Cisqo Discussion Questions help
Cisqo Discussion Questions help
Question 1:
In general, we can implement privilege level access or role-based access control to limit what a network engineer or technician can do once that person is given access to the Cisco router. In your view, where would you implement privilege level access control to manage Cisco devices? What would you gain from either feature? Would you be concerned about the weakness of using the privilege level access control feature? Please elaborate.
A minimum of three full sentences is required to at least address these complex issues. Let’s go to work.
Question 2:
Authentication is the process of determining whether or not an entity is who the entity claims to be. In a way, it requires that the entity be challenged until proven that the entity’s identity is accurate. This is achieved in many ways in networking including the use of digital signatures, passwords, pin, smart cards, tokens, etc. Once an entity is authenticated, we usually are concerned about what the entity is allowed to do on the network. That is where authentication comes into play. By the way, as discussed in class, accounting is the process of collecting data on what the authenticated entity has been doing during the time the access was granted until the entity disconnected from the network. We collect approved and unauthorized acts that the entity performs during the session.
We have discussed two very important AAA Protocols used to protect infrastructure devices – RADIUS and TACACS+. If you were in charge of a large multinational organization, would you prefer to use RADIUS or TACACS+ to manage the AAA part of the security? Justify your answer.
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


