0% found this document useful (0 votes)
316 views

Ccna S 2.0

An administrator defined a local user account with a secret password on router R1 for encrypted SSH connections. Three additional steps are required: enable inbound vty SSH sessions, configure the IP ___domain name on the router, and generate the SSH keys. The JR-Admin account on the router can issue ping and reload commands but not debug or other commands since its privilege level does not match those defined. Three areas of router security that must be maintained to secure an edge router are remote access security, router hardening, and physical security.

Uploaded by

loffy hacker
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
316 views

Ccna S 2.0

An administrator defined a local user account with a secret password on router R1 for encrypted SSH connections. Three additional steps are required: enable inbound vty SSH sessions, configure the IP ___domain name on the router, and generate the SSH keys. The JR-Admin account on the router can issue ping and reload commands but not debug or other commands since its privilege level does not match those defined. Three areas of router security that must be maintained to secure an edge router are remote access security, router hardening, and physical security.

Uploaded by

loffy hacker
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 116

1. What method can be used to mitigate ping sweeps?

using encrypted or hashed authentication protocols

installing antivirus software on hosts

deploying antisniffer software on all network devices

blocking ICMP echo and echo-replies at the network edge*

2. What are the three major components of a worm attack? (Choose


three.)
a penetration mechanism

an infecting vulnerability

a payload*

an enabling vulnerability*

a probing mechanism

a propagation mechanism*

3. Which statement accurately characterizes the evolution of threats


to network security?
Internal threats can cause even greater damage than external threats.*

Threats have become less sophisticated while the technical knowledge needed by an attacker
has grown.

Early Internet users often engaged in activities that would harm other users.

Internet architects planned for network security from the beginning.

4. What causes a buffer overflow?


launching a security countermeasure to mitigate a Trojan horse

sending repeated connections such as Telnet to a particular device, thus denying other data
sources.

downloading and installing too many software updates at one time

attempting to write more data to a memory ___location than that ___location can hold*

sending too much information to two or more interfaces of the same device, thereby causing
dropped packets

5. What commonly motivates cybercriminals to attack networks as


compared to hactivists or state-sponsored hackers?
status among peers

fame seeking

financial gain*

political reasons

6. Which two network security solutions can be used to mitigate DoS


attacks? (Choose two.)
virus scanning

intrusion protection systems*

applying user authentication

antispoofing technologies*

data encryption

7. Which two statements characterize DoS attacks? (Choose two.)


 
They are difficult to conduct and are initiated only by very skilled attackers.
They are commonly launched with a tool called L0phtCrack.
Examples include smurf attacks and ping of death attacks.*
They attempt to compromise the availability of a network, host, or application.*
They always precede access attacks.

8. An attacker is using a laptop as a rogue access point to capture all


network traffic from a targeted user. Which type of attack is this?
trust exploitation

buffer overflow

man in the middle*

port redirection

9. What functional area of the Cisco Network Foundation Protection


framework is responsible for device-generated packets required for
network operation, such as ARP message exchanges and routing
advertisements?
data plane

control plane*

management plane

forwarding plane

10. What are the three components of information security ensured


by cryptography? (Choose three.)
threat prevention

authorization

confidentiality*
countermeasures

integrity*

availability*

11. What is the primary method for mitigating malware?


using encrypted or hashed authentication protocols

installing antivirus software on all hosts*

blocking ICMP echo and echo-replies at the network edge

deploying intrusion prevention systems throughout the network

12. What is an objective of a state-sponsored attack?


to gain financial prosperity

to sell operation system vulnerabilities to other hackers

to gain attention

to right a perceived wrong*

13. What role does the Security Intelligence Operations (SIO) play in
the Cisco SecureX architecture?
identifying and stopping malicious traffic*

authenticating users

enforcing policy

identifying applications

 
14. What worm mitigation phase involves actively disinfecting
infected systems?
Treatment*

containment

inoculation

quarantine

15. How is a smurf attack conducted?


by sending a large number of packets to overflow the allocated buffer memory of the target
device

by sending a large number of ICMP requests to directed broadcast addresses from a


spoofed source address on the same network*

by sending a large number of TCP SYN packets to a target device from a spoofed source
address

by sending an echo request in an IP packet larger than the maximum packet size of 65,535
bytes

16. What is a characteristic of a Trojan horse as it relates to network


security?
Malware is contained in a seemingly legitimate executable program.*

Extreme quantities of data are sent to a particular network device interface.

An electronic dictionary is used to obtain a password to be used to infiltrate a key network


device.

Too much information is destined for a particular memory block causing additional memory
areas to be affected.

 
17. What is the first step in the risk management process specified by
the ISO/IEC?
Create a security policy.

Conduct a risk assessment.*

Inventory and classify IT assets.

Create a security governance model.

18. What is the significant characteristic of worm malware?


A worm can execute independently*

A worm must be triggered by an event on the host system.

Worm malware disguises itself as legitimate software

Once installed on a host system, a worm does not replicate itself.

19. Which condition describes the potential threat created by Instant


On in a data center?
when the primary firewall in the data center crashes

when an attacker hijacks a VM hypervisor and then launches attacks against other devices in
the data center

when the primary IPS appliance is malfunctioning

when a VM that may have outdated security policies is brought online after a long
period of inactivity.*

20. What are the three core components of the Cisco Secure Data
Center solution? (Choose three.)
mesh network
secure segmentation*

visibility*

threat defense*

servers

infrastructure

21. A disgruntled employee is using Wireshark to discover


administrative Telnet usernames and passwords. What type of
network attack does this describe?
trust exploitation

denial of service

reconnaissance*

port redirection

22. Which two statements describe access attacks? (Choose two.)


Trust exploitation attacks often involve the use of a laptop to act as a rogue access point to
capture and copy all network traffic in a public ___location, such as a wireless hotspot.

To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers
on a host

Buffer overflow attacks write data beyond the hallocated buffer memory to overwrite
valid data or to exploit systems to execute malicious code.*

Password attacks can be implemented by the use os brute-force attack methods, Trojan
horse, or packet sniffers.*

Port redirection attacks use a network adapter card in promiscuous mode to capture all
network packets that are sent across a LAN.

23. What is a ping sweep?


a scanning technique that examines a range of TCP or UDP port numbers on a host to detect
listening services.

a software application that enables the capture of all network packets that are sent across a
LAN.

a query and response protocol that identifies information about a ___domain, including the
addresses that are assigned to that ___domain

a network scanning technique that indicates the live hosts in a range of IP addresses.*

24. As a dedicated network security tool, an intrusion __prevention__


system can provide detection and blocking of attacks in real time.

1. An administrator defined a local user account with a secret


password on router R1 for use with SSH. Which three additional
steps are required to configure R1 to accept only encrypted SSH
connections? (Choose three.)
Enable inbound vty SSH sessions.*

Generate two-way pre-shared keys.

Configure DNS on the router.

Configure the IP ___domain name on the router.*

Enable inbound vty Telnet sessions.

Generate the SSH keys.*

2. Which set of commands are required to create a username of


admin, hash the password using MD5, and force the router to access
the internal username database when a user attempts to access the
console?
R1(config)# username admin password Admin01pa55
R1(config)# line con 0
R1(config-line)# login local

R1(config)# username admin secret Admin01pa55


R1(config)# line con 0
R1(config-line)# login local*

R1(config)# username admin Admin01pa55 encr md5


R1(config)# line con 0
R1(config-line)# login local

R1(config)# username admin password Admin01pa55


R1(config)# line con 0
R1(config-line)# login

R1(config)# username admin secret Admin01pa55


R1(config)# line con 0
R1(config-line)# login

3. Refer to the exhibit.

CCNA Security
v2.0 Chapter 2 Exam Answers p3

Which statement about the JR-Admin account is true?


JR-Admin can issue only ping commands.

JR-Admin can issue show, ping, and reload commands.

JR-Admin cannot issue any command because the privilege level does not match one of those
defined.

JR-Admin can issue debug and reload commands.

JR-Admin can issue ping and reload commands*

 
4. Which three areas of router security must be maintained to secure
an edge router at the network perimeter? (Choose three.)
remote access security

zone isolation

router hardening*

operating system security*

flash security

physical security*

5. Which recommended security practice prevents attackers from


performing password recovery on a Cisco IOS router for the purpose
of gaining access to the privileged EXEC mode?
Locate the router in a secure locked room that is accessible only to authorized
personnel.*

Configure secure administrative control to ensure that only authorized personnel can access
the router.

Keep a secure copy of the router Cisco IOS image and router configuration file as a backup.

Provision the router with the maximum amount of memory possible.

Disable all unused ports and interfaces to reduce the number of ways that the router can be
accessed.

6. Refer to the exhibit.


CCNA Security v2.0 Chapter 2 Exam
Answers p6

Based on the output of the show running-config command, which


type of view is SUPPORT?
CLI view, containing SHOWVIEW and VERIFYVIEW commands

superview, containing SHOWVIEW and VERIFYVIEW views*

secret view, with a level 5 encrypted password

root view, with a level 5 encrypted secret password

7. Which two characteristics apply to role-based CLI access


superviews? (Choose two.)
A specific superview cannot have commands added to it directly.*

CLI views have passwords, but superviews do not have passwords.

A single superview can be shared among multiple CLI views.

Deleting a superview deletes all associated CLI views.

Users logged in to a superview can access all commands specified within the associated
CLI views.*

8. Which three types of views are available when configuring the role-
based CLI access feature? (Choose three.)
superview*

admin view
root view*

superuser view

CLI view*

config view

9. If AAA is already enabled, which three CLI steps are required to


configure a router with a specific view? (Choose three.)
Create a superview using the parser view view-name command.

Associate the view with the root view.

Assign users who can use the view.

Create a view using the parser view view-name command.*

Assign a secret password to the view.*

Assign commands to the view.*

10. What occurs after RSA keys are generated on a Cisco router to
prepare for secure device management?
The keys must be zeroized to reset Secure Shell before configuring other parameters.

All vty ports are automatically configured for SSH to provide secure management.

The general-purpose key size must be specified for authentication with the crypto key
generate rsa general-keys moduluscommand.

The generated keys can be used by SSH.*

11. Which three statements describe limitations in using privilege


levels for assigning command authorization? (Choose three.)
Creating a user account that needs access to most but not all commands can be a tedious
process.*
Views are required to define the CLI commands that each user can access.

Commands set on a higher privilege level are not available for lower privilege users.*

It is required that all 16 privilege levels be defined, whether they are used or not.

There is no access control to specific interfaces on a router.*

The root user must be assigned to each privilege level that is defined.

12. What command must be issued to enable login enhancements on a


Cisco router?
privilege exec level

login delay

login block-for*

banner motd

13. What is the default privilege level of user accounts created on


Cisco routers?
0

1*

15

16

14. A network administrator notices that unsuccessful login attempts


have caused a router to enter quiet mode. How can the administrator
maintain remote access to the networks even during quiet mode?
Quiet mode behavior can be enabled via an ip access-group command on a physical interface.
Quiet mode behavior will only prevent specific user accounts from attempting to authenticate.

Quiet mode behavior can be overridden for specific networks by using an ACL.*

Quiet mode behavior can be disabled by an administrator by using SSH to connect.

15. What is a characteristic of the Cisco IOS Resilient Configuration


feature?
It maintains a secure working copy of the bootstrap startup program.

Once issued, the secure boot-config command automatically upgrades the configuration
archive to a newer version after new configuration commands have been entered.

A snapshot of the router running configuration can be taken and securely archived in
persistent storage.*

The secure boot-image command works properly when the system is configured to run an
image from a TFTP server.

16. What is a requirement to use the Secure Copy Protocol feature?


At least one user with privilege level 1 has to be configured for local authentication.

A command must be issued to enable the SCP server side functionality.*

A transfer can only originate from SCP clients that are routers.

The Telnet protocol has to be configured on the SCP server side.

17. What is a characteristic of the MIB?


The OIDs are organized in a hierarchical structure.*

Information in the MIB cannot be changed.

A separate MIB tree exists for any given device in the network.

Information is organized in a flat manner so that SNMP can access it quickly.


 

18. Which three items are prompted for a user response during
interactive AutoSecure setup? (Choose three.)
IP addresses of interfaces

content of a security banner*

enable secret password*

services to disable

enable password*

interfaces to enable

19. A network engineer is implementing security on all company


routers. Which two commands must be issued to force authentication
via the password 1A2b3C for all OSPF-enabled interfaces in the
backbone area of the company network? (Choose two.)
area 0 authentication message-digest*

ip ospf message-digest-key 1 md5 1A2b3C*

username OSPF password 1A2b3C

enable password 1A2b3C

area 1 authentication message-digest

20. What is the purpose of using the ip ospf message-digest-key key


md5 password command and the area area-id authentication
message-digest command on a router?
to configure OSPF MD5 authentication globally on the router*

to enable OSPF MD5 authentication on a per-interface basis


to facilitate the establishment of neighbor adjacencies

to encrypt OSPF routing updates

21. What are two reasons to enable OSPF routing protocol


authentication on a network? (Choose two.)
to provide data security through encryption

to ensure faster network convergence

to ensure more efficient routing

to prevent data traffic from being redirected and then discarded*

to prevent redirection of data traffic to an insecure link*

22. Which two options can be configured by Cisco AutoSecure?


(Choose two.)
enable secret password*

interface IP address

SNMP

security banner*

syslog

23. Which three functions are provided by the syslog logging service?
(Choose three.)
setting the size of the logging buffer

specifying where captured information is stored*

gathering logging information*


authenticating and encrypting data sent over the network

distinguishing between information to be captured and information to be ignored*

retaining captured messages on the router when a router is rebooted

24. What is the Control Plane Policing (CoPP) feature designed to


accomplish?
disable control plane services to reduce overall traffic

prevent unnecessary traffic from overwhelming the route processor*

direct all excess traffic away from the route process

manage services provided by the control plane

25. Which three actions are produced by adding Cisco IOS login
enhancements to the router login process? (Choose three.)
permit only secure console access

create password authentication

automatically provide AAA authentication

create syslog messages*

slow down an active attack*

disable logins from specified hosts*

1. Because of implemented security controls, a user can only access a


server with FTP. Which AAA component accomplishes this?
accounting

accessibility
auditing

authorization*

authentication

2. Why is authentication with AAA preferred over a local database


method?
It provides a fallback authentication method if the administrator forgets the username
or password.*

It uses less network bandwidth.

It specifies a different password for each line or port.

It requires a login and password combination on the console, vty lines, and aux ports.

3. Which authentication method stores usernames and passwords in


ther router and is ideal for small networks.
local AAA over TACACS+

server-based AAA over TACACS+

local AAA*

local AAA over RADIUS

server-based AAA over RADIUS

server-based AAA

4. Which component of AAA allows an administrator to track


individuals who access network resources and any changes that are
made to those resources?
accounting*
accessibility

authentication

authorization

5. Refer to the exhibit.

CCNA Security v2.0 Chapter 3 Exam Answers p5

Router R1 has been configured as shown, with the resulting log


message. On the basis of the information that is presented, which two
statements describe the result of AAA authentication operation?
(Choose two.)
The locked-out user stays locked out until the clear aaa local user lockout username
Admin command is issued.*

The locked-out user stays locked out until the interface is shut down then re-enabled.

The locked-out user is locked out for 10 minutes by default.

The locked-out user should have used the username admin and password Str0ngPa55w0rd.

The locked-out user failed authentication.*

6. A user complains about being locked out of a device after too many
unsuccessful AAA login attempts. What could be used by the network
administrator to provide a secure authentication access method
without locking a user out of a device?
Use the login delay command for authentication attempts.*

Use the login local command for authenticating user access.

Use the aaa local authentication attempts max-fail global configuration mode command with a
higher number of acceptable failures.

Use the none keyword when configuring the authentication method list.

7. A user complains about not being able to gain access to a network


device configured with AAA. How would the network administrator
determine if login access for the user account is disabled?
Use the show aaa local user lockout command.*

Use the show running-configuration command.

Use the show aaa sessions command.

Use the show aaa user command.

8. When a method list for AAA authentication is being configured,


what is the effect of the keywordlocal?
The login succeeds, even if all methods return an error.

It uses the enable password for authentication.

It accepts a locally configured username, regardless of case.*

It defaults to the vty line password for authentication.

9. Which solution supports AAA for both RADIUS and TACACS+


servers?
Implement Cisco Secure Access Control System (ACS) only.*

RADIUS and TACACS+ servers cannot be supported by a single solution.

Implement a local database.

Implement both a local database and Cisco Secure

Access Control System (ACS).

10. What difference exists when using Windows Server as an AAA


server, rather than Cisco Secure ACS?
Windows Server requires more Cisco IOS commands to configure.

Windows Server only supports AAA using TACACS.

Windows Server uses its own Active Directory (AD) controller for authentication and
authorization.*

Windows Server cannot be used as an AAA server.

11. What is a characteristic of TACACS+?


TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646 or 1813 for
accounting.

TACACS+ is backward compatible with TACACS and XTACACS.

TACACS+ is an open IETF standard.

TACACS+ provides authorization of router commands on a per-user or per-group


basis.*

12. Which two features are included by both TACACS+ and


RADIUS protocols? (Choose two.)
802.1X support

separate authentication and authorization processes


SIP support

password encryption*

utilization of transport layer protocols*

13. Which server-based authentication protocol would be best for an


organization that wants to apply authorization policies on a per-group
basis?
SSH

RADIUS

ACS

TACACS+*

14. Refer to the exhibit.

CCNA Security v2.0 Chapter 3 Exam Answers p14

Which statement describes the configuration of the ports for Server1?


The configuration using the default ports for a Cisco router.

The configuration of the ports requires 1812 be used for the authentication and the
authorization ports.

The configuration will not be active until it is saved and Rtr1 is rebooted.

The ports configured for Server1 on the router must be identical to those configured on
the RADIUS server.*

 
15. True or False?

The single-connection keyword prevents the configuration of multiple


TACACS+ servers on a AAA-enabled router.
false*

true

16. Why would a network administrator include a local username


configuration, when the AAA-enabled router is also configured to
authenticate using several ACS servers?
Because ACS servers only support remote user access, local users can only authenticate using
a local username database.

A local username database is required when configuring authentication using ACS servers.

The local username database will provide a backup for authentication in the event the
ACS servers become unreachable.*

Without a local username database, the router will require successful authentication with each
ACS server.

17. Which debug command is used to focus on the status of a TCP


connection when using TACACS+ for authentication?
debug tacacs events*

debug tacacs

debug tacacs accounting

debug aaa authentication

18. Which characteristic is an important aspect of authorization in an


AAA-enabled network device?
The authorization feature enhances network performance.

User access is restricted to certain services.*

User actions are recorded for use in audits and troubleshooting events.

A user must be identified before network access is granted.

19. What is the result of entering the aaa accounting network


command on a router?
The router collects and reports usage data related to network-related service requests.*

The router outputs accounting data for all EXEC shell sessions.

The router provides data for only internal service requests.

The router outputs accounting data for all outbound connections such as SSH and Telnet.

20. What is a characteristic of AAA accounting?


Possible triggers for the aaa accounting exec default command include start-stop and
stop-only.*

Accounting can only be enabled for network connections.

Accounting is concerned with allowing and disallowing authenticated users access to certain
areas and programs on the network.

Users are not required to be authenticated before AAA accounting logs their activities on the
network.

21. When using 802.1X authentication, what device controls physical


access to the network, based on the authentication status of the client?
the router that is serving as the default gateway

the authentication server

the switch that the client is connected to*


the supplicant

22. What device is considered a supplicant during the 802.1X


authentication process?
the client that is requesting authentication*

the switch that is controlling network access

the router that is serving as the default gateway

the authentication server that is performing client authentication

23. What protocol is used to encapsulate the EAP data between the
authenticator and authentication server performing 802.1X
authentication?
SSH

MD5

TACACS+

RADIUS*

1. Refer to the exhibit.

CC
NA Security v2.0 Chapter 4 Exam Answers p1
If a hacker on the outside network sends an IP packet with source
address 172.30.1.50, destination address 10.0.0.3, source port 23, and
destination port 2447, what does the Cisco IOS firewall do with the
packet?
The initial packet is dropped, but subsequent packets are forwarded.

The packet is forwarded, and an alert is generated.

The packet is forwarded, and no alert is generated.

The packet is dropped.*

2. To facilitate the troubleshooting process, which inbound ICMP


message should be permitted on an outside interface?
echo request

time-stamp request

echo reply*

time-stamp reply

router advertisement

3. Which command is used to activate an IPv6 ACL named


ENG_ACL on an interface so that the router filters traffic prior to
accessing the routing table?
ipv6 access-class ENG_ACL in

ipv6 traffic-filter ENG_ACL out

ipv6 traffic-filter ENG_ACL in*

ipv6 access-class ENG_ACL out

 
4. Which statement describes a typical security policy for a DMZ
firewall configuration?
Traffic that originates from the inside interface is generally blocked entirely or very
selectively permitted to the outside interface.

Traffic that originates from the DMZ interface is selectively permitted to the outside
interface.*

Traffic that originates from the outside interface is permitted to traverse the firewall to the
inside interface with few or no restrictions.

Return traffic from the inside that is associated with traffic originating from the outside is
permitted to traverse from the inside interface to the outside interface.

Return traffic from the outside that is associated with traffic originating from the inside is
permitted to traverse from the outside interface to the DMZ interface.

5. Refer to the exhibit.

CCNA Security v2.0 Chapter 4 Exam Answers


p5

Which statement describes the function of the ACEs?


These ACEs allow for IPv6 neighbor discovery traffic.*

These ACEs automatically appear at the end of every IPv6 ACL to allow IPv6 routing to
occur.

These are optional ACEs that can be added to the end of an IPv6 ACL to allow ICMP
messages that are defined in object groups named nd-na and nd-ns.

These ACEs must be manually added to the end of every IPv6 ACL to allow IPv6 routing to
occur.

 
6. When an inbound Internet-traffic ACL is being implemented, what
should be included to prevent the spoofing of internal networks?
ACEs to prevent traffic from private address spaces*

ACEs to prevent broadcast address traffic

ACEs to prevent ICMP traffic

ACEs to prevent HTTP traffic

ACEs to prevent SNMP traffic

7. In addition to the criteria used by extended ACLs, what conditions


are used by a classic firewall to filter traffic?
TCP/UDP source and destination port numbers

TCP/IP protocol numbers

IP source and destination addresses

application layer protocol session information*

8. A router has been configured as a classic firewall and an inbound


ACL applied to the external interface. Which action does the router
take after inbound-to-outbound traffic is inspected and a new entry is
created in the state table?
When traffic returns from its destination, it is reinspected, and a new entry is added to the
state table.

The internal interface ACL is reconfigured to allow the host IP address access to the Internet.

The entry remains in the state table after the session is terminated so that it can be reused by
the host.

A dynamic ACL entry is added to the external interface in the inbound direction.*

 
9. If the provided ACEs are in the same ACL, which ACE should be
listed first in the ACL according to best practice?
permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap*

deny udp any host 172.16.1.5 eq snmptrap

deny tcp any any eq telnet

permit ip any any

permit udp any any range 10000 20000

permit tcp 172.16.0.0 0.0.3.255 any established

10. A company is deploying a new network design in which the border


router has three interfaces. Interface Serial0/0/0 connects to the ISP,
GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01
connects to the internal private network. Which type of traffic would
receive the least amount of inspection (have the most freedom of
travel)?
traffic that is going from the private network to the DMZ*

traffic that is returning from the DMZ after originating from the private network

traffic that originates from the public network and that is destined for the DMZ

traffic that is returning from the public network after originating from the private network

11. Refer to the exhibit.

CCN
A Security v2.0 Chapter 4 Exam Answers p11
The ACL statement is the only one explicitly configured on the router.
Based on this information, which two conclusions can be drawn
regarding remote access network connections? (Choose two.)
SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.

Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
allowed.

Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
blocked.*

SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
allowed.*

SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.

Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are
allowed.

12. Consider the following

access list.access-list 100 permit ip host 192.168.10.1 any

access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo

access-list 100 permit ip any any

Which two actions are taken if the access list is placed inbound on a
router Gigabit Ethernet port that has the IP address 192.168.10.254
assigned? (Choose two.)
Only the network device assigned the IP address 192.168.10.1 is allowed to access the router.

Devices on the 192.168.10.0/24 network are not allowed to reply to any ping requests.

Only Layer 3 connections are allowed to be made from the router to any other network
device.

Devices on the 192.168.10.0/24 network are not allowed to ping other devices on the
192.168.11.0 network.*
A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router
with this access list assigned.*

13. What is one benefit of using a stateful firewall instead of a proxy


server?
ability to perform user authentication

better performance*

ability to perform packet filtering

prevention of Layer 7 attacks

14. What is one limitation of a stateful firewall?


weak user authentication

cannot filter unnecessary traffic

not as effective with UDP- or ICMP-based traffic*

poor log information

15. When a Cisco IOS Zone-Based Policy Firewall is being configured


via CLI, which step must be taken after zones have been created?
Assign interfaces to zones.

Establish policies between zones.*

Identify subsets within zones.

Design the physical infrastructure.

 
16. A network administrator is implementing a Classic Firewall and a
Zone-Based Firewall concurrently on a router. Which statement best
describes this implementation?
An interface must be assigned to a security zone before IP inspection can occur.

Both models must be implemented on all interfaces.

The two models cannot be implemented on a single interface.*

A Classic Firewall and Zone-Based Firewall cannot be used concurrently.

17. Which two rules about interfaces are valid when implementing a
Zone-Based Policy Firewall? (Choose two.)
If one interface is a zone member, but the other is not, all traffic will be passed.

If neither interface is a zone member, then the action is to pass traffic.*

If both interfaces are members of the same zone, all traffic will be passed.*

If one interface is a zone member and a zone-pair exists, all traffic will be passed.

If both interfaces belong to the same zone-pair and a policy exists, all traffic will be passed.

18. Which command will verify a Zone-Based Policy Firewall


configuration?
show interfaces

show zones

show running-config*

show protocols

19. Refer to the exhibit.


CCNA Security v2.0
Chapter 4 Exam Answers p19

The network “A” contains multiple corporate servers that are


accessed by hosts from the Internet for information about the
corporation. What term is used to describe the network marked as
“A”?
internal network

untrusted network

perimeter security boundary

DMZ*

20. Which type of packet is unable to be filtered by an outbound


ACL?
multicast packet

ICMP packet
broadcast packet

router-generated packet*

21. When a Cisco IOS Zone-Based Policy Firewall is being


configured, which two actions can be applied to a traffic class?
(Choose two.)
drop*

log

forward

hold

inspect*

copy

22. Fill in the blank.

A __stateful__ firewall monitors the state of connections as network


traffic flows into and out of the organization.
 

23. Fill in the blank.

The __pass__ action in a Cisco IOS Zone-Based Policy Firewall is


similar to a permit statement in an ACL.

1. What information must an IPS track in order to detect attacks


matching a composite signature?
the total number of packets in the attack

the attacking period used by the attacker

the network bandwidth consumed by all packets

the state of packets related to the attack*

2. What is a disadvantage of a pattern-based detection mechanism?


The normal network traffic pattern must be profiled first.

It cannot detect unknown attacks.*

It is difficult to deploy in a large network.

Its configuration is complex.

3. What is the purpose in configuring an IOS IPS crypto key when


enabling IOS IPS on a Cisco router?
to secure the IOS image in flash

to enable Cisco Configuration Professional to be launched securely

to encrypt the master signature file

to verify the digital signature for the master signature file*

4. Refer to the exhibit.

CCNA Security v2.0 Chapter 5 Exam Answers p4

What is the result of issuing the Cisco IOS IPS commands on router
R1?
All traffic that is permitted by the ACL is subject to inspection by the IPS.*

A named ACL determines the traffic to be inspected.

All traffic that is denied by the ACL is subject to inspection by the IPS.

A numbered ACL is applied to S0/0/0 in the outbound directio

5. Which two benefits does the IPS version 5.x signature format
provide over the version 4.x signature format? (Choose two.)
support for IPX and AppleTalk protocols

addition of signature micro engines

support for comma-delimited data import

support for encrypted signature parameters*

addition of a signature risk rating*

6. Which type of IPS signature detection is used to distract and


confuse attackers?
honeypot-based detection*

policy-based detection

pattern-based detection

anomaly-based detection

7. Which statement is true about an atomic alert that is generated by


an IPS?
It is an alert that is used only when a logging attack has begun.

It is a single alert sent for multiple occurrences of the same signature.


It is an alert that is generated every time a specific signature has been found.*

It is both a normal alarm and a summary alarm being sent simultaneously at set intervals.

8. A system analyst is configuring and tuning a recently deployed IPS


appliance. By examining the IPS alarm log, the analyst notices that
the IPS does not generate alarms for a few known attack packets.
Which term describes the lack of alarms by the IPS?
true negative

false positive

false negative*

true positive

9. A security specialist configures an IPS so that it will generate an


alert when an attack is first detected. Alerts for the subsequent
detection of the same attack are suppressed for a pre-defined period
of time. Another alert will be generated at the end of the period
indicating the number of the attack detected. Which IPS alert
monitoring mechanism is configured?
composite alert

atomic alert

correlation alert

summary alert*

10. In configuring a Cisco router to prepare for IPS and VPN


features, a network administrator opens the file realm-
cisco.pub.key.txt, and copies and pastes the contents to the router at
the global configuration prompt. What is the result after this
configuration step?
The router is authenticated with the Cisco secure IPS resource web server.

A pair of public/secret keys is created for IPsec VPN operation.

A crypto key is created for IOS IPS to verify the master signature file.*

A pair of public/secret keys is created for the router to serve as an SSH server.

11. Refer to the exhibit.

CCNA Security v2.0 Chapter 5 Exam Answers p11

Based on the configuration, which traffic will be examined by the IPS


that is configured on router R1?
traffic that is destined to LAN 1 and LAN 2

return traffic from the web server

traffic that is initiated from LAN 1 and LAN 2

no traffic will be inspected*


http traffic that is initiated from LAN 1

12. Refer to the exhibit.

CCNA
Security v2.0 Chapter 5 Exam Answers p12

Based on the IPS configuration provided, which conclusion can be


drawn?
The signatures in all categories will be compiled into memory and used by the IPS.

The signatures in all categories will be retired and not be used by the IPS.

Only the signatures in the ios_ips basic category will be compiled into memory and used
by the IPS.*

The signatures in the ios_ips basic category will be retired and the remaining signatures will
be compiled into memory and used by the IPS.

13. A network administrator is configuring an IOS IPS with the


command

R1(config)# ip ips signature-definition

Which configuration task can be achieved with this command?


Retire or unretire the ios_ips basic signature category.

Retire or unretire an individual signature.*


Retire or unretire the all signature category.

Retire or unretire the all atomic signatures category.

14. What are two disadvantages of using an IDS? (Choose two.)


The IDS analyzes actual forwarded packets.

The IDS does not stop malicious traffic.*

The IDS has no impact on traffic.

The IDS works offline using copies of network traffic.

The IDS requires other devices to respond to attacks.*

15. What are two shared characteristics of the IDS and the IPS?
(Choose two.)
Both use signatures to detect malicious traffic.*

Both analyze copies of network traffic.

Both have minimal impact on network performance.

Both rely on an additional network device to respond to malicious traffic.

Both are deployed as sensors.*

16. Refer to the exhibit.

CCNA Security v2.0 Chapter 5 Exam


Answers p16

A network administrator enters the command on a Cisco IOS IPS


router. What is the effect?
Alert messages are sent in syslog format.*
Alert messages are sent in trace file format.

Alert messages are sent in Security Device Event Exchange (SDEE) format.

Alert messages are sent in event log format.

17. A network administrator suspects the default setting of the ip ips


notify sdee command has caused performance degradation on the
Cisco IOS IPS router. The network administrator enters the ip sdee
events 50 command in an attempt to remedy the performance issues.
What is the immediate effect of this command?
All events that were stored in the original buffer are saved, while a new buffer is created to
store new events.

All events that were stored in the previous buffer are lost.*

The newest 50 events from the original buffer are saved and all others are deleted.

The oldest 50 events of the original buffer are deleted.

18. True or False?

A Cisco IDS does not affect the flow of traffic when it operates in
promiscuous mode
true*

false

19. What is a required condition to enable IPS activity reporting using


the SDEE format?
Create an IOS IPS configuration directory in flash.

Enable an HTTP or HTTPS service on the router.*


Configure the signature category.

Issue the ip ips notify log command.

20. Refer to the exhibit.

CCNA Security
v2.0 Chapter 5 Exam Answers p20

Which statement best describes how incoming traffic on serial 0/0 is


handled?
Traffic that is coming from any source other than 172.31.235.0/24 will be scanned and
reported.

Traffic not matching ACL 100 will be dropped.

Traffic not matching ACL 100 will be scanned and reported.

Traffic that is sourced from 172.31.235.0/24 will be sent directly to its destination without
being scanned or reported.

Traffic matching ACL 100 will be scanned and reported.*

Traffic that is sourced from 172.31.235.0/24 will be scanned and reported.

21. What is a disadvantage of network-based IPS as compared to


host-based IPS?
Network-based IPS is less cost-effective.

Network-based IPS should not be used with multiple operating systems.


Network-based IPS cannot examine encrypted traffic.*

Network-based IPS does not detect lower level network events.

22. An IPS sensor has detected the string confidential across multiple
packets in a TCP session. Which type of signature trigger and
signature type does this describe?
Trigger: Policy-based detection
Type: Atomic signature

Trigger: Policy-based detection


Type: Composite signature

Trigger: Anomaly-based detection


Type: Atomic signature

Trigger: Anomaly-based detection


Type: Composite signature

Trigger: Pattern-based detection


Type: Atomic signature

Trigger: Pattern-based detection


Type: Composite signature*

23. What are two drawbacks to using HIPS? (Choose two.)


With HIPS, the success or failure of an attack cannot be readily determined.

With HIPS, the network administrator must verify support for all the different
operating systems used in the network.*

HIPS has difficulty constructing an accurate network picture or coordinating events


that occur across the entire network.*

If the network traffic stream is encrypted, HIPS is unable to access unencrypted forms of the
traffic.

HIPS installations are vulnerable to fragmentation attacks or variable TTL attacks

1. Refer to the exhibit.


C
CNA Security v2.0 Chapter 6 Exam Answers p1

The Fa0/2 interface on switch S1 has been configured with the


switchport port-security mac-address 0023.189d.6456 command and
a workstation has been connected. What could be the reason that the
Fa0/2 interface is shutdown?
The connection between S1 and PC1 is via a crossover cable.

The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface.

S1 has been configured with a switchport port-security aging command.

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured
MAC address.*

2. Two devices that are connected to the same switch need to be totally
isolated from one another. Which Cisco switch security feature will
provide this isolation?
PVLAN Edge*

DTP

SPAN

BPDU guard
 

3. Which two functions are provided by Network Admission Control?


(Choose two.)
protecting a switch from MAC address table overflow attacks

enforcing network security policy for hosts that connect to the network*

ensuring that only authenticated hosts can access the network*

stopping excessive broadcasts from disrupting network traffic

limiting the number of MAC addresses that can be learned on a single switch port

4. Which spanning-tree enhancement prevents the spanning-tree


topology from changing by blocking a port that receives a superior
BPDU?
BDPU filter

PortFast

BPDU guard

root guard*

5. Which security feature should be enabled in order to prevent an


attacker from overflowing the MAC address table of a switch?
root guard

port security*

storm control

BPDU filter

 
6. In what situation would a network administrator most likely
implement root guard?
on all switch ports (used or unused)

on all switch ports that connect to a Layer 3 device

on all switch ports that connect to host devices

on all switch ports that connect to another switch

on all switch ports that connect to another switch that is not the root bridge*

7. What component of Cisco NAC is responsible for performing deep


inspection of device security profiles?
Cisco NAC Profiler

Cisco NAC Agent*

Cisco NAC Manager

Cisco NAC Server

8. What is the role of the Cisco NAC Manager in implementing a


secure networking infrastructure?
to define role-based user access and endpoint security policies*

to assess and enforce security policy compliance in the NAC environment

to perform deep inspection of device security profiles

to provide post-connection monitoring of all endpoint devices

9. What is the role of the Cisco NAC Server within the Cisco Secure
Borderless Network Architecture?
providing the ability for company employees to create guest accounts

providing post-connection monitoring of all endpoint devices

defining role-based user access and endpoint security policies

assessing and enforcing security policy compliance in the NAC environment*

10. What is the role of the Cisco NAC Guest Server within the Cisco
Borderless Network architecture?
It defines role-based user access and endpoint security policies.

It provides the ability for creation and reporting of guest accounts.*

It provides post-connection monitoring of all endpoint devices.

It performs deep inspection of device security profiles.

11. Which three functions are provided under Cisco NAC framework
solution? (Choose three.)
VPN connection

AAA services*

intrusion prevention

scanning for policy compliance*

secure connection to servers

remediation for noncompliant devices*

12. Which feature is part of the Antimalware Protection security


solution?
file retrospection*
user authentication and authorization

data loss prevention

spam blocking

13. What security countermeasure is effective for preventing CAM


table overflow attacks?
DHCP snooping

Dynamic ARP Inspection

IP source guard

port security*

14. What is the behavior of a switch as a result of a successful CAM


table attack?
The switch will forward all received frames to all other ports.*

The switch will drop all received frames.

The switch interfaces will transition to the error-disabled state.

The switch will shut down.

15. What additional security measure must be enabled along with IP


Source Guard to protect against address spoofing?
port security

BPDU Guard

root guard

DHCP snooping*
 

16. What are three techniques for mitigating VLAN hopping attacks?
(Choose three.)
Set the native VLAN to an unused VLAN.*

Disable DTP.*

Enable Source Guard.

Enable trunking manually.*

Enable BPDU guard.

Use private VLANs.

17. What two mechanisms are used by Dynamic ARP inspection to


validate ARP packets for IP addresses that are dynamically assigned
or IP addresses that are static? (Choose two.)
MAC-address-to-IP-address bindings*

RARP

ARP ACLs*

IP ACLs

Source Guard

18. What protocol should be disabled to help mitigate VLAN hopping


attacks?
STP

ARP

CDP
DTP*

19. What network attack seeks to create a DoS for clients by


preventing them from being able to obtain a DHCP lease?
DHCP spoofing

CAM table attack

IP address spoofing

DHCP starvation*

20. What is the only type of port that an isolated port can forward
traffic to on a private VLAN?
a community port

a promiscuous port*

another isolated port

any access port in the same PVLAN

21. Which STP stability mechanism is used to prevent a rogue switch


from becoming the root switch?
Source Guard

BPDU guard

root guard*

loop guard

 
22. How can a user connect to the Cisco Cloud Web Security service
directly?
through the connector that is integrated into any Layer 2 Cisco switch

by using a proxy autoconfiguration file in the end device*

by accessing a Cisco CWS server before visiting the destination web site

by establishing a VPN connection with the Cisco CWS

23. What security benefit is gained from enabling BPDU guard on


PortFast enabled interfaces?
enforcing the placement of root bridges

preventing buffer overflow attacks

preventing rogue switches from being added to the network*

protecting against Layer 2 loops

24. DHCP snooping is a mitigation technique to prevent rogue DHCP


servers from providing false IP configuration parameters.

1. What is the focus of cryptanalysis?


hiding secret codes

developing secret codes

breaking encrypted codes*

implementing encrypted codes

 
2. How many bits does the Data Encryption Standard (DES) use for
data encryption?
40 bits

56 bits*

64 bits

72 bits

3. Which statement describes the Software-Optimized Encryption


Algorithm (SEAL)?
SEAL is a stream cipher.*

It uses a 112-bit encryption key.

It is an example of an asymmetric algorithm.

It requires more CPU resources than software-based AES does.

4. Which encryption algorithm is an asymmetric algorithm?


DH*

SEAL

3DES

AES

5. An online retailer needs a service to support the nonrepudiation of


the transaction. Which component is used for this service?
the private key of the retailer

the unique shared secret known only by the retailer and the customer
the public key of the retailer

the digital signatures*

6. In which situation is an asymmetric key algorithm used?


Two Cisco routers authenticate each other with CHAP.

User data is transmitted across the network after a VPN is established.

An office manager encrypts confidential files before saving them to a removable device.

A network administrator connects to a Cisco router with SSH.*

7. What is the purpose of a nonrepudiation service in secure


communications?
to ensure that encrypted secure communications cannot be decoded

to confirm the identity of the recipient of the communications

to provide the highest encryption level possible

to ensure that the source of the communications is confirmed*

8. Which objective of secure communications is achieved by


encrypting data?
integrity

authentication

confidentiality*

availability

 
9. Why is the 3DES algorithm often preferred over the AES
algorithm?
3DES is more trusted because it has been proven secure for a longer period than AES.*

AES is more expensive to implement than 3DES.

3DES performs better in high-throughput, low-latency environments than AES.

Major networking equipment vendors such as Cisco have not yet adopted AES.

10. What is the most common use of the Diffie-Helman algorithm in


communications security?
to create password hashes for secure authentication

to provide routing protocol authentication between routers

to encrypt data for secure e-commerce communications

to secure the exchange of keys used to encrypt data*

11. Which type of encryption algorithm uses public and private keys
to provide authentication, integrity, and confidentiality?
symmetric

shared secret

IPsec

asymmetric*

12. How do modern cryptographers defend against brute-force


attacks?
Use statistical analysis to eliminate the most common encryption keys.
Use a keyspace large enough that it takes too much money and too much time to conduct
a successful attack.*

Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a
successful attack.

Use frequency analysis to ensure that the most popular letters used in the language are not
used in the cipher message.

13. Which encryption protocol provides network layer


confidentiality?
IPsec protocol suite*

Transport Layer Security

Secure Hash Algorithm 1

Secure Sockets Layer

Keyed MD5

Message Digest 5

14. Refer to the exhibit.

CCNA Security v2.0 Chapter 7 Exam Answers p14

Which encryption algorithm is described in the exhibit?


RC4

AES

3DES*

DES

SEAL

15. Which statement describes asymmetric encryption algorithms?


They have key lengths ranging from 80 to 256 bits.

They include DES, 3DES, and AES.

They are also called shared-secret key algorithms.

They are relatively slow because they are based on difficult computational algorithms.*

16. Which two non-secret numbers are initially agreed upon when the
Diffie-Hellman algorithm is used? (Choose two.)
binomial coefficient

generator*

elliptic curve invariant

prime modulus*

topological index

pseudorandom nome

17. In what situation would an asymmetric algorithm most likely be


used?
logging onto a computer
making an online purchase*

uploading a networking book chapter using FTP

transferring a large stream of data between two corporate locations

18. Why is asymmetric algorithm key management simpler than


symmetric algorithm key management?
It uses fewer bits.

Only one key is used.

Two public keys are used for the key exchange.

One of the keys can be made public.*

19. What is the purpose of code signing?


source identity secrecy

integrity of source .EXE files*

reliable transfer of data

data encryption

20. Which algorithm can ensure data confidentiality?


MD5

PKI

RSA

AES*

 
21. What is the purpose of a digital certificate?
It guarantees that a website has not been hacked.

It authenticates a website and establishes a secure connection to exchange confidential


data.*

It provides proof that data has a traditional signature attached.

It ensures that the person who is gaining access to a network device is authorized.

22. Fill in the blank.

A shared secret is a key used in a symmetric encryption algorithm.

1. Refer to the exhibit.

CCN
A Security v2.0 Chapter 8 Exam Answers p1

How will traffic that does not match that defined by access list 101 be
treated by the router?
It will be sent unencrypted.*

It will be sent encrypted.

It will be blocked.

It will be discarded.

 
2. What three protocols must be permitted through the company
firewall for establishment of IPsec site-to-site VPNs? (Choose three.)
HTTPS

SSH

AH*

ISAKMP*

NTP

ESP*

3. Which statement describes the effect of key length in deterring an


attacker from hacking through an encryption key?
The length of a key does not affect the degree of security.

The shorter the key, the harder it is to break.

The length of a key will not vary between encryption algorithms.

The longer the key, the more key possibilities exist.*

4. What is the purpose of configuring multiple crypto ACLs when


building a VPN connection between remote sites?
By applying the ACL on a public interface, multiple crypto ACLs can be built to prevent
public users from connecting to the VPN-enabled router.

Multiple crypto ACLs can define multiple remote peers for connecting with a VPN-enabled
router across the Internet or network.

Multiple crypto ACLs can be configured to deny specific network traffic from crossing a
VPN.

When multiple combinations of IPsec protection are being chosen, multiple crypto ACLs
can define different traffic types.*
 

5. Consider the following configuration on a Cisco ASA:

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

What is the purpose of this command?


to define the ISAKMP parameters that are used to establish the tunnel

to define the encryption and integrity algorithms that are used to build the IPsec tunnel*

to define what traffic is allowed through and protected by the tunnel

to define only the allowed encryption algorithms

6. Which transform set provides the best protection?


crypto ipsec transform-set ESP-DES-SHA esp-aes-256 esp-sha-hmac*

crypto ipsec transform-set ESP-DES-SHA esp-3des esp-sha-hmac

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec transform-set ESP-DES-SHA esp-aes esp-des esp-sha-hmac

7. Which three ports must be open to verify that an IPsec VPN tunnel
is operating properly? (Choose three.)
168

50*

169

501

500*

51*
 

8. When is a security association (SA) created if an IPsec VPN tunnel


is used to connect between two sites?
after the tunnel is created, but before traffic is sent

only during Phase 2

only during Phase 1

during both Phase 1 and 2*

9. In which situation would the Cisco Discovery Protocol be disabled?


when a Cisco VoIP phone attaches to a Cisco switch

when a Cisco switch connects to another Cisco switch

when a Cisco switch connects to a Cisco router

when a PC with Cisco IP Communicator installed connects to a Cisco switch*

10. Which two statements accurately describe characteristics of


IPsec? (Choose two.)
IPsec works at the transport layer and protects data at the network layer.

IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.

IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.

IPsec is a framework of open standards that relies on existing algorithms.*

IPsec works at the network layer and operates over all Layer 2 protocols.*

IPsec works at the application layer and protects all application data.

 
11. Which action do IPsec peers take during the IKE Phase 2
exchange?
exchange of DH keys

negotiation of IPsec policy*

negotiation of IKE policy sets

verification of peer identity

12. Which three statements describe the IPsec protocol framework?


(Choose three.)
AH provides integrity and authentication.*

ESP provides encryption, authentication, and integrity.*

AH uses IP protocol 51.*

AH provides encryption and integrity.

ESP uses UDP protocol 50.

ESP requires both authentication and encryption.

13. Which statement accurately describes a characteristic of IPsec?


IPsec works at the application layer and protects all application data.

IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.

IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.

IPsec works at the transport layer and protects data at the network layer.

IPsec is a framework of open standards that relies on existing algorithms.*

14. Which two IPsec protocols are used to provide data integrity?
SHA*

AES

DH

MD5*

RSA

15. What is the function of the Diffie-Hellman algorithm within the


IPsec framework?
provides authentication

allows peers to exchange shared keys*

guarantees message integrity

provides strong data encryption

16. Refer to the exhibit.

CCNA
Security v2.0 Chapter 8 Exam Answers p16

What HMAC algorithm is being used to provide data integrity?


MD5

AES

SHA*
DH

17. What is needed to define interesting traffic in the creation of an


IPsec tunnel?
security associations

hashing algorithm

access list*

transform set

18. Refer to the exhibit.

CCNA
Security v2.0 Chapter 8 Exam Answers p18

What algorithm will be used for providing confidentiality?


RSA

Diffie-Hellman

DES

AES*

19. Which technique is necessary to ensure a private transfer of data


using a VPN?
encryption*

authorization

virtualization

scalability

20. Which statement describes a VPN?


VPNs use open source virtualization software to create the tunnel through the Internet.

VPNs use virtual connections to create a private network through a public network.*

VPNs use dedicated physical connections to transfer data between remote users.

VPNs use logical connections to create public networks through the Internet.

21. Which protocol provides authentication, integrity, and


confidentiality services and is a type of VPN?
ESP

IPsec*

MD5

AES

22. What is the purpose of NAT-T?


enables NAT for PC-based VPN clients

permits VPN to work when NAT is being used on one or both ends of the VPN*

upgrades NAT for IPv4

allows NAT to be used for IPv6 addresses

 
23. Which term describes a situation where VPN traffic that is is
received by an interface is routed back out that same interface?
GRE

split tunneling

MPLS

hairpinning*

24. What is an important characteristic of remote-access VPNs?


The VPN configuration is identical between the remote devices.

Internal hosts have no knowledge of the VPN.

Information required to establish the VPN must remain static.

The VPN connection is initiated by the remote user.*

25. Which type of site-to-site VPN uses trusted group members to


eliminate point-to-point IPsec tunnels between the members of a
group?
DMVPN

GRE

GETVPN*

MPLS

26. Refer to the exhibit.


CCNA
Security v2.0 Chapter 8 Exam Answers p26

Which pair of crypto isakmp key commands would correctly


configure PSK on the two routers?
R1(config)# crypto isakmp key cisco123 address 209.165.200.227
R2(config)# crypto isakmp key cisco123 address 209.165.200.226*

R1(config)# crypto isakmp key cisco123 address 209.165.200.226


R2(config)# crypto isakmp key cisco123 address 209.165.200.227

R1(config)# crypto isakmp key cisco123 hostname R1


R2(config)# crypto isakmp key cisco123 hostname R2

R1(config)# crypto isakmp key cisco123 address 209.165.200.226


R2(config)# crypto isakmp key secure address 209.165.200.227

27. Which two protocols must be allowed for an IPsec VPN tunnel is
operate properly (Choose two.)?
168

50*

501

169

51*

500

1. Refer to the exhibit.


CCNA Security v2.0 Chapter 9 Exam Answers p1

An administrator creates three zones (A, B, and C) in an ASA that


filters traffic. Traffic originating from Zone A going to Zone C is
denied, and traffic originating from Zone B going to Zone C is denied.
What is a possible scenario for Zones A, B, and C?
A – DMZ, B – Inside, C – Outside

A – Inside, B – DMZ, C – Outside

A – Outside, B – Inside, C – DMZ

A – DMZ, B – Outside, C – Inside*

2. What is one of the drawbacks to using transparent mode operation


on an ASA device?
no support for IP addressing

no support for management

no support for using an ASA as a Layer 2 switch

no support for QoS*


 

3. What is a characteristic of ASA security levels?


An ACL needs to be configured to explicitly permit traffic from an interface with a
lower security level to an interface with a higher security level.*

Each operational interface must have a name and be assigned a security level from 0 to 200.

The lower the security level on an interface, the more trusted the interface.

Inbound traffic is identified as the traffic moving from an interface with a higher security
level to an interface with a lower security level.

4. Refer to the exhibit.

CCNA
Security v2.0 Chapter 9 Exam Answers p4

Two types of VLAN interfaces were configured on an ASA 5505 with


a Base license. The administrator wants to configure a third VLAN
interface with limited functionality. Which action should be taken by
the administrator to configure the third interface?
Because the ASA 5505 does not support the configuration of a third interface, the
administrator cannot configure the third VLAN.

The administrator must enter the no forward interface vlan command before the nameif
command on the third interface.*

The administrator configures the third VLAN interface the same way the other two were
configured, because the Base license supports the proposed action.

The administrator needs to acquire the Security Plus license, because the Base license does
not support the proposed action.

5. What command defines a DHCP pool that uses the maximum


number of DHCP client addresses available on an ASA 5505 that is
using the Base license?
CCNAS-ASA(config)# dhcpd address 192.168.1.20-192.168.1.50 inside

CCNAS-ASA(config)# dhcpd address 192.168.1.10-192.168.1.100 inside

CCNAS-ASA(config)# dhcpd address 192.168.1.25-192.168.1.56 inside*

CCNAS-ASA(config)# dhcpd address 192.168.1.30-192.168.1.79 inside

6. Which two statements are true about ASA standard ACLs?


(Choose two.)
They are the most common type of ACL.

They are applied to interfaces to control traffic.

They are typically only used for OSPF routes.*

They specify both the source and destination MAC address.

They identify only the destination IP address.*

7. Refer to the exhibit.


CCNA
Security v2.0 Chapter 9 Exam Answers p7

A network administrator is configuring the security level for the ASA.


What is a best practice for assigning the security level on the three
interfaces?
Outside 40, Inside 100, DMZ 0

Outside 0, Inside 35, DMZ 90

Outside 100, Inside 10, DMZ 40

Outside 0, Inside 100, DMZ 50*

8. Refer to the exhibit.


CCNA
Security v2.0 Chapter 9 Exam Answers p8

A network administrator is configuring the security level for the ASA.


Which statement describes the default result if the administrator tries
to assign the Inside interface with the same security level as the DMZ
interface?
The ASA allows inbound traffic initiated on the Internet to the DMZ, but not to the Inside
interface.

The ASA console will display an error message.

The ASA will not allow traffic in either direction between the Inside interface and the
DMZ.*

The ASA allows traffic from the Inside to the DMZ, but blocks traffic initiated on the DMZ to
the Inside interface.

9. What is a difference between ASA IPv4 ACLs and IOS IPv4


ACLs?
ASA ACLs are always named, whereas IOS ACLs are always numbered.
Multiple ASA ACLs can be applied on an interface in the ingress direction, whereas only one
IOS ACL can be applied.

ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the
wildcard mask.*

ASA ACLs do not have an implicit deny any at the end, whereas IOS ACLs do.

ASA ACLs use forward and drop ACEs, whereas IOS ACLs use permit and deny ACEs.

10. What is the purpose of the webtype ACLs in an ASA?


to inspect outbound traffic headed towards certain web sites

to restrict traffic that is destined to an ASDM

to monitor return traffic that is in response to web server requests that are initiated from the
inside interface

to filter traffic for clientless SSL VPN users*

11. Refer to the exhibit.

CCN
A Security v2.0 Chapter 9 Exam Answers p11

A network administrator has configured NAT on an ASA device.


What type of NAT is used?
inside NAT*

static NAT

bidirectional NAT

outside NAT
 

12. Refer to the exhibit.

CCNA
Security v2.0 Chapter 9 Exam Answers p12

A network administrator is configuring an object group on an ASA


device. Which configuration keyword should be used after the object
group name SERVICE1?
icmp

ip

udp

tcp*

13. When dynamic NAT on an ASA is being configured, what two


parameters must be specified by network objects? (Choose two.)
a range of private addresses that will be translated*

the interface security level

the pool of public global addresses*

the inside NAT interface

the outside NAT interface

14. What function is performed by the class maps configuration


object in the Cisco modular policy framework?
identifying interesting traffic*

applying a policy to an interface

applying a policy to interesting traffic

restricting traffic through an interface

15. Refer to the exhibit.

CCNA Security v2.0 Chapter 9 Exam Answers p15

Based on the security levels of the interfaces on ASA1, what traffic


will be allowed on the interfaces?
Traffic from the Internet and DMZ can access the LAN.

Traffic from the Internet and LAN can access the DMZ.

Traffic from the Internet can access both the DMZ and the LAN.

Traffic from the LAN and DMZ can access the Internet.*

16. What are three characteristics of the ASA routed mode? (Choose
three.)
This mode is referred to as a “bump in the wire.”

In this mode, the ASA is invisible to an attacker.

The interfaces of the ASA separate Layer 3 networks and require different IP addresses
in different subnets.*

It is the traditional firewall deployment mode.*

This mode does not support VPNs, QoS, or DHCP Relay.

NAT can be implemented between connected networks.*

17. Refer to the exhibit.

CCNA
Security v2.0 Chapter 9 Exam Answers p17

An administrator has configured an ASA 5505 as indicated but is still


unable to ping the inside interface from an inside host. What is the
cause of this problem?
The no shutdown command should be entered on interface Ethernet 0/1.*

VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.

VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.

The security level of the inside interface should be 0 and the outside interface should be 100.
An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.

18. Refer to the exhibit.

CCNA Security v2.0


Chapter 9 Exam Answers p18

According to the command output, which three statements are true


about the DHCP options entered on the ASA 5505? (Choose three.)
The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the
DHCP client.

The dhcpd auto-config outside command was issued to enable the DHCP server.

The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable


the DHCP server.*

The dhcpd auto-config outside command was issued to enable the DHCP client.*

The dhcpd enable inside command was issued to enable the DHCP client.

The dhcpd enable inside command was issued to enable the DHCP server.*

19. Refer to the exhibit.


C
CNA Security v2.0 Chapter 9 Exam Answers p19

What will be displayed in the output of the show running-config


objectcommand after the exhibited configuration commands are
entered on an ASA 5505?
host 192.168.1.4

host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20

host 192.168.1.4 and range 192.168.1.10 192.168.1.20

host 192.168.1.3 and host 192.168.1.4

range 192.168.1.10 192.168.1.20*

host 192.168.1.3

20. What must be configured on a Cisco ASA device to support local


authentication?
AAA*

the IP address of the RADIUS or TACACS+ server

encrypted passwords

SSHv2

RSA keys
 

21. Which statement describes a difference between the Cisco ASA


IOS CLI feature and the router IOS CLI feature?
ASA uses the ? command whereas a router uses the help command to receive help on a brief
description and the syntax of a command.

To use a show command in a general configuration mode, ASA can use the command
directly whereas a router will need to enter the do command before issuing the show
command.*

To complete a partially typed command, ASA uses the Ctrl+Tab key combination whereas a
router uses the Tab key.

To indicate the CLI EXEC mode, ASA uses the % symbol whereas a router uses the #
symbol.

22. What are two factory default configurations on an ASA 5505?


(Choose two.)
VLAN 2 is configured with the name inside.

The internal web server is disabled.

DHCP service is enabled for internal hosts to obtain an IP address and a default gateway from
the upstream device.

PAT is configured to allow internal hosts to access remote networks through an


Ethernet interface.*

VLAN 1 is assigned a security level of 100.*

23. Which type of NAT would be used on an ASA where 10.0.1.0/24


inside addresses are to be translated only if traffic from these
addresses is destined for the 198.133.219.0/24 network?
policy NAT*

dynamic NAT
static NAT

dynamic PAT

24. Which statement describes a feature of AAA in an ASA device?


Accounting can be used alone.*

Authorization is enabled by default.

If authorization is disabled, all authenticated users will have a very limited access to the
commands.

Both authorization and accounting require a user to be authenticated first.

25. A network administrator is working on the implementation of the


Cisco Modular Policy Framework on an ASA device. The
administrator issues a clear service-policy command. What is the
effect after this command is entered?
All class map configurations are removed.

All service policy statistics data are removed.*

All service policies are removed.

All policy map configurations are removed.

26. What is needed to allow specific traffic that is sourced on the


outside network of an ASA firewall to reach an internal network?
ACL*

NAT

dynamic routing protocols

outside security zone level 0


1. Which statement describes the function provided to a network
administratorwho uses the Cisco Adaptive Security Device Manager
(ASDM) GUI that runs as a Java Web Start application?
The administrator can connect to and manage a single ASA.*

The administrator can connect to and manage multiple ASA devices.

The administrator can connect to and manage multiple ASA devices and Cisco routers.

The administrator can connect to and manage multiple ASA devices, Cisco routers, and Cisco
switches.

2. What is one benefit of using ASDM compared to using the CLI to


configure the Cisco ASA?
It does not require any initial device configuration.

It hides the complexity of security commands.*

ASDM provides increased configuration security.

It does not require a remote connection to a Cisco device.

3. Which type of security is required for initial access to the Cisco


ASDM by using the local application option?
SSL*

WPA2 corporate

biometric

AES

 
4. Which minimum configuration is required on most ASAs before
ASDM can be used?
SSH

a dedicated Layer 3 management interface*

a logical VLAN interface and an Ethernet port other than 0/0

Ethernet 0/0

5. What must be configured on an ASA before it can be accessed by


ASDM?
web server access*

Telnet or SSH

an Ethernet port other than 0/0

Ethernet 0/0 IP address

6. How is an ASA interface configured as an outside interface when


using ASDM?
Select a check box from the Interface Type option that shows inside, outside, and DMZ.

Select outside from the Interface Type drop-down menu.

Enter the name “outside” in the Interface Name text box.*

Drag the interface to the port labeled “outside” in the ASA drawing.

7. Refer to the exhibit.


CCNA Security v2.0 Chapter 10 Exam
Answers p7

Which Device Management menu item would be used to access


theASA command line from within Cisco ASDM?
Licensing

System Image/Configuration

Management Access*

Advanced

8. Which ASDM configuration option is used to configure the ASA


enable secret password?
Device Setup*

Monitoring

Interfaces

Device Management
 

9. Refer to the exhibit.

CCNA Security v2.0 Chapter 10 Exam


Answers p9

Which Device Setup ASDM menu option would be used to


configure the ASA for an NTP server?
Startup Wizard

Device Name/Password

Routing

Interfaces

System Time*

10. True or False?

The ASA can be configured through ASDM as a DHCP server.


false

true*

11. Which ASDM interface option would be used to configure an ASA


as a DHCP server for local corporate devices?
DMZ

outside

local

inside*

12. Which ASDM configuration option re-encrypts all shared keys


and passwords on an ASA?
security master

super encryption

master passphrase*

device protection

13. Which type of encryption is applied to shared keys and passwords


when the master passphrase option is enabled through ASDM for an
ASA?
3DES

public/private key

AES*

128-bit

14. When the CLI is used to configure an ISR for a site-to-site VPN
connection, which two items must be specified to enable a crypto map
policy? (Choose two.)
the hash

the peer*
encryption

the ISAKMP policy

a valid access list*

IP addresses on all active interfaces

15. What is the purpose of the ACL in the configuration of an ISR


site-to-site VPN connection?
to permit only secure protocols

to log denied traffic

to identify the peer

to define interesting traffic*

16. When ASDM is used to configure an ASA site-to-site VPN, what


can be customized to secure traffic?
ISAKMP

IKE

IKE and ISAKMP*

preshared key

17. Which VPN solution allows the use of a web browser to establish a
secure, remote-access VPN tunnel to the ASA?
clientless SSL*

site-to-site using an ACL

site-to-site using a preshared key


client-based SSL

18. Which remote-access VPN connection allows the user to connect


by using a web browser?
IPsec (IKEv2) VPN

site-to-site VPN

clientless SSL VPN*

IPsec (IKEv1) VPN

19. Which remote-access VPN connection allows the user to connect


using Cisco AnyConnect?
IPsec (IKEv2) VPN*

site-to-site VPN

clientless SSL VPN

IPsec (IKEv1) VPN

20. Which statement describes available user authentication methods


when using an ASA 5505 device?
The ASA 5505 can use either a AAA server or a local database.*

The ASA 5505 only uses a AAA server for authentication.

The ASA 5505 only uses a local database for authentication.

The ASA 5505 must use both a AAA server and a local database.

21. Which remote-access VPN connection needs a bookmark list?


IPsec (IKEv1) VPN

IPsec (IKEv2) VPN

site-to-site VPN

clientless SSL VPN*

22. What occurs when a user logs out of the web portal on a clientless
SSL VPN connection?
The browser cache is cleared.

Downloaded files are deleted.

The user no longer has access to the VPN.*

The web portal times out.

23. If an outside host does not have the Cisco AnyConnect client
preinstalled, how would the host gain access to the client image?
The host initiates a clientless connection to a TFTP server to download the client.

The host initiates a clientless VPN connection using a compliant web browser to
download the client.*

The Cisco AnyConnect client is installed by default on most major operating systems.

The host initiates a clientless connection to an FTP server to download the client.

24. What is an optional feature that is performed during the Cisco


AnyConnect Secure Mobility Client VPN establishment phase?
security optimization

host-based ACL installation

posture assessment*
quality of service security

25. Which item describes secure protocol support provided by Cisco


AnyConnect?
neither SSL nor IPsec

SSL only

both SSL and IPsec*

IPsec only

26. What is the purpose of configuring an IP address pool to be used


for client-based SSL VPN connections?
to assign addresses to the interfaces on the ASA

to identify which users are allowed to download the client image

to assign IP addresses to clients when they connect*

to identify which clients are allowed to connect

1. Which security test is appropriate for detecting system weaknesses


such as misconfiguration, default passwords, and potential DoS
targets?
vulnerability scanning*

network scanning

integrity checkers

penetration testing

 
2. How does network scanning help assess operations security?
It can simulate attacks from malicious sources.

It can log abnormal activity.

It can detect open TCP ports on network systems.*

It can detect weak or blank passwords.

3. What is the objective of the governing policy in the security policy


hierarchy structure?
It covers all rules pertaining to information security that end users should know about and
follow.

It outlines the company’s overall security goals for managers and technical staff.*

It provides general policies on how the technical staff should perform security functions.

It defines system and issue-specific policies that describe what the technical staff does.

4. Which type of security policy document is it that includes


implementation details that usually contain step-by-step instructions
and graphics?
best practices document

procedure document*

standards document

guideline document

5. What is the purpose of a security awareness campaign?


to teach skills so employees can perform security tasks
to focus the attention of employees on security issues*

to provide users with a training curriculum that can ultimately lead to a formal degree

to integrate all the security skills and competencies into a single body of knowledge

6. What is the goal of network penetration testing?


detecting configuration changes on network systems

detecting potential weaknesses in systems

determining the feasibility and the potential consequences of a successful attack*

detecting weak passwords

7. What network security testing tool has the ability to provide details
on the source of suspicious network activity?
SIEM*

SuperScan

Zenmap

Tripwire

8. What network scanning tool has advanced features that allows it to


use decoy hosts to mask the source of the scan?
Nessus

Metasploit

Tripwire

Nmap*

 
9. What network testing tool can be used to identify network layer
protocols running on a host?
SIEM

Nmap*

L0phtcrack

Tripwire

10. What type of network security test would be used by network


administrators for detection and reporting of changes to network
systems?
penetration testing

vulnerability scanning

integrity checking*

network scanning

11. What testing tool is available for network administrators who


need a GUI version of Nmap?
Nessus

SIEM

Zenmap*

SuperScan

12. Which initial step should be followed when a security breach is


found on a corporate system?
Create a drive image of the system.

Isolate the infected system.*

Establish a chain of custody.

Photograph the system.

13. What step should be taken after data is collected, but before
equipment is disconnected, if a security breach is found on a system?
Create a drive image of the system.

Isolate the infected system.

Photograph the system.*

Determine if data tampering has occurred.

14. Which security program is aimed at all levels of an organization,


including end users and executive staff?
educational degree programs

certificate programs

awareness campaigns*

firewall implementation training courses

15. What is implemented by administration to instruct end users in


how to effectively conduct business safely within an organization?
security awareness program*

governing policy

noncompliance consequences
technical policy

16. What are two major components of a security awareness


program? (Choose two.)
technical policy

procedure documents

awareness campaigns*

guideline documents

education and training*

17. Which type of documents include implementation details that


usually contain step-by-step instructions and graphics?
standards documents

procedure documents*

guideline documents

end-user policy documents

18. Which type of documents help an organization establish


consistency in the operations of the network by specifying criteria that
must be followed?
guidelines

standards*

procedures

end user policies


 

19. Which policy outlines the overall security goals for managers and
technical staff within a company?
acceptable use policy

technical policy

governing policy*

end-user policy

20. Which type of security policy includes network access standards


and server security policies?
end user policy

technical policy*

governing policy

acceptable use policy

21. Which type of security policy includes acceptable encryption


methods?
governing policy

acceptable use policy

technical policy*

end-user policy

22. What is the determining factor in the content of a security policy


within an organization?
the security staff

the audience*

the chief executive officer

the best practices

23. Which executive position is ultimately responsible for the success


of an organization?
Chief Technology Officer

Chief Executive Officer*

Chief Security Officer

Chief Information Officer

24. Match the network security testing tool with the correct function.
(Not all options are used.)
Question

CCNA Security v2.0 Chapter 11 Exam Answers p24-1


Answer
CCNA Security v2.0 Chapter
11 Exam Answers p24-2

1. Refer to the exhibit.

CCNA Security v2.0 Final Exam q1

Based on the security levels of the interfaces on ASA1, what traffic


will be allowed on the interfaces? [Similar with Question 27]
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet and DMZ can access the LAN.
Traffic from the Internet can access both the DMZ and the LAN.
Traffic from the LAN and DMZ can access the Internet.*
2. What is the one major difference between local AAA authentication
and using the login local command when configuring device access
authentication?
Local AAA authentication provides a way to configure backup methods of
authentication, but login local does not.*
The login local command requires the administrator to manually configure the usernames and
passwords, but local AAA authentication does not.
Local AAA authentication allows more than one user account to be configured, but login local
does not.
The login local command uses local usernames and passwords stored on the router, but local
AAA authentication does not.

3. Refer to the exhibit.

CCNA Security v2.0 Final Exam q3


A network administrator configures AAA authentication on R1. The administrator then
tests the configuration by telneting to R1. The ACS servers are configured and running.
What will happen if the authentication fails?

The enable secret password could be used in the next login attempt.
The authentication process stops. *
The username and password of the local user database could be used in the next login attempt.
The enable secret password and a random username could be used in the next login attempt.

4. What are two tasks that can be accomplished with the Nmap and
Zenmap network tools? (Choose two.)
password recovery
password auditing
identification of Layer 3 protocol support on hosts*
TCP and UDP port scanning*
validation of IT system configuration
5. Which Cisco IOS subcommand is used to compile an IPS signature
into memory?
retired true
event-action produce-alert
retired false*
event-action deny-attacker-inline

6. Why are DES keys considered weak keys?


They are more resource intensive.
DES weak keys use very long key sizes.
They produce identical subkeys.*
DES weak keys are difficult to manage.

7. What is a benefit of using a next-generation firewall rather than a


stateful firewall?
reactive protection against Internet attacks
granularity control within applications*
support of TCP-based packet filtering
support for logging

8. What is a result of securing the Cisco IOS image using the Cisco
IOS Resilient Configuration feature?
When the router boots up, the Cisco IOS image is loaded from a secured FTP ___location.
The Cisco IOS image file is not visible in the output of the show flash command.*
The Cisco IOS image is encrypted and then automatically backed up to the NVRAM.
The Cisco IOS image is encrypted and then automatically backed up to a TFTP server.

9. The corporate security policy dictates that the traffic from the
remote-access VPN clients must be separated between trusted traffic
that is destined for the corporate subnets and untrusted traffic
destined for the public Internet. Which VPN solution should be
implemented to ensure compliance with the corporate policy?
MPLS
hairpinning
GRE
split tunneling*
10. Which two conditions must be met in order for a network
administrator to be able to remotely manage multiple ASAs with
Cisco ASDM? (Choose two.)
The ASAs must all be running the same ASDM version.
Each ASA must have the same enable secret password.
Each ASA must have the same master passphrase enabled.
The ASAs must be connected to each other through at least one inside interface.
ASDM must be run as a local application.*

11. What is negotiated in the establishment of an IPsec tunnel between


two IPsec hosts during IKE Phase 1?
ISAKMP SA policy*
DH groups
interesting traffic
transform sets

12. What are two benefits of using a ZPF rather than a Classic
Firewall? (Choose two.)
ZPF allows interfaces to be placed into zones for IP inspection.
The ZPF is not dependent on ACLs.*
Multiple inspection actions are used with ZPF.
ZPF policies are easy to read and troubleshoot.*
With ZPF, the router will allow packets unless they are explicitly blocked.

13. Which security policy characteristic defines the purpose of


standards?
step-by-step details regarding methods to deploy company switches
recommended best practices for placement of all company switches
required steps to ensure consistent configuration of all company switches*
list of suggestions regarding how to quickly configure all company switches

14. What algorithm is used to provide data integrity of a message


through the use of a calculated hash value?
RSA
DH
AES
HMAC*
15. On which port should Dynamic ARP Inspection (DAI) be
configured on a switch?
an uplink port to another switch*
on any port where DHCP snooping is disabled
any untrusted port
access ports only

16. What is a feature of a Cisco IOS Zone-Based Policy Firewall?


A router interface can belong to only one zone at a time.*
Service policies are applied in interface configuration mode.
Router management interfaces must be manually assigned to the self zone.
The pass action works in multiple directions.

17. Refer to the exhibit.

CCNA Security v2.0 Final Exam q17

The administrator can ping the S0/0/1 interface of RouterB but is


unable to gain Telnet access to the router by using the password
cisco123. What is a possible cause of the problem?
The Telnet connection between RouterA and RouterB is not working correctly.
The password cisco123 is wrong.*
The administrator does not have enough rights on the PC that is being used.
The enable password and the Telnet password need to be the same.
18. Refer to the exhibit.

CCNA Security v2.0 Final Exam q18

The ip verify source command is applied on untrusted interfaces.


Which type of attack is mitigated by using this configuration?
DHCP spoofing
DHCP starvation
STP manipulation
MAC and IP address spoofing*

19. Refer to the exhibit.

CCNA Security v2.0 Final Exam q19

Which conclusion can be made from the show crypto map command
output that is shown on R1?
The crypto map has not yet been applied to an interface.*
The current peer IP address should be 172.30.2.1.
There is a mismatch between the transform sets.
The tunnel configuration was established and can be tested with extended pings.

20. What type of algorithms require sender and receiver to exchange


a secret key that is used to ensure the confidentiality of messages?
symmetric algorithms*
hashing algorithms
asymmetric algorithms
public key algorithms

21. What is an advantage in using a packet filtering firewall versus a


high-end firewall appliance?
Packet filters perform almost all the tasks of a high-end firewall at a fraction of the
cost.*
Packet filters provide an initial degree of security at the data-link and network layer.
Packet filters represent a complete firewall solution.
Packet filters are not susceptible to IP spoofing.

22. Refer to the exhibit.

CCNA Security v2.0 Final Exam q22

In the network that is shown, which AAA command logs the use of
EXEC session commands?
aaa accounting network start-stop group tacacs+
aaa accounting network start-stop group radius
aaa accounting connection start-stop group radius
aaa accounting exec start-stop group radius
aaa accounting connection start-stop group tacacs+
aaa accounting exec start-stop group tacacs+*
23. A network administrator enters the single-connection command.
What effect does this command have on AAA operation?
allows a new TCP session to be established for every authorization request
authorizes connections based on a list of IP addresses configured in an ACL on a Cisco ACS
server
allows a Cisco ACS server to minimize delay by establishing persistent TCP
connections*
allows the device to establish only a single connection with the AAA-enabled server

24. Which two practices are associated with securing the features and
performance of router operating systems? (Choose two.)
Install a UPS.
Keep a secure copy of router operating system images.*
Configure the router with the maximum amount of memory possible.*
Disable default router services that are not necessary.
Reduce the number of ports that can be used to access the router.

25. Which statement describes a characteristic of the IKE protocol?


It uses UDP port 500 to exchange IKE information between the security gateways.*
IKE Phase 1 can be implemented in three different modes: main, aggressive, or quick.
It allows for the transmission of keys directly across a network.
The purpose of IKE Phase 2 is to negotiate a security association between two IKE peers.

26. Refer to the exhibit.


CCNA Security v2.0 Final Exam q26

If a network administrator is using ASDM to configure a site-to-site


VPN between the CCNAS-ASA and R3, which IP address would the
administrator use for the peer IP address textbox on the ASA if data
traffic is to be encrypted between the two remote LANs?
209.165.201.1*
192.168.1.3
172.16.3.1
172.16.3.3
192.168.1.1

27. Refer to the exhibit.


CCNA Security v2.0 Final Exam q27

Based on the security levels of the interfaces on the ASA, what


statement correctly describes the flow of traffic allowed on the
interfaces?
Traffic that is sent from the LAN and the Internet to the DMZ is considered inbound.
Traffic that is sent from the DMZ and the Internet to the LAN is considered outbound.
Traffic that is sent from the LAN to the DMZ is considered is considered inbound.
Traffic that is sent from the DMZ and the LAN to the Internet is considered outbound.*

28. What two assurances does digital signing provide about code that
is downloaded from the Internet? (Choose two.)
The code contains no errors.
The code contains no viruses.
The code has not been modified since it left the software publisher.*
The code is authentic and is actually sourced by the publisher.*
The code was encrypted with both a private and public key.

29. Which interface option could be set through ASDM for a Cisco
ASA?
default route
access list
VLAN ID*
NAT/PAT
30. What are two characteristics of a stateful firewall? (Choose two.)
uses connection information maintained in a state table*
uses static packet filtering techniques
analyzes traffic at Layers 3, 4 and 5 of the OSI model*
uses complex ACLs which can be difficult to configure
prevents Layer 7 attacks

31. What are three characteristics of SIEM? (Choose three.)


can be implemented as software or as a service*
Microsoft port scanning tool designed for Windows
examines logs and events from systems and applications to detect security threats*
consolidates duplicate event data to minimize the volume of gathered data*
uses penetration testing to determine most network vulnerabilities
provides real-time reporting for short-term security event analysis

32. Which type of traffic is subject to filtering on an ASA 5505 device?


public Internet to inside
public Internet to DMZ
inside to DMZ*
DMZ to inside

33. Which IDS/IPS signature alarm will look for packets that are
destined to or from a particular port?
honey pot-based
anomaly-based
signature-based*
policy-based

34. Which three actions can the Cisco IOS Firewall IPS feature be
configured to take when an intrusion activity is detected? (Choose
three.)
reset UDP connection
reset TCP connection*
alert*
isolate
inoculate
drop*
35. Which two protocols can be selected using the Cisco AnyConnect
VPN Wizard to protect the traffic inside a VPN tunnel? (Choose two.)
Telnet
SSH
SSL*
ESP
IPsec*

36. What is a characteristic of a role-based CLI view of router


configuration?
When a superview is deleted, the associated CLI views are deleted.
A single CLI view can be shared within multiple superviews.*
A CLI view has a command hierarchy, with higher and lower views.
Only a superview user can configure a new view and add or remove commands from the
existing views.

37. Match the network security testing technique with how it is used to
test network security. (Not all options are used)

CCNA Security v2.0 Final Exam q37


Penetration testing = used to determine the possible consequences of successful attacks on
the network.
Vulnerability scanning = used to find weaknesses and misconfigurations on network
systems.
Network scanning = used to discover available resources on the network.

38. Which statement describes the use of certificate classes in the PKI?
A class 5 certificate is more trustworthy than a class 4 certificate.*
Email security is provided by the vendor, not by a certificate.
The lower the class number, the more trusted the certificate.
A vendor must issue only one class of certificates when acting as a CA.
39. Refer to the exhibit.

CCNA Security v2.0 Final


Exam q39

An administrator issues these IOS login enhancement commands to


increase the security for login connections. What can be concluded
about them?
Because the login delay command was not used, a one-minute delay between login attempts is
assumed.
The hosts that are identified in the ACL will have access to the device.*
The login block-for command permits the attacker to try 150 attempts before being stopped to
try again.
These enhancements apply to all types of login connections.

40. A company deploys a Cisco ASA with the Cisco CWS connector
enabled as the firewall on the border of corporate network. An
employee on the internal network is accessing a public website. What
should the employee do in order to make sure the web traffic is
protected by the Cisco CWS?
Register the destination website on the Cisco ASA.
Use the Cisco AnyConnect Secure Mobility Client first.
Use a web browser to visit the destination website.*
First visit a website that is located on a web server in the Cisco CWS infrastructure.

41. An administrator assigned a level of router access to the user


ADMIN using the commands below.
Router(config)# privilege exec level 14 show ip route

Router(config)# enable algorithm-type scrypt secret level 14 cisco-


level-10

Router(config)# username ADMIN privilege 14 algorithm-type scrypt secret


cisco-level-10
Which two actions are permitted to the user ADMIN? (Choose two.)
The user can execute all subcommands under the show ip interfaces command.
The user can issue the show version command.*
The user can only execute the subcommands under the show ip route command.*
The user can issue all commands because this privilege level can execute all Cisco IOS
commands.
The user can issue the ip route command.

42. What mechanism is used by an ASA 5505 device to allow


inspected outbound traffic to return to the originating sender who is
on an inside network?
Network Address Translation
access control lists
security zones
stateful packet inspection*

43. Which two end points can be on the other side of an ASA site-to-
site VPN configured using ASDM? (Choose two.)
DSL switch
Frame Relay switch
ISR router*
another ASA*
multilayer switch

44. What Layer 2 attack is mitigated by disabling Dynamic Trunking


Protocol?
DHCP spoofing
ARP spoofing
VLAN hopping*
ARP poisoning

45. In an AAA-enabled network, a user issues the configure terminal


command from the privileged executive mode of operation. What
AAA function is at work if this command is rejected?
authorization*
authentication
auditing
accounting

46. An organization has configured an IPS solution to use atomic


alerts. What type of response will occur when a signature is detected?
A counter starts and a summary alert is issued when the count reaches a preconfigured
number.
The TCP connection is reset.
An alert is triggered each time a signature is detected.*
The interface that triggered the alert is shutdown.

47. What two algorithms can be part of an IPsec policy to provide


encryption and hashing to protect interesting traffic? (Choose two.)
PSK
DH
RSA
AES*
SHA*

48. Fill in the blank.


A stateful signature is also known as a signature.

49. Why is hashing cryptographically stronger compared to a cyclical


redundancy check (CRC)?
Hashes are never sent in plain text.
It is easy to generate data with the same CRC.
It is virtually impossible for two different sets of data to calculate the same hash
output.*
Hashing always uses a 128-bit digest, whereas a CRC can be variable length.

50. A network analyst wants to monitor the activity of all new interns.
Which type of security testing would track when the interns sign on
and sign off the network?
vulnerability scanning
password cracking
network scanning
integrity checker*
51. Refer to the exhibit.

CCNA Security v2.0 Final Exam q51

What two pieces of information can be gathered from the generated


message? (Choose two.)
This message is a level five notification message.*
This message indicates that service timestamps have been globally enabled.*
This message indicates that enhanced security was configured on the vty ports.
This message appeared because a major error occurred that requires immediate action.
This message appeared because a minor error occurred that requires further investigation.

52. What is required for auto detection and negotiation of NAT when
establishing a VPN link?
Both VPN end devices must be configured for NAT.
No ACLs can be applied on either VPN end device.
Both VPN end devices must be NAT-T capable.*
Both VPN end devices must be using IPv6.

53. Refer to the exhibit.

CCNA Security v2.0 Final Exam q53


The network administrator is configuring the port security feature on
switch SWC. The administrator issued the command show port-
security interface fa 0/2 to verify the configuration. What can be
concluded from the output that is shown? (Choose three.)
Three security violations have been detected on this interface.
This port is currently up.*
The port is configured as a trunk link.
Security violations will cause this port to shut down immediately.*
There is no device currently connected to this port.*
The switch port mode for this interface is access mode. [adef]

54. In which two instances will traffic be denied as it crosses the ASA
5505 device? (Choose two.)
traffic originating from the inside network going to the DMZ network
traffic originating from the inside network going to the outside network
traffic originating from the outside network going to the DMZ network
traffic originating from the DMZ network going to the inside network*
traffic originating from the outside network going to the inside network*

55. Refer to the exhibit.

CCNA Security v2.0 Final Exam q55

Based on the configuration that is shown, which statement is true


about the IPS signature category?
Only signatures in the ios_ips advanced category will be compiled into memory for scanning.
All signatures categories will be compiled into memory for scanning, but only those
signatures within the ios ips advanced category will be used for scanning purposes.
All signature categories will be compiled into memory for scanning, but only those signatures
in the ios_ips basic category will be used for scanning purposes.
Only signatures in the ios_ips basic category will be compiled into memory for
scanning.*

56. Which two ports can send and receive Layer 2 traffic from a
community port on a PVLAN? (Choose two.)
community ports belonging to other communities
promiscuous ports*
isolated ports within the same community
PVLAN edge protected ports
community ports belonging to the same community*

57. What is a feature of the TACACS+ protocol?


It utilizes UDP to provide more efficient packet transfer.
It combines authentication and authorization as one process.
It encrypts the entire body of the packet for more secure communications.*
It hides passwords during transmission using PAP and sends the rest of the packet in
plaintext.

58. Which security measure is best used to limit the success of a


reconnaissance attack from within a campus area network?
Implement restrictions on the use of ICMP echo-reply messages.
Implement a firewall at the edge of the network.
Implement access lists on the border router.
Implement encryption for sensitive traffic.*

59. What is the benefit of the network-based IPS (NIPS) over host-
based IPS (HIPS) deployment models?
NIPS provides individual host protection.
NIPS relies on centrally managed software agents.
NIPS monitors all operations within an operating system.*
NIPS monitors network segments.

60. What represents a best practice concerning discovery protocols


such as CDP and LLDP on network devices?
LLDP on network devices?
Enable CDP on edge devices, and enable LLDP on interior devices.
Use the default router settings for CDP and LLDP.
Use the open standard LLDP rather than CDP.
Disable both protocols on all interfaces where they are not required.*
61. What function is provided by the Tripwire network security tool?
password recovery
security policy compliance*
IDS signature development
logging of security events

62. What is the function of a policy map configuration when an ASA


firewall is being configured?
binding class maps with actions*
identifying interesting traffic
binding a service policy to an interface
using ACLs to match traffic

63. If a network administrator wants to track the usage of FTP


services, which keyword or keywords should be added to the aaa
accounting command?
exec default
connection
exec*
network

64. What is indicated by the use of the local-case keyword in a local


AAA authentication configuration command sequence?
That AAA is enabled globally on the router.
That passwords and usernames are case-sensitive.*
That a default local database AAA authentication is applied to all lines.
That user access is limited to vty terminal lines.

65. What is the purpose of a local username database if multiple ACS


servers are configured to provide authentication services?
Clients using internet services are authenticated by ACS servers, whereas local clients are
authenticated through a local username database.
Each ACS server must be configured with a local username database in order to provide
authentication services.
A local username database is required when creating a method list for the default login.
A local username database provides redundancy if ACS servers become unreachable.
[adef]
66. Which security implementation will provide control plane
protection for a network device?
encryption for remote access connections
AAA for authenticating management access
routing protocol authentication*
NTP for consistent timestamps on logging messages

67. What are two reasons to enable OSPF routing protocol


authentication on a network? (Choose two.)
to ensure more efficient routing
to prevent data traffic from being redirected and then discarded*
to ensure faster network convergence
to prevent redirection of data traffic to an insecure link*
to provide data security through encryption

68. A security awareness session is best suited for which topic?


required steps when reporting a breach of security*
the primary purpose and use of password policies
steps used to configure automatic Windows updates
how to install and maintain virus protection

You might also like