CCNA Security Final Exam Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Pepsisnus
P
Pepsisnus
Community Contributor
Quizzes Created: 1 | Total Attempts: 674
| Attempts: 674
SettingsSettings
Please wait...
  • 1/81 Questions

    58. What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

    • TACACS+
    • NTP
    • SSH
    • RADIUS
    • HTTPS
    • CHAP
Please wait...
About This Quiz

It’s quite possibly the most important thing you could know about when studying the topic of networking – security is vital for any network that’s passing information and data from one location to another, to make sure it reaches its destination untouched by any outside source. What can you tell us about it in this final exam?

CCNA Security Final Exam Quiz - Quiz

Quiz Preview

  • 2. 

    31. A network administrator configures the alert generation of an IPS device in such a way that when multiple attack packets that match the same signature are detected, a single alert for the first packet is generated and the remaining duplicate alarms are counted, but not sent, for a specific time period. When the specified time period is reached, an alert is sent that indicates the number of alarms that occurred during the time interval. What kind of alert generation pattern is configured?

    • Composite alerts

    • Composite alerts

    • Summary alerts

    • Advanced alerts

    Correct Answer
    A. Summary alerts
    Explanation
    The network administrator has configured the alert generation of the IPS device to generate a single alert for the first packet that matches a specific signature. Any subsequent packets that match the same signature are not sent as individual alerts, but are instead counted. After a specified time period, an alert is sent indicating the number of alarms that occurred during that time interval. This configuration is known as "summary alerts," where multiple alarms are summarized and reported as a single alert.

    Rate this question:

  • 3. 

    Refer to the exhibit. The administrator can ping the S0/0/1 interface of RouterB but is unable to gain Telnet access to the router by using the password cisco123. What is a possible cause of the problem?

    • The Telnet connection between RouterA and RouterB is not working correctly.

    • The enable password and the Telnet password need to be the same.

    • The password cisco123 is wrong.

    • The administrator does not have enough rights on the PC that is being used.

    Correct Answer
    A. The password cisco123 is wrong.
    Explanation
    The possible cause of the problem is that the password cisco123 is wrong. This means that the administrator is using an incorrect password to gain Telnet access to RouterB.

    Rate this question:

  • 4. 

    80. Place the system development cycle (SDLC) phases in the order they occur (Not all options are used) 1st -> Initiation2nd -> Acqusition and Development3rd -> Implementation4th -> Operations and Maintenance5th -> Disposition

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The correct order of the system development cycle (SDLC) phases is as follows: initiation, acquisition and development, implementation, operations and maintenance, and disposition. This means that the phases occur in the order of initiation, followed by acquisition and development, implementation, operations and maintenance, and finally disposition.

    Rate this question:

  • 5. 

    81. Fill in the blank.When role-based CLI is used, only the _____________ view has the ability to add or remove commands from existing views.

    Correct Answer
    Root
    Explanation
    When role-based CLI is used, only the "Root" view has the ability to add or remove commands from existing views. This means that only the highest level of access, which is the root level, has the authority to modify the commands available in other views. Other roles or views may have limited permissions and restrictions, but the root view holds the ultimate control over the commands in the CLI.

    Rate this question:

  • 6. 

    11. What is a type of SSL VPN that provides access to a network without requiring VPN software or a Java applet on the client?

    • Clientless mode

    • Cisco VPN client mode

    • Full client mode

    • Thin client mode

    Correct Answer
    A. Clientless mode
    Explanation
    Clientless mode is a type of SSL VPN that allows users to access a network without the need for VPN software or a Java applet on the client device. In this mode, users can connect to the network using only a web browser, eliminating the need for additional software installations. This provides a convenient and streamlined approach to VPN access, as users can securely connect to the network from any device with a web browser, without the need for specific VPN client software.

    Rate this question:

  • 7. 

    22. How would a network security professional mitigate a DoS attack?

    • Implement a strong password policy.

    • Deploy antisniffer software.

    • Include a firewall and IPS in the network security design.

    • Design the network by using the principle of minimum trust.

    Correct Answer
    A. Include a firewall and IPS in the network security design.
    Explanation
    A network security professional would mitigate a DoS (Denial of Service) attack by including a firewall and IPS (Intrusion Prevention System) in the network security design. A firewall acts as a barrier between the internal network and external threats, filtering and blocking unauthorized access. An IPS monitors network traffic, detects and prevents malicious activities, including DoS attacks. By implementing these measures, the network security professional can effectively prevent and mitigate the impact of a DoS attack on the network.

    Rate this question:

  • 8. 

    2. With the Cisco AnyConnect VPN wizard, which two protocols can be used for tunnel group configuration? (Choose two.)

    • MPLS

    • SSH

    • PPTP

    • ESP

    • IPsec

    Correct Answer(s)
    A. SSH
    A. IPsec
    Explanation
    The Cisco AnyConnect VPN wizard allows the use of SSH and IPsec protocols for tunnel group configuration. SSH (Secure Shell) provides a secure remote login and command execution, making it suitable for secure access to network devices. IPsec (Internet Protocol Security) is a suite of protocols that provide secure communication over IP networks, ensuring confidentiality, integrity, and authentication of data. These protocols are commonly used in VPN configurations to establish secure connections between remote users and the network.

    Rate this question:

  • 9. 

    27. What will be disabled as a result of the no service password-recovery command?

    • Aaa new-model global configuration command

    • Changes to the configuration register

    • Ability to access ROMMON

    • Password encryption service

    Correct Answer
    A. Ability to access ROMMON
    Explanation
    The "no service password-recovery" command disables the ability to access ROMMON. ROMMON (ROM Monitor) is a low-level software that runs on Cisco devices, allowing users to recover passwords or perform other troubleshooting tasks. By disabling this command, users will no longer be able to access ROMMON, limiting their ability to recover passwords or perform any other actions that require ROMMON access.

    Rate this question:

  • 10. 

    48. Which security feature would be commonly implemented as part of a large enterprise wireless policy but would not typically be used in a small office/home office network?

    • Not broadcasting the SSID

    • Using WPA2

    • Not allowing personal wireless devices

    • Using an authentication server

    Correct Answer
    A. Using an authentication server
    Explanation
    Using an authentication server would be commonly implemented as part of a large enterprise wireless policy but would not typically be used in a small office/home office network. An authentication server is used to centrally manage and control user access to the wireless network, providing a higher level of security and control. In a large enterprise, where there are multiple users and devices accessing the network, it is important to have a centralized authentication mechanism. However, in a small office/home office network, where the number of users and devices is limited, using an authentication server may not be necessary or cost-effective.

    Rate this question:

  • 11. 

    39. Which security policy component would contain procedures for handling an issue where someone followed a network administrator into the server room without the administrator noticing and the person removed some storage drives?

    • Information preservation policy

    • Security policy

    • Operations and maintenance document

    • Security initiation document

    Correct Answer
    A. Security policy
    Explanation
    The correct answer is security policy. A security policy is a document that outlines the guidelines and procedures for ensuring the security of an organization's assets, including physical security. It would contain procedures for handling security incidents such as unauthorized access to the server room and the removal of storage drives. This policy would help establish protocols for preventing and responding to such incidents to protect sensitive information and maintain the integrity of the network.

    Rate this question:

  • 12. 

    49. Which two commands are needed on every IPv6 ACL to allow IPv6 neighbor discovery? (Choose two.)

    • Permit ipv6 any any fragments

    • Permit icmp any any nd-ns

    • Permit icmp any any echo-reply

    • Permit icmp any any nd-na

    • Permit tcp any any ack

    • Permit ipv6 any any routing

    Correct Answer(s)
    A. Permit icmp any any nd-ns
    A. Permit icmp any any nd-na
    Explanation
    The correct answer is "permit icmp any any nd-ns" and "permit icmp any any nd-na". These two commands allow ICMP Neighbor Discovery Neighbor Solicitation (nd-ns) and Neighbor Advertisement (nd-na) messages to pass through the IPv6 ACL. Neighbor Discovery is an essential protocol in IPv6 that allows devices to discover and communicate with other devices on the same network. By permitting these ICMP messages, the ACL ensures that neighbor discovery functions properly in the IPv6 network.

    Rate this question:

  • 13. 

    13. What is the main difference between the implementation of IDS and IPS devices?

    • An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses profile-based technology.

    • An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.

    • An IDS can negatively impact the packet flow, whereas an IPS can not.

    • An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall.

    Correct Answer
    A. An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.
    Explanation
    The main difference between the implementation of IDS and IPS devices is that an IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately. This means that an IDS is more passive in nature, detecting and alerting about malicious activity but not taking immediate action to prevent it. On the other hand, an IPS actively blocks and prevents malicious traffic from entering the network, providing a higher level of security.

    Rate this question:

  • 14. 

    18. What is the best way to prevent a VLAN hopping attack?

    • Use ISL encapsulation on all trunk links.

    • Disable STP on all nontrunk ports.

    • Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

    • Use VLAN 1 as the native VLAN on trunk ports.

    Correct Answer
    A. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.
    Explanation
    The best way to prevent a VLAN hopping attack is to disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports. By doing this, the network administrator can ensure that only authorized devices can access the VLANs. Trunk negotiation should be disabled to prevent unauthorized devices from negotiating a trunk connection and gaining access to multiple VLANs. Statically setting nontrunk ports as access ports ensures that these ports can only access a single VLAN, further preventing unauthorized access.

    Rate this question:

  • 15. 

    55. Two devices that are connected to the same switch need to be totally isolated from one another. Which Cisco switch security feature will provide this isolation?

    • DTP

    • BPDU guard

    • PVLAN Edge

    • SPAN

    Correct Answer
    A. PVLAN Edge
    Explanation
    PVLAN Edge is a Cisco switch security feature that provides isolation between two devices connected to the same switch. PVLAN Edge allows the switch to treat each device as if it is connected to a separate switch, preventing communication between the two devices. This feature ensures that the devices are completely isolated from each other, enhancing network security and preventing unauthorized access or communication.

    Rate this question:

  • 16. 

    9. What is an advantage of using SSL VPNs compared to IPsec VPNs on an ASA?

    • SSL VPNs provide support for more applications.

    • SSL VPNs do not require any pre-installed client software.

    • SSL VPNs provide superior authentication.

    • SSL VPNs provide stronger encryption as a remote-access solution.

    Correct Answer
    A. SSL VPNs do not require any pre-installed client software.
    Explanation
    SSL VPNs do not require any pre-installed client software, which is an advantage compared to IPsec VPNs on an ASA. This means that users can access the VPN without having to install any additional software on their devices, making it more convenient and user-friendly. It also reduces the complexity and potential compatibility issues that may arise from requiring client software installations.

    Rate this question:

  • 17. 

    17. What is a difference between ASA IPv4 ACLs and IOS IPv4 ACLs?

    • ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the wildcard mask.

    • ASA ACLs do not have an implicit deny all at the end, whereas IOS ACLs do.

    • ASA ACLs use forward and drop ACEs, whereas IOS ACLs use permit and deny ACEs.

    • Multiple ASA ACLs can be applied on an interface in the ingress direction, whereas only one IOS ACL can be applied.

    • ASA ACLs are always named, whereas IOS ACLs can be named or numbered.

    Correct Answer
    A. ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the wildcard mask.
    Explanation
    ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the wildcard mask. Subnet masks are used to determine the network portion of an IP address, while wildcard masks are used to specify which bits in the IP address should be matched. This means that ASA ACLs are more specific in defining the network, as they require an exact match of the subnet mask. On the other hand, IOS ACLs provide more flexibility by allowing the use of wildcard masks, which can match multiple subnets or ranges of IP addresses.

    Rate this question:

  • 18. 

    19. Why have corporations been shifting remote access security policies to include support for ASA SSL VPNs?

    • To have stronger encryption options

    • To support secure access for users on a multitude of devices

    • To have stronger authentication options

    • To provide stronger overall security

    Correct Answer
    A. To support secure access for users on a multitude of devices
    Explanation
    Corporations have been shifting remote access security policies to include support for ASA SSL VPNs in order to support secure access for users on a multitude of devices. This is because ASA SSL VPNs provide a secure and encrypted connection for users accessing the corporate network remotely, regardless of the device they are using. By implementing ASA SSL VPNs, corporations can ensure that employees can securely access company resources from various devices, such as laptops, smartphones, and tablets, without compromising the security of the network.

    Rate this question:

  • 19. 

    24. Which algorithm is used to automatically generate a shared secret for two systems to use in establishing an IPsec VPN?

    • DES

    • DH

    • 3DES

    • ESP

    • AH

    • SSL

    Correct Answer
    A. DH
    Explanation
    DH (Diffie-Hellman) algorithm is used to automatically generate a shared secret for two systems to use in establishing an IPsec VPN. DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard), ESP (Encapsulating Security Payload), AH (Authentication Header), and SSL (Secure Sockets Layer) are all encryption protocols or algorithms, but they are not specifically used for generating shared secrets in IPsec VPNs.

    Rate this question:

  • 20. 

    32. Which STP port type is permitted to forward traffic, but is not the port closest to the root bridge?

    • Root port

    • Designated port

    • Backup port

    • Alternate port

    Correct Answer
    A. Designated port
    Explanation
    A designated port is a port on a non-root bridge that is selected to forward traffic towards the root bridge. While the root port is the port on a non-root bridge that is closest to the root bridge and is responsible for forwarding traffic towards it, the designated port is also permitted to forward traffic but may not be the closest port to the root bridge. Therefore, the designated port is the correct answer.

    Rate this question:

  • 21. 

    6. When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

    • Apply the ACL to the vty lines without the in or out option required when applying ACLs to interfaces.

    • The ACL is applied to the Telnet port with the ip access-group command.

    • The ACL must be applied to each vty line individually.

    • The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

    Correct Answer
    A. The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
    Explanation
    The most effective way to use ACLs to control Telnet traffic that is destined to the router itself is to apply the ACL to all vty lines in the in direction. This prevents unwanted users from connecting to an unsecured port and ensures that only authorized users can access the router through Telnet. Applying the ACL to the vty lines without the in or out option, as mentioned in the first option, is incorrect because it does not specify the direction of traffic. Applying the ACL to the Telnet port with the ip access-group command, as mentioned in the second option, is also incorrect because the ACL needs to be applied to the vty lines, not the specific port. Applying the ACL to each vty line individually, as mentioned in the third option, is not necessary because applying it to all vty lines in the in direction achieves the desired control.

    Rate this question:

  • 22. 

    14. What information must an IPS track in order to detect attacks matching a composite signature?

    • The state of packets related to the attack

    • The total number of packets in the attack

    • The network bandwidth consumed by all packets

    • The attacking period used by the attacker

    Correct Answer
    A. The state of packets related to the attack
    Explanation
    An Intrusion Prevention System (IPS) must track the state of packets related to the attack in order to detect attacks matching a composite signature. By monitoring the state of packets, the IPS can analyze the behavior and characteristics of the attack. This includes tracking the sequence of packets, their source and destination, payload content, and any anomalies or patterns that indicate a potential attack. By understanding the state of packets, the IPS can effectively detect and prevent attacks that match a composite signature.

    Rate this question:

  • 23. 

    Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message?

    • This is a notification message for a normal but significant condition.

    • This is an alert message for which immediate action is needed.

    • This is an error message that indicates the system is unusable.

    • This is an error message for which warning conditions exist.

    Correct Answer
    A. This is a notification message for a normal but significant condition.
    Explanation
    The message in the syslog server indicates a normal but significant condition. It is not an alert message that requires immediate action, nor is it an error message indicating that the system is unusable. Additionally, there is no mention of warning conditions. Therefore, the correct answer is that this is a notification message for a normal but significant condition.

    Rate this question:

  • 24. 

    15. What method is used to authenticate SNMPv2 messages between the manager and the agent?

    • RSA keys

    • Trusted keys

    • Encrypted passwords

    • Community strings

    Correct Answer
    A. Community strings
    Explanation
    Community strings are used to authenticate SNMPv2 messages between the manager and the agent. SNMP (Simple Network Management Protocol) is a widely used protocol for managing and monitoring network devices. The community string acts as a password or shared secret between the manager and the agent. When a manager sends a request to an agent, it includes the community string. The agent checks if the received community string matches the one configured on its side. If there is a match, the agent accepts the request and responds accordingly. This helps ensure that only authorized managers can access and control the SNMP agent.

    Rate this question:

  • 25. 

    47. Why does a worm pose a greater threat than a virus poses?

    • Worms are not detected by antivirus programs.

    • Worms run within a host program.

    • Worms are more network-based than viruses are.

    • Worms directly attack the network devices.

    Correct Answer
    A. Worms are more network-based than viruses are.
    Explanation
    Worms are more network-based than viruses because they are designed to spread quickly across computer networks, infecting multiple devices and systems. Unlike viruses, which typically require user interaction or the execution of a program to spread, worms can self-replicate and spread automatically without any user intervention. This makes worms a greater threat as they can rapidly infect a large number of devices and cause widespread damage to network infrastructure.

    Rate this question:

  • 26. 

    64. Fill in the blank.In a syslog implementation, a router that generates and forwards syslog messages is known as a syslog ______

    Correct Answer
    clients
    Explanation
    In a syslog implementation, a router that generates and forwards syslog messages is known as a syslog client.

    Rate this question:

  • 27. 

    Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?

    • R1# crypto isakmp key ciscopass address 209.165.200.226 R2# crypto isakmp key secure address 209.165.200.227

    • R1# crypto isakmp key ciscopass address 209.165.200.227 R2# crypto isakmp key ciscopass address 209.165.200.226

    • R1# crypto isakmp key ciscopass hostname R1 R2# crypto isakmp key ciscopass hostname R2

    • R1# crypto isakmp key ciscopass address 209.165.200.226 R2# crypto isakmp key ciscopass address 209.165.200.227

    Correct Answer
    A. R1# crypto isakmp key ciscopass address 209.165.200.227 R2# crypto isakmp key ciscopass address 209.165.200.226
    Explanation
    The correct answer is the pair of commands:

    R1# crypto isakmp key ciscopass address 209.165.200.227
    R2# crypto isakmp key ciscopass address 209.165.200.226

    This is because the "crypto isakmp key" command is used to configure a pre-shared key (PSK) for IPsec VPN authentication. In this case, the PSK is "ciscopass". The first command configures the PSK on R1 with the IP address of R2 (209.165.200.227), and the second command configures the PSK on R2 with the IP address of R1 (209.165.200.226). This ensures that both routers have the correct PSK configured for authentication when establishing an IPsec VPN tunnel.

    Rate this question:

  • 28. 

    59. Which security organization updates the training material that helps prepare for the Global Information Assurance Certification (GIAC)?

    • WARP

    • Phoenix Labs

    • SANS

    • Global Trust Center

    Correct Answer
    A. SANS
    Explanation
    SANS is the correct answer because it is a well-known security organization that regularly updates training material for the Global Information Assurance Certification (GIAC). SANS offers a wide range of cybersecurity courses and certifications, and their training material is highly regarded in the industry. They provide up-to-date information and resources to help individuals prepare for the GIAC certification, ensuring that they have the necessary knowledge and skills to excel in the field of information security.

    Rate this question:

  • 29. 

    75. In a corporate network where SAN is deployed, what happens if the SAN fabric is compromised?

    • Data is compromised.

    • Server CPUs become overloaded.

    • Configurations can be changed or lost.

    • End devices become infected.

    Correct Answer
    A. Data is compromised.
    Explanation
    If the SAN fabric in a corporate network is compromised, it means that unauthorized individuals or entities have gained access to the storage area network. This can lead to the compromise of sensitive data stored within the SAN. The attackers may be able to access, modify, or steal the data, potentially causing significant damage to the organization. Therefore, the correct answer is that data is compromised.

    Rate this question:

  • 30. 

    Refer to the exhibit. Which interface configuration completes the classic firewall configuration on the firewall?

    • FW(config)# interface g0/1 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE out

    • FW(config)# interface g0/1 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE in

    • FW(config)# interface g0/0 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE in

    • W(config)# interface g0/0 FW(config-if)# ip inspect INSIDE in FW(config-if)# ip access-group OUTBOUND in

    Correct Answer
    A. FW(config)# interface g0/1 FW(config-if)# ip inspect OUTBOUND in FW(config-if)# ip access-group INSIDE in
    Explanation
    The correct answer is FW(config)# interface g0/1. This completes the classic firewall configuration by configuring the interface g0/1 with the "ip inspect OUTBOUND in" command to enable outbound traffic inspection and the "ip access-group INSIDE in" command to apply the access group INSIDE to inbound traffic on the interface. This ensures that outbound traffic is inspected and inbound traffic is filtered according to the rules defined in the access group.

    Rate this question:

  • 31. 

    16. Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

    • A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.

    • Both stateful and packet-filtering firewalls can filter at the application layer.

    • A packet-filtering firewall uses session layer information to track the state of a connection, whereas a stateful firewall uses application layer information to track the state of a connection.

    • A stateful firewall can filter application layer information, whereas a packet-filtering firewall cannot filter beyond the network layer.

    Correct Answer
    A. A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.
    Explanation
    Packet-filtering firewalls typically operate at the network layer of the OSI model, allowing them to filter based on IP addresses, ports, and protocols. They can examine individual packets and make decisions based on this information. On the other hand, stateful firewalls operate at a higher layer, typically the session layer. They can keep track of the state of connections and make decisions based on the context of the entire session. This allows stateful firewalls to have more advanced filtering capabilities compared to packet-filtering firewalls.

    Rate this question:

  • 32. 

    25. What type of security key is generated by the local user software when a user is connecting to a Cisco ASA through a remote-access SSL VPN?

    • Asymmetric key

    • Digitally signed private key

    • Shared-secret key

    • Digitally signed public key

    Correct Answer
    A. Shared-secret key
    Explanation
    When a user is connecting to a Cisco ASA through a remote-access SSL VPN, the local user software generates a shared-secret key. This key is used for authentication and encryption purposes between the user's device and the Cisco ASA. It is called a shared-secret key because it is shared between the user's software and the ASA, allowing them to establish a secure connection.

    Rate this question:

  • 33. 

    35. What is the basic method used by 3DES to encrypt plaintext?

    • The data is divided into three blocks of equal length for encryption.

    • The data is encrypted using a key length that is three times longer than the key used for DES.

    • The data is encrypted three times with three different keys.

    • The data is encrypted, decrypted, and encrypted using three different keys.

    Correct Answer
    A. The data is encrypted, decrypted, and encrypted using three different keys.
    Explanation
    3DES, also known as Triple Data Encryption Standard, uses the method of encrypting the data, then decrypting it, and finally encrypting it again using three different keys. This process provides a higher level of security compared to regular DES encryption. By applying multiple rounds of encryption and decryption, 3DES enhances the confidentiality and integrity of the data being transmitted or stored.

    Rate this question:

  • 34. 

    74. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C

    • A – DMZ, B – Inside, C – Outside

    • A – DMZ, B – Outside, C – Inside

    • A – Inside, B – DMZ, C – Outside

    • A – Outside, B – Inside, C – DMZ

    Correct Answer
    A. A – DMZ, B – Outside, C – Inside
    Explanation
    In this scenario, Zone A is the DMZ (Demilitarized Zone), which typically contains servers or services that are accessible from the internet but separated from the internal network. Zone B is the Outside, which refers to the internet or any external network. Zone C is the Inside, which represents the internal network of an organization. By denying traffic originating from Zone A to Zone C and from Zone B to Zone C, the administrator is ensuring that communication between the DMZ and the Inside network is restricted, providing an additional layer of security.

    Rate this question:

  • 35. 

    79. A user complains about not being able to gain access to the network. What command would be used by the network administrator to determine which AAA method list is being used for this particular user as the user logs on?

    • Debug aaa accounting

    • Debug aaa authorization

    • Debug aaa authentication

    • Debug aaa protocol

    Correct Answer
    A. Debug aaa authentication
    Explanation
    The correct answer is "debug aaa authentication". This command would be used by the network administrator to determine which AAA method list is being used for this particular user as they log on. By enabling the "debug aaa authentication" command, the administrator can view the authentication process in real-time, including the AAA method list being used for the user. This can help in troubleshooting and identifying any issues with the authentication process that may be preventing the user from gaining access to the network.

    Rate this question:

  • 36. 

    40. What question is answered by the risk analysis component of security policy development?

    • What is the cost versus benefit analysis of implementing various security technologies?

    • What are the reliable, well-understood, and recommended security practices that similar organizations currently employ?

    • What are the current procedures for incident response, monitoring, maintenance, and auditing of the system for compliance?

    • What are the most likely types of threats given the purpose of the organization?

    Correct Answer
    A. What is the cost versus benefit analysis of implementing various security technologies?
    Explanation
    The risk analysis component of security policy development answers the question of what is the cost versus benefit analysis of implementing various security technologies. This component evaluates the potential risks and threats faced by the organization and assesses the effectiveness and cost-effectiveness of different security technologies in mitigating those risks. It helps in determining the appropriate allocation of resources and investment in security measures based on the potential benefits and costs associated with each technology.

    Rate this question:

  • 37. 

    61. Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still unable to ping the inside interface from an inside host. What is the cause of this problem?

    • An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.

    • The no shutdown command should be entered on interface Ethernet 0/1.

    • The security level of the inside interface should be 0 and the outside interface should be 100.

    • VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.

    • VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.

    Correct Answer
    A. The no shutdown command should be entered on interface Ethernet 0/1.
    Explanation
    The cause of the problem is that the "no shutdown" command should be entered on interface Ethernet 0/1. This command is used to enable the interface and bring it up. Without this command, the interface will remain in a shutdown state and will not be able to receive or send any traffic. By entering the "no shutdown" command on interface Ethernet 0/1, the interface will be activated and the inside host will be able to ping the inside interface of the ASA 5505.

    Rate this question:

  • 38. 

    78. What is an example of toll fraud?

    • The use of a telephony system to send unsolicited and unwanted bulk messages

    • The use of a telephony system to make unauthorized long distance calls

    • The use of a telephony system to get information, such as account details, directly from users

    • The use of a telephony system to illegally intercept voice packets in order to listen in on a call

    Correct Answer
    A. The use of a telephony system to make unauthorized long distance calls
    Explanation
    An example of toll fraud is the use of a telephony system to make unauthorized long distance calls. This refers to the act of using someone else's telephony system without permission to make long distance calls, resulting in the unauthorized use of resources and costs for the owner of the system.

    Rate this question:

  • 39. 

    29. What is one benefit of implementing a secure email service by using the Cisco Email Security Appliance (ESA)?

    • ESA provides isolation between processes.

    • It obtains real-time updates from the Cisco SIO.

    • It uses the network infrastructure to enforce security policy compliance.

    • It combines advanced threat defense and secure mobility for email.

    Correct Answer
    A. It obtains real-time updates from the Cisco SIO.
    Explanation
    By implementing a secure email service using the Cisco Email Security Appliance (ESA), one benefit is that it obtains real-time updates from the Cisco SIO. This means that the ESA can stay up to date with the latest information and intelligence about potential threats and vulnerabilities. This allows the ESA to effectively protect against new and emerging threats, ensuring that the email service remains secure and protected.

    Rate this question:

  • 40. 

    38. What are three goals of a port scan attack? (Choose three.)

    • To identify peripheral configurations

    • To determine potential vulnerabilities

    • To disable used ports and services

    • To identify operating systems

    • To identify active services

    Correct Answer(s)
    A. To determine potential vulnerabilities
    A. To identify operating systems
    A. To identify active services
    Explanation
    A port scan attack aims to achieve three goals. First, it is used to determine potential vulnerabilities in a system by identifying open ports that could be exploited. Second, it helps in identifying the operating system running on the target system, which can provide valuable information for further attacks. Lastly, a port scan is used to identify active services running on the target system, which can help an attacker understand the network infrastructure and potential entry points.

    Rate this question:

  • 41. 

    46. In deploying an IPS in a corporate network, system operators first create a profile of normal network operation by monitoring network activities in normal network uses. After the profile is incorporated into the IPS triggering mechanism, alarms will be generated when the IPS detects excessive activity that is beyond the scope of the profile. Which signature detection mechanism is deployed?

    • Pattern-based detection

    • Policy-based detection

    • Honey pot-based detection

    • Anomaly-based detection

    Correct Answer
    A. Anomaly-based detection
    Explanation
    In this scenario, the correct answer is anomaly-based detection. Anomaly-based detection involves creating a profile of normal network behavior by monitoring network activities during typical network usage. This profile is then used by the IPS triggering mechanism to identify any excessive activity that deviates from the normal pattern. When such activity is detected, alarms are generated to alert the system operators. This approach is effective in identifying unknown or new types of attacks that may not have a specific signature or pattern associated with them.

    Rate this question:

  • 42. 

    50. A network technician has been asked to design a virtual private network between two branch routers. Which type of cryptographic key should be used in this scenario?

    • Asymmetric key

    • Hash key

    • Symmetric key

    • Digital signature

    Correct Answer
    A. Symmetric key
    Explanation
    In this scenario, a symmetric key should be used to design a virtual private network between two branch routers. A symmetric key is a single shared key that is used for both encryption and decryption of data. Since the two routers are within the same network, using a symmetric key will provide a more efficient and faster encryption process compared to asymmetric keys. Asymmetric keys involve a pair of keys, one for encryption and another for decryption, which can be more complex and resource-intensive. Therefore, a symmetric key is the most suitable choice for this scenario.

    Rate this question:

  • 43. 

    57. Which security feature helps protect a VoIP system from SPIT attacks?

    • AES

    • BPDU guard

    • WPA2

    • Authenticated TLS

    Correct Answer
    A. Authenticated TLS
    Explanation
    Authenticated TLS helps protect a VoIP system from SPIT (Spam over Internet Telephony) attacks. SPIT attacks involve the flooding of unwanted and unsolicited messages or calls in a VoIP system. Authenticated TLS (Transport Layer Security) ensures secure communication by encrypting data and providing authentication between the parties involved. This prevents unauthorized access, tampering, and eavesdropping, thereby safeguarding the VoIP system from SPIT attacks.

    Rate this question:

  • 44. 

    70. What is one way to prevent attackers from eavesdropping on VoIP conversations?

    • Use Forced Authorization Codes.

    • Implement separate voice VLANs.

    • Configure IP phones to use only signed firmware files.

    • Create ACLs to allow only VoIP protocols.

    Correct Answer
    A. Implement separate voice VLANs.
    Explanation
    Implementing separate voice VLANs is one way to prevent attackers from eavesdropping on VoIP conversations. By separating voice traffic from other network traffic, voice VLANs ensure that only authorized devices have access to the VoIP conversations. This helps to protect the confidentiality and integrity of the conversations by preventing unauthorized users from intercepting the traffic.

    Rate this question:

  • 45. 

    73. What command must be issued to enable login enhancements on a Cisco router?

    • Privilege exec level

    • Banner motd

    • Login delay

    • Login block-for

    Correct Answer
    A. Login block-for
    Explanation
    The command "login block-for" must be issued to enable login enhancements on a Cisco router. This command is used to configure a login block timer, which prevents further login attempts for a specified period after a certain number of failed attempts. By using this command, the router can enhance security by blocking repeated login attempts and protecting against brute force attacks.

    Rate this question:

  • 46. 

    37. Which two security features can cause a switch port to become error-disabled? (Choose two.)

    • Storm control with the trap option

    • PortFast with BPDU guard enabled

    • Port security with the shutdown violation mode

    • Root guard

    • Protected ports

    Correct Answer(s)
    A. PortFast with BPDU guard enabled
    A. Port security with the shutdown violation mode
    Explanation
    PortFast with BPDU guard enabled can cause a switch port to become error-disabled because it detects the presence of a BPDU (Bridge Protocol Data Unit) on a PortFast enabled port, which indicates the connection of a switch or bridge. This is a security feature that prevents loops in the network.

    Port security with the shutdown violation mode can also cause a switch port to become error-disabled. This feature is used to restrict the number of MAC addresses allowed on a port and if a violation occurs (e.g., when a new MAC address is detected), the port will be shut down to prevent unauthorized access.

    Rate this question:

  • 47. 

    71. A large company deploys several network-based IPS sensors for its headquarters network. Which network service configuration will help the process of correlating attack events happening simultaneously in different points of the network?

    • Multiple DNS servers with fault tolerance

    • Distributed DHCP servers

    • A syslog server for each IPS sensor

    • A centralized NTP server

    Correct Answer
    A. A centralized NTP server
    Explanation
    A centralized NTP (Network Time Protocol) server will help the process of correlating attack events happening simultaneously in different points of the network. NTP ensures that all devices on the network have synchronized and accurate time, which is crucial for accurately correlating events. By having a centralized NTP server, all IPS sensors will be able to reference the same time source, allowing for better correlation and analysis of attack events.

    Rate this question:

  • 48. 

    77. Logging into a computer as the administrator just to surf the web is a violation of which security technique?

    • Process isolation

    • Utilizing a reference monitor

    • Access control to resources

    • Least privilege

    Correct Answer
    A. Least privilege
    Explanation
    Logging into a computer as the administrator just to surf the web is a violation of the security technique known as "least privilege." Least privilege principle states that users should only be given the minimum level of access necessary to perform their tasks. By logging in as the administrator, the user has access to all the privileges and resources on the computer, which is unnecessary and increases the risk of unauthorized access or malicious activities. This violates the principle of least privilege.

    Rate this question:

  • 49. 

    3. What are two disadvantages of using network IPS? (Choose two.)

    • Network IPS is operating system-dependent and must be customized for each platform.

    • Network IPS is incapable of examining encrypted traffic.

    • Network IPS is unable to provide a clear indication of the extent to which the network is being attacked.

    • Network IPS sensors are difficult to deploy when new networks are added.

    • Network IPS has a difficult time reconstructing fragmented traffic to determine if an attack was successful.

    Correct Answer(s)
    A. Network IPS is incapable of examining encrypted traffic.
    A. Network IPS has a difficult time reconstructing fragmented traffic to determine if an attack was successful.
    Explanation
    An explanation for the given correct answer is that network IPS is unable to examine encrypted traffic, which means that it cannot detect and prevent attacks that are hidden within encrypted data. Additionally, network IPS may have a difficult time reconstructing fragmented traffic, making it challenging to determine if an attack was successful or not. These two disadvantages highlight limitations in the effectiveness of network IPS in certain situations.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 08, 2015
    Quiz Created by
    Pepsisnus
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.