The Basic Of Ccna Cyber Security Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,149
| Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. What does level 5 in this enable secret global configuration mode command indicate?

Explanation

In the context of the enable secret global configuration mode command, level 5 refers to the privilege level at which the password will grant access. It is specifically related to exec privilege level 5 and not for other purposes such as configuration or user authentication.

Submit
Please wait...
About This Quiz
The Basic Of CCNA Cyber Security Quiz - Quiz

Explore the essentials of CCNA cybersecurity in this focused quiz. Assess your knowledge on computer security threats and prevention techniques, crucial for those preparing for the CCNA certification... see moreexam. Ideal for learners aiming to enhance their cybersecurity skills. see less

2. Which two functions are required for IPsec operation?
Submit
3. How are Cisco IOS access control lists processed?

Explanation

In Cisco IOS, access control lists (ACLs) are processed from top down, meaning the router will check the packets against the entries in the list starting from the top and proceeding downwards until a match is found.

Submit
4. Which access list permits HTTP traffic sourced from host 10.0.1.129.100 port 3030 destined to host 192.168.1.10?

Explanation

The correct answer allows TCP traffic from host 10.0.1.129 port 3030 to host 192.168.1.10 port www. The incorrect answers either have incorrect IP/mask combinations, incorrect port numbers, or incorrect wildcard mask usage.

Submit
5. Which two features are supported by Cisco IronPort Security Gateway?

Explanation

The Cisco IronPort Security Gateway primarily focuses on email security features such as Spam Protection and Email Encryption. It is not designed for Intrusion Detection, Firewall Protection, or Anti-Virus Scanning.

Submit
6. Which two characteristics represent a blended threat?

Explanation

A blended threat is a sophisticated cyberattack that combines various types of malware and techniques to exploit vulnerabilities in a system. In this case, a trojan horse attack and a day zero attack are examples of characteristics that represent a blended threat because they involve both malicious software and exploitation of unknown vulnerabilities.

Submit
7. Under which higher-level policy is a VPN security policy categorized?

Explanation

A VPN security policy is typically categorized under a remote access policy as it governs how remote users should securely connect to the network.

Submit
8. What does the option secret 5 in the username global config mode command indicate about the user password?

Explanation

When the 'secret 5' option is used in the username global config mode command, it indicates that the user password is hashed using MD5.

Submit
9. What does level 5 in the 'enable secret' global configuration mode command indicate?

Explanation

In the given 'enable secret' command, the level 5 refers to the privilege level at which the password is valid. It does not specify the length of the password, encryption algorithm, or the number of allowed attempts.

Submit
10. Which option is the correct representation of the IPv6 address: 2001:0000:150C:0000:0000:41B1:45A3:041D?

Explanation

When representing an IPv6 address, you can compress consecutive sections of zeros by using a double colon (::) only once. It is not necessary to represent each group of zeros with leading zeros like '0000'. Therefore, the correct representation is 2001:0:150C::41B1:45A3:41D.

Submit
11. Which statement about this output is true?

Explanation

The correct answer directly addresses the reason for the login failure, which was due to an incorrect password. The incorrect answers provide alternative reasons which were not the cause of the login failure in this scenario.

Submit
12. Which statement about this partial CLI configuration of an access control list is true?

Explanation

The correct answer specifies that only traffic sourced from 10.10.0.10 is allowed from the 10.10.0.0 subnet. Therefore, options stating all traffic from the subnet is allowed, no traffic is allowed, or only traffic sourced from a different IP address are incorrect.

Submit
13. What type of entry in Cisco Adaptive Security Appliance (ASA) access list enables matching multiple entries in a single statement?

Explanation

Object groups in Cisco ASA access lists allow for simplifying configuration by grouping objects together for easier management and matching multiple entries in a single statement.

Submit
14. Which statement about an access control list that is applied to a router interface is true?

Explanation

An access control list applied to a router interface filters traffic that passes through the router based on the defined rules. It can filter based on various criteria, not just source IP address. The ACL can be configured to allow or deny traffic in both directions, and it applies to all types of connections, whether wireless or wired.

Submit
15. When tasked with implementing syslog in your network, what is an important factor to consider in your implementation?

Explanation

Synchronizing clocks on the network ensures log entries across devices are accurately timestamped, aiding in troubleshooting and correlating events.

Submit
16. Which protocol secures router management session traffic?

Explanation

SSH (Secure Shell) is the correct answer as it provides a secure way to remotely access and manage routers. Telnet, FTP, and HTTP are incorrect because they do not provide the same level of security for managing router sessions.

Submit
17. Which two considerations about secure network management are important?

Explanation

Secure network management requires mechanisms like log tampering detection and accurate time stamping to maintain the integrity and security of the network. Strong passwords, physical access control, and network bandwidth optimization are also important aspects of network security, but they do not specifically address the management considerations mentioned in the question.

Submit
18. Which command enables Cisco IOS image resilience?

Explanation

The correct command to enable Cisco IOS image resilience is 'secure boot-image'. This command is used to ensure that the Cisco IOS image is secure and protected from tampering or unauthorized access.

Submit
19. Which router management feature provides for the ability to configure multiple administrative views?

Explanation

Role-based CLI allows the configuration of different administrative views based on roles assigned to users, while SNMPv3 is a network management protocol, VLANs are used for network segmentation, and Port Mirroring is used for network traffic monitoring.

Submit
20. How can you mitigate the activity of an attacker who has configured a rogue Layer 2 device to intercept traffic from multiple VLANs?

Explanation

The correct methods to mitigate the activity of an attacker intercepting traffic from multiple VLANs involve setting the native VLAN on trunk ports to an unused VLAN and disabling Dynamic Trunking Protocol (DTP). Enabling Port Security on all switch ports does not directly address the issue of rogue Layer 2 device interception. Configuring all VLANs to use the same native VLAN can still allow the attacker to intercept traffic. Implementing Spanning Tree Protocol (STP) on trunk ports helps with preventing loops in the network, but does not specifically protect against rogue device interception.

Submit
21. What is a best practice when configuring trunking on a switch port?

Explanation

Configuring an unused VLAN as the native VLAN helps prevent security vulnerabilities by separating management traffic from user traffic on the trunk port.

Submit
22. Which type of Layer 2 attack causes a switch to flood all incoming traffic to all ports?

Explanation

A Content Addressable Memory (CAM) overflow attack floods a switch with traffic causing it to forward packets to all ports. The other options do not result in the same behavior.

Submit
23. How can VLAN hopping attacks be prevented?

Explanation

VLAN hopping attacks can be prevented by disabling Dynamic Trunking Protocol (DTP) negotiations, which can help prevent unauthorized VLAN access and manipulation.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What does level 5 in this enable secret global configuration mode...
Which two functions are required for IPsec operation?
How are Cisco IOS access control lists processed?
Which access list permits HTTP traffic sourced from host...
Which two features are supported by Cisco IronPort Security Gateway?
Which two characteristics represent a blended threat?
Under which higher-level policy is a VPN security policy categorized?
What does the option secret 5 in the username global config mode...
What does level 5 in the 'enable secret' global configuration mode...
Which option is the correct representation of the IPv6 address:...
Which statement about this output is true?
Which statement about this partial CLI configuration of an access...
What type of entry in Cisco Adaptive Security Appliance (ASA) access...
Which statement about an access control list that is applied to a...
When tasked with implementing syslog in your network, what is an...
Which protocol secures router management session traffic?
Which two considerations about secure network management are...
Which command enables Cisco IOS image resilience?
Which router management feature provides for the ability to configure...
How can you mitigate the activity of an attacker who has configured a...
What is a best practice when configuring trunking on a switch port?
Which type of Layer 2 attack causes a switch to flood all incoming...
How can VLAN hopping attacks be prevented?
Alert!

Advertisement