CCNA Security Final Exam (2nd Half)

Is this your test? Login to manage it. If not, you can build an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What is the purpose of a local username database if multiple ACS servers are configured to provide authentication services?
2.
1 point
What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)
3.
1 point
Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.)
4.
1 point
What is a feature of the TACACS+ protocol?
5.
1 point
Which network security tool allows an administrator to test and detect weak passwords?
6.
1 point
Which statement describes a characteristic of the Security Device Event Exchange (SDEE) feature supported by the Cisco IOS IPS?
7.
1 point
Refer to the exhibit. Based on the security levels of the interfaces on ASA1, what traffic will be allowed on the interfaces?
8.
1 point
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
9.
1 point
What is a characteristic of most modern viruses?
10.
1 point
If a network administrator wants to track the usage of FTP services, which keyword or keywords should be added to the aaa accounting command?
11.
1 point
In which two instances will traffic be denied as it crosses the ASA 5505 device? (Choose two.)
12.
1 point
A company deploys a hub-and-spoke VPN topology where the security appliance is the hub and the remote VPN networks are the spokes. Which VPN method should be used in order for one spoke to communicate with another spoke through the single public interface of the security appliance?
13.
1 point
Why is hashing cryptographically stronger compared to a cyclical redundancy check (CRC)?
14.
1 point
A network analyst wants to monitor the activity of all new interns. Which type of security testing would track when the interns sign on and sign off the network?
15.
1 point
In an AAA-enabled network, a user issues the configure terminal command from the privileged executive mode of operation. What AAA function is at work if this command is rejected?
16.
1 point
**** New Incomplete Question ****

The following authentication configuration is applied to a router.

aaa authentication login default tacacs+ local enable none

Several days later the TACACS+ server goes off-line. Which method will be used to authenticate users?
17.
1 point
What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?
18.
1 point
Which security policy outlines the overall security goals for managers and technical personnel within an organization and includes the consequences of noncompliance with the policy?
19.
1 point
What is a secure configuration option for remote access to a network device?
20.
1 point
Which feature is specific to the Security Plus upgrade license of an ASA 5505 and provides increased availability?
21.
1 point
Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network?
22.
1 point
In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?
23.
1 point
What is the default preconfigured interface for the outside network on a Cisco ASA 5505?
24.
1 point
Which two features should be configured on end-user ports in order to prevent STP manipulation attacks? ( Choose two.)
25.
1 point
A network technician is attempting to resolve problems with the NAT configuration on an ASA. The technician generates a ping from an inside host to an outside host. Which command verifies that addresses are being translated on the ASA?
26.
1 point
A security awareness session is best suited for which topic?
27.
1 point
Which two types of hackers are typically classified as grey hat hackers? (Choose two.)
28.
1 point
Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.)
29.
1 point
Which two ports can send and receive Layer 2 traffic from a community port on a PVLAN? (Choose two.)
30.
1 point
What provides both secure segmentation and threat defense in a Secure Data Center solution?
31.
1 point
What mechanism is used by an ASA 5505 device to allow inspected outbound traffic to return to the originating sender who is on an inside network?
32.
1 point
An organization has configured an IPS solution to use atomic alerts. What type of response will occur when a signature is detected?
33.
1 point
What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)
34.
1 point
Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)
35.
1 point
What is the function of a policy map configuration when an ASA firewall is being configured?
36.
1 point
What is the benefit of the network-based IPS (NIPS) over host-based IPS (HIPS) deployment models?
37.
1 point
Fill in the blank.

A stateful signature is also known as a _____________ signature.
38.
1 point
Refer to the exhibit. Based on the configuration that is shown, which statement is true about the IPS signature category?
39.
1 point
What function is provided by the Tripwire network security tool?
40.
1 point
What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence?
41.
1 point
An administrator assigned a level of router access to the user ADMIN using the commands below.

Router(config)# privilege exec level 14 show ip route
Router(config)# enable algorithm-type scrypt secret level 14 cisco-level-10
Router(config)# username ADMIN privilege 14 algorithm-type scrypt secret cisco-level-10

Which two actions are permitted to the user ADMIN? (Choose two.)
42.
1 point
What are two drawbacks in assigning user privilege levels on a Cisco router? (Choose two.)
43.
1 point
What is required for auto detection and negotiation of NAT when establishing a VPN link?
44.
1 point
Which procedure is recommended to mitigate the chances of ARP spoofing?