SECURITY FINAL 1

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
2 points
Which authentication method is available when specifying a method list for group policy lookup using the CCP Easy VPN Server wizard?
2.
2 points
Which two configuration requirements are needed for remote access VPNs using Cisco Easy VPN Server, but are not required for site-to-site VPNs? (Choose two.)
3.
3 points
Refer to the exhibit. Which three things occur if a user attempts to log in four times within 10 seconds using an incorrect password? (Choose three.)
4.
2 points
What can be used as a VPN gateway when setting up a site-to-site VPN?
5.
2 points
Which statement is true about the One-Step lockdown feature of the CCP Security Audit wizard?
6.
2 points
Which type of encryption algorithm uses public and private keys to provide authentication, integrity, and confidentiality?
7.
2 points
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
8.
2 points
Refer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements?
9.
2 points
Which access list statement permits HTTP traffic that is sourced from host 10.1.129.100 port 4300 and destined to host 192.168.30.10?
10.
3 points
Which three statements describe the IPsec protocol framework? (Choose three.)
11.
3 points
Which three statements describe limitations in using privilege levels for assigning command authorization? (Choose three.)
12.
2 points
Which statement describes the operation of the IKE protocol?
13.
2 points
Why does a worm poses a greater threat than a virus poses?
14.
2 points
Which set of Cisco IOS commands instructs the IPS to compile a signature category named ios_ips into memory and use it to scan traffic?
15.
2 points
Refer to the exhibit. An administrator has entered the commands that are shown on router R1. At what trap level is the logging function set?
16.
2 points
A network technician is configuring SNMPv3 and has set a security level of auth. What is the effect of this setting?
17.
3 points
What are three common examples of AAA implementation on Cisco routers? (Choose three.)
18.
2 points
When configuring a site-to-site IPsec VPN using the CLI, the authentication pre-share command is configured in the ISAKMP policy. Which additional peer authentication configuration is required?
19.
2 points
Which statement describes configuring ACLs to control Telnet traffic destined to the router itself?
20.
2 points
Which action best describes a MAC address spoofing attack?
21.
2 points
Which type of Layer 2 attack makes a host appear as the root bridge for a LAN?
22.
2 points
Refer to the exhibit. What conclusion can be drawn from the exhibited window when it is displayed on a remote user computer screen?
23.
3 points
What are three characteristics of the ASA routed mode? (Choose three.)
24.
2 points
When port security is enabled on a Cisco Catalyst switch, what is the default action when the maximum number of allowed MAC addresses is exceeded?
25.
2 points
When logging is enabled for an ACL entry, how does the router switch packets filtered by the ACL?
26.
2 points
If a switch is configured with the storm-control command and the action shutdown and action trap parameters, which two actions does the switch take when a storm occurs on a port? (Choose two.)
27.
2 points
Refer to the exhibit. Which two statements are correct regarding the configuration on switch S1? (Choose two.)
28.
2 points
What is a characteristic of AAA accounting?
29.
2 points
Refer to the exhibit. Which interface configuration completes the CBAC configuration on router R1?
30.
2 points
Refer to the exhibit. The administrator can ping the S0/0/1 interface of RouterB but is unable to gain Telnet access to the router using the password cisco123. What is a possible cause of the problem?