CCNA Security Chapter 11 Exam v2

CCNA Security Chapter 11 Exam Answer v2 Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets? vulnerability scanning network scanning integrity checkers penetration testing How does network scanning help assess operations security? It can simulate attacks from malicious sources. It can log abnormal activity. It can..
Read More..

 

CCNA Security Chapter 10 Exam v2

CCNA Security Chapter 10 Exam Answer v2 Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application? The administrator can connect to and manage a single ASA. The administrator can connect to and manage multiple ASA devices. The administrator can..
Read More..

 

CCNA Security Chapter 9 Exam v2

CCNA Security Chapter 9 Exam Answer v2 Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for..
Read More..

 

CCNA Security Chapter 8 Exam v2

CCNA Security Chapter 8 Exam Answer v2 Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router? It will be sent unencrypted. It will be sent encrypted. It will be blocked. It will be discarded. What three protocols must be permitted through the..
Read More..

 

CCNA Security Chapter 7 Exam v2

CCNA Security Chapter 7 Exam Answer v2 What is the focus of cryptanalysis? hiding secret codes developing secret codes breaking encrypted codes implementing encrypted codes How many bits does the Data Encryption Standard (DES) use for data encryption? 40 bits 56 bits 64 bits 72 bits Which statement describes the Software-Optimized Encryption Algorithm (SEAL)? SEAL..
Read More..

 

CCNA Security Chapter 6 Exam v2

CCNA Security Chapter 6 Exam Answer v2 Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? The connection between S1 and PC1 is via a crossover cable…
Read More..

 

CCNA Security Chapter 5 Exam v2

What information must an IPS track in order to detect attacks matching a composite signature? the total number of packets in the attack the attacking period used by the attacker the network bandwidth consumed by all packets the state of packets related to the attack What is a disadvantage of a pattern-based detection mechanism? The..
Read More..

 

CCNA Security Chapter 4 Exam v2

CCNA Security Chapter 4 Exam Answer v2 Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet? The initial packet is dropped, but subsequent packets are..
Read More..

 

CCNA Security Chapter 3 Exam v2

CCNA Security Chapter 3 Exam v2 Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this? accounting accessibility auditing authorization authentication Why is authentication with AAA preferred over a local database method? It provides a fallback authentication method if the administrator forgets the username or password…
Read More..

 

CCNA Security Chapter 2 Exam v2

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) Enable inbound vty SSH sessions. Generate two-way pre-shared keys. Configure DNS on the router. Configure the IP domain name on..
Read More..

 

CCNA Security Chapter 1 Exam v2

CCNA Security Chapter 1 Exam v2 What method can be used to mitigate ping sweeps? using encrypted or hashed authentication protocols installing antivirus software on hosts deploying antisniffer software on all network devices blocking ICMP echo and echo-replies at the network edge What are the three major components of a worm attack? (Choose three.) a..
Read More..