It’s quite possibly the most important thing you could know about when studying the topic of networking – security is vital for any network that’s passing information and data from one location to another, to make sure it reaches its destination untouched by any outside source. What can you tell us about it in this final exam?
Composite alerts
Composite alerts
Summary alerts
Advanced alerts
Rate this question:
The Telnet connection between RouterA and RouterB is not working correctly.
The enable password and the Telnet password need to be the same.
The password cisco123 is wrong.
The administrator does not have enough rights on the PC that is being used.
Rate this question:
True
False
Rate this question:
Rate this question:
Clientless mode
Cisco VPN client mode
Full client mode
Thin client mode
Rate this question:
Implement a strong password policy.
Deploy antisniffer software.
Include a firewall and IPS in the network security design.
Design the network by using the principle of minimum trust.
Rate this question:
MPLS
SSH
PPTP
ESP
IPsec
Rate this question:
Aaa new-model global configuration command
Changes to the configuration register
Ability to access ROMMON
Password encryption service
Rate this question:
Not broadcasting the SSID
Using WPA2
Not allowing personal wireless devices
Using an authentication server
Rate this question:
Information preservation policy
Security policy
Operations and maintenance document
Security initiation document
Rate this question:
Permit ipv6 any any fragments
Permit icmp any any nd-ns
Permit icmp any any echo-reply
Permit icmp any any nd-na
Permit tcp any any ack
Permit ipv6 any any routing
Rate this question:
An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses profile-based technology.
An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.
An IDS can negatively impact the packet flow, whereas an IPS can not.
An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall.
Rate this question:
Use ISL encapsulation on all trunk links.
Disable STP on all nontrunk ports.
Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.
Use VLAN 1 as the native VLAN on trunk ports.
Rate this question:
DTP
BPDU guard
PVLAN Edge
SPAN
Rate this question:
SSL VPNs provide support for more applications.
SSL VPNs do not require any pre-installed client software.
SSL VPNs provide superior authentication.
SSL VPNs provide stronger encryption as a remote-access solution.
Rate this question:
ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the wildcard mask.
ASA ACLs do not have an implicit deny all at the end, whereas IOS ACLs do.
ASA ACLs use forward and drop ACEs, whereas IOS ACLs use permit and deny ACEs.
Multiple ASA ACLs can be applied on an interface in the ingress direction, whereas only one IOS ACL can be applied.
ASA ACLs are always named, whereas IOS ACLs can be named or numbered.
Rate this question:
To have stronger encryption options
To support secure access for users on a multitude of devices
To have stronger authentication options
To provide stronger overall security
Rate this question:
DES
DH
3DES
ESP
AH
SSL
Rate this question:
Root port
Designated port
Backup port
Alternate port
Rate this question:
Apply the ACL to the vty lines without the in or out option required when applying ACLs to interfaces.
The ACL is applied to the Telnet port with the ip access-group command.
The ACL must be applied to each vty line individually.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
Rate this question:
The state of packets related to the attack
The total number of packets in the attack
The network bandwidth consumed by all packets
The attacking period used by the attacker
Rate this question:
This is a notification message for a normal but significant condition.
This is an alert message for which immediate action is needed.
This is an error message that indicates the system is unusable.
This is an error message for which warning conditions exist.
Rate this question:
RSA keys
Trusted keys
Encrypted passwords
Community strings
Rate this question:
Worms are not detected by antivirus programs.
Worms run within a host program.
Worms are more network-based than viruses are.
Worms directly attack the network devices.
Rate this question:
Rate this question:
R1# crypto isakmp key ciscopass address 209.165.200.226 R2# crypto isakmp key secure address 209.165.200.227
R1# crypto isakmp key ciscopass address 209.165.200.227 R2# crypto isakmp key ciscopass address 209.165.200.226
R1# crypto isakmp key ciscopass hostname R1 R2# crypto isakmp key ciscopass hostname R2
R1# crypto isakmp key ciscopass address 209.165.200.226 R2# crypto isakmp key ciscopass address 209.165.200.227
Rate this question:
WARP
Phoenix Labs
SANS
Global Trust Center
Rate this question:
Data is compromised.
Server CPUs become overloaded.
Configurations can be changed or lost.
End devices become infected.
Rate this question:
FW(config)# interface g0/1 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE out
FW(config)# interface g0/1 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE in
FW(config)# interface g0/0 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE in
W(config)# interface g0/0 FW(config-if)# ip inspect INSIDE in FW(config-if)# ip access-group OUTBOUND in
Rate this question:
A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.
Both stateful and packet-filtering firewalls can filter at the application layer.
A packet-filtering firewall uses session layer information to track the state of a connection, whereas a stateful firewall uses application layer information to track the state of a connection.
A stateful firewall can filter application layer information, whereas a packet-filtering firewall cannot filter beyond the network layer.
Rate this question:
Asymmetric key
Digitally signed private key
Shared-secret key
Digitally signed public key
Rate this question:
The data is divided into three blocks of equal length for encryption.
The data is encrypted using a key length that is three times longer than the key used for DES.
The data is encrypted three times with three different keys.
The data is encrypted, decrypted, and encrypted using three different keys.
Rate this question:
A – DMZ, B – Inside, C – Outside
A – DMZ, B – Outside, C – Inside
A – Inside, B – DMZ, C – Outside
A – Outside, B – Inside, C – DMZ
Rate this question:
Debug aaa accounting
Debug aaa authorization
Debug aaa authentication
Debug aaa protocol
Rate this question:
What is the cost versus benefit analysis of implementing various security technologies?
What are the reliable, well-understood, and recommended security practices that similar organizations currently employ?
What are the current procedures for incident response, monitoring, maintenance, and auditing of the system for compliance?
What are the most likely types of threats given the purpose of the organization?
Rate this question:
An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.
The no shutdown command should be entered on interface Ethernet 0/1.
The security level of the inside interface should be 0 and the outside interface should be 100.
VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.
VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.
Rate this question:
The use of a telephony system to send unsolicited and unwanted bulk messages
The use of a telephony system to make unauthorized long distance calls
The use of a telephony system to get information, such as account details, directly from users
The use of a telephony system to illegally intercept voice packets in order to listen in on a call
Rate this question:
ESA provides isolation between processes.
It obtains real-time updates from the Cisco SIO.
It uses the network infrastructure to enforce security policy compliance.
It combines advanced threat defense and secure mobility for email.
Rate this question:
To identify peripheral configurations
To determine potential vulnerabilities
To disable used ports and services
To identify operating systems
To identify active services
Rate this question:
Pattern-based detection
Policy-based detection
Honey pot-based detection
Anomaly-based detection
Rate this question:
Asymmetric key
Hash key
Symmetric key
Digital signature
Rate this question:
AES
BPDU guard
WPA2
Authenticated TLS
Rate this question:
Use Forced Authorization Codes.
Implement separate voice VLANs.
Configure IP phones to use only signed firmware files.
Create ACLs to allow only VoIP protocols.
Rate this question:
Privilege exec level
Banner motd
Login delay
Login block-for
Rate this question:
Storm control with the trap option
PortFast with BPDU guard enabled
Port security with the shutdown violation mode
Root guard
Protected ports
Rate this question:
Multiple DNS servers with fault tolerance
Distributed DHCP servers
A syslog server for each IPS sensor
A centralized NTP server
Rate this question:
Process isolation
Utilizing a reference monitor
Access control to resources
Least privilege
Rate this question:
Network IPS is operating system-dependent and must be customized for each platform.
Network IPS is incapable of examining encrypted traffic.
Network IPS is unable to provide a clear indication of the extent to which the network is being attacked.
Network IPS sensors are difficult to deploy when new networks are added.
Network IPS has a difficult time reconstructing fragmented traffic to determine if an attack was successful.
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.