For both the Router and the Switch the simulated console mode needs to start and remain in enabled mode.
RouterA and SwitchA have been configured to operate in a private network which will connect to the Internet. You have been asked to review the configuration prior to cabling and implementation.
This task requires the use of various IOS commands to access and inspect the running configuration of RouterA and SwitchA. No configuration changes are necessary.
You will connect to RouterA and SwilchA via the console devices that are attached to each.
There are 4 multiple-choice questions with this task. Be sure to answer all of them before leaving this item. In order to score the maximum points you will need to have accessed both SwitchA and RouterA.
NOTE: The configuration command has been disabled for both the router and switch in this simulation.
Which two are security issues which need to be modified before RouterA is used? (Choose two.)
- A. unencrypted weak password is configured to protect privilege mode
- B. inappropriate wording in banner message
- C. the virtual terminal lines have a weak password configured
- D. virtual terminal lines have a password, but it will not be used
- E. configuration supports un-secure web server access
ROUTER A CONFIGURATION:
no service password-encryption
enable password cisco
username ciscouser privilege 15 password 0 cisco
banner motd ^CWelcome! If you encountered any problem, please consult the administrator^C
line vty 0 4
transport input telnet ssh
“no service password-encryption” displays the passwords in plain text, and here we see that the password is set to the easily guessable password of “cisco”.
Never say “Welcome” in your banner message, it is basically an open invitation to access the device without permission.