Could You Pass This Basic CCNA Security Exam?

11 Questions | Total Attempts: 232

SettingsSettingsSettings
CCNA Security Quizzes & Trivia

This quiz follows the IINS 640-553 exam curriculum from Cisco. It also tries to explain the answers so it can be used as an additional learning tool. DO NOT SCRAMBLE THE ANSWERS ORDER, otherwise, the explanations will not make sense. So, let's try out this quiz. All the best!


Questions and Answers
  • 1. 
    What actions of a hacker can affect data integrity?
    • A. 

      Flood the network with pings

    • B. 

      Use somebody else's credentials

    • C. 

      Decrypt data

    • D. 

      Intercepting and altering an electronic transaction.

  • 2. 
    What are some roles of a Custodian in regard to data protection? (choose two)
    • A. 

      Accesses data following the company's policy

    • B. 

      Creates backups and verifies the integrity of the backups

    • C. 

      Reviews procedures and policies for protecting data

    • D. 

      Initially determines the classification for data

    • E. 

      Follows the policies to maintain data

  • 3. 
    According to Cisco, what type of control is properly screening potential employees?
    • A. 

      Administrative

    • B. 

      Physical

    • C. 

      Audit

    • D. 

      Technical

  • 4. 
    What does a Deterrent control do?
    • A. 

      Attempts to prevent access to data

    • B. 

      Attempts to influence the attacker not to launch an attack

    • C. 

      Detects when data has been accessed

    • D. 

      Detects when data has been modified

  • 5. 
    What type of attacker uses his skills on data networks for unethical purposes only?
    • A. 

      Script kiddy

    • B. 

      White hat hacker

    • C. 

      Black hat hacker

    • D. 

      Gray hat hacker

    • E. 

      Phreaker

  • 6. 
    What category of attack is launched using legitimate credentials?
    • A. 

      Passive

    • B. 

      Active

    • C. 

      Close-in

    • D. 

      Insider

    • E. 

      Distribution

  • 7. 
    What pair of actions can prevent a Distribution class attack?
    • A. 

      Encryption / Applications with integrated security

    • B. 

      Firewall at the network edge / HIPS

    • C. 

      Protecting against unauthorized physical access / Authentication

    • D. 

      Protecting against unauthorized physical access / Video monitoring systems

    • E. 

      Secured software distribution system / Real-time software integrity checking

  • 8. 
    What security solution concept has multiple layers of protection to provide redundancy and is recommended by Cisco?
    • A. 

      Intrusion Detection System

    • B. 

      Intrusion Prevention System

    • C. 

      Distributed Layer Protection

    • D. 

      Public Key Infrastructure

    • E. 

      Defense in Depth

  • 9. 
    What type of spoofing is placed from the same subnet as the victim?
    • A. 

      IP Spoofing

    • B. 

      Nonblind Spoofing

    • C. 

      Blind Spoofing

    • D. 

      SYN Spoofing

  • 10. 
    How can a network be protected from IP spoofing attacks? (choose three)
    • A. 

      Use of access control lists (ACL)

    • B. 

      Strong password policy

    • C. 

      Encrypt traffic

    • D. 

      Cryptografic authentication

    • E. 

      Open only needed ports

  • 11. 
    Which of the following is NOT considered an integrity attack?
    • A. 

      Salami attack

    • B. 

      Data diddling

    • C. 

      ICMP attack

    • D. 

      Password attack (through trojan horses, brute force attacks etc)

    • E. 

      Hijacking a TCP session