CCNA Security Quizzes & Trivia
Top Trending
Questions: 17 | Attempts: 764 | Last updated: Nov 2, 2020
Questions: 50 | Attempts: 945 | Last updated: Nov 24, 2020
Questions: 81 | Attempts: 439 | Last updated: Jul 20, 2020
Questions: 17 | Attempts: 379 | Last updated: Jan 16, 2013
Questions: 8 | Attempts: 209 | Last updated: Jan 4, 2019
Welcome to a helpful quiz on the opening chapter of your studies regarding network security, as part of your work towards the Cisco Certified Network Associate. Do you think you have all of the information memorised from the...
Questions: 17 | Attempts: 764 | Last updated: Nov 2, 2020
-
Sample Question1 Which statement describes phone freaking?
.
Questions: 50 | Attempts: 945 | Last updated: Nov 24, 2020
-
Sample QuestionWhich VPN component ensures that data cannot be read while in transit?Select one:
It’s quite possibly the most important thing you could know about when studying the topic of networking – security is vital for any network that’s passing information and data from one location to another, to...
Questions: 81 | Attempts: 439 | Last updated: Jul 20, 2020
-
Sample Question1. Which statement is true about the One-Step lockdown feature of the CCP Security Audit wizard?
I love u
Questions: 17 | Attempts: 379 | Last updated: Jan 16, 2013
-
Sample QuestionAn administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?
These days, there is nothing more important in the entire field of networking than security, and as such you need to be immensely aware of all the security protocols needed to be undertaken when working in the field. Do you know...
Questions: 8 | Attempts: 209 | Last updated: Jan 4, 2019
-
Sample QuestionWhich Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?
Advertisement
Advertisement

CCNA Security Questions & Answers
What do you understand by the term phone freaking?
Take note that phreaking used to be popular back in the 90s but with all of the new advancements that are made, what used to be effective in the past are not too useful now. C is an example of phone phreaking. It makes use of a tone that will make th
What is the accurately describes Cisco IOS zone-based policy firewall operation?
The pass action works in only one direction.
What is true if a network administrator needs to configure port security on a switch?
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.Follow these gui
What are the two characteristics of DoS attacks?
More
They attempt to compromise the availability of a network, host, or application. Examples include smurf attacks and ping of death attacks.
This quiz follows the IINS 640-553 exam curriculum from Cisco. It also tries to explain the answers so it can be used as an additional learning tool. DO NOT SCRAMBLE THE ANSWERS ORDER, otherwise, the explanations will...
Questions: 11 | Attempts: 209 | Last updated: Jan 8, 2019
-
Sample QuestionWhat actions of a hacker can affect data integrity?
CCNA Security for certification practice. Take this quiz and learn more about ​CCNA routing and switching.
Questions: 118 | Attempts: 154 | Last updated: May 8, 2017
-
Sample QuestionWhat are the three primary goals of network security?
CCNA Routing & Switching courses and prepares you for Cisco Security certification, Let's begin this quiz now!
Questions: 77 | Attempts: 68 | Last updated: May 8, 2017
-
Sample QuestionWhat will be disabled as a result of the no service password-recovery command?