Ccna Sec 1.1
Ccna Sec 1.1
When logging is enabled for an ACL entry, how does the router switch
packets filtered by the ACL?
topology-based switching
autonomous switching
process switching
optimum switching
2. Which statement is true about the One-Step lockdown feature of the CCP
Security Audit wizard?
Refer to the exhibit. The administrator can ping the S0/0/1 interface of
RouterB but is unable to gain Telnet access to the router using the password
cisco123. What is a possible cause of the problem?
5.
Refer to the exhibit. An administrator has entered the commands that are
shown on router R1. At what trap level is the logging function set?
2
3
5
6
IPsec
symmetric
asymmetric
shared secret
10. Which three statements describe the IPsec protocol framework? (Choose
three.)
AH uses IP protocol 51.
AH provides encryption and integrity.
AH provides integrity and authentication.
ESP uses UDP protocol 50.
ESP requires both authentication and encryption.
ESP provides encryption, authentication, and integrity.
11.
13. Which two configuration requirements are needed for remote access
VPNs using Cisco Easy VPN Server, but are not required for site-to-site
VPNs? (Choose two.)
14. What can be used as a VPN gateway when setting up a site-to-site VPN?
15. Which type of Layer 2 attack makes a host appear as the root bridge for a
LAN?
LAN storm
MAC address spoofing
MAC address table overflow
STP manipulation
VLAN attack
16.
Refer to the exhibit. An administrator has configured a standard ACL on R1
and applied it to interface serial 0/0/0 in the outbound direction. What
happens to traffic leaving interface serial 0/0/0 that does not match the
configured ACL statements?
17. The use of 3DES within the IPsec framework is an example of which of
the five IPsec building blocks?
authentication
confidentiality
Diffie-Hellman
integrity
nonrepudiation
18.
Refer to the exhibit. Which two statements are correct regarding the
configuration on switch S1? (Choose two.)
Port Fa0/5 storm control for broadcasts will be activated if traffic exceeds
80.1 percent of the total bandwidth.
Port Fa0/6 storm control for multicasts and broadcasts will be activated if
traffic exceeds 2,000,000 packets per second.
Port Fa0/6 storm control for multicasts will be activated if traffic exceeds
2,000,000 packets per second.
Port Fa0/5 storm control for multicasts will be activated if traffic exceeds
80.1 percent of the total bandwidth.
Port Fa0/5 storm control for broadcasts and multicasts will be activated if
traffic exceeds 80.1 percent of 2,000,000 packets per second.
20. A network technician is configuring SNMPv3 and has set a security level
of auth. What is the effect of this setting?
23. Which three statements describe limitations in using privilege levels for
assigning command authorization? (Choose three.)
24. Which set of Cisco IOS commands instructs the IPS to compile a
signature category named ios_ips into memory and use it to scan traffic?
25.
Refer to the exhibit. Which three things occur if a user attempts to log in four
times within 10 seconds using an incorrect password? (Choose three.)
Subsequent virtual login attempts from the user are blocked for 60
seconds.
During the quiet mode, an administrator can virtually log in from any host
on network 172.16.1.0/24.
Subsequent console login attempts are blocked for 60 seconds.
A message is generated indicating the username and source IP address of
the user.
During the quiet mode, an administrator can log in from host 172.16.1.2.
No user can log in virtually from any host for 60 seconds.
27. What are three characteristics of the ASA routed mode? (Choose three.)
This mode does not support VPNs, QoS, or DHCP Relay. (Original)
The interfaces of the ASA separate Layer 3 networks and require different IP
addresses in different subnets. (Corrected by Elfnet & Joker!)
It is the traditional firewall deployment mode.
NAT can be implemented between connected networks. (Corrected by Elfnet &
Joker!)
This mode is referred to as a “bump in the wire.” (Original)
In this mode, the ASA is invisible to an attacker.
Active Directory
Kerberos (Original)
Certificate Authority
RADIUS (Corrected by Joker! & Andy)
TACACS+
29. Which access list statement permits HTTP traffic that is sourced from
host 10.1.129.100 port 4300 and destined to host 192.168.30.10?
Refer to the exhibit. What conclusion can be drawn from the exhibited
window when it is displayed on a remote user computer screen?
32. Which type of IPS signature detection is used to distract and confuse
attackers?
pattern-based detection
anomaly-based detection
policy-based detection
honey pot-based detection
33.
34. Which attack allows the attacker to see all frames on a broadcast network
by causing a switch to flood all incoming traffic?
35.
Refer to the exhibit. The indicated window has appeared in the web browser
of a remote user. What is the cause of this message?
rule-based
profile-based
signature-based
NetFlow anomaly-based
protocol analysis-based
41. What occurs after RSA keys are generated on a Cisco router to prepare for
secure device management?
All vty ports are automatically configured for SSH to provide secure
management.
The general-purpose key size must be specified for authentication with the
crypto key generate rsa general-keys moduluscommand.
The keys must be zeroized to reset secure shell before configuring other
parameters.
The generated keys can be used by SSH.
42.
43.
44. What is a result of securing the Cisco IOS image using the Cisco IOS
Resilient Configuration feature?
The Cisco IOS image file is not visible in the output of the show flash
command.
The Cisco IOS image is encrypted and then automatically backed up to a
TFTP server.
The Cisco IOS image is encrypted and then automatically backed up to the
NVRAM.
When the router boots up, the Cisco IOS image is loaded from a secured FTP
location.
45. Which two commands are needed on every IPv6 ACL to allow IPv6
neighbor discovery? (Choose two.)
46. Which technology does CCP require for configuring remote access VPN
support with the Easy VPN Server wizard?
AutoSecure
Role-Based CLI Access
AAA
port forwarding
47. What are three goals of a port scan attack? (Choose three.)
49. Which type of VPN may require the Cisco VPN Client software?
Refer to the exhibit. What information can be obtained from the AAA
configuration statements?
52. What must be configured before any Role-Based CLI views can be
created?
53.
Refer to the exhibit. Based on the output from the show secure bootset
command on router R1, which three conclusions can be drawn regarding
Cisco IOS Resilience? (Choose three.)
A copy of the Cisco IOS image file has been made.
A copy of the router configuration file has been made.
The Cisco IOS image file is hidden and cannot be copied, modified, or
deleted.
The Cisco IOS image filename will be listed when the show flash command is
issued on R1.
The copy tftp flash command was issued on R1.
The secure boot-config command was issued on R1.
54. What are two disadvantages of using network IPS? (Choose two.)
After the wizard identifies the vulnerabilities, the CCP One-Step Lockdown
feature must be used to make all security-related configuration changes.
After the wizard identifies the vulnerabilities, it automatically makes all
security-related configuration changes.
The wizard autosenses the inside trusted and outside untrusted interfaces to
determine possible security problems that might exist. (Original Answer)
The wizard is based on the Cisco IOS AutoSecure feature. (Corrected by Elfnet
& Andy)
The wizard is enabled by using the Intrusion Prevention task.
56. Which three statements describe zone-based policy firewall rules that
govern interface behavior and the traffic moving between zone member
interfaces? (Choose three.)
An interface can be assigned to multiple security zones. (Original)
Interfaces can be assigned to a zone before the zone is created.
Pass, inspect, and drop options can only be applied between two
zones. (Corrected by Joker! & Andy)
If traffic is to flow between all interfaces in a router, each interface must be
a member of a zone.
Traffic is implicitly prevented from flowing by default among interfaces that
are members of the same zone.
To permit traffic to and from a zone member interface, a policy allowing or
inspecting traffic must be configured between that zone and any other
zone.
57.
Refer to the exhibit. Which option tab on the CCP screen is used to view the
Top Threats table and deploy signatures associated with those threats?
Create IPS
Edit IPS
Security Dashboard
IPS Sensor
IPS Migration
auditing
accounting
authorization
authentication
1. What are the basic phases of attack that can be used by a virus or worm in
sequential order?
They are difficult to conduct and are initiated only by very skilled attackers.
3. Users report to the helpdesk that icons usually seen on the menu bar are
randomly appearing on their computer screens. What could be a reason that
computers are displaying these random graphics?
buffer overflow
ping sweep
port redirection
trust exploitation
port scan
A program writes data beyond the allocated memory to enable the execution
of malicious code.
A Trojan Horse can be hard to detect because it closes when the application
that launched it closes.
containment phase
inoculation phase
quarantine phase
treatment phase
A ping sweep is a network scanning technique that indicates the live hosts
in a range of IP addresses.
10. Which type of security threat can be described as software that attaches
to another program to execute a specific unwanted function?
virus
worm
Denial of Service
port redirection
reconnaissance
trust exploitation
modification of system files and registry settings to ensure that the attack
code is running
13. What are the three major components of a worm attack? (Choose three.)
enabling vulnerability
infecting vulnerability
payload
penetration mechanism
probing mechanism
propagation mechanism
15. What are three goals of a port scan attack? (Choose three.)
brute-force attack
IP spoofing attack
virus scanning
data encryption
anti-spoofing technologies
19. Which phase of worm mitigation involves terminating the worm process,
removing modified files or system settings that the worm introduced, and
patching the vulnerability that the worm used to exploit the system?
containment
inoculation
quarantine
treatment
Buffer overflow attacks write data beyond the allocated buffer memory to
overwrite valid data or exploit systems to execute malicious code.
Port scanning attacks scan a range of TCP or UDP port numbers on a host to
detect listening services.
Trust exploitation attacks can use a laptop acting as a rogue access point to
capture and copy all network traffic in a public location on a wireless
hotspot.
Please take note this answer is not 100% correct. I only got 95.7% for this
CCNAS Chapter 1 Test. There might be mistake on the new questions. If you
think that you have better answer, please share with us. Thank you
NEW QUESTION SECTION
Which statement accurately characterizes the evolution of network security?
Internal threats can cause even greater damage than external threats.
Internet architects planned for network security from the beginning.
Early Internet users often engaged in activities that would harm other users.
Threats have become less sophisticated while the technical knowledge
needed by an attacker has grown.
The containment phase requires the use of incoming and outgoing ACLs on
routers and firewalls.
The containment phase tracks down and identifies the infected machines
within the contained areas.
The inoculation phase disconnects, blocks, or removes infected machines.
The inoculation phase patches uninfected systems with the appropriate
vendor patch for the vulnerability.
The quarantine phase terminates the worm process, removes modified files
or system settings, and patches the vulnerability the worm used to exploit
the system.
The treatment phase disinfects actively infected systems.
trust exploitation
buffer overflow
man in the middle
port redirection
What is considered a valid method of securing the control plane in the Cisco
NFP framework?
authorization of actions
DHCP snooping
dynamic ARP inspection
login and password policy
routing protocol authentication
role-based access control
[Updated by Xase]
access attack
reconnaissance attack
spoofing attack
port scanner
ping sweeper
packet sniffer
to provide a record of who accessed the device, what occurred, and when it
occurred
to allow users to control the flow of traffic that is managed by the route
processor of their network devices
availability
connectivity
confidentiality
disclosure
integrity
safety
asset management
communication and network management
risk assessment
security policy
How would limiting the type and number of input characters on a web page
help with network security?
It deters hacking.
It provides content filtering.
It protects from DoS attacks.
It prevents open ports from being used in an improper manner.
[Updated by Hello]
They are difficult to conduct and are initiated only by very skilled attackers.
They are commonly launched with a tool called L0phtCrack.
Examples include smurf attacks and ping of death attacks.
They attempt to compromise the availability of a network, host, or
application.
They always precede access attacks.
[Other Sources]
The containment phase requires the use of incoming and outgoing ACLs on
routers and firewalls.
The containment phase tracks down and identifies the infected machines
within the contained areas.
The quarantine phase terminates the worm process, removes modified files
or system settings, and patches the vulnerability the worm used to exploit
the system.
sending too much information to two or more interfaces of the same device,
thereby causing dropped packets
1. Refer to the exhibit. What two pieces of information can be gathered from
the generated message? (Choose two. )
This message is a level five notification message.
This message appeared because a minor error occurred requiring further
investigation.
This message appeared because a major error occurred requiring immediate
action.
This message indicates that service timestamps have been globally
enabled.
This message indicates that enhanced security was configured on the vty
ports.
3. Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One
router is configured as the NTP master, and the other is an NTP client.
Which two pieces of information can be obtained from the partial output of
the show ntp associations detail command on R2? (Choose two. )
Both routers are configured to use NTPv2.
Router R1 is the master, and R2 is the client.
Router R2 is the master, and R1 is the client.
The IP address of R1 is 192. 168. 1. 2.
The IP address of R2 is 192. 168. 1. 2.
4. What are two characteristics of the SDM Security Audit wizard? (Choose
two. )
It uses interactive dialogs and prompts to implement AAA.
It automatically enables Cisco IOS firewall and implements Cisco IOS IPS
security configurations to secure the router.
It displays a screen with Fix-it check boxes to let you choose which
potential security-related configuration changes to implement.
It requires users to first identify which router interfaces connect to the
inside network and which connect to the outside network.
It is initiated from CLI and executes a script in which the managment plane
functions and forwarding plane services are tested against known
vulnerabilities.
5. If AAA is already enabled, which three CLI steps are required to configure a
router with a specific view? (Choose three. )
assign a secret password to the view
assign commands to the view
assign users who can use the view
associate the view with the root view
create a superview using the parser view view-name command
create a view using the parser viewview-name command
10. Which three services on a router does Cisco SDM One-Step Lockdown
enable? (Choose three. )
SNMP
TCP intercepts
SSH access to the router
Cisco Discovery Protocol
password encryption service
firewall on all outside interfaces
15. Which service is enabled on a Cisco router by default that can reveal
significant information about the router and potentially make it more
vulnerable to attack?
HTTP
CDP
FTP
NTP
TFTP
16. Which two operations are required to implement Cisco SDM One-Step
Lockdown? (Choose two. )
Choose the One-Step Lockdown feature.
Apply the documented network policies.
Deliver the configuration changes to the router.
Compare the router configuration against recommended settings.
Select the Firewall and ACL task on the SDM Configuration screen.
17. Which statement matches the CLI commands to the SDM wizard that
performs similar configuration functions?
aaa configuration commands and the SDM Basic Firewall wizard
auto secure privileged EXEC command and the SDM One-Step Lockdown
wizard
class-maps, policy-maps, and service-policy configuration commands and
the SDM IPS wizard
setup privileged EXEC command and the SDM Security Audit wizard
18. Refer to the exhibit. What is the significance of secret 5 in the generated
output?
The ADMIN password is encrypted using DH group 5.
The ADMIN password is encrypted via the service password-encryption
command.
The ADMIN password is hashed using MD5.
The ADMIN password is hashed using SHA.
19. Which three commands are required to restore a primary bootset from a
secure archive on a router on which Cisco IOS resilience is enabled? (Choose
three. )
Restart the router in ROM monitor mode and display the secure bootset
Cisco IOS image name using the dir command.
Restart the router, enter privileged EXEC mode, and display the secure
bootset Cisco IOS image name using the show flash command.
Boot the secure bootset Cisco IOS image using the boot command with the
filename.
Copy the secure bootset Cisco IOS image to flash using the copy IOS-
backup-image flash command.
Restore the secure configuration file using the copy config-backup flash
command.
Restore the secure configuration file using the secure boot-config restore
filename command.
21. Refer to the exhibit. Which two statements describe the current SDM
logging setup? (Choose two. )
Buffered logging will be enabled on the router for Logging Level 7 messages.
Buffered logging will be enabled on the syslog server for Logging Level 7
messages.
All messages with a trap level of 4 and higher (less critical) will be logged.
All messages with a trap level of 4 and lower (more critical) will be logged.
The router interface IP address that is connected to the syslog server is 192.
168. 1. 3.
The syslog server IP address is 192. 168. 1. 3.
22. What are two characteristics of SNMP community strings? (Choose two. )
A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the
community strings in plaintext.
Commonly known community strings should be used when configuring
secure SNMP.
If the manager sends one of the correct read-only community strings, it can
get information and set information in an agent.
SNMP read-only community strings can be used to get information from
an SNMP-enabled device.
SNMP read-write community strings can be used to set information on an
SNMP-enabled device.
23. What is the minimum recommended modulus key length for keys
generated to use with SSH?
256
512
768
1024
2048
25. Refer to the exhibit. What two facts can be determined from the output?
(Choose two.)
The Cisco IOS image and configuration files have been properly secured.
ROMmon mode will be inaccessible upon entering the privileged EXEC
reload command.
The Cisco IOS Resilient Configuration feature is enabled.
The Cisco IOS Resilient Configuration feature has detected an image version
mismatch.
The Cisco IOS configuration files have been erased.
26. What are three requirements that must be met if an administrator wants
to maintain device configurations via secure in-band management? (Choose
three. )
network devices configured to accommodate SSH
a separate network segment connecting all management devices
at least one router acting as a terminal server
encryption of all remote access management traffic
connection to network devices through a production network or the
Internet
direct access to the console ports of all network devices
New Questions
Which two statements describe the initial deployed services of Cisco routers
and recommended security configuration changes? (Choose two.)
CDP is disabled by default and should be enabled on all interfaces, even when
the service is not required.
Configuration autoloading is disabled by default but should be enabled, even
when the service is not required.
ICMP mask reply is disabled by default but should be enabled on untrusted
interfaces.
ICMP unreachable notifications are enabled by default but should be
disabled on untrusted interfaces.
FTP is enabled by default and should be disabled.
TCP keepalives are disabled by default but should be enabled globally to
prevent certain DoS attacks.
Which command is used to verify the existence of a secure Cisco IOS image
file? (by Naji Alobaidi)
show version
dir
show flash
show secure bootset
Which three types of views are available when configuring the Role-Based
CLI Access feature? (Choose three.) (by Naji Alobaidi)
superuser view
root view
superview
CLI view
admin view
config view
[Update by Xase]
Why is the username name secret password command preferred over the
username name password password command?
It does not require the login local command to enable the local database for
authentication.
Which statement describes the operation of the CCP Security Audit wizard?
The wizard logs the effectiveness of network security measures for baseline
comparisons.
Which three services does CCP One-Step Lockdown enable? (Choose three.)
SNMP
TCP intercepts
password encryption
Please take note that this CCNA Security Chapter 2 answer is not 100%
correct. I got 97.9% for this CCNAS Chapter 2 test. So if you think you have
better answer, please share with us.
Thank You
Refer to the exhibit. Which three things occur if a user attempts to log in four
times within 10 seconds and uses an incorrect password? (Choose three).
Subsequent virtual login attempts from the user are blocked for 60
seconds.
During the quiet mode, an administrator can virtually log in from any host
on network 172.16.1.0/24.
Subsequent console login attempts are blocked for 60 seconds.
A message is generated that indicates the username and source IP address
of the user.
During the quiet mode, an administrator can log in from host 172.16.1.2.
No user can log in virtually from any host for 60 seconds.
[by vlad]
Quiet mode behavior will only prevent specific user accounts from
attempting to authenticate.
A separate MIB tree exists for any given device in the network.
Which three actions are produced by adding Cisco IOS login enhancements
to the router login process? (Choose three.)
What is the default privilege level of user accounts created on Cisco routers?
15
16
This post is about questions and answer for CCNA Security Chapter 3 Test.
The questions is based on CCNAS v1.1. All the answers has been verified to be
100% correct. Hopefully all these questions and answers will be a good guide
and reference to all of us.
It requires a login and password combination on console, vty lines, and aux
ports.
It is more efficient for users who only need to enter a password to gain entry
to a device.
Which authentication method stores usernames and passwords in the router
and is ideal for small networks?
local AAA
server-based AAA
The Cisco Secure ACS can be accessed from the router console.
Telnet can be used to configure a Cisco Secure ACS server after an initial
configuration is complete.
The Cisco Secure ACS can be accessed remotely after installing ACS client
software on the administrator workstation.
What is a difference between using the login local command and using local
AAA authentication for authenticating administrator access?
A method list must be configured when using the login local command, but
is optional when using local AAA authentication.
The login local command supports the keyword none, which ensures that
authentication succeeds, even if all methods return an error.
Due to implemented security controls, a user can only access a server with
FTP. Which AAA component accomplishes this?
accessibility
accounting
auditing
authentication
authorization
Which two AAA access method statements are true? (Choose two.)
Character mode provides remote users with access to network resources and
requires use of the console, vty, or tty ports.
Character mode provides remote users with access to network resources and
requires use of dialup or VPN.
Packet mode provides users with administrative privilege EXEC access and
requires use of dialup or VPN.
Packet mode provides remote users with access to network resources and
requires use of dialup or VPN.
Packet mode provides users with administrative privilege EXEC access and
requires use of the console, vty, or tty ports.
TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646
or 1813 for accounting.
Refer to the exhibit. Router R1 is configured as shown. An administrative
user attempts to use Telnet from router R2 to router R1 using the interface IP
address 10.10.10.1. However, Telnet access is denied. Which option corrects
this problem?
The vty lines must be configured with the login authentication default
command.
The administrative user should use the username Admin and password
Str0ngPa55w0rd.
Refer to the exhibit. In the network shown, which AAA command logs the
use of EXEC session commands?
When configuring a method list for AAA authentication, what is the effect of
the keyword local?
The administrator is allowed full access using the enable secret password.
RADIUS can cause delays by establishing a new TCP session for each
authorization request.
Cisco Secure ACS Express is a rack-mountable unit intended for more than
350 users.
Refer to the exhibit. Router R1 has been configured as shown, with the
resulting log message. On the basis of the information that is presented,
which two statements describe the result of AAA authentication operation?
(Choose two.)
The locked-out user should have used the username Admin and password
Pa55w0rd.
The locked-out user should have used the username admin and password
Str0ngPa55w0rd.
The locked-out user stays locked out until the clear aaa local user lockout
username Admin command is issued.
AutoSecure
Cisco Configuration Professional communities
Which two modes are supported by AAA to authenticate users for accessing
the network and devices? (Choose two.)
verbose mode
character mode
quiet mode
packet mode
ancillary mode
Which two features are included by both TACACS+ and RADIUS protocols?
(Choose two.)
password encryption
SIP support
802.1X support
As stated earlier, all the answers should be 100% correct. However if you find
any mistake or wrong answer in the solution above, please do not hesitate to
comment below. Also, if you have new updated questions, you may share
here to all the readers. We really appreciate it. Hopefully it will benefits all of
us.
Questions and answers in this chapter 3 test has been provided by XASE. All
credits goes to him.
Accounting method lists are not applied to any interfaces until an interface
is added to the server group.
[by Layla]
LetMe1n2
Pa$$w0rD
authen-radius
authen-tacacs
[by Jaime]
authentication
authorization
accounting
auditing
The TACACS+ server only accepts one successful try for a user to
authenticate with it.
R1 will open a separate connection to the TACACS+ server for each user
authentication session.
[by dekaytar]
When a method list for AAA authentication is being configured, what is the
effect of the keyword local?
It defaults to the vty line password for authentication.
The login succeeds, even if all methods return an error.
It uses the enable password for authentication.
It accepts a locally configured username, regardless of case.
The locked-out user stays locked out until the clear aaa local user lockout
username Admin command is issued.
The locked-out user should have used the username admin and password
Str0ngPa55w0rd.
The locked-out user should have used the username Admin and password
Pa55w0rd.
authen-tacacs
LetMe1n2
Pa$$wOrD
authen-radius
Internal network
Untrusted network
DMZ
Classic firewall
Refer to the exhibit. The ACL statement is the only one explicitly configured
on the router. Based on this information, which two conclusions can be
drawn regarding remote access network connections? (Choose two.)
Standard ACLs can filter on source and destination TCP and UDP ports.
self zone
system zone
local zone
inside zone
outside zone
Refer to the exhibit. If a hacker on the outside network sends an IP packet
with source address 172.30.1.50, destination address 10.0.0.3, source port 23,
and destination port 2447, what does the Cisco IOS firewall do with the
packet?
Which two parameters are tracked by CBAC for TCP traffic but not for UDP
traffic? (Choose two.)
source port
protocol ID
sequence number
destination port
What is the first step in configuring a Cisco IOS zone-based policy firewall
using the CLI?
What is the first step in configuring a Cisco IOS zone-based policy firewall
via the CLI?
Create zones.
Class maps identify traffic and traffic parameters for policy application
based on which three criteria? (Choose three.)
access group
access class
policy map
protocol
interface pairs
Both stateful and packet-filtering firewalls can filter at the application layer.
A new combined access rule was created using the new access rule number.
Duplicate ACEs were removed.
A new combined access rule was created using the new access rule number.
Duplicate ACEs and overriding ACEs were highlighted to allow the
administrator to make adjustments
The existing rule was placed in a preview pane to allow the administrator to
select specific ACEs to move to the new access rule.
Which statement correctly describes how an ACL can be used with the
access-class command to filter vty access to a router?
An extended ACL can be used to restrict vty access based on specific source
addresses, destination addresses, and protocol.
An extended ACL can be used to restrict vty access based on specific source
and destination addresses but not on protocol.
An extended ACL can be used to restrict vty access based on specific source
addresses and protocol but the destination can only specify the keyword
any.
echo reply
time-stamp request
time-stamp reply
router advertisement
access-group ipv6_ENG_ACL in
Traffic that originates from the outside interface is permitted to traverse the
firewall to the inside interface with little or no restrictions.
Traffic that originates from the DMZ interface is permitted to traverse the
firewall to the outside interface with little or no restrictions.
Traffic that originates from the DMZ interface is selectively permitted to
the outside interface. (Similar Question warning! Use this answer if this answer
available. Otherwise use the other one)
Return traffic from the outside that is associated with traffic originating
from the inside is permitted to traverse from the outside interface to the
DMZ interface.
Return traffic from the inside that is associated with traffic originating from
the outside is permitted to traverse from the inside interface to the outside
interface.
When configuring a Cisco IOS zone-based policy firewall, which two actions
can be applied to a traffic class? (Choose two.)
log
hold
drop
inspect
copy
forward
Refer to the exhibit. Which statement describes the function of the ACEs?
These ACEs allow for IPv6 neighbor discovery traffic.
These ACEs must be manually added to the end of every IPv6 ACL to allow
IPv6 routing to occur.
These ACEs automatically appear at the end of every IPv6 ACL to allow IPv6
routing to occur.
These are optional ACEs that can be added to the end of an IPv6 ACL to allow
ICMP messages that are defined in object groups named nd-na and nd-ns.
Refer to the exhibit. Which statement is true about the effect of this Cisco
IOS zone-based policy firewall configuration?
The firewall will automatically drop all HTTP, HTTPS, and FTP traffic.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
s0/0 to fa0/0 and will track the connections. Tracking the connection allows
only return traffic to be permitted through the firewall in the opposite
direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
fa0/0 to s0/0 and will track the connections. Tracking the connection
allows only return traffic to be permitted through the firewall in the
opposite direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
fa0/0 to s0/0, but will not track the state of connections. A corresponding
policy must be applied to allow return traffic to be permitted through the
firewall in the opposite direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
s0/0 to fa0/0, but will not track the state of connections. A corresponding
policy must be applied to allow return traffic to be permitted through the
firewall in the opposite direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
s0/0/0 to g0/0, but will not track the state of connections. A corresponding
policy must be applied to allow return traffic to be permitted through the
firewall in the opposite direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
g0/0 to s0/0/0, but will not track the state of connections. A corresponding
policy must be applied to allow return traffic to be permitted through the
firewall in the opposite direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
s0/0/0 to g0/0 and will track the connections. Tracking the connection
allows only return traffic to be permitted through the firewall in the
opposite direction.
The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
g0/0 to s0/0/0 and will track the connections. Tracking the connection
allows only return traffic to be permitted through the firewall in the
opposite direction.
As i did mention above, the answers given should be 100% correct. If you
find and error, mistake or wrong answers which you have doubt, please do
comment below to share with all of us the correct answer. Invisible
Algorithm also do appreciate any new questions or latest version of any test
that you might want to share will all people. Do contact me for that
purpose. Hopefully, everyone can get benefits from what we share.
[by Gilton]
classic firewall
reflexive ACL firewall
zone-based policy firewall
AAA access control firewall
[by Mar]
Pass, inspect, and drop options can only be applied between two zones.
When logging is enabled for an ACL entry, how does the router switch
packets filtered by the ACL?
process switching
autonomous switching
topology-based switching
optimum switching
[by Jaime]
When a Cisco IOS zone-based policy firewall is being configured, which two
actions can be applied to a traffic class? (Choose two.)
log
copy
inspect
hold
drop
forward
When traffic returns from its destination, it is reinspected, and a new entry
is added to the state table.
The entry remains in the state table after the session is terminated so that it
can be reused by the host.
[by abu7ala1]
broadcast packet
router-generated packet
ICMP packet
multicast packet
[by Mr Jaya]
Which two parameters are tracked by a classic firewall for TCP traffic but not
for UDP traffic? (Choose two.)
destination port
sequence number
source port
protocol ID
Standard ACLs can filter on source and destination TCP and UDP ports
Which statement describes one of the rules that govern interface behavior in
the context of implementing a zone-based policy firewall configuration?
[by Sham]
In this post, I will share the questions and answers for CCNA Security
Chapter 5 Test. All the questions and answers are valid and 100% correct.
The questions shared in this post is based on CCNAS v1.1. I wish this post will
be a good reference to all of us in answering CCNA Security Chapter 5 Test.
Refer to the exhibit. When modifying an IPS signature action, which two
check boxes should be selected to create an ACL that denies all traffic from
the IP address that is considered the source of the attack and drops the
packet and all future packets from the TCP flow? (Choose two.)
Produce Alert
The IDS requires significant router resources to maintain the event horizon.
The stateful properties of atomic attacks usually require the IDS to have
several pieces of data to match an attack signature.
Refer to the exhibit. What is the result of issuing the Cisco IOS IPS
commands on router R1?
All traffic that is denied by the ACL is subject to inspection by the IPS.
All traffic that is permitted by the ACL is subject to inspection by the IPS.
Which two files could be used to implement Cisco IOS IPS with version 5.x
format signatures? (Choose two.)
IOS-Sxxx-CLI.bin
IOS-Sxxx-CLI.pkg
IOS-Sxxx-CLI.sdf
realm-cisco.priv.key.txt
realm-cisco.pub.key.txt
high
medium
low
informational
Which two benefits does the IPS version 5.x signature format provide over
the version 4.x signature format? (Choose two.)
Which two Cisco IOS commands are required to enable IPS SDEE message
logging? (Choose two.)
logging on
ip http server
Which Cisco IPS feature allows for regular threat updates from the Cisco
SensorBase Network database?
event correlation
global correlation
honeypot-based detection
security-independent operation
FTP
SDEE
SIO
SNMP
Only signatures in the ios_ips basic category will be compiled into memory
for scanning.
All signature categories will be compiled into memory for scanning, but only
those signatures in the ios_ips basic category will be used for scanning
purposes.
All signatures categories will be compiled into memory for scanning, but
only those signatures within the ios_ips advanced category will be used for
scanning purposes.
Refer to the exhibit. Based on the configuration commands that are shown,
how will IPS event notifications be sent?
HTTP format
SDEE format
syslog format
TFTP format
Refer to the exhibit. What action will be taken if a signature match occurs?
An ACL will be created that denies all traffic from the IP address that is
considered the source of the attack, and an alert will be generated.
This packet and all future packets from this TCP flow will be dropped, and an
alert will be generated.
deny-attacker-inline
deny-connection-inline
deny-packet-inline
produce-alert
reset-tcp-connection
Refer to the exhibit. Based on the configuration, what traffic is inspected by
the IPS?
only traffic traveling from the s0/0/1 interface to the fa0/1 interface
all traffic entering the s0/0/1 interface and all traffic leaving the fa0/1
interface
all traffic entering the s0/0/1 interface and all traffic entering and leaving
the fa0/1 interface
The flash directory where the IPS signatures should be stored is corrupt or
nonexistent.
SDEE notification is disabled and must be explicitly enabled.
All the answers should be 100% correct. If you unable to achieve 100% score
following all the questions and answers provided above, and you have the
correct answer, please comment below so that other people able to get
benefits from your experience and knowledge. We do appreciate any
correction, new questions or latest version of any test that you might know.
Sharing is caring.
Credit: This Chapter 5 CCNA Security Test contribute by Xase. All credits
goes to him.
Issue the clear ip ips sdee events command to clear the SDEE buffer.
a rapid exploit attack of employee login credentials via the use of social
engineering techniques
Refer to the exhibit. Which option tab on the CCP screen is used to view the
Top Threats table and deploy signatures associated with those threats?
IPS Migration
IPS Sensor
Edit IPS
Security Dashboard
Create IPS
This post is about answer for CCNA Security Chapter 6 Test. The questions
displayed in this post are based on CCNAS v1.1. All the answers has been
confirmed to be 100% correct. With this solution, hopefully it will be a good
reference for all of us.
As a recommended practice for Layer 2 security, how should VLAN 1 be
treated?
With IP voice systems on data networks, which two types of attacks target
VoIP specifically? (Choose two.)
CoWPAtty
Kismet
SPIT
virus
vishing
An attacker alters the MAC address of his host to match another known
MAC address of a target host.
An attacker alters the MAC address of the switch to gain access to the
network device from a rogue host device.
An attacker floods the MAC address table of a switch so that the switch can
no longer filter network access based on MAC addresses.
Fibre Channel
SATA
iSCSI
IP PBX
FCIP
IDE
Refer to the exhibit. What action will the switch take when the maximum
number of secure MAC addresses has reached the allowed limit on the Fa0/2
port?
Packets with unknown source addresses are dropped, but notification of the
dropped packets is sent.
The VLAN that Fa0/2 is on is set to error-disabled and all traffic on the VLAN
is stopped.
Which software tool can a hacker use to flood the MAC address table of a
switch?
macof
Cisco CCP
Which two methods are used to mitigate VLAN attacks? (Choose two.)
Which three switch security commands are required to enable port security
on a port so that it will dynamically learn a single MAC address and disable
the port if a host with any other MAC address is connected? (Choose three.)
switchport port-security
digital certificate
digital signature
Why are traditional network security perimeters not suitable for the latest
consumer-based network endpoint devices?
These devices pose no risk to security as they are not directly connected to
the corporate network.
C-Series
M-Series
S-Series
SenderBase-Series
M-Series
S-Series
SenderBase-Series
What is the goal of the Cisco NAC framework and the Cisco NAC appliance?
to ensure that only hosts that are authenticated and have had their security
posture examined and approved are permitted onto the network
to monitor data from the company to the ISP in order to build a real-time
database of current spam threats from both internal and external sources
posture assessment
switchport block
switchport nonnegotiate
switchport protected
All data traffic that passes between protected ports must be forwarded
through a Layer 2 device.
All data traffic that passes between protected ports must be forwarded
through a Layer 3 device.
The device has been updated with the latest virus protection software.
The user does not plan on accessing the corporate network when attached to
the open wireless network.
As stated earlier, all this answers has been verified to be 100% correct. If you
found any wrong answers provided, please leave comment below. We do
appreciate all the corrections that you made. If you want to contribute for
new question or any latest version of chapter test and exam question, please
let me know. We do appreciate it too.
Credit: The answer in this chapter test has been provided by Xase. All credit
goes to him.
[by Jaime]
How does a switch interface that uses sticky port security handle MAC
addresses?
They are configured dynamically and are saved in the running
configuration.
They are configured dynamically and are not saved in the running
configuration.
They are configured manually and are not saved in the running
configuration.
The addresses are configured manually and are saved in the running
configuration.
Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured
with the switchport port-security mac-address 0023.189d.6456 command
and a workstation has been connected. What could be the reason that the
Fa0/2 interface is shutdown?
The connection between S1 and PC1 is via a crossover cable.
The Fa0/24 interface of S1 is configured with the same MAC address as the
Fa0/2 interface.
S1 has been configured with a switchport port-security aging command.
The MAC address of PC1 that connects to the Fa0/2 interface is not the
configured MAC address.
[by Luis]
Which mitigation technique can help prevent MAC table overflow attacks?
storm control
switchport security
BPDU guard
root guard
BPDU
ISL
DTP
802.1q
Which attack allows the attacker to see all frames on a broadcast network by
causing a switch to flood all incoming traffic?
MAC table overflow
VLAN hopping
802.1q double tagging
LAN storm
STP manipulation
When configuring a switch port for port security, what is the default
violation mode?
restrict
reset
shutdown
protect
Refer to the exhibit. Which two statements are correct regarding the
configuration on switch S1? (Choose two.)
Port Fa0/5 storm control for multicasts will be activated if traffic exceeds
80.1 percent of the total bandwidth.
Port Fa0/6 storm control for multicasts and broadcasts will be activated if
traffic exceeds 2,000,000 packets per second.
Port Fa0/6 storm control for multicasts will be activated if traffic exceeds
2,000,000 packets per second.
Port Fa0/5 storm control for broadcasts and multicasts will be activated if
traffic exceeds 80.1 percent of 2,000,000 packets per second.
Port Fa0/5 storm control for broadcasts will be activated if traffic exceeds
80.1 percent of the total bandwidth.
What functionality is provided by Cisco SPAN in a switched network?
It protects the switched network from receiving BPDUs on ports that should
not be receiving them.
It copies traffic that passes through a switch interface and sends the data
directly to a syslog or SNMP server for analysis.
It mitigates MAC address overflow attacks.
It prevents traffic on a LAN from being disrupted by a broadcast storm.
It inspects voice protocols to ensure that SIP, SCCP, H.323, and MGCP
requests conform to voice standards.
It mirrors traffic that passes through a switch port or VLAN to another port
for traffic analysis
Refer to the exhibit. Based on the output generated by the show monitor
session 1command, how will SPAN operate on the switch?
Native VLAN traffic transmitted from VLAN 10 or received on VLAN 20 is
forwarded to FastEthernet 0/1.
All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded
to FastEthernet 0/1.
All traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to
FastEthernet 0/1.
Native VLAN traffic received on VLAN 10 or transmitted from VLAN 20 is
forwarded to FastEthernet 0/1.
[by Anon]
Which two actions are permitted to the user ADMIN? (Choose two.)
The user can only execute the subcommands under the show ip route
command.
The user can issue all commands because this privilege level can execute all
Cisco IOS commands.
The user can execute all subcommands under the show ip interfaces
command.
authentication
confidentiality
integrity
nonrepudiation
Use an algorithm that requires the attacker to have both ciphertext and
plaintext to conduct a successful attack.
Use a keyspace large enough that it takes too much money and too much
time to conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the
language are not used in the cipher message.
The data is encrypted, decrypted, and encrypted using three different keys.
The data is divided into three blocks of equal length for encryption.
The data is encrypted using a key length that is three times longer than the
key used for DES.
An administrator requires a PKI that supports a longer lifetime for keys used
for digital signing operations than for keys used for encrypting data. Which
feature should the PKI support?
certificate keys
nonrepudiation keys
usage keys
variable keys
anti-replay protection
authentication
authorization
confidentiality
integrity
Caesar cipher
stream cipher
substitution cipher
transposition cipher
HMAC uses a secret key that is only known to the sender and defeats man-
in-the-middle attacks.
Keyed MD5
Message Digest 5
3DES
AES
DES
RC4
SEAL
They are relatively slow because they are based on difficult computational
algorithms.
Which two statements correctly describe certificate classes used in the PKI?
(Choose two.)
The lower the class number, the more trusted the certificate.
Two users must authenticate each other using digital certificates and a CA.
Which option describes the CA authentication procedure?
The users must obtain the certificate of the CA and then their own
certificate.
verification
exchange
generation
DES key
symmetric keys
hash keys
digital signatures
ESP
DES
3DES
AH
DH
SSL
Which two non-secret numbers are initially agreed upon when the Diffie-
Hellman algorithm is used? (Choose two.)
generator
pseudorandom nome
binomial coefficient
prime modulus
topological index
It uses a two-way function that computes a hash from the input and output
data.
I did mentioned above that all the answers for CCNA Security Chapter 7 are
100% correct. However, if you find any mistake or error, please do comment
below to share with us the correct answer. We also do appreciate any latest
version or new questions that you would like to share with us.
Credit: The answers for this CCNA Security Chapter 7 Test provided by Xase.
All credit goes to him.
[by Jaime]
MD5
HMAC
3DES
SHA-1
Why is the 3DES algorithm often preferred over the AES algorithm?
3DES is more trusted because it has been proven secure for a longer period
than AES.
Major networking equipment vendors such as Cisco have not yet adopted
AES.
In which situation is an asymmetric key algorithm used?
AES
DH
SEAL
3DES
How many bits does the Data Encryption Standard (DES) use for data
encryption?
40 bits
56 bits
64 bits
72 bits
What feature of the AES encryption algorithm makes it more desirable to use
than 3DES?
It is a symmetric algorithm.
Which type of encryption algorithm uses public and private keys to provide
authentication, integrity, and confidentiality?
symmetric
IPsec
asymmetric
shared secret
An online retailer needs a service to support the nonrepudiation of the
transaction. Which component is used for this service?
the unique shared secret known only by the retailer and the customer
1.
Refer to the exhibit. Based on the CCP screen that is shown, which two
conclusions can be drawn about the IKE policy that is being configured?
(Choose two.)
It will use digital certificates for authentication.
It will use a predefined key for authentication.
It will use a very strong encryption algorithm. (Original answer, Confirmed
by Xase)
It will be the default policy with the highest priority.
It is being created using the CCP VPN Quick Setup Wizard. (Andy’s answer)
4. With the Cisco Easy VPN feature, which process ensures that a static route
is created on the Cisco Easy VPN Server for the internal IP address of each
VPN client?
5. Which two authentication methods can be configured when using the CCP
Site-to-Site VPN wizard? (Choose two.)
MD5
SHA
pre-shared keys
encrypted nonces
digital certificates
400
500
600
700
8.
128-bit AES
192-bit AES
256-bit AES
3DES (Original answer)
DES (Corrected by Ja Shin)
11.
Refer to the exhibit. Which two IPsec framework components are valid
options when configuring an IPsec VPN on a Cisco ISR router? (Choose two.)
Integrity options include MD5 and RSA.
IPsec protocol options include GRE and AH.
Confidentiality options include DES, 3DES, and AES.
Authentication options include pre-shared key and SHA.
Diffie-Hellman options include DH1, DH2, and DH5.
12.
Refer to the exhibit. Based on the CCP settings that are shown, which Easy
VPN Server component is being configured?
group policy
transform set
IKE proposal
user authentication
13. Which action do IPsec peers take during the IKE Phase 2 exchange?
exchange of DH keys
negotiation of IPsec policy
verification of peer identity
negotiation of IKE policy sets
14. When configuring an IPsec VPN, what is used to define the traffic that is
sent through the IPsec tunnel and protected by the IPsec process?
crypto map
crypto ACL (Corrected by Ja Shin)
ISAKMP policy (Original answer)
IPsec transform set
15. What is required for a host to use an SSL VPN to connect to a remote
network device?
17. When using ESP tunnel mode, which portion of the packet is not
authenticated?
ESP header
ESP trailer
new IP header
original IP header
18. How many bytes of overhead are added to each IP packet while it is
transported through a GRE tunnel?
8
16
24
32
IPsec works at the application layer and protects all application data.
IPsec works at the transport layer and protects data at the network layer.
IPsec works at the network layer and operates over all Layer 2 protocols.
IPsec is a framework of proprietary standards that depend on Cisco specific
algorithms.
IPsec is a framework of standards developed by Cisco that relies on OSI
algorithms.
IPsec is a framework of open standards that relies on existing algorithms.
20.
Again, this answer CCNA Security Chapter 8 answer is not 100% correct. I
only got 90% from this answer. So, if you have a better answer or new
questions, please share. I’ll improve this post based on the correction you
provide. Thank You.
5.Refer to the exhibit. Which pair of crypto isakmp key commands would
correctly configure PSK on the two routers?
R1# crypto isakmp key cisco123 hostname R1
R2# crypto isakmp key cisco123 hostname R2
6. Refer to the exhibit. How will traffic that does not match that defined by
access list 101 be treated by the router?
9.What VPN solution uses a server to push IPsec policies to mobile clients so
that they can access company resources over a secure IPsec tunnel?
Cisco VPN Wizard
Cisco SSL VPN
Cisco Easy VPN
Step by Step Wizard
Active Directory
Kerberos
Certificate Authority
RADIUS
TACACS+
[by kamyk]
[by Jaime]
The use of 3DES within the IPsec framework is an example of which of the
five IPsec building blocks?
confidentiality
nonrepudiation
authentication
Diffie-Hellman
integrity
What protocol is used by IPsec to calculate shared keys and to negotiate the
parameters to be used by IPsec SAs?
NTP
IKE
ESP
AH
backup site
cold site
hot site
reserve site
network scan
password crack
penetration test
vulnerability scan
backup policy
server policy
incident policy
governing policy
end-user policy
technical policy
asset inventory
best practices
guidelines
procedures
risk assessment
standards
What are the two major components of a security awareness program?
(Choose two.)
awareness campaign
A task requires two individuals who review and approve the work of each
other.
A task is broken down into two parts, and each part is assigned to a different
individual.
A task must be completed twice by two operators who must achieve the same
results.
guideline document
standard document
procedure document
overview document
next-generation endpoint
scanning engine
Security Intelligence Operations
consumer endpoints
DMZ services
context awareness
perimeter awareness
centralized enforcement
perimeter deployment
secure access
secure mobility
secure network
secure network
secure e-mail and web
secure access
secure mobility
Which Cisco secure access solution can be used to determine if hosts are
compliant with security policies?
IPSec
HTTPS
SSH
Telnet
TFTP
If you unable to achieve 100% mark for this CCNA Security Chapter 9 Test
following all questions and answers given above please leave your comment
below. We do appreciate any correction you provided or any new and
updated questions. With all the knowledge that we shared, hopefully it will
benefits all of us.
Credit: All questions and answers for CCNA Security Chapter 9 provided by
Xase. All credits goes to him.
[by John]
The lower the security level on an interface, the more trusted the interface.
Each operational interface must have a name and be assigned a security level
from 0 to 200.
The administrator needs to acquire the Security Plus license, because the
Base license does not support the proposed action.
The administrator configures the third VLAN interface the same way the
other two were configured, because the Base license supports the proposed
action.
Because the ASA 5505 does not support the configuration of a third
interface, the administrator cannot configure the third VLAN.
What command defines a DHCP pool that uses the maximum number of
DHCP client addresses available on an ASA 5505 that is using the Base
license?
The administrator can connect to and manage multiple ASA devices, Cisco
routers, and Cisco switches.
The administrator can connect to and manage multiple ASA devices and
Cisco routers.
Which two statements are true about ASA standard ACLs? (Choose two.)
to monitor return traffic that is in response to web server requests that are
initiated from the inside interface
[by Jaime]
SSL
IPsec
Which three security features do ASA models 5505 and 5510 support by
default? (Choose three.)
When the ASA recognizes that the incoming packets are part of an already
established connection, which three fast path tasks are executed? (Choose
three.)
Which option lists the ASA adaptive security algorithm session management
tasks in the correct order?
The following questions has been answered on CCNA Security Final Exam
v1.1
Refer to the exhibit. The indicated window has appeared in the web browser
of a remote user. What is the cause of this message?
[by abu7ala1]
ip
tcp
udp
icmp
inside NAT
bidirectional NAT
outside NAT
static NAT
interface e0/0
switchport access vlan 2
no shut
exit
interface vlan 2
nameif outside
security-level 0
ip address 209.165.200.226 255.255.255.248
Which three security features do ASA models 5505 and 5510 support
bydefault? (Choose three.)
stateful firewall
intrusion prevention system
VPN concentrator
Which option lists the ASA adaptive security algorithm session management
tasks in the correct order?
[by LB]
[Updated by A Smith]
VLAN 1 should be the outside interface and VLAN 2 should be the inside
interface.
The security level of the inside interface should be 0 and the outside
interface should be 100.
Refer to the exhibit. What will be displayed in the output of the show
running-config object command after the exhibited configuration
commands are entered on an ASA 5505?
host 192.168.1.4
host 192.168.1.3
range 192.168.1.10 192.168.1.20
host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20
host 192.168.1.4 and range 192.168.1.10 192.168.1.20
host 192.168.1.3 and host 192.168.1.4
[Updated by Andersson, J]
Which three wizards are included in Cisco ASDM 6.4? (Choose three.)
Which three types of remote access VPNs are supported on ASA devices?
[by Valeria]
A network administrator is configuring the security level for the ASA. What
is a best practice for assigning the security level on the three interfaces?
In this post, i will share answer for Chapter 10 Test CCNA Security. All the
questions in this post is based on CCNAS v1.1. The answers provided in this
post has been verified to be 100% correct. I hope it will be a good material
and guide for answering CCNA Security Chapter Test.
In what three ways do the 5505 and 5510 Adaptive Security Appliances
differ? (Choose three.)
in the method by which they can be configured using either CLI or ASDM
in types of interfaces
Which three security features do ASA models 5505 and 5510 support by
default? (Choose three.)
content security and control module
stateful firewall
VPN concentrator
Which option lists the ASA adaptive security algorithm session management
tasks in the correct order?
When the ASA recognizes that the incoming packets are part of an already
established connection, which three fast path tasks are executed? (Choose
three.)
The interfaces of the ASA separate Layer 3 networks and require IP addresses
in different subnets.
interface e0/0
nameif outside
security-level 0
no shut
interface e0/0
no shut
exit
interface vlan 2
nameif outside
security-level 0
The dhcpd auto-config outside command was issued to enable the DHCP
client.
The dhcpd enable inside command was issued to enable the DHCP client.
The dhcpd auto-config outside command was issued to enable the DHCP
server.
The dhcpd enable inside command was issued to enable the DHCP server.
Which three wizards are included in Cisco ASDM 6.4? (Choose three.)
Startup wizard
VPN wizard
Refer to the exhibit. What will be displayed in the output of the show
running-config object command after the exhibited configuration
commands are entered on an ASA 5505?
host 192.168.1.3
host 192.168.1.4
Configuration > Device Management > Users/AAA > AAA Server Group
Which option lists the four steps to configure the Modular Policy Framework
on an ASA?
bookmark lists
client images
group policy
bookmark lists
client image
DHCP pools
group policy
SSL or IPsec
Refer to the exhibit. A remote host is connecting to an ASA 5505 via a VPN
connection. Once authenticated, the host displays the highlighted system
tray icon. On the basis of the information that is presented, what three
assumptions can be made? (Choose three.)
The host web browser window is displaying the ASA SSL web portal webpage
containing bookmarks.
The host has connected to the ASA via a client-based SSL VPN connection.
Using the ipconfig command on the host displays one IP address from the
originating network.
Using the ipconfig command on the host displays an IP address from the
originating network and an IP address for the VPN connection.
Configuration > Remote Access VPN > Clientless SSL VPN Access
authentication method
bookmarks
crypto maps
encryption algorithms
IKE version
An ASA uses the Zone-Based Firewall feature and tracks the state of the TCP
or UDP network connections that are traversing the network.
The first packet of a flow examined by an ASA goes through the session
management path.
All the answers for CCNA Security Chapter 10 Test discussed above should be
100% correct. However, if you found any error, mistake or correction, please
do not hesitate to leave comment below. We also do appreciate new
questions or latest version for any question set if you want to share with all
of us. I hope, the knowledge that you shared will benefits all of us.
Credits: All the questions and answers in this chapter test contribute by
Xase. All credit goes to him.
1. A network security manager has been tasked with supporting some staff to
work from home on a part time basis. What Cisco Secure access product will
allow this manager to provide secure, manageable voice and video services
to this group of personnel?
Cisco AnyConnect
Cisco NAC Appliance
AAA authorization
AES
SSH
TCP/IP-based VPN
It is exploratory.
It is descriptive.
so that the organization can focus resources where they are most needed
so that the organization knows the top areas where network security holes
exist
70 percent of the devices in the data center do not have fire resistance
coverage.
change control
separation of duties
rotation of duties
trusted recovery
integrity checkers
penetration testing
vulnerability scanning
network scanning
11. Fill in the blank. risk analysis is used to estimate the probability and
severity of threats to a system.
13. In quantitative risk analysis, what term is used to represent the degree of
destruction that would occur if an event took place?
single loss expectancy
exposure factor
14. What security task is relevant in the disposition phase of the SDLC?
$1500
$6000
$15,000
$1,500,000
SIO
delivery mechanism
scanning engine
18. Which security policy component defines what users are allowed and not
allowed to do on company systems?
authentication policy
governing policy
application policy
19. A new network manager at a small company is presented with a list from
the technician who is responsible for server backups. The technician
provides the following list of current practices.
20. A new person has joined the security operations team for a
manufacturing plant. What is a common scope of responsibility for this
person?
It defines system and issue-specific policies that describe what the technical
staff does.
It outlines the company’s overall security goals for managers and technical
staff.
It covers all rules pertaining to information security that end users should
know about and follow.
standards document
procedure document
guideline document
23. What are the three security tasks related to the disposition phase of the
system development life cycle? (Choose three.)
media sanitation
information preservation
to integrate all the security skills and competencies into a single body of
knowledge
25.
[jarod08]
1. When logging is enabled for an ACL entry, how does the router switch
packets filtered by the ACL?
topology-based switching
autonomous switching
process switching
optimum switching
2. Which statement is true about the One-Step lockdown feature of the CCP
Security Audit wizard?
Refer to the exhibit. The administrator can ping the S0/0/1 interface of
RouterB but is unable to gain Telnet access to the router using the password
cisco123. What is a possible cause of the problem?
5.
Refer to the exhibit. An administrator has entered the commands that are
shown on router R1. At what trap level is the logging function set?
2
3
5
6
IPsec
symmetric
asymmetric
shared secret
10. Which three statements describe the IPsec protocol framework? (Choose
three.)
AH uses IP protocol 51.
AH provides encryption and integrity.
AH provides integrity and authentication.
ESP uses UDP protocol 50.
ESP requires both authentication and encryption.
ESP provides encryption, authentication, and integrity.
11.
13. Which two configuration requirements are needed for remote access
VPNs using Cisco Easy VPN Server, but are not required for site-to-site
VPNs? (Choose two.)
14. What can be used as a VPN gateway when setting up a site-to-site VPN?
15. Which type of Layer 2 attack makes a host appear as the root bridge for a
LAN?
LAN storm
MAC address spoofing
MAC address table overflow
STP manipulation
VLAN attack
16.
Refer to the exhibit. An administrator has configured a standard ACL on R1
and applied it to interface serial 0/0/0 in the outbound direction. What
happens to traffic leaving interface serial 0/0/0 that does not match the
configured ACL statements?
17. The use of 3DES within the IPsec framework is an example of which of
the five IPsec building blocks?
authentication
confidentiality
Diffie-Hellman
integrity
nonrepudiation
18.
Refer to the exhibit. Which two statements are correct regarding the
configuration on switch S1? (Choose two.)
Port Fa0/5 storm control for broadcasts will be activated if traffic exceeds
80.1 percent of the total bandwidth.
Port Fa0/6 storm control for multicasts and broadcasts will be activated if
traffic exceeds 2,000,000 packets per second.
Port Fa0/6 storm control for multicasts will be activated if traffic exceeds
2,000,000 packets per second.
Port Fa0/5 storm control for multicasts will be activated if traffic exceeds
80.1 percent of the total bandwidth.
Port Fa0/5 storm control for broadcasts and multicasts will be activated if
traffic exceeds 80.1 percent of 2,000,000 packets per second.
20. A network technician is configuring SNMPv3 and has set a security level
of auth. What is the effect of this setting?
23. Which three statements describe limitations in using privilege levels for
assigning command authorization? (Choose three.)
24. Which set of Cisco IOS commands instructs the IPS to compile a
signature category named ios_ips into memory and use it to scan traffic?
25.
Refer to the exhibit. Which three things occur if a user attempts to log in four
times within 10 seconds using an incorrect password? (Choose three.)
Subsequent virtual login attempts from the user are blocked for 60
seconds.
During the quiet mode, an administrator can virtually log in from any host
on network 172.16.1.0/24.
Subsequent console login attempts are blocked for 60 seconds.
A message is generated indicating the username and source IP address of
the user.
During the quiet mode, an administrator can log in from host 172.16.1.2.
No user can log in virtually from any host for 60 seconds.
27. What are three characteristics of the ASA routed mode? (Choose three.)
This mode does not support VPNs, QoS, or DHCP Relay. (Original)
The interfaces of the ASA separate Layer 3 networks and require different IP
addresses in different subnets. (Corrected by Elfnet & Joker!)
It is the traditional firewall deployment mode.
NAT can be implemented between connected networks. (Corrected by Elfnet &
Joker!)
This mode is referred to as a “bump in the wire.” (Original)
In this mode, the ASA is invisible to an attacker.
Active Directory
Kerberos (Original)
Certificate Authority
RADIUS (Corrected by Joker! & Andy)
TACACS+
29. Which access list statement permits HTTP traffic that is sourced from
host 10.1.129.100 port 4300 and destined to host 192.168.30.10?
Refer to the exhibit. What conclusion can be drawn from the exhibited
window when it is displayed on a remote user computer screen?
32. Which type of IPS signature detection is used to distract and confuse
attackers?
pattern-based detection
anomaly-based detection
policy-based detection
honey pot-based detection
33.
34. Which attack allows the attacker to see all frames on a broadcast network
by causing a switch to flood all incoming traffic?
35.
Refer to the exhibit. The indicated window has appeared in the web browser
of a remote user. What is the cause of this message?
rule-based
profile-based
signature-based
NetFlow anomaly-based
protocol analysis-based
41. What occurs after RSA keys are generated on a Cisco router to prepare for
secure device management?
All vty ports are automatically configured for SSH to provide secure
management.
The general-purpose key size must be specified for authentication with the
crypto key generate rsa general-keys moduluscommand.
The keys must be zeroized to reset secure shell before configuring other
parameters.
The generated keys can be used by SSH.
42.
43.
44. What is a result of securing the Cisco IOS image using the Cisco IOS
Resilient Configuration feature?
The Cisco IOS image file is not visible in the output of the show flash
command.
The Cisco IOS image is encrypted and then automatically backed up to a
TFTP server.
The Cisco IOS image is encrypted and then automatically backed up to the
NVRAM.
When the router boots up, the Cisco IOS image is loaded from a secured FTP
location.
45. Which two commands are needed on every IPv6 ACL to allow IPv6
neighbor discovery? (Choose two.)
46. Which technology does CCP require for configuring remote access VPN
support with the Easy VPN Server wizard?
AutoSecure
Role-Based CLI Access
AAA
port forwarding
47. What are three goals of a port scan attack? (Choose three.)
49. Which type of VPN may require the Cisco VPN Client software?
Refer to the exhibit. What information can be obtained from the AAA
configuration statements?
52. What must be configured before any Role-Based CLI views can be
created?
53.
Refer to the exhibit. Based on the output from the show secure bootset
command on router R1, which three conclusions can be drawn regarding
Cisco IOS Resilience? (Choose three.)
A copy of the Cisco IOS image file has been made.
A copy of the router configuration file has been made.
The Cisco IOS image file is hidden and cannot be copied, modified, or
deleted.
The Cisco IOS image filename will be listed when the show flash command is
issued on R1.
The copy tftp flash command was issued on R1.
The secure boot-config command was issued on R1.
54. What are two disadvantages of using network IPS? (Choose two.)
After the wizard identifies the vulnerabilities, the CCP One-Step Lockdown
feature must be used to make all security-related configuration changes.
After the wizard identifies the vulnerabilities, it automatically makes all
security-related configuration changes.
The wizard autosenses the inside trusted and outside untrusted interfaces to
determine possible security problems that might exist. (Original Answer)
The wizard is based on the Cisco IOS AutoSecure feature. (Corrected by Elfnet
& Andy)
The wizard is enabled by using the Intrusion Prevention task.
56. Which three statements describe zone-based policy firewall rules that
govern interface behavior and the traffic moving between zone member
interfaces? (Choose three.)
An interface can be assigned to multiple security zones. (Original)
Interfaces can be assigned to a zone before the zone is created.
Pass, inspect, and drop options can only be applied between two
zones. (Corrected by Joker! & Andy)
If traffic is to flow between all interfaces in a router, each interface must be
a member of a zone.
Traffic is implicitly prevented from flowing by default among interfaces that
are members of the same zone.
To permit traffic to and from a zone member interface, a policy allowing or
inspecting traffic must be configured between that zone and any other
zone.
57.
Refer to the exhibit. Which option tab on the CCP screen is used to view the
Top Threats table and deploy signatures associated with those threats?
Create IPS
Edit IPS
Security Dashboard
IPS Sensor
IPS Migration
auditing
accounting
authorization
authentication
1. Which statement is true about the One-Step lockdown feature of the CCP Security Audit
wizard?
MPLS
SSH [Dimented]
PPTP
ESP [J***]
Network IPS is operating system-dependent and must be customized for each platform.
Network IPS is unable to provide a clear indication of the extent to which the network is
being attacked.
Network IPS sensors are difficult to deploy when new networks are added.
4.
Refer to the exhibit. An administrator is implementing VPN support on an ASA 5505. What
type of VPN support is being implemented?
The thin client mode functions without requiring any downloads or software.
It is compatible with DMVPNs, Cisco IOS Firewall, IPsec, IPS, Cisco Easy VPN, and
NAT.
Apply the ACL to the vty lines without the in or out option required when applying ACLs to
interfaces.
The ACL is applied to the Telnet port with the ip access-group command.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted
user from connecting to an unsecured port.
7.
Refer to the exhibit. A network administrator is configuring the security level for the ASA.
Which statement describes the default result if the administrator tries to assign the Inside
interface with the same security level as the DMZ interface?
The ASA will not allow traffic in either direction between the Inside interface and the
DMZ. [Snarl]
The ASA allows traffic from the Inside to the DMZ, but blocks traffic initiated on the DMZ to
the Inside interface. [nuno]
The ASA allows inbound traffic initiated on the Internet to the DMZ, but not to the Inside
interface.
8. A network technician is configuring SNMPv3 and has set a security level of auth. What is
the effect of this setting?
authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and
encrypts the packet with either the DES, 3DES or AES algorithms
authenticates a packet by using either the HMAC with MD5 method or the SHA method
10.
Refer to the exhibit. Which interface configuration completes the classic firewall
configuration on the firewall?
11. What is a type of SSL VPN that provides access to a network without requiring VPN
software or a Java applet on the client?
(Ref: 8.6.3.2)
12. What are two reasons for a company to migrate from a classic firewall to the ZPF model?
(Choose two.)
The classic firewall will perform the same inspection on all traffic that goes through a
specific interface.
The classic firewall can only have one policy that affects any given traffic.
13. What is the main difference between the implementation of IDS and IPS devices?
An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses
profile-based technology.
An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops
it immediately.
An IDS can negatively impact the packet flow, whereas an IPS can not.
An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a
firewall.
14. What information must an IPS track in order to detect attacks matching a composite
signature?
15. What method is used to authenticate SNMPv2 messages between the manager and the
agent?
RSA keys
trusted keys
encrypted passwords
community strings
16. Which statement describes the characteristics of packet-filtering and stateful firewalls as
they relate to the OSI model?
A packet-filtering firewall uses session layer information to track the state of a connection,
whereas a stateful firewall uses application layer information to track the state of a
connection.
A stateful firewall can filter application layer information, whereas a packet-filtering firewall
cannot filter beyond the network layer.
17. What is a difference between ASA IPv4 ACLs and IOS IPv4 ACLs?
ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the
wildcard mask. [Zaf, Snarl and Dimented]
ASA ACLs do not have an implicit deny all at the end, whereas IOS ACLs do.
ASA ACLs use forward and drop ACEs, whereas IOS ACLs use permit and deny ACEs.
Multiple ASA ACLs can be applied on an interface in the ingress direction, whereas only one
IOS ACL can be applied.
ASA ACLs are always named, whereas IOS ACLs can be named or numbered. [J]
(Ref: 9.2.6.1)
Disable trunk negotiation for trunk ports and statically set nontrunk ports as access
ports.
to support secure access for users on a multitude of devices [nuno and Kiros]
20.
Refer to the exhibit. What is the purpose of the object group-based ACL?
It allows users on the 10.5.0.0/24 network access via HTTPS to remote devices on the
10.7.150.0/28, 10.7.151.0/28, 10.7.160.0/28, and 10.7.161.0/28 networks. [nuno]
It allows any TCP traffic with port 443 from the 10.7.150.0/28, 10.7.151.0/28, 10.7.160.0/28,
and 10.7.161.0/28 networks access to the 10.5.0.0/24 network.
It allows devices on the 10.5.0.0/24 network to have telnet and web access to the
10.7.150.0/28, 10.7.151.0/28, 10.7.160.0/28, and 10.7.161.0/28 networks.
21.
Refer to the exhibit. Based on the output from the show secure bootset command on router
R1, which three conclusions can be drawn about Cisco IOS Resilience? (Choose three.)
The Cisco IOS image file is hidden and cannot be copied, modified, or deleted.
The Cisco IOS image filename will be listed when the show flash command is issued on R1.
23. Which three statements describe limitations in using privilege levels for assigning
command authorization? (Choose three.)
The root user must be assigned to each privilege level that is defined.
It is required that all 16 privilege levels be defined, whether they are used or not.
Views are required to define the CLI commands that each user can access.
Creating a user account that needs access to most but not all commands can be a tedious
process.
Commands set on a higher privilege level are not available for lower privilege users.
24. Which algorithm is used to automatically generate a shared secret for two systems to use
in establishing an IPsec VPN?
DES
DH
3DES
ESP
AH
SSL
25. What type of security key is generated by the local user software when a user is
connecting to a Cisco ASA through a remote-access SSL VPN?
asymmetric key
digitally signed private key
shared-secret key
(Ref: 8.6.3.4)
26. What is one advantage of using a Cisco ASA for remote networking VPN deployment
compared to a Cisco ISR?
support for more concurrent user sessions [nuno, Kiros, J and Zen]
28. In what two phases of the system development life cycle does risk assessment take place?
(Choose two.)
operation and maintenance
disposition
implementation
initiation
29. What is one benefit of implementing a secure email service by using the Cisco Email
Security Appliance (ESA)?
30.
Refer to the exhibit. The administrator can ping the S0/0/1 interface of RouterB but is unable
to gain Telnet access to the router by using the password cisco123. What is a possible cause
of the problem?
The Telnet connection between RouterA and RouterB is not working correctly.
The enable password and the Telnet password need to be the same.
The administrator does not have enough rights on the PC that is being used.
31. A network administrator configures the alert generation of an IPS device in such a way
that when multiple attack packets that match the same signature are detected, a single alert for
the first packet is generated and the remaining duplicate alarms are counted, but not sent, for a
specific time period. When the specified time period is reached, an alert is sent that indicates
the number of alarms that occurred during the time interval. What kind of alert generation
pattern is configured?
composite alerts
atomic alerts
summary alerts
advanced alerts
(Ref: 5.2.4.2)
32. Which STP port type is permitted to forward traffic, but is not the port closest to the root
bridge?
root port
backup port
33.
to deny inbound IPv6 and SSH traffic unless it originates from within the
organization [nuno, Arab guy and Zen]
to allow SSH connections initiated from the Internet to enter the network [Dimented]
to deny all inbound traffic and log TCP and UDP transmissions [Rahul]
34.
Refer to the exhibit. An administrator is examining the message in a syslog server. What can
be determined from the message?
The data is divided into three blocks of equal length for encryption.
The data is encrypted using a key length that is three times longer than the key used for DES.
The data is encrypted, decrypted, and encrypted using three different keys.
36.
Refer to the exhibit. A network administrator configures AAA authentication on R1. The
administrator then tests the configuration by telneting to R1. The ACS servers are configured
and running. What will happen if the authentication fails?
The enable secret password could be used in the next login attempt. [Dimented]
The enable secret password and a random username could be used in the next login attempt.
The username and password of the local user database could be used in the next login
attempt. [Rahul, Paul]
37. Which two security features can cause a switch port to become error-disabled? (Choose
two.)
root guard
protected ports
38. What are three goals of a port scan attack? (Choose three.)
39. Which security policy component would contain procedures for handling an issue where
someone followed a network administrator into the server room without the administrator
noticing and the person removed some storage drives?
information preservation policy
security policy
40. What question is answered by the risk analysis component of security policy
development?
What is the cost versus benefit analysis of implementing various security technologies?
What are the reliable, well-understood, and recommended security practices that similar
organizations currently employ?
What are the current procedures for incident response, monitoring, maintenance, and auditing
of the system for compliance?
What are the most likely types of threats given the purpose of the organization?
(Ref 10.1.1.1)
41. What are two characteristics of an acceptable use policy? (Choose two.)
42.
Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure
PSK on the two routers?
It enables complete access to the corporate network over an SSL VPN tunnel. [Dimented]
It requires remote access to the corporate network via a web browser and SSL.
Cisco Easy VPN Server enables VPN client remote access to a company intranet through
creation of secure IPsec tunnels.
(Ref 8.6.4.1)
44.
Refer to the exhibit. A network administrator is troubleshooting a GRE VPN tunnel between
R1 and R2. Assuming the R2 GRE configuration is correct and based on the running
configuration of R1, what must the administrator do to fix the problem?
45. Which spanning-tree enhancement prevents the spanning-tree topology from changing by
blocking a port that receives a superior BPDU?
PortFast
BDPU filter
(Ref: 6.3.3.5)
46. In deploying an IPS in a corporate network, system operators first create a profile of
normal network operation by monitoring network activities in normal network uses. After the
profile is incorporated into the IPS triggering mechanism, alarms will be generated when the
IPS detects excessive activity that is beyond the scope of the profile. Which signature
detection mechanism is deployed?
pattern-based detection
policy-based detection
anomaly-based detection
(Ref: 5.2.2.3)
47. Why does a worm pose a greater threat than a virus poses?
Worms are not detected by antivirus programs.
48. Which security feature would be commonly implemented as part of a large enterprise
wireless policy but would not typically be used in a small office/home office network?
using WPA2
49. Which two commands are needed on every IPv6 ACL to allow IPv6 neighbor discovery?
(Choose two.)
hash key
digital signature
51. A company is designing its strategy of deploying Cisco Secure ACS to manage user
access. The company is currently using a Windows server for the internal authentication
service. The network administrator needs to configure the ACS to contact the Windows server
when it cannot find the user in its local database. Which option of external user database setup
should be configured on ACS?
by administrator privilege
(Ref: 3.3.5.1)
52.
Refer to the exhibit. What is the purpose of the highlighted inspect line?
It is the action to take on the traffic from the 10.10.10.0/24 network. [Rahul and Zepo]
It dictates to the firewall to track all outgoing sessions no matter the source in order to
determine whether a return packet is allowed. [Dimented]
It is the command used to apply a rate limit to a specific class of traffic. [abd]
53. Which two options are offered through the Cisco TrustSec Solution for enterprise
networks? (Choose two.)
(Ref: 3.3.3.3)
54. Which statement accurately describes Cisco IOS zone-based policy firewall operation?
(Ref: 4.3.2.1)
55. Two devices that are connected to the same switch need to be totally isolated from one
another. Which Cisco switch security feature will provide this isolation?
DTP
SPAN
(Ref: 6.3.7.1)
56. Why is a reflexive ACL harder to spoof compared to an extended ACL that uses the
established keyword?
It provides more detailed filter criteria to match an incoming packet before the packet is
allowed through.
57. Which security feature helps protect a VoIP system from SPIT attacks?
AES
BPDU guard
WPA2
authenticated TLS
58. What are two protocols that are used by AAA to authenticate users against a central
database of usernames and password? (Choose two.)
TACACS+
NTP
SSH
RADIUS
HTTPS
CHAP
59. Which security organization updates the training material that helps prepare for the Global
Information Assurance Certification (GIAC)?
CERT
CIS
SANS
(ISC)2
60. Which three wizards are included in Cisco ASDM 6.4? (Choose three.)
Startup wizard
VPN wizard
61. Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still
unable to ping the inside interface from an inside host. What is the cause of this problem?
The security level of the inside interface should be 0 and the outside interface should be 100.
VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.
VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.
host 192.168.1.3
host 192.168.1.4
63. Refer to the exhibit. According to the command output, which three statements are true
about the DHCP options entered on the ASA 5505? (Choose three.)
The dhcpd auto-config outside command was issued to enable the DHCP client.
The dhcpd enable inside command was issued to enable the DHCP server.
The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the
DHCP client.
The dhcpd auto-config outside command was issued to enable the DHCP server.
The dhcpd enable inside command was issued to enable the DHCP client.
(Ref: Syslog clients: Routers or other types of equipment that generate and forward log
messages to syslog servers)
65. Which three types of remote access VPNs are supported on ASA devices? (Choose three.)
66. Refer to the exhibit. The network administrator is configuring the port security feature on
switch SWC. The administrator issued the command show port-security interface fa 0/2 to
verify the configuration. What can be concluded from the output that is shown? (Choose
three.)
67. What is an advantage of using CCP rather than the CLI to configure an ACL?
IPsec is supported.
CCP applies the read-only quality to manually created access rules so that accidental
modification cannot be made.
68. What is a CLI initiated script that locks down the control plane of a Cisco router in one
step?
Cisco AutoSecure
IP Source Guard
(Ref: 1. CCNA Security Chapter 2.4.2.1 – Released in IOS version 12.3, Cisco AutoSecure is
a feature that is initiated from the CLI and executes a script.
2. http://www.ciscopress.com/articles/article.asp?p=1924983&seqNum=3)
69. Which three statements should be considered when applying ACLs to a Cisco router?
(Choose three.)
An access list applied to any interface without a configured ACL allows all traffic to
pass.
More specific ACL entries should be placed at the top of the ACL.
ACLs always search for the most specific entry before taking any filtering action.
70. What is one way to prevent attackers from eavesdropping on VoIP conversations?
Use Forced Authorization Codes.
Implement separate voice VLANs.
Configure IP phones to use only signed firmware files.
Create ACLs to allow only VoIP protocols.
71. A large company deploys several network-based IPS sensors for its headquarters network.
Which network service configuration will help the process of correlating attack events
happening simultaneously in different points of the network?
72. What is the role of the Cisco NAC Manager in implementing a secure networking
infrastructure?
73. What command must be issued to enable login enhancements on a Cisco router?
banner motd
login delay
login block-for
74. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that
filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic
originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A,
B, and C
Data is compromised.
76. What three phases would be addressed as part of doing business continuity planning?
(Choose three.)
a recovery phase
a reaction phase
an initiation phase
(Source: 10.5.1.1)
77. Logging into a computer as the administrator just to surf the web is a violation of which
security technique?
process isolation
least privilege
the use of a telephony system to send unsolicited and unwanted bulk messages
the use of a telephony system to get information, such as account details, directly from users
the use of a telephony system to illegally intercept voice packets in order to listen in on a call
79. A user complains about not being able to gain access to the network. What command
would be used by the network administrator to determine which AAA method list is being
used for this particular user as the user logs on?
80. Place the system development cycle (SDLC) phases in the order they occur (Not all
options are used)
Answer: Root
82. A network administrator notices that unsuccessful login attempts have caused a router to
enter quiet mode. How can the administrator maintain remote access to the networks even
during quiet mode?
Quiet mode behavior can be enabled via an ip access-group command on a physical interface.
Quiet mode behavior will only prevent specific user accounts from attempting to authenticate.
Quiet mode behavior can be overridden for specific networks by using an ACL.
83. Which type of NAT would be used on an ASA where 10.0.1.0/24 inside addresses are to
be translated only if traffic from these addresses is destined for the 198.133.219.0/24
network?
static NAT
dynamic PAT
dynamic NAT
policy NAT
84. Refer to the exhibit. Two types of VLAN interfaces were configured on an ASA 5505
with a Base license. The administrator wants to configure a third VLAN interface with limited
functionality. Which action should be taken by the administrator to configure the third
interface?
The administrator needs to acquire the Security Plus license, because the Base license does
not support the proposed action.
The administrator must enter the no forward interface vlan command before the nameif
command on the third interface.
Because the ASA 5505 does not support the configuration of a third interface, the
administrator cannot configure the third VLAN.
The administrator configures the third VLAN interface the same way the other two were
configured, because the Base license supports the proposed action.
85. Refer to the exhibit. A network administrator is configuring the security level for the
ASA. What is a best practice for assigning the security level on the three interfaces?
86. Which two functions are provided by Network Admission Control? (Choose two.)
enforcing network security policy for hosts that connect to the network
limiting the number of MAC addresses that can be learned on a single switch port
Please leave comment for any unlisted or new questions, answers or any correction for CCNA
Security Final Exam v1.2. Hope it will benefits all of us. Thank you and wish you good luck.
Acknowledgement
J***, R*** and N*** – Questions Contributor Starter, Answers and Reference
Zaf, Dimented, Nuno, abd, Jez, Zepo, Paul, Kim, Silk, My Wife, ComoEh, Juan, Rodion,
marcel, kevin – Answers Contributor
Zen, Mage, Saco, tonduyutong, Nicer, Anon – Questions, Answers and Reference Contributor
Sharing is Caring
FacebookTwitterWhatsAppWeChatCopy Link
172 thoughts on “Answer CCNA Security Final
Exam – CCNAS v1.2”
1. Zafsays:
Reply
2. Zafsays:
11. What is a type of SSL VPN that provides access to a network without
requiring VPN software or a Java applet on the client?
Reply
0. nunosays:
Reply
3. Zafsays:
30) Refer to the exhibit. The administrator can ping the S0/0/1
interface of RouterB but is unable to gain Telnet access to the router by
using the password cisco123. What is a possible cause of the problem?
Correct Answer:
The password cisco123 is wrong.
Reply
4. Zafsays:
Correct Answer:
Reply
5. Zafsays:
17. What is a difference between ASA IPv4 ACLs and IOS IPv4 ACLs?
Correct Answer:
ASA ACLs use the subnet mask in defining a network, whereas IOS
ACLs use the wildcard mask.
Reply
6. Zafsays:
Correct Answer:
Disable trunk negotiation for trunk ports and statically set nontrunk
ports as access ports.
Reply
7. Zafsays:
Correct Answer:
Reply
8. Zafsays:
Correct Answer:
DH
Reply
9. Zafsays:
Correct Answer:
Reply
10. Zafsays:
Correct Answer:
Reply
11. Zafsays:
Correct Answer:
summary alerts
Reply
12. Zafsays:
Correct Answer:
This is a notification message for a normal but significant condition.
Reply
0. InviAlgosays:
Reply
13. dimentedsays:
Reply
14. dimentedsays:
4.
7.
1
Refer to the exhibit. A network administrator is configuring the
security level for the ASA. Which statement describes the default result
if the administrator tries to assign the Inside interface with the same
security level as the DMZ interface?
The ASA console will display an error message.
The ASA will not allow traffic in either direction between the Inside
interface and the DMZ.
The ASA allows traffic from the Inside to the DMZ, but blocks traffic
initiated on the DMZ to the Inside interface.
The ASA allows inbound traffic initiated on the Internet to the DMZ,
but not to the Inside interface.
11. What is a type of SSL VPN that provides access to a network without
requiring VPN software or a Java applet on the client?
CISCO vpn client mode
Refer to the exhibit. Based on the output from the show secure bootset
command on router R1, which three conclusions can be drawn about
Cisco IOS Resilience? (Choose three.)
The Cisco IOS image file is hidden and cannot be copied, modified, or
deleted.
A copy of the router configuration file has been made.
The secure boot-config command was issued on R1.
26. What is one advantage of using a Cisco ASA for remote networking
VPN deployment compared to a Cisco ISR?
support for SSL VPNs
27. What will be disabled as a result of the no service password-
recovery command?
ability to access ROMMON