CCNA WAN Chapter 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rodney.butler
R
Rodney.butler
Community Contributor
Quizzes Created: 21 | Total Attempts: 27,779
Questions: 22 | Attempts: 270

SettingsSettingsSettings
CCNA WAN Chapter 4 - Quiz

CCNA WAN Chapter 4: Network Security


Questions and Answers
  • 1. 

    What is the best defense for protecting a network from phishing exploits?

    • A.

      Schedule antivirus scans.

    • B.

      Schedule antispyware scans .

    • C.

      Schedule training for all users.

    • D.

      Schedule operating systems updates.

    Correct Answer
    C. Schedule training for all users.
    Explanation
    Training for all users is the best defense for protecting a network from phishing exploits. Phishing attacks often target individuals by tricking them into providing sensitive information or clicking on malicious links. By providing training to all users, they can learn how to identify and avoid phishing attempts, reducing the risk of falling victim to these attacks. Antivirus scans, antispyware scans, and operating system updates are important for overall network security, but they may not specifically address the human element of phishing attacks.

    Rate this question:

  • 2. 

    What are three characteristics of a good security policy? (Choose three.)

    • A.

      It defines acceptable and unacceptable use of network resources.

    • B.

      It communicates consensus and defines roles.

    • C.

      It is developed by end users.

    • D.

      It is developed after all security devices have been fully tested.

    • E.

      It defines how to handle security incidents.

    Correct Answer(s)
    A. It defines acceptable and unacceptable use of network resources.
    B. It communicates consensus and defines roles.
    E. It defines how to handle security incidents.
    Explanation
    A good security policy should define the acceptable and unacceptable use of network resources to ensure that users are aware of the rules and guidelines they must follow. It should also communicate consensus and define roles to establish a clear understanding of responsibilities and expectations. Additionally, it should define how to handle security incidents to ensure a proper response and mitigation plan is in place.

    Rate this question:

  • 3. 

    The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the file name c2600-d-mz.121-4? (Choose two.)

    • A.

      The "mz" in the file name represents the special capabilities and features of the IOS.

    • B.

      The file is uncompressed and requires 2.6 MB of RAM to run.

    • C.

      The software is version 12.1, 4th revision.

    • D.

      The file is downloadable and 121.4MB in size.

    • E.

      The IOS is for the Cisco 2600 series hardware platform.

    Correct Answer(s)
    C. The software is version 12.1, 4th revision.
    E. The IOS is for the Cisco 2600 series hardware platform.
    Explanation
    The file name "c2600-d-mz.121-4" indicates that the software is version 12.1, 4th revision. Additionally, the "c2600" in the file name suggests that the IOS is for the Cisco 2600 series hardware platform.

    Rate this question:

  • 4. 

    Refer to the exhibit. What is accomplished when both commands are configured on the router?

    • A.

      The commands filter UDP and TCP traffic coming to the router.

    • B.

      The commands disable any TCP or UDP request sent by the routing protocols.

    • C.

      The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.

    • D.

      The commands disable the BOOTP and TFTP server services to prevent security vulnerabilities.

    Correct Answer
    C. The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.
    Explanation
    The given commands disable the services such as echo, discard, and chargen on the router. These services are known to have security vulnerabilities, so by disabling them, the router is protected from potential attacks or exploits.

    Rate this question:

  • 5. 

    Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)

    • A.

      Verify the name of the TFTP server using the show hosts command.

    • B.

      Verify that the TFTP server is running using the tftpdnld command.

    • C.

      Verify that the checksum for the image is valid using the show version command.

    • D.

      Verify connectivity between the router and TFTP server using the ping command.

    • E.

      Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

    Correct Answer(s)
    D. Verify connectivity between the router and TFTP server using the ping command.
    E. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.
    Explanation
    Before attempting to upgrade a Cisco IOS image using a TFTP server, the network administrator should verify two conditions. Firstly, they should verify the connectivity between the router and TFTP server using the ping command. This ensures that the router can successfully communicate with the TFTP server. Secondly, they should verify that there is enough flash memory for the new Cisco IOS image using the show flash command. This ensures that the router has sufficient storage space to accommodate the new image.

    Rate this question:

  • 6. 

    Which two statements regarding preventing network attacks are true? (Choose two.)

    • A.

      The default security settings for modern server and PC operating systems can be trusted to have secure default security settings.

    • B.

      Intrusion prevention systems can log suspicious network activity, but there is no way to counter an attack in progress without user intervention.

    • C.

      Physical security threat mitigation consists of controlling access to device console ports, labeling critical cable runs, installing UPS systems, and providing climate control.

    • D.

      Phishing attacks are best prevented by firewall devices.

    • E.

      Changing default usernames and passwords and disabling or uninstalling unnecessary services are aspects of device hardening.

    Correct Answer(s)
    C. pHysical security threat mitigation consists of controlling access to device console ports, labeling critical cable runs, installing UPS systems, and providing climate control.
    E. Changing default usernames and passwords and disabling or uninstalling unnecessary services are aspects of device hardening.
  • 7. 

    An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?

    • A.

      DoS

    • B.

      DDoS

    • C.

      Virus

    • D.

      Access

    • E.

      Reconnaissance

    Correct Answer
    C. Virus
    Explanation
    The IT director is trying to protect users from virus attacks. Opening email messages from suspicious sources can often lead to the introduction of malicious viruses into a system. These viruses can cause harm to the user's computer, steal sensitive information, or disrupt the normal functioning of the system. By reminding users to avoid opening such emails, the IT director is taking preventive measures to mitigate the risk of virus attacks.

    Rate this question:

  • 8. 

    Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?

    • A.

      Reconnaissance

    • B.

      Access

    • C.

      DoS

    • D.

      Worm

    • E.

      Trojan horse

    Correct Answer
    C. DoS
    Explanation
    The correct answer is DoS. In this scenario, the system logs indicate that the server is receiving a high level of fake requests for service, causing it to operate slowly. This is characteristic of a Denial of Service (DoS) attack, where the attacker overwhelms the server with a flood of requests, making it inaccessible to legitimate users.

    Rate this question:

  • 9. 

    Refer to the exhibit. What is the purpose of the "ip ospf message-digest-key 1 md5 cisco" statement in the configuration?

    • A.

      To specify a key that is used to authenticate routing updates

    • B.

      To save bandwidth by compressing the traffic

    • C.

      To enable SSH encryption of traffic

    • D.

      To create an IP sec tunnel

    Correct Answer
    A. To specify a key that is used to authenticate routing updates
    Explanation
    The "ip ospf message-digest-key 1 md5 cisco" statement in the configuration is used to specify a key that is used to authenticate routing updates. This key is used to verify the authenticity of OSPF messages exchanged between routers in the network. By using this key, routers can ensure that the routing updates they receive are from trusted sources and have not been tampered with. This helps to maintain the integrity and security of the OSPF routing protocol.

    Rate this question:

  • 10. 

    Which two statements define the security risk when DNS services are enabled on the network?(Choose two.)

    • A.

      By default, name queries are sent to the broadcast address 255.255.255.255.

    • B.

      DNS name queries require the ip directed-broadcast command to be enabled on the Ethernet interfaces of all routers.

    • C.

      Using the global configuration command ip name-server on one router enables the DNS services on all routers in the network.

    • D.

      The basic DNS protocol does not provide authentication or integrity assurance.

    • E.

      The router configuration does not provide an option to set up main and backup DNS servers.

    Correct Answer(s)
    A. By default, name queries are sent to the broadcast address 255.255.255.255.
    D. The basic DNS protocol does not provide authentication or integrity assurance.
    Explanation
    The first statement explains that when DNS services are enabled on the network, name queries are sent to the broadcast address 255.255.255.255 by default. This can be a security risk as it allows anyone on the network to intercept and respond to these queries, potentially leading to DNS spoofing attacks.

    The second statement highlights another security risk, stating that the basic DNS protocol does not provide authentication or integrity assurance. This means that there is no built-in mechanism to verify the authenticity or integrity of DNS responses, making it susceptible to DNS cache poisoning and other types of attacks.

    Rate this question:

  • 11. 

    Which two statements are true about network attacks? (Choose two.)

    • A.

      Strong network passwords mitigate most DoS attacks.

    • B.

      Worms require human interaction to spread, viruses do not.

    • C.

      Reconnaissance attacks are always electronic in nature, such as ping sweeps or port scans.

    • D.

      A brute-force attack searches to try every possible password from a combination of characters.

    • E.

      Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.

    Correct Answer(s)
    D. A brute-force attack searches to try every possible password from a combination of characters.
    E. Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.
    Explanation
    The first true statement is that a brute-force attack searches to try every possible password from a combination of characters. This type of attack is time-consuming but can eventually crack a password by systematically trying all possible combinations.

    The second true statement is that devices in the DMZ (Demilitarized Zone) should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection. The DMZ is a network segment that separates the internal network from the external network, and it is important to have security measures in place to protect the internal network from potential attacks originating from the DMZ.

    Rate this question:

  • 12. 

    Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem?

    • A.

      The privilege level of the user is not configured correctly.

    • B.

      The authentication method is not configured correctly.

    • C.

      The HTTP server is not configured correctly.

    • D.

      The HTTP timeout policy is not configured correctly.

    Correct Answer
    A. The privilege level of the user is not configured correctly.
    Explanation
    The problem could be that the privilege level of the user is not configured correctly. This means that the user does not have the necessary privileges to access and configure the router using SDM.

    Rate this question:

  • 13. 

    Refer to the exhibit. The network administrator is trying to back up the Cisco IOS router software and receives the output shown. What are two possible reasons for this output? (Choose two.)

    • A.

      The Cisco IOS file has an invalid checksum.

    • B.

      The TFTP client on the router is corrupt.

    • C.

      The router cannot connect to the TFTP server.

    • D.

      The TFTP server software has not been started.

    • E.

      There is not enough room on the TFTP server for the software.

    Correct Answer(s)
    C. The router cannot connect to the TFTP server.
    D. The TFTP server software has not been started.
    Explanation
    The output suggests that there are two possible reasons for the issue. First, the router cannot connect to the TFTP server, which means there could be a network connectivity problem between the router and the server. Second, the TFTP server software has not been started, indicating that the server may not be running or properly configured to receive the backup request from the router.

    Rate this question:

  • 14. 

    Which two statements are true regarding network security? (Choose two.)

    • A.

      Securing a network against internal threats is a lower priority because company employees represent a low security risk.

    • B.

      Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.

    • C.

      Assuming a company locates its web server outside the firewall and has adequate backups of the web server, no further security measures are needed to protect the web server because no harm can come from it being hacked.

    • D.

      Established network operating systems like UNIX and network protocols like TCP/IP can be used with their default settings because they have no inherent security weaknesses.

    • E.

      Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.

    Correct Answer(s)
    B. Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.
    E. Protecting network devices from pHysical damage caused by water or electricity is a necessary part of the security policy.
    Explanation
    The statement "Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security" is true because both skilled hackers and inexperienced individuals can exploit vulnerabilities in a network to gain unauthorized access or cause damage. The statement "Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy" is also true because physical damage can disrupt network operations and compromise security.

    Rate this question:

  • 15. 

    The password recovery process begins in which operating mode and using what type of connection? (Choose two.)

    • A.

      ROM monitor

    • B.

      Boot ROM

    • C.

      Cisco IOS

    • D.

      Direct connection through the console port

    • E.

      Network connection through the serial port

    Correct Answer(s)
    A. ROM monitor
    D. Direct connection through the console port
    Explanation
    The password recovery process begins in the ROM monitor mode and requires a direct connection through the console port. The ROM monitor mode is a separate operating mode that allows access to the router's bootstrap program. By connecting directly through the console port, the user can access the ROM monitor mode and initiate the password recovery process. This mode allows the user to bypass the normal startup sequence and gain access to the router's configuration files and settings.

    Rate this question:

  • 16. 

    Which two objectives must a security policy accomplish? (Choose two.)

    • A.

      Provide a checklist for the installation of secure servers

    • B.

      Describe how the firewall must be configured

    • C.

      Document the resources to be protected

    • D.

      Identify the security objectives of the organization

    • E.

      Identify the specific tasks involved in hardening a router

    Correct Answer(s)
    C. Document the resources to be protected
    D. Identify the security objectives of the organization
    Explanation
    A security policy must document the resources that need to be protected in order to establish a baseline for security measures and ensure that appropriate safeguards are in place. Additionally, identifying the security objectives of the organization is important as it helps in defining the overall goals and priorities for security measures and allows for the development of strategies and tactics to achieve those objectives.

    Rate this question:

  • 17. 

    Which statement is true about Cisco Security Device Manager (SDM)?

    • A.

      SDM can run only on Cisco 7000 series routers.

    • B.

      SDM can be run from router memory or from a PC.

    • C.

      SDM should be used for complex router configurations.

    • D.

      SDM is supported by every version of the Cisco IOS software.

    Correct Answer
    B. SDM can be run from router memory or from a PC.
    Explanation
    SDM can be run from router memory or from a PC, meaning it offers flexibility in terms of where it can be accessed and used. It allows users to manage and configure Cisco routers either directly from the router itself or from a PC connected to the network. This allows for ease of use and accessibility, as users can choose the method that is most convenient for them.

    Rate this question:

  • 18. 

    Which step is required to recover a lost enable password for a router?

    • A.

      Set the configuration register to bypass the startup configuration.

    • B.

      Copy the running configuration to the startup configuration.

    • C.

      Reload the IOS from a TFTP server from ROMMON.

    • D.

      Reconfigure the router using setup mode.

    Correct Answer
    A. Set the configuration register to bypass the startup configuration.
    Explanation
    To recover a lost enable password for a router, the configuration register needs to be set to bypass the startup configuration. This allows the router to boot up without loading the saved configuration, effectively bypassing the password requirement. By doing this, the administrator can gain access to the router and then reset the enable password to regain control. This step is necessary because copying the running configuration to the startup configuration, reloading the IOS from a TFTP server, or reconfiguring the router using setup mode will not directly address the issue of a lost enable password.

    Rate this question:

  • 19. 

    Refer to the exhibit. Security Device Manager (SDM) is installed on router R1. What is the result of opening a web browser on PC1 and entering the URL https://192.168.10.1?

    • A.

      The password is sent in plain text.

    • B.

      A Telnet session is established with R1.

    • C.

      The SDM page of R1 appears with a dialog box that requests a username and password.

    • D.

      The R1 home page is displayed and allows the user to download Cisco IOS images and configuration files.

    Correct Answer
    C. The SDM page of R1 appears with a dialog box that requests a username and password.
    Explanation
    Entering the URL https://192.168.10.1 will open the SDM page of router R1. This page will display a dialog box that requests a username and password, indicating that authentication is required to access the SDM.

    Rate this question:

  • 20. 

    Intrusion detection occurs at which stage of the Security Wheel?

    • A.

      Securing

    • B.

      Monitoring

    • C.

      Testing

    • D.

      Improvement

    • E.

      Reconnaissance

    Correct Answer
    B. Monitoring
    Explanation
    Intrusion detection occurs at the monitoring stage of the Security Wheel. This is because monitoring involves actively observing and analyzing network traffic, system logs, and other security events to identify any suspicious or unauthorized activities. Intrusion detection systems (IDS) are specifically designed to detect and alert on potential intrusions or security breaches. By monitoring network and system activities, organizations can quickly identify and respond to potential threats, minimizing the impact of security incidents.

    Rate this question:

  • 21. 

    Refer to the exhibit. Security Device Manager (SDM) has been used to configure a required level of security on the router. What would be accomplished when the SDM applies the next step on the security problems that are identified on the router?

    • A.

      SDM will automatically invoke the AutoSecure command.

    • B.

      SDM will generate a report that will outline the proper configuration actions to alleviate the security issues.

    • C.

      SDM will create a configuration file that can be copy and pasted into the router to reconfigure the services.

    • D.

      SDM will reconfigure the services that are marked in the exhibit as “fix it” to apply the suggested security changes.

    Correct Answer
    D. SDM will reconfigure the services that are marked in the exhibit as “fix it” to apply the suggested security changes.
    Explanation
    When the SDM applies the next step on the security problems identified on the router, it will reconfigure the services that are marked as "fix it" in the exhibit. This means that the SDM will make the necessary changes to the router's services in order to apply the suggested security changes. This ensures that the router's security is improved and any vulnerabilities are addressed.

    Rate this question:

  • 22. 

    What are two benefits of using Cisco AutoSecure? (Choose two.)

    • A.

      It gives the administrator detailed control over which services are enabled or disabled.

    • B.

      It offers the ability to instantly disable non-essential system processes and services.

    • C.

      It automatically configures the router to work with SDM.

    • D.

      It ensures the greatest compatibility with other devices in your network.

    • E.

      It allows the administrator to configure security policies without having to understand all of the Cisco IOS software features.

    Correct Answer(s)
    B. It offers the ability to instantly disable non-essential system processes and services.
    E. It allows the administrator to configure security policies without having to understand all of the Cisco IOS software features.
    Explanation
    Cisco AutoSecure offers the ability to instantly disable non-essential system processes and services, which helps in improving the security of the network by reducing the attack surface. It also allows the administrator to configure security policies without having to understand all of the Cisco IOS software features, making it easier for non-experts to implement effective security measures.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 20, 2010
    Quiz Created by
    Rodney.butler
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.