Thursday, January 30, 2014

CCNA 4 Chapter 7 -2014

1. Refer to the exhibit. Traffic exiting R1 is failing translation. What part of the configuration is most likely incorrect?
Access-list statement

2. Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?
defines which addresses can be translated

3. How many bits of an IPv6 address are used to identify the interface ID?
64

4. Refer to the exhibit. How many IPv6 broadcast domains exist in this topology?
0

Tuesday, January 28, 2014

CCNA 4 Chapter 8 -2014

1. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?
192.168.3.40 0.0.0.7

2. Excessive broadcasts are generally a symptom of a problem at which layer?
Data link

3. Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)
A carrier detect signal is present.
Keepalives are being received successfully.
The LCP negotiation phase is complete.

4. A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)
Transport layer
Application layer

Thursday, January 23, 2014

CCNA 4 Final Exam Answers -2014

1. What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?
define which addresses can be translated

2. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
Deliberately misspell words when creating passwords.
Create passwords that are at least 8 characters in length.
Use combinations of upper case, lower case, and special characters.

3. Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem?
The configuration register is set to ignore the startup configuration.

4. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?
CIR

Wednesday, January 15, 2014

CCNA Security Chapter 1 - 2014

1. What are the basic phases of attack that can be used by a virus or worm in sequential order?


paralyze, probe, penetrate, persist, and propagate

>> 
probe, penetrate, persist, propagate, and paralyze


penetrate, persist, propagate, paralyze, and probe


persist, propagate, paralyze, probe, and penetrate

2. Which two are characteristics of DoS attacks? (Choose two.)


They always precede access attacks.

>> 
They attempt to compromise the availability of a network, host, or application.


They are difficult to conduct and are initiated only by very skilled attackers.


They are commonly launched with a tool called L0phtCrack.

>> 
Examples include smurf attacks and ping of death attacks.

3. Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?


An access attack has occurred.

>> 
A virus has infected the computers.


A DoS attack has been launched against the network.


The computers are subject to a reconnaissance attack.



Tuesday, January 14, 2014

CCNA Security Chapter 2 - 2014

1. Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two. )

>> 
This message is a level five notification message.


This message appeared because a minor error occurred requiring further investigation.


This message appeared because a major error occurred requiring immediate action.

>> 
This message indicates that service timestamps have been globally enabled.


This message indicates that enhanced security was configured on the vty ports.



2. By default, how many seconds of delay between virtual login attempts is invoked when the login block-for command is configured?

>> 
one


two


three


four


five

3. Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two. )


Both routers are configured to use NTPv2.

>> 
Router R1 is the master, and R2 is the client.


Router R2 is the master, and R1 is the client.

>> 
The IP address of R1 is 192. 168. 1. 2.


The IP address of R2 is 192. 168. 1. 2.



Monday, January 13, 2014

CCNA Security Chapter 3 - 2014

1. Why is local database authentication preferred over a password-only login?


It specifies a different password for each line or port.

>> 
It provides for authentication and accountability.


It requires a login and password combination on console, vty lines, and aux ports.


It is more efficient for users who only need to enter a password to gain entry to a device.



2. Which authentication method stores usernames and passwords in the router and is ideal for small networks?

>> 
local AAA


local AAA over RADIUS


local AAA over TACACS+


server-based AAA


server-based AAA over RADIUS


server-based AAA over TACACS+

3. In regards to Cisco Secure ACS, what is a client device?


a web server, email server, or FTP server.


the computer used by a network administrator.


network users who must access privileged EXEC commands.

>> 
a router, switch, firewall, or VPN concentrator.



Sunday, January 12, 2014

CCNA Security Chapter 4 - 2014

1. Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)

>> 
SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.


Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.


SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.

>> 
Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.


SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.


Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.

2. Which two are characteristics of ACLs? (Choose two.)

>> 
Extended ACLs can filter on destination TCP and UDP ports.


Standard ACLs can filter on source TCP and UDP ports.

>> 
Extended ACLs can filter on source and destination IP addresses.


Standard ACLs can filter on source and destination IP addresses.


Standard ACLs can filter on source and destination TCP and UDP ports.



3. Which zone-based policy firewall zone is system-defined and applies to traffic destined for the router or originating from the router?

>> 
self zone


system zone


local zone


inside zone


outside zone



Saturday, January 11, 2014

CCNA Security Chapter 5 - 2014

1. Refer to the exhibit. When modifying an IPS signature action, which two check boxes should be selected to create an ACL that denies all traffic from the IP address that is considered the source of the attack and drops the packet and all future packets from the TCP flow? (Choose two.)

>> 
Deny Attacker Inline

>> 
Deny Connection Inline


Deny Packet Inline


Produce Alert


Reset TCP Connection

2. Why is a network that deploys only IDS particularly vulnerable to an atomic attack?


The IDS must track the three-way handshake of established TCP connections.


The IDS must track the three-way handshake of established UDP connections.

>> 
The IDS permits malicious single packets into the network.


The IDS requires significant router resources to maintain the event horizon.


The stateful properties of atomic attacks usually require the IDS to have several pieces of data to match an attack signature.

3. Refer to the exhibit. What is the result of issuing the Cisco IOS IPS commands on router R1?


A named ACL determines the traffic to be inspected.


A numbered ACL is applied to S0/0/0 in the outbound direction.


All traffic that is denied by the ACL is subject to inspection by the IPS.

>> 
All traffic that is permitted by the ACL is subject to inspection by the IPS.


Friday, January 10, 2014

CCNA Security Chapter 6 - 2014

1. As a recommended practice for Layer 2 security, how should VLAN 1 be treated?


All access ports should be assigned to VLAN 1.


All trunk ports should be assigned to VLAN 1.


VLAN 1 should be used for management traffic.

>> 
VLAN 1 should not be used.



2. With IP voice systems on data networks, which two types of attacks target VoIP specifically? (Choose two.)


CoWPAtty


Kismet

>> 
SPIT


virus

>> 
vishing

3. Which option best describes a MAC address spoofing attack?


An attacker gains access to another host and masquerades as the rightful user of that device.

>> 
An attacker alters the MAC address of his host to match another known MAC address of a target host.


An attacker alters the MAC address of the switch to gain access to the network device from a rogue host device.


An attacker floods the MAC address table of a switch so that the switch can no longer filter network access based on MAC addresses.



Thursday, January 9, 2014

CCNA Security Chapter 7 - 2014

1. The network administrator for an e-commerce website requires a service that prevents customers from claiming that legitimate orders are fake. What service provides this type of guarantee?


authentication


confidentiality


integrity

>> 
nonrepudiation



2. How do modern cryptographers defend against brute-force attacks?


Use statistical analysis to eliminate the most common encryption keys.


Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.

>> 
Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.


Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.

3. What is the basic method used by 3DES to encrypt plaintext?


The data is encrypted three times with three different keys.

>> 
The data is encrypted, decrypted, and encrypted using three different keys.


The data is divided into three blocks of equal length for encryption.


The data is encrypted using a key length that is three times longer than the key used for DES.



Wednesday, January 8, 2014

CCNA Security Chapter 8 - 2014

1. Refer to the exhibit. Based on the CCP screen that is shown, which two conclusions can be drawn about the IKE policy that is being configured? (Choose two.)


It will use digital certificates for authentication.

>> 
It will use a predefined key for authentication.

>> 
It will use a very strong encryption algorithm.


It will be the default policy with the highest priority.


It is being created using the CCP VPN Quick Setup Wizard.



2. A network administrator is planning to implement centralized management of Cisco VPN devices to simplify VPN deployment for remote offices and teleworkers. Which Cisco IOS feature would provide this solution?

>> 
Cisco Easy VPN


Cisco VPN Client


Cisco IOS SSL VPN


Dynamic Multipoint VPN

3. Which statement describes an important characteristic of a site-to-site VPN?

>> 
It must be statically set up.


It is ideally suited for use by mobile workers.


It requires using a VPN client on the host PC.


It is commonly implemented over dialup and cable modem networks.


After the initial connection is established, it can dynamically change connection information.



Tuesday, January 7, 2014

CCNA Security Chapter 9 - 2014

1. In which phase of the system development life cycle should security requirements be addressed?


Add security requirements during the initiation phase.

>> 
Include a minimum set of security requirements at each phase.


Apply critical security requirements during the implementation phase.


Implement the majority of the security requirements at the acquisition phase.



2. Which type of analysis uses a mathematical model that assigns a monetary figure to the value of assets, the cost of threats being realized, and the cost of security implementations?


Qualitative Risk Analysis

>> 
Quantitative Risk Analysis


Qualitative Asset Analysis


Quantitative Continuity Analysis

3. Which term describes a completely redundant backup facility, with almost identical equipment to the operational facility, that is maintained in the event of a disaster?


backup site


cold site

>> 
hot site


reserve site


Monday, January 6, 2014

CCNA Security Chapter 10 - 2014

1. In what three ways do the 5505 and 5510 Adaptive Security Appliances differ? (Choose three.)


in the method by which they can be configured using either CLI or ASDM


in their compatibility with Cisco SecureX technology

>> 
in the maximum traffic throughput supported


in the number of interfaces


in operating system version support

>> 
in types of interfaces



2. Which three security features do ASA models 5505 and 5510 support by default? (Choose three.)


content security and control module


Cisco Unified Communications (voice and video) security

>> 
intrusion prevention system

>> 
stateful firewall

>> 
VPN concentrator


Zone-Based Policy Firewall

3. Which option lists the ASA adaptive security algorithm session management tasks in the correct order?


1) allocating NAT translations (xlates)
2) establishing sessions in the “fast path”
3) performing route lookups
4) performing the access list checks





1) establishing sessions in the “fast path”
2) performing the access list checks
3) allocating NAT translations (xlates)
4) performing route lookups



Saturday, January 4, 2014

CCNA Security Final exam answers - 2014

1. When logging is enabled for an ACL entry, how does the router switch packets filtered by the ACL?


topology-based switching


autonomous switching

>> 
process switching


optimum switching



2. Which statement is true about the One-Step lockdown feature of the CCP Security Audit wizard?


It enables the Secure Copy Protocol (SCP).


It supports AAA configuration.


It enables TCP intercepts.

>> 
It sets an access class ACL on vty lines.


It provides an option for configuring SNMPv3 on all routers.

3. What are three common examples of AAA implementation on Cisco routers? (Choose three.)

>> 
authenticating administrator access to the router console port, auxiliary port, and vty ports

>> 
authenticating remote users who are accessing the corporate LAN through IPsec VPN connections


implementing public key infrastructure to authenticate and authorize IPsec VPN peers using digital certificates

>> 
implementing command authorization with TACACS+


securing the router by locking down all unused services


tracking Cisco Netflow accounting statistics