CCNA WAN Chapter 4

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rodney.butler
R
Rodney.butler
Community Contributor
Quizzes Created: 21 | Total Attempts: 29,074
| Attempts: 273 | Questions: 22
Please wait...
Question 1 / 22
0 %
0/100
Score 0/100
1. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?

Explanation

The correct answer is DoS. In this scenario, the system logs indicate that the server is receiving a high level of fake requests for service, causing it to operate slowly. This is characteristic of a Denial of Service (DoS) attack, where the attacker overwhelms the server with a flood of requests, making it inaccessible to legitimate users.

Submit
Please wait...
About This Quiz
CCNA WAN Chapter 4 - Quiz

The 'CCNA WAN Chapter 4' quiz assesses knowledge on network security, focusing on phishing defense, security policies, Cisco IOS, and router configurations. It prepares learners for CCNA certification,... see moreenhancing skills in identifying security vulnerabilities and upgrading network systems. see less

2.
Refer to the exhibit. What is the purpose of the "ip ospf message-digest-key 1 md5 cisco" statement in the configuration?

Explanation

The "ip ospf message-digest-key 1 md5 cisco" statement in the configuration is used to specify a key that is used to authenticate routing updates. This key is used to verify the authenticity of OSPF messages exchanged between routers in the network. By using this key, routers can ensure that the routing updates they receive are from trusted sources and have not been tampered with. This helps to maintain the integrity and security of the OSPF routing protocol.

Submit
3. Which two statements are true regarding network security? (Choose two.)

Explanation

The statement "Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security" is true because both skilled hackers and inexperienced individuals can exploit vulnerabilities in a network to gain unauthorized access or cause damage. The statement "Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy" is also true because physical damage can disrupt network operations and compromise security.

Submit
4.
Refer to the exhibit. Security Device Manager (SDM) is installed on router R1. What is the result of opening a web browser on PC1 and entering the URL https://192.168.10.1?

Explanation

Entering the URL https://192.168.10.1 will open the SDM page of router R1. This page will display a dialog box that requests a username and password, indicating that authentication is required to access the SDM.

Submit
5. Intrusion detection occurs at which stage of the Security Wheel?

Explanation

Intrusion detection occurs at the monitoring stage of the Security Wheel. This is because monitoring involves actively observing and analyzing network traffic, system logs, and other security events to identify any suspicious or unauthorized activities. Intrusion detection systems (IDS) are specifically designed to detect and alert on potential intrusions or security breaches. By monitoring network and system activities, organizations can quickly identify and respond to potential threats, minimizing the impact of security incidents.

Submit
6. An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?

Explanation

The IT director is trying to protect users from virus attacks. Opening email messages from suspicious sources can often lead to the introduction of malicious viruses into a system. These viruses can cause harm to the user's computer, steal sensitive information, or disrupt the normal functioning of the system. By reminding users to avoid opening such emails, the IT director is taking preventive measures to mitigate the risk of virus attacks.

Submit
7. What is the best defense for protecting a network from phishing exploits?

Explanation

Training for all users is the best defense for protecting a network from phishing exploits. Phishing attacks often target individuals by tricking them into providing sensitive information or clicking on malicious links. By providing training to all users, they can learn how to identify and avoid phishing attempts, reducing the risk of falling victim to these attacks. Antivirus scans, antispyware scans, and operating system updates are important for overall network security, but they may not specifically address the human element of phishing attacks.

Submit
8. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the file name c2600-d-mz.121-4? (Choose two.)

Explanation

The file name "c2600-d-mz.121-4" indicates that the software is version 12.1, 4th revision. Additionally, the "c2600" in the file name suggests that the IOS is for the Cisco 2600 series hardware platform.

Submit
9. Which two statements regarding preventing network attacks are true? (Choose two.)

Explanation

not-available-via-ai

Submit
10.
Refer to the exhibit. Security Device Manager (SDM) has been used to configure a required level of security on the router. What would be accomplished when the SDM applies the next step on the security problems that are identified on the router?

Explanation

When the SDM applies the next step on the security problems identified on the router, it will reconfigure the services that are marked as "fix it" in the exhibit. This means that the SDM will make the necessary changes to the router's services in order to apply the suggested security changes. This ensures that the router's security is improved and any vulnerabilities are addressed.

Submit
11. Which step is required to recover a lost enable password for a router?

Explanation

To recover a lost enable password for a router, the configuration register needs to be set to bypass the startup configuration. This allows the router to boot up without loading the saved configuration, effectively bypassing the password requirement. By doing this, the administrator can gain access to the router and then reset the enable password to regain control. This step is necessary because copying the running configuration to the startup configuration, reloading the IOS from a TFTP server, or reconfiguring the router using setup mode will not directly address the issue of a lost enable password.

Submit
12. Which two objectives must a security policy accomplish? (Choose two.)

Explanation

A security policy must document the resources that need to be protected in order to establish a baseline for security measures and ensure that appropriate safeguards are in place. Additionally, identifying the security objectives of the organization is important as it helps in defining the overall goals and priorities for security measures and allows for the development of strategies and tactics to achieve those objectives.

Submit
13. Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)

Explanation

Before attempting to upgrade a Cisco IOS image using a TFTP server, the network administrator should verify two conditions. Firstly, they should verify the connectivity between the router and TFTP server using the ping command. This ensures that the router can successfully communicate with the TFTP server. Secondly, they should verify that there is enough flash memory for the new Cisco IOS image using the show flash command. This ensures that the router has sufficient storage space to accommodate the new image.

Submit
14. Which statement is true about Cisco Security Device Manager (SDM)?

Explanation

SDM can be run from router memory or from a PC, meaning it offers flexibility in terms of where it can be accessed and used. It allows users to manage and configure Cisco routers either directly from the router itself or from a PC connected to the network. This allows for ease of use and accessibility, as users can choose the method that is most convenient for them.

Submit
15.
Refer to the exhibit. What is accomplished when both commands are configured on the router?

Explanation

The given commands disable the services such as echo, discard, and chargen on the router. These services are known to have security vulnerabilities, so by disabling them, the router is protected from potential attacks or exploits.

Submit
16.
Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem?

Explanation

The problem could be that the privilege level of the user is not configured correctly. This means that the user does not have the necessary privileges to access and configure the router using SDM.

Submit
17. Which two statements are true about network attacks? (Choose two.)

Explanation

The first true statement is that a brute-force attack searches to try every possible password from a combination of characters. This type of attack is time-consuming but can eventually crack a password by systematically trying all possible combinations.

The second true statement is that devices in the DMZ (Demilitarized Zone) should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection. The DMZ is a network segment that separates the internal network from the external network, and it is important to have security measures in place to protect the internal network from potential attacks originating from the DMZ.

Submit
18. What are three characteristics of a good security policy? (Choose three.)

Explanation

A good security policy should define the acceptable and unacceptable use of network resources to ensure that users are aware of the rules and guidelines they must follow. It should also communicate consensus and define roles to establish a clear understanding of responsibilities and expectations. Additionally, it should define how to handle security incidents to ensure a proper response and mitigation plan is in place.

Submit
19. Which two statements define the security risk when DNS services are enabled on the network?(Choose two.)

Explanation

The first statement explains that when DNS services are enabled on the network, name queries are sent to the broadcast address 255.255.255.255 by default. This can be a security risk as it allows anyone on the network to intercept and respond to these queries, potentially leading to DNS spoofing attacks.

The second statement highlights another security risk, stating that the basic DNS protocol does not provide authentication or integrity assurance. This means that there is no built-in mechanism to verify the authenticity or integrity of DNS responses, making it susceptible to DNS cache poisoning and other types of attacks.

Submit
20. The password recovery process begins in which operating mode and using what type of connection? (Choose two.)

Explanation

The password recovery process begins in the ROM monitor mode and requires a direct connection through the console port. The ROM monitor mode is a separate operating mode that allows access to the router's bootstrap program. By connecting directly through the console port, the user can access the ROM monitor mode and initiate the password recovery process. This mode allows the user to bypass the normal startup sequence and gain access to the router's configuration files and settings.

Submit
21.
Refer to the exhibit. The network administrator is trying to back up the Cisco IOS router software and receives the output shown. What are two possible reasons for this output? (Choose two.)

Explanation

The output suggests that there are two possible reasons for the issue. First, the router cannot connect to the TFTP server, which means there could be a network connectivity problem between the router and the server. Second, the TFTP server software has not been started, indicating that the server may not be running or properly configured to receive the backup request from the router.

Submit
22. What are two benefits of using Cisco AutoSecure? (Choose two.)

Explanation

Cisco AutoSecure offers the ability to instantly disable non-essential system processes and services, which helps in improving the security of the network by reducing the attack surface. It also allows the administrator to configure security policies without having to understand all of the Cisco IOS software features, making it easier for non-experts to implement effective security measures.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 20, 2010
    Quiz Created by
    Rodney.butler
Cancel
  • All
    All (22)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Users are unable to access a company server. The system logs show that...
Refer to the exhibit. What is the purpose of the "ip ospf...
Which two statements are true regarding network security? (Choose...
Refer to the exhibit. Security Device Manager (SDM) is installed on...
Intrusion detection occurs at which stage of the Security Wheel?
An IT director has begun a campaign to remind users to avoid opening...
What is the best defense for protecting a network from phishing...
The Cisco IOS image naming convention allows identification of...
Which two statements regarding preventing network attacks are true?...
Refer to the exhibit. Security Device Manager (SDM) has been used to...
Which step is required to recover a lost enable password for a router?
Which two objectives must a security policy accomplish? (Choose two.)
Which two conditions should the network administrator verify before...
Which statement is true about Cisco Security Device Manager (SDM)?
Refer to the exhibit. What is accomplished when both commands are...
Refer to the exhibit. A network administrator is trying to configure a...
Which two statements are true about network attacks? (Choose two.)
What are three characteristics of a good security policy? (Choose...
Which two statements define the security risk when DNS services are...
The password recovery process begins in which operating mode and using...
Refer to the exhibit. The network administrator is trying to back up...
What are two benefits of using Cisco AutoSecure? (Choose two.)
Alert!

Advertisement