0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Which of the following type of traffic inspection uses pattern matching?
Question 2 of 50
1 point(s)
Which of the following type of VPN technology is likely to be used in a site-to-site VPN?
Question 3 of 50
1 point(s)
What is a ping sweep?
Question 4 of 50
1 point(s)
Which three are the main components of information security? (Choose any three)
Question 5 of 50
1 point(s)
Which three characteristics describe SIEM technology? (Choose any three)
Question 6 of 50
1 point(s)
Databases that categorizes the threats over the internet are known as:
Question 7 of 50
1 point(s)
Which of the followings is an availability attack?
Question 8 of 50
1 point(s)
Which of the followings are the attack generating methods? (Choose any three)
Question 9 of 50
1 point(s)
Which attack denies services reduce the functionality or prevent the access of the resources even to the legitimate users?
Question 10 of 50
1 point(s)
Which of the two network security solutions can be used to prevent DoS attacks? (Choose any two)
Question 11 of 50
1 point(s)
An attacker with a laptop (rogue access point) is capturing all network traffic from a targeted user. Which type of attack is this?
Question 12 of 50
1 point(s)
What is the characteristic of a Trojan horse?
Question 13 of 50
1 point(s)
What is the characteristic of a worm malware?
Question 14 of 50
1 point(s)
An attacker is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?
Question 15 of 50
1 point(s)
Which malicious software is designed to encrypt user’s data and then hackers demand ransom payment to decrypt the respective data?
Question 16 of 50
1 point(s)
Which attack involves a software program attempting to discover a system password by using an electronic dictionary?
Question 17 of 50
1 point(s)
Which type of network has the topology where multiple LANs are interconnected but it is not expanded as Wide Area Network (WAN) or Metropolitan Area Network (MAN)?
Question 18 of 50
1 point(s)
The technique of encrypting the clear text data into a scrambled code is called:
Question 19 of 50
1 point(s)
Which type of cryptography uses the same pair of keys on both sides?
Question 20 of 50
1 point(s)
The combination of policies, procedures, hardware, software, and people that are required to create, manage and revoke digital certificates is called?
Question 21 of 50
1 point(s)
Which kind of potential threat can occur by Instant On in a data center?
Question 22 of 50
1 point(s)
What role does the Security Intelligence Operations (SIO) play in Network architecture?
Question 23 of 50
1 point(s)
What is the primary method of network defense for mitigating malware?
Question 24 of 50
1 point(s)
What usually motivates cyber attackers or criminals to attack networks as compared to hacktivists or state-sponsored hackers?
Question 25 of 50
1 point(s)
What purpose does a digital certificate serve?
Question 26 of 50
1 point(s)
Which of the following is a type of encryption algorithm that uses a pair of public and private keys to provide authentication, integrity, and confidentiality?
Question 27 of 50
1 point(s)
Which of the following type of an encryption algorithm uses the same key to encrypt and decrypt data?
Question 28 of 50
1 point(s)
What is the main feature of Control Plane Policing (CoPP)?
Question 29 of 50
1 point(s)
What are the types of role-based CLI control access feature?
Super view, admin view, config view, CLI view
admin view, Root view, CLI view, Super view
root view, CLI view, Super view, admin view
CLI view, Root view, Super view, Law intercept view
Question 30 of 50
1 point(s)
By default, what is the privilege level of user account created on Cisco routers?
Question 31 of 50
1 point(s)
Syslog server uses eight severity levels from zero, which of the following level indicates the critical condition?
Question 32 of 50
1 point(s)
An application-level network monitoring protocol with fewer manager stations and controls a set of agents, known as:
Question 33 of 50
1 point(s)
Which one is the characteristic of the MIB?
Question 34 of 50
1 point(s)
_________________ is the process of proving an identity of a user by login identification and a password.
Question 35 of 50
1 point(s)
Which AAA security protocol provides encryption of full payload?
Question 36 of 50
1 point(s)
What is the requirement to enable the Secure Copy Protocol feature in a network?
Question 37 of 50
1 point(s)
Which specification or protocol provides port based network access control (PNAC)?
Question 38 of 50
1 point(s)
Which technology provides seamless connectivity between network and end users while maintaining good security policies for an organization?
Question 39 of 50
1 point(s)
Which solution provides the unified management of the entire network (mobile devices, smart phones, tablets, notebooks, Laptops etc.) from a centralized dashboard?
Question 40 of 50
1 point(s)
Which option can be configured by Cisco AutoSecure?
Question 41 of 50
1 point(s)
After enabling AAA, which three CLI steps are required to configure a router with a parser view? (Choose any three)
Question 42 of 50
1 point(s)
In SSH, which three steps are required to configure Router to accept only encrypted SSH connections? (Choose any three)
Question 43 of 50
1 point(s)
What are the three primary functions of syslog logging service? (Choose any three)
Question 44 of 50
1 point(s)
On which plane or layer do we apply policies to control user traffic?
Question 45 of 50
1 point(s)
Which plane involves the configuration, management and monitoring of networking devices?
Question 46 of 50
1 point(s)
Which of the following version of SNMP supports encryption and hashing?
Question 47 of 50
1 point(s)
Which protocol allows networking devices to synchronize their time with respect to the NTP server, so the devices may have more authenticated time settings and generated syslog messages?
Question 48 of 50
1 point(s)
What functional plane is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?
Question 49 of 50
1 point(s)
If a user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled or not?
Question 50 of 50
1 point(s)
Which AAA solution supports both RADIUS and TACACS+ servers?