CCNA Security, Final Exam

CCNA Security, Final Exam

1.     What will be disabled as a result of the no service password-recovery command ? – aaa new-model global configuration command. – change to the configuration register. – password encryption service. – ability to access ROMmon. 2.     What occurs after RSA keys are generated on a Cisco router to prepare for secure device management? …

+ Read More

CCNA Security, chapter 9 Exam

CCNA Security, chapter 9 Exam

Questions and answers above 90% correct. 1.     Which three statements describe ethics in network security? (Choose three.) – principles put into action in place of laws – foundations for current laws – set of moral principles that govern civil behavior – standard that is higher than the law – set of regulations established by …

+ Read More

CCNA Security, chapter 8 Exam

CCNA Security, chapter 8 Exam

Questions and answers above 90% correct. 1. What are two benefits of an SSL VPN? (Choose two.) – It supports all client/server applications. – It supports the same level of cryptographic security as an IPsec VPN. – It has the option of only requiring an SSL-enabled web browser. – The thin client mode functions without …

+ Read More

CCNA Security, chapter 7 Exam

CCNA Security, chapter 7 Exam

Questions and answers above 90% correct. 1.     Which symmetrical encryption algorithm is the most difficult to crack? –  3DES –AES -DES -RSA -SHA 2.     What is the basic method used by 3DES to encrypt plaintext? -The data is encrypted three times with three different keys. –The data is encrypted, decrypted, and encrypted using …

+ Read More

CCNA Security, chapter 6 Exam

CCNA Security, chapter 6 Exam

Questions and answers above 90% correct. 1.     Which two measures are recommended to mitigate VLAN hopping attacks? (Choose two.) –  Use a dedicated native VLAN for all trunk ports. – Place all unused ports in a separate guest VLAN. – Disable trunk negotiation on all ports connecting to workstations. – Enable DTP on all …

+ Read More

CCNA Security, chapter 5 Exam

CCNA Security, chapter 5 Exam

Questions and answers above 90% correct. 1.     An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger and signature type does this describe? –  Trigger: Anomaly-based detection Type: Atomic signature -Trigger: Anomaly-based detection Type: Composite signature -Trigger: Pattern-based detection Type: Atomic signature –Trigger: Pattern-based …

+ Read More

CCNA Security, chapter 4 Exam

CCNA Security, chapter 4 Exam

Questions and answers above 90% correct. 1.     Which statement accurately describes Cisco IOS zone-based policy firewall operation? – The pass action works in only one direction. – A router interface can belong to multiple zones. – Service policies are applied in interface configuration mode. – Router management interfaces must be manually assigned to the self …

+ Read More

CCNA Security, chapter 3 Exam

CCNA Security, chapter 3 Exam

Questions and answers above 90% correct. 1.     Why is local database authentication preferred over a password-only login? – It specifies a different password for each line or port. – It provides for authentication and accountability. – It requires a login and password combination on console, vty lines, and aux ports. – It is more …

+ Read More

CCNA Security, chapter 2 Exam

CCNA Security, chapter 2 Exam

Questions and answers above 90% correct. 1.     Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.) – This message is a level five notification message. – This message appeared because a minor error occurred requiring further investigation. – This message appeared because a major …

+ Read More

CCNA Security, chapter 1 Exam.

CCNA Security, chapter 1 Exam.

Questions and answers above 90% correct. 1.     What are the basic phases of attack that can be used by a virus or worm in sequential order? – paralyze, probe, penetrate, persist, and propagate – probe, penetrate, persist, propagate, and paralyze – penetrate, persist, propagate, paralyze, and probe – persist, propagate, paralyze, probe, and penetrate …

+ Read More