: Which set of commands creates a message list that includes a...
Question 39: (Exhibit) SNMP users have a specified username, a group to w...
Question 40: What are two reasons to implement Cisco IOS MPLS Bandwidth-A...
Question 41: CORRECT TEXT You are a network security engineer for the Sec...
Question 42: Which two statements about zone-based firewalls are true? (C...
Question 43: Which Cisco TrustSec role does a Cisco ASA firewall serve wi...
Question 44: Enabling what security mechanism can prevent an attacker fro...
Question 45: CORRECT TEXT (Exhibit)
Question 46: Which configuration keyword will configure SNMPv3 with authe...
Question 47: Which three options are default settings for NTP parameters ...
Question 48: At which layer does Dynamic ARP Inspection validate packets?...
Question 49: Which three logging methods are supported by Cisco routers? ...
Question 50: Which two TCP ports must be open on the Cisco Security Manag...
Question 51: Which statement describes the correct steps to enable Botnet...
Question 52: Refer to the exhibit. (Exhibit) To protect Host A and Host B...
Question 53: CORRECT TEXT You are the network security engineer for the S...
Question 54: Which command enables the HTTP server daemon for Cisco ASDM ...
Question 55: A switch is being configured at a new location that uses sta...
Question 56: When you configure a Cisco firewall in multiple context mode...
Question 57: Which two web browsers are supported for the Cisco ISE GUI? ...
Question 58: (Exhibit) An SNMP host is an IP address to which SNMP notifi...
Question 59: Which two router commands enable NetFlow on an interface? (C...
Question 60: Which command displays syslog messages on the Cisco ASA cons...
Question 61: Cisco Security Manager can manage which three products? (Cho...
Question 62: Which statement about Cisco IPS Manager Express is true?...
Question 63: If the Cisco ASA 1000V has too few licenses, what is its beh...
Question 64: Which option describes the purpose of the input parameter wh...
Question 65: IPv6 addresses in an organization's network are assigned usi...
Question 66: A router is being enabled for SSH command line access. The f...
Question 67: Which three compliance and audit report types are available ...
Question 68: What is the result of the default ip ssh server authenticate...
Question 69: A Cisco ASA is configured for TLS proxy. When should the sec...
Question 70: A network engineer is troubleshooting and configures the ASA...
Question 71: (Exhibit) Which statement is true of the logging configurati...
Question 72: According to Cisco best practices, which two interface confi...
Question 73: The Cisco Email Security Appliance can be managed with both ...
Question 74: An administrator is deploying port-security to restrict traf...
Question 75: (Exhibit) According to the logging configuration on the Cisc...
Question 76: Which two configurations are necessary to enable password-le...
Question 77: Which product can manage licenses, updates, and a single sig...
Question 78: You are a security engineer at a large multinational retaile...
Question 79: Which statement about the Cisco Security Manager 4.4 NAT Red...
Question 80: Which utility can you use to troubleshoot and determine the ...
Question 81: (Exhibit) Which statement about how the Cisco ASA supports S...
Question 82: What are three ways to add devices in Cisco Prime Infrastruc...
Question 83: You are configuring a Cisco IOS Firewall on a WAN router tha...
Question 84: All 30 users on a single floor of a building are complaining...
Question 85: What can an administrator do to simultaneously capture and t...
Question 86: What are two security features at the access port level that...
Question 87: Which two voice protocols can the Cisco ASA inspect? (Choose...
Question 88: Which two features block traffic that is sourced from non-to...
Question 89: Which two features does Cisco Security Manager provide? (Cho...
Question 90: An attacker has gained physical access to a password protect...
Question 91: Which Cisco switch technology prevents traffic on a LAN from...
Question 92: If you encounter problems logging in to the Cisco Security M...
Question 93: What are three features of the Cisco ASA 1000V? (Choose thre...
Question 94: What are two primary purposes of Layer 2 detection in Cisco ...
Question 95: You are configuring a Cisco IOS Firewall on a WAN router tha...
Question 96: What is the primary purpose of stateful pattern recognition ...
Question 97: Which command sets the source IP address of the NetFlow expo...
Question 98: (Exhibit) Refer to the exhibit. Which two statements about t...
Question 99: Which function in the Cisco ADSM ACL Manager pane allows an ...
Question 100: When a Cisco ASA is configured in multicontext mode, which c...
Question 101: What is the CLI command to enable SNMPv3 on the Cisco Web Se...
Question 102: Which two statements about Cisco IDS are true? (Choose two.)...
Question 103: When configuring a new context on a Cisco ASA device, which ...
Question 104: Which feature can suppress packet flooding in a network?...
Question 105: Which statement about Cisco Security Manager form factors is...
Question 106: When you set a Cisco IOS Router as an SSH server, which comm...
Question 107: When it is configured in accordance to Cisco best practices,...
Question 108: A network administrator is creating an ASA-CX administrative...
Question 109: Which two options are two purposes of the packet-tracer comm...
Question 110: In IOS routers, what configuration can ensure both preventio...
Question 111: (Exhibit) In your role as network security administrator, yo...
Question 112: When you install a Cisco ASA AIP-SSM, which statement about ...
Question 113: Which function does DNSSEC provide in a DNS infrastructure?...
Question 114: Which URL matches the regex statement "http"*/"www.cisco.com...
Question 115: Which security operations management best practice should be...
Question 116: Which command configures the SNMP server group1 to enable au...
Question 117: To which interface on a Cisco ASA 1000V firewall should a se...
Question 118: Which two features are supported when configuring clustering...
Question 119: You are the administrator of a Cisco ASA 9.0 firewall and ha...
Question 120: Which three statements about private VLANs are true? (Choose...
Question 121: Which command tests authentication with SSH and shows a gene...
Question 122: (Exhibit) Refer to the exhibit. Which two statements about t...
Question 123: (Exhibit) Refer to the exhibit. Which command can produce th...