QUIZ: CCNA Security Second Edition Part 2
Practice Exam Instructions
The exam comprises of the following types of questions;
Multiple Choice Single Response
Multiple Choice Multiple Response
There is no negative marking.
Attempt History: 0
Total Questions: 50
Quiz Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
1 point(s)When one of the following is supposed to be the best time to perform an anti-virus signature update?
CorrectIncorrect -
Question 2 of 50
2. Question
1 point(s)Which of the following statement is true about application blocking?
CorrectIncorrect -
Question 3 of 50
3. Question
1 point(s)What action would you take to block users from accidentally visiting the URL and becoming infected with malware if a specific URL has been identified as containing malware?
CorrectIncorrect -
Question 4 of 50
4. Question
1 point(s)Which of the following three features can protect the data plane? (Choose three.)
CorrectIncorrect -
Question 5 of 50
5. Question
1 point(s)In How many numbers can you apply crypto map sets to a router interface?
CorrectIncorrect -
Question 6 of 50
6. Question
1 point(s)Which of the following represents the correct transition order of STP states on a Layer 2 switch interface?
CorrectIncorrect -
Question 7 of 50
7. Question
1 point(s)What is the effect on the company’s business, when a company puts a security policy in place?
CorrectIncorrect -
Question 8 of 50
8. Question
1 point(s)Which of the following statements are true about reflexive access lists? (Choose any three.)
CorrectIncorrect -
Question 9 of 50
9. Question
1 point(s)Which three of the following actions can a promiscuous IPS take to mitigate an attack? (Choose any three.)
CorrectIncorrect -
Question 10 of 50
10. Question
1 point(s)Which of the following Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?
CorrectIncorrect -
Question 11 of 50
11. Question
1 point(s)Which two of the following accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose any two.)
CorrectIncorrect -
Question 12 of 50
12. Question
1 point(s)Which of the following command is used to enable SSH support on a Cisco Router?
CorrectIncorrect -
Question 13 of 50
13. Question
1 point(s)Which of the following protocol provides security to Secure Copy?
CorrectIncorrect -
Question 14 of 50
14. Question
1 point(s)Which of the following security zone is automatically defined by the system?
CorrectIncorrect -
Question 15 of 50
15. Question
1 point(s)What purpose does Internet Key Exchange in an IPsec VPN serves? (Choose any two.)
CorrectIncorrect -
Question 16 of 50
16. Question
1 point(s)Which of the following address block is reserved for locally assigned unique local addresses?
CorrectIncorrect -
Question 17 of 50
17. Question
1 point(s)For which of the following reason the error message Router(config)#aaa server?% Unrecognized command occurs?
CorrectIncorrect -
Question 18 of 50
18. Question
1 point(s)What will be the potential consequence, if the native VLAN on a trunk is different on each end of the link?
CorrectIncorrect -
Question 19 of 50
19. Question
1 point(s)When you apply an access list to a physical interface, which of the following option describes information that must be considered?
CorrectIncorrect -
Question 20 of 50
20. Question
1 point(s)Which one of the following source port does IKE use when NAT has been detected between two VPN gateways?
CorrectIncorrect -
Question 21 of 50
21. Question
1 point(s)Which three of the following features are of IPsec transport mode? (Choose any three.)
CorrectIncorrect -
Question 22 of 50
22. Question
1 point(s)Which of the following command makes a Layer 2 switch interface to operate as a Layer 3 interface?
CorrectIncorrect -
Question 23 of 50
23. Question
1 point(s)Which of the following security term refers to a person, property, or data of value to a company?
CorrectIncorrect -
Question 24 of 50
24. Question
1 point(s)Which of the following technology you can use to prevent non malicious program to run in the computer that is disconnected from the network?
CorrectIncorrect -
Question 25 of 50
25. Question
1 point(s)Which of the following command enable ospf authentication?
CorrectIncorrect -
Question 26 of 50
26. Question
1 point(s)Which of the following command help user1 to use enable, disable, exit commands?
CorrectIncorrect -
Question 27 of 50
27. Question
1 point(s)Which of the following two NAT types allows only objects or groups to reference an IP address? (choose two)
CorrectIncorrect -
Question 28 of 50
28. Question
1 point(s)Which of the following port in a PVLAN can communicate with every other ports?
CorrectIncorrect -
Question 29 of 50
29. Question
1 point(s)Which two of the following given commands result in a secure bootset? (Choose any two.)
CorrectIncorrect -
Question 30 of 50
30. Question
1 point(s)What one of the following is an example of social engineering?
CorrectIncorrect -
Question 31 of 50
31. Question
1 point(s)Which of the following prevent the company data from modification even when the data is in transit?
CorrectIncorrect -
Question 32 of 50
32. Question
1 point(s)Which one is an example of SYN flood attack?
CorrectIncorrect -
Question 33 of 50
33. Question
1 point(s)Which of the following type of an IPS can identify worms that are propagating in a network?
CorrectIncorrect -
Question 34 of 50
34. Question
1 point(s)Which of the following command verifies phase 1 of an IPsec VPN on a Cisco router?
CorrectIncorrect -
Question 35 of 50
35. Question
1 point(s)Which of the following type of firewall can act on the behalf of the end device?
CorrectIncorrect -
Question 36 of 50
36. Question
1 point(s)In which of the following threat, the victim tricked into entering username and password information at a disguised website?
CorrectIncorrect -
Question 37 of 50
37. Question
1 point(s)Which of the following type of mirroring does SPAN technology perform?
CorrectIncorrect -
Question 38 of 50
38. Question
1 point(s)Which of the following network device does NTP authenticate?
CorrectIncorrect -
Question 39 of 50
39. Question
1 point(s)Which of the following Cisco product can help mitigate web-based attacks within a network?
CorrectIncorrect -
Question 40 of 50
40. Question
1 point(s)Which of the following statement correctly describes the function of a private VLAN?
CorrectIncorrect -
Question 41 of 50
41. Question
1 point(s)Which of the following hash type does Cisco use to validate the integrity of downloaded images?
CorrectIncorrect -
Question 42 of 50
42. Question
1 point(s)Which of the following Cisco feature can help us to mitigate spoofing attacks by verifying symmetry of the traffic path?
CorrectIncorrect -
Question 43 of 50
43. Question
1 point(s)Which one the following is the most common Cisco Discovery Protocol version 1 attack?
CorrectIncorrect -
Question 44 of 50
44. Question
1 point(s)Which of the following is the Cisco preferred countermeasure to mitigate CAM overflows?
CorrectIncorrect -
Question 45 of 50
45. Question
1 point(s)Which one of the following option is the most effective placement of an IPS device within the infrastructure?
CorrectIncorrect -
Question 46 of 50
46. Question
1 point(s)Which of the following events will occur when the TACACS+ server returns an error, if a router configuration includes the line aaa authentication login default group tacacs+ enable? (Choose anytwo.)
CorrectIncorrect -
Question 47 of 50
47. Question
1 point(s)Which of the following alert protocol is used with Cisco IPS Manager Express to support up to 10 sensors?
CorrectIncorrect -
Question 48 of 50
48. Question
1 point(s)What is the first step that STP takes to prevent loops, when a switch has multiple links connected to a downstream switch?
CorrectIncorrect -
Question 49 of 50
49. Question
1 point(s)Which of the following type of network address translation should be used when a Cisco ASA is in transparent mode?
CorrectIncorrect -
Question 50 of 50
50. Question
1 point(s)Which of the following components does HMAC use to determine the authenticity and integrity of a message? (Choose any two.)
CorrectIncorrect