CCNA Security v2.0 Chapter 1 Exam Answers

Similar documents
CCNA 1 Chapter v5.1 Answers 100%

2. When logging is used, which severity level indicates that a device is unusable?

CCNA 1 Chapter v5.1 Answers 100%

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*

CCNA Security v2.0 Chapter 2 Exam Answers

SIEM Use Cases 45 use cases for Security Monitoring

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)

CCNA 1 Chapter v5.1 Answers 100%

E-Lock Policy Manager White Paper

CCNA Security v2.0 Chapter 9 Exam Answers

Vulnerability Protection A Buffer for Patching

CCNA Security v2.0 Chapter 10 Exam Answers

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016

SafeDispatch SDR Gateway for MOTOROLA TETRA

CCNA Security v2.0 Chapter 3 Exam Answers

Web Application Security Version 13.0 Training Course

An Introduction to Crescendo s Maestro Application Delivery Platform

CCNA 1 v5.1 Practice Final Exam Answers %

SASAC v1.0 Implementing Core Cisco ASA Security Cisco Training

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

threats. & kali linux security Exposure to other Packet filter firewall o o o o o Stateful Inspection next generation Stateful and

1. Which organization certifies vendors for adherence to the standards to improve interoperability of products?

IS312T Information Security Essentials [Onsite]

ASM Educational Center (ASM) Est Authorized SCNP Security Certified Network Professional Boot Camp

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

CNS-222-1I: NetScaler for Apps and Desktops

TDR and Trend Micro. Integration Guide

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016

Chapter 2. The OSI Model and TCP/IP Protocol Suite. PDF created with FinePrint pdffactory Pro trial version

(CNS-220) Citrix NetScaler Essentials and Traffic Management

COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE SOLUTION

2. When an EIGRP-enabled router uses a password to accept routes from other EIGRP-enabled routers, which mechanism is used?

CCNA course contents:

CCNA 1 Chapter v5.1 Answers 100%

ITD Information Security October 19, 2015

Comprehensive LAN Security for the Banking Financial Services and Insurance Industries

The Internet protocol

Questions and Answers

ELEC5509 Mobile Networks

IT Security & New Regulatory Requirements May 29, 2014

Packet Tracer - Skills Integration Challenge Topology

WDBWL v1.2 Cisco Deploying Basic Wireless LANs

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

ELEC5509 Mobile Networks

CNS-301 Citrix NetScaler 10.5 Advanced Implementation

1. What are two disadvantages of employing teleworkers in an organization? (Choose two.)

Point-to-Point Encryption (P2PE)

WordPress Penetration Testing using WPScan & Metasploit

Patch Management Policy

UNSW Technology Policy:


REST; WebSocket (RFC 6455)

IPv6 Foundations: Protocols, Services and Migration

ASM Educational Center (ASM) Est Authorized SCNS Security Certified Network Specialist Boot Camp

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

2. Which command can be used to view the cable type that is attached to a serial interface?

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1

Knowledge Exchange (KE) System Cyber Security Plan

App Orchestration 2.6

INVENTION DISCLOSURE

Overview. Recommended pre-requisite courses: Key Skills. : CNS-220-1I: Citrix NetScaler Traffic Management

WLAN Interoperability Testing with Expert Analysis

1. What is a characteristic of Frame Relay that provides more flexibility than a dedicated line?

Chapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version

Understanding Active Directory Domain Services (AD DS) Functional Levels

CCNA 3 Practice Final v5.0 Exam Answers 2015 (100%)

Chapter 5. The Network Layer IP

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Packet Tracer - Configuring a Zone-Based Policy Firewall (ZPF)

Please contact technical support if you have questions about the directory that your organization uses for user management.

NSE 8 Certification. Exam Description for FortiGate 5.2 and higher

Dynamic Storage (ECS)

Intelligence Driven Malware Analysis (IDMA) Malicious Profiling

High Security SaaS Concept Software as a Service (SaaS) for Life Science

2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?

IS315T IS Risk Management and Intrusion Detection [Onsite]

Implementation of Authentication Mechanism for a Virtual File System

Software Defined Networking and OpenFlow. Jeffrey Dalla Tezza and Nate Schloss

Managed Infrastructure SLA

CS4500/5500 Operating Systems Computer and Operating Systems Overview

Course Name: VMware vsphere: Install, Configure, Manage [V6.5] Duration: 5 Days

Network Analysis, Intrusion Detection/Prevention Systems Laboratory. Computer Information Systems Department. Computer Information Systems: Security

Town of Warner, New Hampshire Information Security Policy

Secure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016

Stop the Exploit. Stop the Attack. Justin Walker & Chris Chaves

TDR and Symantec. Integration Guide

Connect+/SendPro P Series Networking Technical Specification

Dell Wyse Device Manager (WDM)

Developing Microsoft SharePoint Server 2013 Core Solutions

MID-II Examinations April 2018 Course: B. Tech Branch:CSE Year: II. Date of Exam: AN Max.Marks 30 TIME :02:00PM TO 03:00 PM

Apply power, the appliance may be powered by connecting:

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

Infrastructure Series

Managed Infrastructure SLA

TDR and Avast Business Antivirus. Integration Guide

DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE

Frequently Asked Questions

Transcription:

CCNA Security v2.0 Chapter 1 Exam Answers 1. What methd can be used t mitigate ping sweeps? using encrypted r hashed authenticatin prtcls installing antivirus sftware n hsts deplying antisniffer sftware n all netwrk devices blcking ICMP ech and ech-replies at the netwrk edge 2. What are the three majr cmpnents f a wrm attack? (Chse three.) a penetratin mechanism an infecting vulnerability a paylad an enabling vulnerability a prbing mechanism a prpagatin mechanism 3. Which statement accurately characterizes the evlutin f threats t netwrk security? Internal threats can cause even greater damage than external threats. Threats have becme less sphisticated while the technical knwledge needed by an attacker has grwn. Early Internet users ften engaged in activities that wuld harm ther users. Internet architects planned fr netwrk security frm the beginning. 4. What causes a buffer verflw? launching a security cuntermeasure t mitigate a Trjan hrse sending repeated cnnectins such as Telnet t a particular device, thus denying ther data surces. dwnlading and installing t many sftware updates at ne time attempting t write mre data t a memry lcatin than that lcatin can hld sending t much infrmatin t tw r mre interfaces f the same device, thereby causing drpped packets 5. What cmmnly mtivates cybercriminals t attack netwrks as cmpared t hactivists r state-spnsred hackers? status amng peers fame seeking financial gain CCNA 5 Page 1

plitical reasns 6. Which tw netwrk security slutins can be used t mitigate DS attacks? (Chse tw.) virus scanning intrusin prtectin systems applying user authenticatin antispfing technlgies data encryptin 7. Which tw statements characterize DS attacks? (Chse tw.) Examples include smurf attacks and ping f death attacks. They attempt t cmprmise the availability f a netwrk, hst, r applicatin 8. An attacker is using a laptp as a rgue access pint t capture all netwrk traffic frm a targeted user. Which type f attack is this? trust explitatin buffer verflw man in the middle prt redirectin 9. What functinal area f the Cisc Netwrk Fundatin Prtectin framewrk is respnsible fr device-generated packets required fr netwrk peratin, such as ARP message exchanges and ruting advertisements? data plane cntrl plane management plane frwarding plane 10. What are the three cmpnents f infrmatin security ensured by cryptgraphy? (Chse three.) threat preventin authrizatin cnfidentiality cuntermeasures integrity availability 11. What is the primary methd fr mitigating malware? CCNA 5 Page 2

using encrypted r hashed authenticatin prtcls installing antivirus sftware n all hsts blcking ICMP ech and ech-replies at the netwrk edge deplying intrusin preventin systems thrughut the netwrk 12. What is an bjective f a state-spnsred attack? t gain financial prsperity t sell peratin system vulnerabilities t ther hackers t gain attentin t right a perceived wrng 13. What rle des the Security Intelligence Operatins (SIO) play in the Cisc SecureX architecture? identifying and stpping malicius traffic authenticating users enfrcing plicy identifying applicatins 14. What wrm mitigatin phase invlves actively disinfecting infected systems? Treatment 15. Hw is a smurf attack cnducted? by sending a large number f packets t verflw the allcated buffer memry f the target device by sending a large number f ICMP requests t directed bradcast addresses frm a spfed surce address n the same netwrk by sending a large number f TCP SYN packets t a target device frm a spfed surce address by sending an ech request in an IP packet larger than the maximum packet size f 65,535 bytes 16. What is a characteristic f a Trjan hrse as it relates t netwrk security? Malware is cntained in a seemingly legitimate executable prgram. Extreme quantities f data are sent t a particular netwrk device interface. An electrnic dictinary is used t btain a passwrd t be used t infiltrate a key netwrk device. T much infrmatin is destined fr a particular memry blck causing additinal memry areas t be affected. CCNA 5 Page 3

17. What is the first step in the risk management prcess specified by the ISO/IEC? Create a security plicy. Cnduct a risk assessment. Inventry and classify IT assets. Create a security gvernance mdel. 18. What is the significant characteristic f wrm malware? A wrm can execute independently A wrm must be triggered by an event n the hst system. Wrm malware disguises itself as legitimate sftware Once installed n a hst system, a wrm des nt replicate itself. 19. Which cnditin describes the ptential threat created by Instant On in a data center? when the primary firewall in the data center crashes when an attacker hijacks a VM hypervisr and then launches attacks against ther devices in the data center when the primary IPS appliance is malfunctining when a VM that may have utdated security plicies is brught nline after a lng perid f inactivity. 20. What are the three cre cmpnents f the Cisc Secure Data Center slutin? (Chse three.) mesh netwrk secure segmentatin visibility threat defense servers infrastructure 21. A disgruntled emplyee is using Wireshark t discver administrative Telnet usernames and passwrds. What type f netwrk attack des this describe? trust explitatin denial f service recnnaissance prt redirectin 22. Which tw statements describe access attacks? (Chse tw.) CCNA 5 Page 4

Trust explitatin attacks ften invlve the use f a laptp t act as a rgue access pint t capture and cpy all netwrk traffic in a public lcatin, such as a wireless htspt. T detect listening services, prt scanning attacks scan a range f TCP r UDP prt numbers n a hst Buffer verflw attacks write data beynd the hallcated buffer memry t verwrite valid data r t explit systems t execute malicius cde. Passwrd attacks can be implemented by the use s brute-frce attack methds, Trjan hrse, r packet sniffers. Prt redirectin attacks use a netwrk adapter card in prmiscuus mde t capture all netwrk packets that are sent acrss a LAN. 23. What is a ping sweep? a scanning technique that examines a range f TCP r UDP prt numbers n a hst t detect listening services. a sftware applicatin that enables the capture f all netwrk packets that are sent acrss a LAN. a query and respnse prtcl that identifies infrmatin abut a dmain, including the addresses that are assigned t that dmain a netwrk scanning technique that indicates the live hsts in a range f IP addresses. 24. As a dedicated netwrk security tl, an intrusin Prtectin system can prvide detectin and blcking f attacks in real time. CCNA 5 Page 5