CCNA Security Quizzes & Trivia

Top Trending

Welcome to a helpful quiz on the opening chapter of your studies regarding network security, as part of your work towards the Cisco Certified Network Associate. Do you think you have all of the information memorised from the...

Questions: 17  |  Attempts: 764   |  Last updated: Nov 2, 2020
  • Sample Question
    1 Which statement describes phone freaking?


Questions: 50  |  Attempts: 945   |  Last updated: Nov 24, 2020
  • Sample Question
    Which VPN component ensures that data cannot be read while in transit?Select one:

It’s quite possibly the most important thing you could know about when studying the topic of networking – security is vital for any network that’s passing information and data from one location to another, to...

Questions: 81  |  Attempts: 439   |  Last updated: Jul 20, 2020
  • Sample Question
    1. Which statement is true about the One-Step lockdown feature of the CCP Security Audit wizard?

I love u

Questions: 17  |  Attempts: 379   |  Last updated: Jan 16, 2013
  • Sample Question
    An administrator needs to create a user account with custom access to most privileged EXEC commands. Which privilege command is used to create this custom account?

These days, there is nothing more important in the entire field of networking than security, and as such you need to be immensely aware of all the security protocols needed to be undertaken when working in the field. Do you know...

Questions: 8  |  Attempts: 209   |  Last updated: Jan 4, 2019
  • Sample Question
    Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?


CCNA Security Questions & Answers

What do you understand by the term phone freaking?
Take note that phreaking used to be popular back in the 90s but with all of the new advancements that are made, what used to be effective in the past are not too useful now. C is an example of phone phreaking. It makes use of a tone that will make th
What is true if a network administrator needs to configure port security on a switch?
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.Follow these gui
What are the two characteristics of DoS attacks?
They attempt to compromise the availability of a network, host, or application. Examples include smurf attacks and ping of death attacks.
More More CCNA security Questions