Ccna S 2.0
Ccna S 2.0
an infecting vulnerability
a payload*
an enabling vulnerability*
a probing mechanism
a propagation mechanism*
Threats have become less sophisticated while the technical knowledge needed by an attacker
has grown.
Early Internet users often engaged in activities that would harm other users.
sending repeated connections such as Telnet to a particular device, thus denying other data
sources.
attempting to write more data to a memory ___location than that ___location can hold*
sending too much information to two or more interfaces of the same device, thereby causing
dropped packets
fame seeking
financial gain*
political reasons
antispoofing technologies*
data encryption
buffer overflow
port redirection
control plane*
management plane
forwarding plane
authorization
confidentiality*
countermeasures
integrity*
availability*
to gain attention
13. What role does the Security Intelligence Operations (SIO) play in
the Cisco SecureX architecture?
identifying and stopping malicious traffic*
authenticating users
enforcing policy
identifying applications
14. What worm mitigation phase involves actively disinfecting
infected systems?
Treatment*
containment
inoculation
quarantine
by sending a large number of TCP SYN packets to a target device from a spoofed source
address
by sending an echo request in an IP packet larger than the maximum packet size of 65,535
bytes
Too much information is destined for a particular memory block causing additional memory
areas to be affected.
17. What is the first step in the risk management process specified by
the ISO/IEC?
Create a security policy.
when an attacker hijacks a VM hypervisor and then launches attacks against other devices in
the data center
when a VM that may have outdated security policies is brought online after a long
period of inactivity.*
20. What are the three core components of the Cisco Secure Data
Center solution? (Choose three.)
mesh network
secure segmentation*
visibility*
threat defense*
servers
infrastructure
denial of service
reconnaissance*
port redirection
To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers
on a host
Buffer overflow attacks write data beyond the hallocated buffer memory to overwrite
valid data or to exploit systems to execute malicious code.*
Password attacks can be implemented by the use os brute-force attack methods, Trojan
horse, or packet sniffers.*
Port redirection attacks use a network adapter card in promiscuous mode to capture all
network packets that are sent across a LAN.
a software application that enables the capture of all network packets that are sent across a
LAN.
a query and response protocol that identifies information about a ___domain, including the
addresses that are assigned to that ___domain
a network scanning technique that indicates the live hosts in a range of IP addresses.*
CCNA Security
v2.0 Chapter 2 Exam Answers p3
JR-Admin cannot issue any command because the privilege level does not match one of those
defined.
4. Which three areas of router security must be maintained to secure
an edge router at the network perimeter? (Choose three.)
remote access security
zone isolation
router hardening*
flash security
physical security*
Configure secure administrative control to ensure that only authorized personnel can access
the router.
Keep a secure copy of the router Cisco IOS image and router configuration file as a backup.
Disable all unused ports and interfaces to reduce the number of ways that the router can be
accessed.
Users logged in to a superview can access all commands specified within the associated
CLI views.*
8. Which three types of views are available when configuring the role-
based CLI access feature? (Choose three.)
superview*
admin view
root view*
superuser view
CLI view*
config view
10. What occurs after RSA keys are generated on a Cisco router to
prepare for secure device management?
The keys must be zeroized to reset Secure Shell before configuring other parameters.
All vty ports are automatically configured for SSH to provide secure management.
The general-purpose key size must be specified for authentication with the crypto key
generate rsa general-keys moduluscommand.
Commands set on a higher privilege level are not available for lower privilege users.*
It is required that all 16 privilege levels be defined, whether they are used or not.
The root user must be assigned to each privilege level that is defined.
login delay
login block-for*
banner motd
1*
15
16
Quiet mode behavior can be overridden for specific networks by using an ACL.*
Once issued, the secure boot-config command automatically upgrades the configuration
archive to a newer version after new configuration commands have been entered.
A snapshot of the router running configuration can be taken and securely archived in
persistent storage.*
The secure boot-image command works properly when the system is configured to run an
image from a TFTP server.
A transfer can only originate from SCP clients that are routers.
A separate MIB tree exists for any given device in the network.
18. Which three items are prompted for a user response during
interactive AutoSecure setup? (Choose three.)
IP addresses of interfaces
services to disable
enable password*
interfaces to enable
interface IP address
SNMP
security banner*
syslog
23. Which three functions are provided by the syslog logging service?
(Choose three.)
setting the size of the logging buffer
25. Which three actions are produced by adding Cisco IOS login
enhancements to the router login process? (Choose three.)
permit only secure console access
accessibility
auditing
authorization*
authentication
It requires a login and password combination on the console, vty lines, and aux ports.
local AAA*
server-based AAA
authentication
authorization
The locked-out user stays locked out until the interface is shut down then re-enabled.
The locked-out user should have used the username admin and password Str0ngPa55w0rd.
6. A user complains about being locked out of a device after too many
unsuccessful AAA login attempts. What could be used by the network
administrator to provide a secure authentication access method
without locking a user out of a device?
Use the login delay command for authentication attempts.*
Use the aaa local authentication attempts max-fail global configuration mode command with a
higher number of acceptable failures.
Use the none keyword when configuring the authentication method list.
Windows Server uses its own Active Directory (AD) controller for authentication and
authorization.*
password encryption*
RADIUS
ACS
TACACS+*
The configuration of the ports requires 1812 be used for the authentication and the
authorization ports.
The configuration will not be active until it is saved and Rtr1 is rebooted.
The ports configured for Server1 on the router must be identical to those configured on
the RADIUS server.*
15. True or False?
true
A local username database is required when configuring authentication using ACS servers.
The local username database will provide a backup for authentication in the event the
ACS servers become unreachable.*
Without a local username database, the router will require successful authentication with each
ACS server.
debug tacacs
User actions are recorded for use in audits and troubleshooting events.
The router outputs accounting data for all EXEC shell sessions.
The router outputs accounting data for all outbound connections such as SSH and Telnet.
Accounting is concerned with allowing and disallowing authenticated users access to certain
areas and programs on the network.
Users are not required to be authenticated before AAA accounting logs their activities on the
network.
23. What protocol is used to encapsulate the EAP data between the
authenticator and authentication server performing 802.1X
authentication?
SSH
MD5
TACACS+
RADIUS*
CC
NA Security v2.0 Chapter 4 Exam Answers p1
If a hacker on the outside network sends an IP packet with source
address 172.30.1.50, destination address 10.0.0.3, source port 23, and
destination port 2447, what does the Cisco IOS firewall do with the
packet?
The initial packet is dropped, but subsequent packets are forwarded.
time-stamp request
echo reply*
time-stamp reply
router advertisement
4. Which statement describes a typical security policy for a DMZ
firewall configuration?
Traffic that originates from the inside interface is generally blocked entirely or very
selectively permitted to the outside interface.
Traffic that originates from the DMZ interface is selectively permitted to the outside
interface.*
Traffic that originates from the outside interface is permitted to traverse the firewall to the
inside interface with few or no restrictions.
Return traffic from the inside that is associated with traffic originating from the outside is
permitted to traverse from the inside interface to the outside interface.
Return traffic from the outside that is associated with traffic originating from the inside is
permitted to traverse from the outside interface to the DMZ interface.
These ACEs automatically appear at the end of every IPv6 ACL to allow IPv6 routing to
occur.
These are optional ACEs that can be added to the end of an IPv6 ACL to allow ICMP
messages that are defined in object groups named nd-na and nd-ns.
These ACEs must be manually added to the end of every IPv6 ACL to allow IPv6 routing to
occur.
6. When an inbound Internet-traffic ACL is being implemented, what
should be included to prevent the spoofing of internal networks?
ACEs to prevent traffic from private address spaces*
The internal interface ACL is reconfigured to allow the host IP address access to the Internet.
The entry remains in the state table after the session is terminated so that it can be reused by
the host.
A dynamic ACL entry is added to the external interface in the inbound direction.*
9. If the provided ACEs are in the same ACL, which ACE should be
listed first in the ACL according to best practice?
permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap*
traffic that is returning from the DMZ after originating from the private network
traffic that originates from the public network and that is destined for the DMZ
traffic that is returning from the public network after originating from the private network
CCN
A Security v2.0 Chapter 4 Exam Answers p11
The ACL statement is the only one explicitly configured on the router.
Based on this information, which two conclusions can be drawn
regarding remote access network connections? (Choose two.)
SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.
Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
allowed.
Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
blocked.*
SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
allowed.*
SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.
Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are
allowed.
Which two actions are taken if the access list is placed inbound on a
router Gigabit Ethernet port that has the IP address 192.168.10.254
assigned? (Choose two.)
Only the network device assigned the IP address 192.168.10.1 is allowed to access the router.
Devices on the 192.168.10.0/24 network are not allowed to reply to any ping requests.
Only Layer 3 connections are allowed to be made from the router to any other network
device.
Devices on the 192.168.10.0/24 network are not allowed to ping other devices on the
192.168.11.0 network.*
A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router
with this access list assigned.*
better performance*
16. A network administrator is implementing a Classic Firewall and a
Zone-Based Firewall concurrently on a router. Which statement best
describes this implementation?
An interface must be assigned to a security zone before IP inspection can occur.
17. Which two rules about interfaces are valid when implementing a
Zone-Based Policy Firewall? (Choose two.)
If one interface is a zone member, but the other is not, all traffic will be passed.
If both interfaces are members of the same zone, all traffic will be passed.*
If one interface is a zone member and a zone-pair exists, all traffic will be passed.
If both interfaces belong to the same zone-pair and a policy exists, all traffic will be passed.
show zones
show running-config*
show protocols
untrusted network
DMZ*
ICMP packet
broadcast packet
router-generated packet*
log
forward
hold
inspect*
copy
What is the result of issuing the Cisco IOS IPS commands on router
R1?
All traffic that is permitted by the ACL is subject to inspection by the IPS.*
All traffic that is denied by the ACL is subject to inspection by the IPS.
5. Which two benefits does the IPS version 5.x signature format
provide over the version 4.x signature format? (Choose two.)
support for IPX and AppleTalk protocols
policy-based detection
pattern-based detection
anomaly-based detection
It is both a normal alarm and a summary alarm being sent simultaneously at set intervals.
false positive
false negative*
true positive
atomic alert
correlation alert
summary alert*
A crypto key is created for IOS IPS to verify the master signature file.*
A pair of public/secret keys is created for the router to serve as an SSH server.
CCNA
Security v2.0 Chapter 5 Exam Answers p12
The signatures in all categories will be retired and not be used by the IPS.
Only the signatures in the ios_ips basic category will be compiled into memory and used
by the IPS.*
The signatures in the ios_ips basic category will be retired and the remaining signatures will
be compiled into memory and used by the IPS.
15. What are two shared characteristics of the IDS and the IPS?
(Choose two.)
Both use signatures to detect malicious traffic.*
Alert messages are sent in Security Device Event Exchange (SDEE) format.
All events that were stored in the previous buffer are lost.*
The newest 50 events from the original buffer are saved and all others are deleted.
A Cisco IDS does not affect the flow of traffic when it operates in
promiscuous mode
true*
false
CCNA Security
v2.0 Chapter 5 Exam Answers p20
Traffic that is sourced from 172.31.235.0/24 will be sent directly to its destination without
being scanned or reported.
22. An IPS sensor has detected the string confidential across multiple
packets in a TCP session. Which type of signature trigger and
signature type does this describe?
Trigger: Policy-based detection
Type: Atomic signature
With HIPS, the network administrator must verify support for all the different
operating systems used in the network.*
If the network traffic stream is encrypted, HIPS is unable to access unencrypted forms of the
traffic.
The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface.
The MAC address of PC1 that connects to the Fa0/2 interface is not the configured
MAC address.*
2. Two devices that are connected to the same switch need to be totally
isolated from one another. Which Cisco switch security feature will
provide this isolation?
PVLAN Edge*
DTP
SPAN
BPDU guard
enforcing network security policy for hosts that connect to the network*
limiting the number of MAC addresses that can be learned on a single switch port
PortFast
BPDU guard
root guard*
port security*
storm control
BPDU filter
6. In what situation would a network administrator most likely
implement root guard?
on all switch ports (used or unused)
on all switch ports that connect to another switch that is not the root bridge*
9. What is the role of the Cisco NAC Server within the Cisco Secure
Borderless Network Architecture?
providing the ability for company employees to create guest accounts
10. What is the role of the Cisco NAC Guest Server within the Cisco
Borderless Network architecture?
It defines role-based user access and endpoint security policies.
11. Which three functions are provided under Cisco NAC framework
solution? (Choose three.)
VPN connection
AAA services*
intrusion prevention
spam blocking
IP source guard
port security*
BPDU Guard
root guard
DHCP snooping*
16. What are three techniques for mitigating VLAN hopping attacks?
(Choose three.)
Set the native VLAN to an unused VLAN.*
Disable DTP.*
RARP
ARP ACLs*
IP ACLs
Source Guard
ARP
CDP
DTP*
IP address spoofing
DHCP starvation*
20. What is the only type of port that an isolated port can forward
traffic to on a private VLAN?
a community port
a promiscuous port*
BPDU guard
root guard*
loop guard
22. How can a user connect to the Cisco Cloud Web Security service
directly?
through the connector that is integrated into any Layer 2 Cisco switch
by accessing a Cisco CWS server before visiting the destination web site
2. How many bits does the Data Encryption Standard (DES) use for
data encryption?
40 bits
56 bits*
64 bits
72 bits
SEAL
3DES
AES
the unique shared secret known only by the retailer and the customer
the public key of the retailer
An office manager encrypts confidential files before saving them to a removable device.
authentication
confidentiality*
availability
9. Why is the 3DES algorithm often preferred over the AES
algorithm?
3DES is more trusted because it has been proven secure for a longer period than AES.*
Major networking equipment vendors such as Cisco have not yet adopted AES.
11. Which type of encryption algorithm uses public and private keys
to provide authentication, integrity, and confidentiality?
symmetric
shared secret
IPsec
asymmetric*
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a
successful attack.
Use frequency analysis to ensure that the most popular letters used in the language are not
used in the cipher message.
Keyed MD5
Message Digest 5
AES
3DES*
DES
SEAL
They are relatively slow because they are based on difficult computational algorithms.*
16. Which two non-secret numbers are initially agreed upon when the
Diffie-Hellman algorithm is used? (Choose two.)
binomial coefficient
generator*
prime modulus*
topological index
pseudorandom nome
data encryption
PKI
RSA
AES*
21. What is the purpose of a digital certificate?
It guarantees that a website has not been hacked.
It ensures that the person who is gaining access to a network device is authorized.
CCN
A Security v2.0 Chapter 8 Exam Answers p1
How will traffic that does not match that defined by access list 101 be
treated by the router?
It will be sent unencrypted.*
It will be blocked.
It will be discarded.
2. What three protocols must be permitted through the company
firewall for establishment of IPsec site-to-site VPNs? (Choose three.)
HTTPS
SSH
AH*
ISAKMP*
NTP
ESP*
Multiple crypto ACLs can define multiple remote peers for connecting with a VPN-enabled
router across the Internet or network.
Multiple crypto ACLs can be configured to deny specific network traffic from crossing a
VPN.
When multiple combinations of IPsec protection are being chosen, multiple crypto ACLs
can define different traffic types.*
to define the encryption and integrity algorithms that are used to build the IPsec tunnel*
7. Which three ports must be open to verify that an IPsec VPN tunnel
is operating properly? (Choose three.)
168
50*
169
501
500*
51*
IPsec works at the network layer and operates over all Layer 2 protocols.*
IPsec works at the application layer and protects all application data.
11. Which action do IPsec peers take during the IKE Phase 2
exchange?
exchange of DH keys
IPsec works at the transport layer and protects data at the network layer.
14. Which two IPsec protocols are used to provide data integrity?
SHA*
AES
DH
MD5*
RSA
CCNA
Security v2.0 Chapter 8 Exam Answers p16
AES
SHA*
DH
hashing algorithm
access list*
transform set
CCNA
Security v2.0 Chapter 8 Exam Answers p18
Diffie-Hellman
DES
AES*
authorization
virtualization
scalability
VPNs use virtual connections to create a private network through a public network.*
VPNs use dedicated physical connections to transfer data between remote users.
VPNs use logical connections to create public networks through the Internet.
IPsec*
MD5
AES
permits VPN to work when NAT is being used on one or both ends of the VPN*
23. Which term describes a situation where VPN traffic that is is
received by an interface is routed back out that same interface?
GRE
split tunneling
MPLS
hairpinning*
GRE
GETVPN*
MPLS
27. Which two protocols must be allowed for an IPsec VPN tunnel is
operate properly (Choose two.)?
168
50*
501
169
51*
500
Each operational interface must have a name and be assigned a security level from 0 to 200.
The lower the security level on an interface, the more trusted the interface.
Inbound traffic is identified as the traffic moving from an interface with a higher security
level to an interface with a lower security level.
CCNA
Security v2.0 Chapter 9 Exam Answers p4
The administrator must enter the no forward interface vlan command before the nameif
command on the third interface.*
The administrator configures the third VLAN interface the same way the other two were
configured, because the Base license supports the proposed action.
The administrator needs to acquire the Security Plus license, because the Base license does
not support the proposed action.
The ASA will not allow traffic in either direction between the Inside interface and the
DMZ.*
The ASA allows traffic from the Inside to the DMZ, but blocks traffic initiated on the DMZ to
the Inside interface.
ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the
wildcard mask.*
ASA ACLs do not have an implicit deny any at the end, whereas IOS ACLs do.
ASA ACLs use forward and drop ACEs, whereas IOS ACLs use permit and deny ACEs.
to monitor return traffic that is in response to web server requests that are initiated from the
inside interface
CCN
A Security v2.0 Chapter 9 Exam Answers p11
static NAT
bidirectional NAT
outside NAT
CCNA
Security v2.0 Chapter 9 Exam Answers p12
ip
udp
tcp*
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet can access both the DMZ and the LAN.
Traffic from the LAN and DMZ can access the Internet.*
16. What are three characteristics of the ASA routed mode? (Choose
three.)
This mode is referred to as a “bump in the wire.”
The interfaces of the ASA separate Layer 3 networks and require different IP addresses
in different subnets.*
CCNA
Security v2.0 Chapter 9 Exam Answers p17
VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.
VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.
The security level of the inside interface should be 0 and the outside interface should be 100.
An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.
The dhcpd auto-config outside command was issued to enable the DHCP server.
The dhcpd auto-config outside command was issued to enable the DHCP client.*
The dhcpd enable inside command was issued to enable the DHCP client.
The dhcpd enable inside command was issued to enable the DHCP server.*
host 192.168.1.3
encrypted passwords
SSHv2
RSA keys
To use a show command in a general configuration mode, ASA can use the command
directly whereas a router will need to enter the do command before issuing the show
command.*
To complete a partially typed command, ASA uses the Ctrl+Tab key combination whereas a
router uses the Tab key.
To indicate the CLI EXEC mode, ASA uses the % symbol whereas a router uses the #
symbol.
DHCP service is enabled for internal hosts to obtain an IP address and a default gateway from
the upstream device.
dynamic NAT
static NAT
dynamic PAT
If authorization is disabled, all authenticated users will have a very limited access to the
commands.
NAT
The administrator can connect to and manage multiple ASA devices and Cisco routers.
The administrator can connect to and manage multiple ASA devices, Cisco routers, and Cisco
switches.
WPA2 corporate
biometric
AES
4. Which minimum configuration is required on most ASAs before
ASDM can be used?
SSH
Ethernet 0/0
Telnet or SSH
Drag the interface to the port labeled “outside” in the ASA drawing.
System Image/Configuration
Management Access*
Advanced
Monitoring
Interfaces
Device Management
Device Name/Password
Routing
Interfaces
System Time*
true*
outside
local
inside*
super encryption
master passphrase*
device protection
public/private key
AES*
128-bit
14. When the CLI is used to configure an ISR for a site-to-site VPN
connection, which two items must be specified to enable a crypto map
policy? (Choose two.)
the hash
the peer*
encryption
IKE
preshared key
17. Which VPN solution allows the use of a web browser to establish a
secure, remote-access VPN tunnel to the ASA?
clientless SSL*
site-to-site VPN
site-to-site VPN
The ASA 5505 must use both a AAA server and a local database.
site-to-site VPN
22. What occurs when a user logs out of the web portal on a clientless
SSL VPN connection?
The browser cache is cleared.
23. If an outside host does not have the Cisco AnyConnect client
preinstalled, how would the host gain access to the client image?
The host initiates a clientless connection to a TFTP server to download the client.
The host initiates a clientless VPN connection using a compliant web browser to
download the client.*
The Cisco AnyConnect client is installed by default on most major operating systems.
The host initiates a clientless connection to an FTP server to download the client.
posture assessment*
quality of service security
SSL only
IPsec only
network scanning
integrity checkers
penetration testing
2. How does network scanning help assess operations security?
It can simulate attacks from malicious sources.
It outlines the company’s overall security goals for managers and technical staff.*
It provides general policies on how the technical staff should perform security functions.
It defines system and issue-specific policies that describe what the technical staff does.
procedure document*
standards document
guideline document
to provide users with a training curriculum that can ultimately lead to a formal degree
to integrate all the security skills and competencies into a single body of knowledge
7. What network security testing tool has the ability to provide details
on the source of suspicious network activity?
SIEM*
SuperScan
Zenmap
Tripwire
Metasploit
Tripwire
Nmap*
9. What network testing tool can be used to identify network layer
protocols running on a host?
SIEM
Nmap*
L0phtcrack
Tripwire
vulnerability scanning
integrity checking*
network scanning
SIEM
Zenmap*
SuperScan
13. What step should be taken after data is collected, but before
equipment is disconnected, if a security breach is found on a system?
Create a drive image of the system.
certificate programs
awareness campaigns*
governing policy
noncompliance consequences
technical policy
procedure documents
awareness campaigns*
guideline documents
procedure documents*
guideline documents
standards*
procedures
19. Which policy outlines the overall security goals for managers and
technical staff within a company?
acceptable use policy
technical policy
governing policy*
end-user policy
technical policy*
governing policy
technical policy*
end-user policy
the audience*
24. Match the network security testing tool with the correct function.
(Not all options are used.)
Question
The enable secret password could be used in the next login attempt.
The authentication process stops. *
The username and password of the local user database could be used in the next login attempt.
The enable secret password and a random username could be used in the next login attempt.
4. What are two tasks that can be accomplished with the Nmap and
Zenmap network tools? (Choose two.)
password recovery
password auditing
identification of Layer 3 protocol support on hosts*
TCP and UDP port scanning*
validation of IT system configuration
5. Which Cisco IOS subcommand is used to compile an IPS signature
into memory?
retired true
event-action produce-alert
retired false*
event-action deny-attacker-inline
8. What is a result of securing the Cisco IOS image using the Cisco
IOS Resilient Configuration feature?
When the router boots up, the Cisco IOS image is loaded from a secured FTP ___location.
The Cisco IOS image file is not visible in the output of the show flash command.*
The Cisco IOS image is encrypted and then automatically backed up to the NVRAM.
The Cisco IOS image is encrypted and then automatically backed up to a TFTP server.
9. The corporate security policy dictates that the traffic from the
remote-access VPN clients must be separated between trusted traffic
that is destined for the corporate subnets and untrusted traffic
destined for the public Internet. Which VPN solution should be
implemented to ensure compliance with the corporate policy?
MPLS
hairpinning
GRE
split tunneling*
10. Which two conditions must be met in order for a network
administrator to be able to remotely manage multiple ASAs with
Cisco ASDM? (Choose two.)
The ASAs must all be running the same ASDM version.
Each ASA must have the same enable secret password.
Each ASA must have the same master passphrase enabled.
The ASAs must be connected to each other through at least one inside interface.
ASDM must be run as a local application.*
12. What are two benefits of using a ZPF rather than a Classic
Firewall? (Choose two.)
ZPF allows interfaces to be placed into zones for IP inspection.
The ZPF is not dependent on ACLs.*
Multiple inspection actions are used with ZPF.
ZPF policies are easy to read and troubleshoot.*
With ZPF, the router will allow packets unless they are explicitly blocked.
Which conclusion can be made from the show crypto map command
output that is shown on R1?
The crypto map has not yet been applied to an interface.*
The current peer IP address should be 172.30.2.1.
There is a mismatch between the transform sets.
The tunnel configuration was established and can be tested with extended pings.
In the network that is shown, which AAA command logs the use of
EXEC session commands?
aaa accounting network start-stop group tacacs+
aaa accounting network start-stop group radius
aaa accounting connection start-stop group radius
aaa accounting exec start-stop group radius
aaa accounting connection start-stop group tacacs+
aaa accounting exec start-stop group tacacs+*
23. A network administrator enters the single-connection command.
What effect does this command have on AAA operation?
allows a new TCP session to be established for every authorization request
authorizes connections based on a list of IP addresses configured in an ACL on a Cisco ACS
server
allows a Cisco ACS server to minimize delay by establishing persistent TCP
connections*
allows the device to establish only a single connection with the AAA-enabled server
24. Which two practices are associated with securing the features and
performance of router operating systems? (Choose two.)
Install a UPS.
Keep a secure copy of router operating system images.*
Configure the router with the maximum amount of memory possible.*
Disable default router services that are not necessary.
Reduce the number of ports that can be used to access the router.
28. What two assurances does digital signing provide about code that
is downloaded from the Internet? (Choose two.)
The code contains no errors.
The code contains no viruses.
The code has not been modified since it left the software publisher.*
The code is authentic and is actually sourced by the publisher.*
The code was encrypted with both a private and public key.
29. Which interface option could be set through ASDM for a Cisco
ASA?
default route
access list
VLAN ID*
NAT/PAT
30. What are two characteristics of a stateful firewall? (Choose two.)
uses connection information maintained in a state table*
uses static packet filtering techniques
analyzes traffic at Layers 3, 4 and 5 of the OSI model*
uses complex ACLs which can be difficult to configure
prevents Layer 7 attacks
33. Which IDS/IPS signature alarm will look for packets that are
destined to or from a particular port?
honey pot-based
anomaly-based
signature-based*
policy-based
34. Which three actions can the Cisco IOS Firewall IPS feature be
configured to take when an intrusion activity is detected? (Choose
three.)
reset UDP connection
reset TCP connection*
alert*
isolate
inoculate
drop*
35. Which two protocols can be selected using the Cisco AnyConnect
VPN Wizard to protect the traffic inside a VPN tunnel? (Choose two.)
Telnet
SSH
SSL*
ESP
IPsec*
37. Match the network security testing technique with how it is used to
test network security. (Not all options are used)
38. Which statement describes the use of certificate classes in the PKI?
A class 5 certificate is more trustworthy than a class 4 certificate.*
Email security is provided by the vendor, not by a certificate.
The lower the class number, the more trusted the certificate.
A vendor must issue only one class of certificates when acting as a CA.
39. Refer to the exhibit.
40. A company deploys a Cisco ASA with the Cisco CWS connector
enabled as the firewall on the border of corporate network. An
employee on the internal network is accessing a public website. What
should the employee do in order to make sure the web traffic is
protected by the Cisco CWS?
Register the destination website on the Cisco ASA.
Use the Cisco AnyConnect Secure Mobility Client first.
Use a web browser to visit the destination website.*
First visit a website that is located on a web server in the Cisco CWS infrastructure.
43. Which two end points can be on the other side of an ASA site-to-
site VPN configured using ASDM? (Choose two.)
DSL switch
Frame Relay switch
ISR router*
another ASA*
multilayer switch
50. A network analyst wants to monitor the activity of all new interns.
Which type of security testing would track when the interns sign on
and sign off the network?
vulnerability scanning
password cracking
network scanning
integrity checker*
51. Refer to the exhibit.
52. What is required for auto detection and negotiation of NAT when
establishing a VPN link?
Both VPN end devices must be configured for NAT.
No ACLs can be applied on either VPN end device.
Both VPN end devices must be NAT-T capable.*
Both VPN end devices must be using IPv6.
54. In which two instances will traffic be denied as it crosses the ASA
5505 device? (Choose two.)
traffic originating from the inside network going to the DMZ network
traffic originating from the inside network going to the outside network
traffic originating from the outside network going to the DMZ network
traffic originating from the DMZ network going to the inside network*
traffic originating from the outside network going to the inside network*
56. Which two ports can send and receive Layer 2 traffic from a
community port on a PVLAN? (Choose two.)
community ports belonging to other communities
promiscuous ports*
isolated ports within the same community
PVLAN edge protected ports
community ports belonging to the same community*
59. What is the benefit of the network-based IPS (NIPS) over host-
based IPS (HIPS) deployment models?
NIPS provides individual host protection.
NIPS relies on centrally managed software agents.
NIPS monitors all operations within an operating system.*
NIPS monitors network segments.