Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Network Security (Version1.0) - Final Exam Answers Full

Download as pdf or txt
Download as pdf or txt
You are on page 1of 66

25/08/2021 Network Security (Version1.

0) - Final Exam Answers Full

 IT Questions Bank Commands Help Resources »  IP Calculators »  Donations

 My account

80% Faster,

Search the site

50% of the

Cost
FedRAMP Moderate
Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

 Home  CCNA v7 » IT Essentials 7.0 » Security » CyberOps » CCNP v8 »

DevNet Linux » Other courses »

 IT Questions Bank CCNA v6 » CCNA v7 » IT Essentials 7.0 » Security »


OPEN

CCNA CyberOps » CCNP v8 » DevNet Associate Linux » Networking Essentials

IOS Commands Help Resources » Download Cisco Packet Tracer 8 » IP Subnet Calculators »

Donation Contact  My account

Network Security (Version1.0) – Final


Exam Answers Full
 May 20, 2021 |
 Last Updated: July 29, 2021 |
 Network Security 1.0 |

 46 Comments

AWS Compliance Programs


Audit-Ready in 60 Days
Cut time-to-compliance by 80% with Anitian FedRAMP Automation on AWS

and Azure.

Network Security 1.0 Exam


Answers
anitian.com OPEN
Network Security v1.0

How to
 Share Speed Share
 Tweet Up FedRAMP
 Pin it - Cloud DevOps
Modules 1OPEN
– 4: Securing 
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com
Networks Group Exam
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 1/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

(Answers)
How to find: Press “Ctrl + F” in the browser and fill in
whatever wording is in the question to find that Modules 5 – 7: Monitoring
question/answer. If the question is not here, find it in and Managing Devices
Questions Bank.
80% Faster,

Group Exam (Answers)

50% of the

Modules 8 – 10: ACLs and


Firewalls Group Exam
NOTE: If you have the new question on this test, please
Cost
(Answers)
comment Question and Multiple-Choice list in form below
this article. We will update answers for you in the Modules 11 – 12: Intrusion
shortest time. Thank you! We truly value your FedRAMP
Prevention Moderate
Group Exam
contribution to the website. (Answers)
Quickly deploy a

FedRAMP-compliant

Modules 13 – 14: Layer 2


Network Security ( Version 1) – Network Security cloud environment.
and Endpoint Security Group
1.0 Final Exam Answers Exam (Answers)
anitian.com
1. Match the type of ASA ACLs to the description. (Not all Modules 15 – 17:
options are used.)
Cryptography Group Exam
(Answers)

Modules 18 – 19: VPNs


Group Exam (Answers)
OPEN
Modules 20 – 22: ASA
Group Exam (Answers)

Network Security 1.0


Practice Final Exam
Answers

Network Security 1.0 Final


PT Skills Exam (PTSA)
Answers

Network Security 1.0 Final


Exam Answers

Share your ❤️Buy me a ☕

Donate

2. Which statement describes a difference between the Cisco


ASA IOS CLI feature and the router IOS CLI feature? Recent Comments
ASA uses the ? command whereas a router uses the help Joseph on CCNA 200-301 Dumps
command to receive help on a brief description and the syntax Full Questions – Exam Study Guide
of a command. & Free
How to Speed Up FedRAMP - Cloud DevOps OPEN
To use a show command in a general configuration
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com
Briant on CCNA 200-301 Dumps
mode, ASA can use the command directly whereas a router Full Questions – Exam Study Guide

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 2/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

will need to enter the do command before issuing the show & Free
command. Joa on CCIE/CCNP 350-401
To complete a partially typed command, ASA uses the ENCOR Dumps Full Questions with
Ctrl+Tab key combination whereas a router uses the Tab key. VCE & PDF
To indicate the CLI EXEC mode, ASA uses the % symbol 80% Faster,

Joa on CCIE/CCNP 350-401


ENCOR Dumps Full Questions with
whereas a router uses the # symbol.
50% of the

VCE & PDF


ana on CCIE/CCNP 350-401
Explanation: The ASA CLI is a proprietary OS which has a
similar look and feel to the Cisco router IOS. Although it Cost
ENCOR Dumps Full Questions with
VCE & PDF
shares some common features with the router IOS, it has its
FedRAMP Moderate
unique features. For example, an ASA CLI command can be
executed regardless of the current configuration mode Quickly deploy a

prompt. The IOS do command is not required or recognized. FedRAMP-compliant

Both the ASA CLI and the router CLI use the # symbol to cloud environment.
indicate the EXEC mode. Both CLIs use the Tab key to
complete a partially typed command. Different from the router anitian.com
IOS, the ASA provides a help command that provides a brief
command description and syntax for certain commands.

3. Refer to the exhibit. A network administrator is configuring


AAA implementation on an ASA device. What does the option
link3 indicate?
OPEN

the network name where the AAA server resides


the specific AAA server name
the sequence of servers in the AAA server group
the interface name
4. What provides both secure segmentation and threat
defense in a Secure Data Center solution?

Cisco Security Manager software


AAA server
Adaptive Security Appliance
intrusion prevention system
5. What are the three core components of the Cisco Secure
Data Center solution? (Choose three.)

mesh network
secure segmentation
visibility
threat defense
servers
infrastructure

How to Speed Up FedRAMP - Cloud DevOps OPEN


Explanation: Secure segmentation is used when managing
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
and organizing data in a data center. Threat defense includes
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 3/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

a firewall and intrusion prevention system (IPS). Data center


visibility is designed to simplify operations and compliance
reporting by providing consistent security policy enforcement.

6. What are three characteristics of ASA transparent mode? 80% Faster,

(Choose three.)
50% of the

This mode does not support VPNs, QoS, or DHCP Relay.


It is the traditional firewall deployment mode. Cost
This mode is referred to as a “bump in the wire.”
NAT can be implemented between connected networks. FedRAMP Moderate
In this mode the ASA is invisible to an attacker.
Quickly deploy a

The interfaces of the ASA separate Layer 3 networks and


FedRAMP-compliant

require IP addresses in different subnets.


cloud environment.
7. What is needed to allow specific traffic that is sourced on
the outside network of an ASA firewall to reach an internal anitian.com
network?

ACL
NAT
dynamic routing protocols
outside security zone level 0
OPEN

Explanation: In order to explicitly permit traffic from an


interface with a lower security level to an interface with a
higher security level, an ACL must be configured. By default,
traffic will only flow from a higher security level to a lower.

8. What will be the result of failed login attempts if the


following command is entered into a router?

login block-for 150 attempts 4 within 90


All login attempts will be blocked for 150 seconds if there are
4 failed attempts within 90 seconds.
All login attempts will be blocked for 90 seconds if there are
4 failed attempts within 150 seconds.
All login attempts will be blocked for 1.5 hours if there are 4
failed attempts within 150 seconds.
All login attempts will be blocked for 4 hours if there are 90
failed attempts within 150 seconds.

Explanation: The components of the login block-for 150


attempts 4 within 90 command are as follows:

The expression block-for 150 is the time in seconds that


logins will be blocked.

The expression attempts 4 is the number of failed attempts


that will trigger the blocking of login requests.

TheHow to Speed
expression Up
within 90 FedRAMP
is the time in seconds- Cloud
in whichDevOps
the OPEN
Quickly deploy a FedRAMP-compliant
4 failed attempts must occur. cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 4/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

9. Which two tasks are associated with router hardening?


(Choose two.)

placing the router in a secure room


disabling unused ports and interfaces 80% Faster,

installing the maximum amount of memory possible


securing administrative access 50% of the

using uninterruptible power supplies


10. Which threat protection capability is provided by Cisco
Cost
ESA? FedRAMP Moderate
web filtering Quickly deploy a

cloud access security FedRAMP-compliant

spam protection
cloud environment.
Layer 4 traffic monitoring
anitian.com
Explanation: Email is a top attack vector for security
breaches. Cisco ESA includes many threat protection
capabilities for email such as spam protection, forged email
detection, and Cisco advanced phishing protection.

OPEN
11. What are two security measures used to protect
endpoints in the borderless network? (Choose two.)

denylisting
Snort IPS
DLP
DMZ
rootkit

Explanation:
Measure Purpose

antimalware Protect endpoints from malware.


software

spam Prevent spam emails from reaching


filtering endpoints.

blocklisting Prevent endpoints from connecting to


websites with bad reputations by
immediately blocking connections based
on the latest reputation intelligence.

data loss Prevent sensitive information from being


prevention lost or stolen.
(DLP)
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 5/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

12. Which three types of traffic are allowed when the


authentication port-control auto command has been issued
and the client has not yet been authenticated? (Choose
three.)

CDP 80% Faster,

802.1Q
IPsec
50% of the

TACACS+
STP
Cost
EAPOL FedRAMP Moderate
Quickly deploy a

Explanation: Until the workstation is authenticated, 802.1X


FedRAMP-compliant

access control enables only Extensible Authentication


cloud environment.
Protocol over LAN (EAPOL), Cisco Discovery Protocol
(CDP), and Spanning Tree Protocol (STP) traffic through the
anitian.com
port to which the workstation is connected. After
authentication succeeds, normal traffic can pass through the
port.

13. Which statement describes a characteristic of the IKE


protocol? OPEN
It uses UDP port 500 to exchange IKE information
between the security gateways.
IKE Phase 1 can be implemented in three different modes:
main, aggressive, or quick.
It allows for the transmission of keys directly across a
network.
The purpose of IKE Phase 2 is to negotiate a security
association between two IKE peers.
14. Which action do IPsec peers take during the IKE Phase 2
exchange?

exchange of DH keys
negotiation of IPsec policy
negotiation of IKE policy sets
verification of peer identity

Explanation: The IKE protocol executes in two phases.


During Phase 1 the two sides negotiate IKE policy sets,
authenticate each other, and set up a secure channel. During
the second phase IKE negotiates security associations
between the peers.

15. What are two hashing algorithms used with IPsec AH to


guarantee authenticity? (Choose two.)
How to Speed Up FedRAMP - Cloud DevOps OPEN
SHA
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
RSA
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 6/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

DH
MD5
AES

Explanation: The IPsec framework uses various protocols 80% Faster,

and algorithms to provide data confidentiality, data integrity,


authentication, and secure key exchange. Two popular 50% of the

algorithms used to ensure that data is not intercepted and


modified (data integrity and authenticity) are MD5 and SHA. Cost
FedRAMP Moderate
16. Which command raises the privilege level of the ping
Quickly deploy a

command to 7?
FedRAMP-compliant

user exec ping level 7 cloud environment.


authorization exec ping level 7
accounting exec level 7 ping anitian.com
privilege exec level 7 ping
17. What is a characteristic of a role-based CLI view of router
configuration?

A CLI view has a command hierarchy, with higher and lower


views. OPEN
When a superview is deleted, the associated CLI views are
deleted.​
A single CLI view can be shared within multiple
superviews.
Only a superview user can configure a new view and add or
remove commands from the existing views.​

Explanation: A CLI view has no command hierarchy, and


therefore, no higher or lower views. Deleting a superview
does not delete the associated CLI views. Only a root view
user can configure a new view and add or remove commands
from the existing views.​

18. What is a limitation to using OOB management on a large


enterprise network?

Production traffic shares the network with management


traffic.
Terminal servers can have direct console connections to user
devices needing management.
OOB management requires the creation of VPNs.
All devices appear to be attached to a single
management network.

Explanation: OOB management provides a dedicated


How to Speed Up FedRAMP - Cloud DevOps OPEN
management network without production traffic. Devices
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
within that network, such as terminal servers, have direct
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 7/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

console access for management purposes. Because in-band


management runs over the production network, secure
tunnels or VPNs may be needed. Failures on the production
network may not be communicated to the OOB network
administrator because the OOB management network may 80% Faster,

not be affected
50% of the

19. Refer to the exhibit. A corporate network is using NTP to


synchronize the time across devices. What can be Cost
determined from the displayed output?

FedRAMP Moderate
Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

Router03 is a stratum 2 device that can provide NTP


service to other devices in the network.
The time on Router03 may not be reliable because it is offset
by more than 7 seconds to the time server.
The interface on Router03 that connects to the time sever OPEN
has the IPv4 address 209.165.200.225.
Router03 time is synchronized to a stratum 2 time server.
20. Refer to the exhibit. Which two conclusions can be drawn
from the syslog message that was generated by the router?
(Choose two.)

This message resulted from an unusual error requiring


reconfiguration of the interface.
This message indicates that service timestamps have
been configured.
This message indicates that the interface changed state five
times.
This message is a level 5 notification message.
This message indicates that the interface should be
replaced.

Explanation: The message is a level 5 notification message


as shown in the %LINEPROTO-5 section of the output.
Messages reporting the link status are common and do not
require replacing the interface or reconfiguring the interface.
The date and time displayed at the beginning of the message
How that
indicates to Speed Up FedRAMP
service timestamps have been- configured
Cloud DevOps on OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
the router.

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 8/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

21. Which two types of hackers are typically classified as


grey hat hackers? (Choose two.)

hacktivists
cyber criminals 80% Faster,

vulnerability brokers
script kiddies 50% of the

Cost
state-sponsored hackers

Explanation: Grey hat hackers may do unethical or illegal FedRAMP Moderate


things, but not for personal gain or to cause damage.
Hacktivists use their hacking as a form of political or social
Quickly deploy a

protest, and vulnerability brokers hack to uncover FedRAMP-compliant

weaknesses and report them to vendors. Depending on the cloud environment.


perspective one possesses, state-sponsored hackers are
either white hat or black hat operators. Script kiddies create anitian.com
hacking scripts to cause damage or disruption. Cyber
criminals use hacking to obtain financial gain by illegal
means.

22. When describing malware, what is a difference between a OPEN


virus and a worm?

A virus focuses on gaining privileged access to a device,


whereas a worm does not.
A virus replicates itself by attaching to another file,
whereas a worm can replicate itself independently.
A virus can be used to launch a DoS attack (but not a
DDoS), but a worm can be used to launch both DoS and DDoS
attacks.
A virus can be used to deliver advertisements without user
consent, whereas a worm cannot.

Explanation: Malware can be classified as follows:

Virus (self-replicates by attaching to another program or file)

Worm (replicates independently of another program)

Trojan horse (masquerades as a legitimate file or program)

Rootkit (gains privileged access to a machine while


concealing itself)

Spyware (collects information from a target system)

Adware (delivers advertisements with or without consent)

Bot (waits for commands from the hacker)

Ransomware (holds a computer system or data captive until


payment isreceived)

23. Which type of packet is unable to be filtered by an


HowACL?
outbound to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
multicast packet
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 9/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

ICMP packet
broadcast packet
router-generated packet

Explanation: Traffic that originates within a router such as 80% Faster,

pings from a command prompt, remote access from a router


to another device, or routing updates are not affected by 50% of the

outbound access lists. The traffic must flow through the router
in order for the router to apply the ACEs. Cost
FedRAMP Moderate
24. Consider the access list command applied outbound on a
Quickly deploy a

router serial interface.


FedRAMP-compliant

cloud environment.
access-list 100 deny icmp 192.168.10.0 0.0.0.255 any
anitian.com

What is the effect of applying this access list command?

The only traffic denied is echo-replies sourced from the


192.168.10.0/24 network. All other traffic is allowed.
The only traffic denied is ICMP-based traffic. All other traffic
is allowed. OPEN
No traffic will be allowed outbound on the serial
interface.
Users on the 192.168.10.0/24 network are not allowed to
transmit traffic to any other destination.
25. Which command is used to activate an IPv6 ACL named
ENG_ACL on an interface so that the router filters traffic prior
to accessing the routing table?

ipv6 access-class ENG_ACL in


ipv6 traffic-filter ENG_ACL out
ipv6 traffic-filter ENG_ACL in
ipv6 access-class ENG_ACL out

Explanation: For the purpose of applying an access list to a


particular interface, the ipv6 traffic-filter IPv6 command is
equivalent to the access-group IPv4 command. The direction
in which the traffic is examined (in or out) is also required.

26. What technology has a function of using trusted third-


party protocols to issue credentials that are accepted as an
authoritative identity?

digital signatures
hashing algorithms
PKI certificates
How to Speed
symmetric keys Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 10/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Explanation: Digital certificates are used to prove the


authenticity and integrity of PKI certificates, but a PKI
Certificate Authority is a trusted third-party entity that issues
PKI certificates. PKI certificates are public information and
are used to provide authenticity, confidentiality, integrity, and 80% Faster,

nonrepudiation services that can scale to large requirements.


50% of the

27. What are two methods to maintain certificate revocation


status? (Choose two.)
Cost
subordinate CA FedRAMP Moderate
OCSP Quickly deploy a

DNS
FedRAMP-compliant

LDAP
cloud environment.
CRL
anitian.com
Explanation: A digital certificate might need to be revoked if
its key is compromised or it is no longer needed. The
certificate revocation list (CRL) and Online Certificate Status
Protocol (OCSP), are two common methods to check a
certificate revocation status.
OPEN
28. Which protocol is an IETF standard that defines the PKI
digital certificate format?

SSL/TLS
X.500
LDAP
X.509

Explanation: To address the interoperability of different PKI


vendors, IETF published the Internet X.509 Public Key
Infrastructure Certificate Policy and Certification Practices
Framework (RFC 2527). The standard defines the format of a
digital certificate.

29. A network administrator is configuring DAI on a switch.


Which command should be used on the uplink interface that
connects to a router?

ip arp inspection trust


ip dhcp snooping
ip arp inspection vlan
spanning-tree portfast

Explanation: In general, a router serves as the default


gateway for the LAN or VLAN on the switch. Therefore, the
How to Speed Up FedRAMP - Cloud DevOps OPEN
uplink interface that connects to a router should be a trusted
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
port for forwarding ARP requests.
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 11/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

30. What is the best way to prevent a VLAN hopping attack?

Disable trunk negotiation for trunk ports and statically


set nontrunk ports as access ports.
Disable STP on all nontrunk ports.
80% Faster,

Use VLAN 1 as the native VLAN on trunk ports.


Use ISL encapsulation on all trunk links.
50% of the

31. What would be the primary reason an attacker would Cost


launch a MAC address overflow attack?
FedRAMP Moderate
so that the switch stops forwarding traffic
so that legitimate hosts cannot obtain a MAC address Quickly deploy a

so that the attacker can see frames that are destined for FedRAMP-compliant

other hosts cloud environment.


so that the attacker can execute arbitrary code on the switch
anitian.com
32. What is the main difference between the implementation
of IDS and IPS devices?

An IDS can negatively impact the packet flow, whereas an


IPS can not.
An IDS needs to be deployed together with a firewall device,
whereas an IPS can replace a firewall. OPEN
An IDS would allow malicious traffic to pass before it is
addressed, whereas an IPS stops it immediately.
An IDS uses signature-based technology to detect malicious
packets, whereas an IPS uses profile-based technology.

Explanation: An IPS is deployed in inline mode and will not


allow malicious traffic to enter the internal network without
first analyzing it. An advantage of this is that it can stop an
attack immediately. An IDS is deployed in promiscuous
mode. It copies the traffic patterns and analyzes them offline,
thus it cannot stop the attack immediately and it relies on
another device to take further actions once it detects an
attack. Being deployed in inline mode, an IPS can negatively
impact the traffic flow. Both IDS and IPS can use signature-
based technology to detect malicious packets. An IPS cannot
replace other security devices, such as firewalls, because
they perform different tasks.

33. Which attack is defined as an attempt to exploit software


vulnerabilities that are unknown or undisclosed by the
vendor?

zero-day
Trojan horse
brute-force
How to Speed
man-in-the-middle Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 12/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

34. Match the network monitoring technology with the


description.

80% Faster,

50% of the

Cost
FedRAMP Moderate
Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

35. What are the three signature levels provided by Snort IPS
on the 4000 Series ISR? (Choose three.)

security
drop
reject OPEN
connectivity
inspect
balanced
36. What are three attributes of IPS signatures? (Choose
three.)

action
length
trigger
type
depth
function

Explanation: IPS signatures have three distinctive attributes:


type
trigger (alarm)
action

37. Match each IPS signature trigger category with the


description.

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 13/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

80% Faster,

50% of the

Cost

FedRAMP Moderate
Other case:

Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

OPEN

pattern-based detection: simplest triggering mechanism


which searches for a specific and pre-defined atomic or
composite pattern
anomaly-based detection: involves first defining a profile of
what is considered normal network or host activity
honey pot-based detection: uses a decoy server to divert
attacks away from production devices
38. Which two features are included by both TACACS+ and
RADIUS protocols? (Choose two.)

SIP support
password encryption
802.1X support
separate authentication and authorization processes
utilization of transport layer protocols

Explanation: Both TACACS+ and RADIUS support


password encryption (TACACS+ encrypts all communication)
and use Layer 4 protocol (TACACS+ uses TCP and RADIUS
uses UDP).
How toTACACS+
Speed supports
Up FedRAMPseparation of authentication
- Cloud DevOps OPEN
andQuickly
authorization processes, while
deploy a FedRAMP-compliant RADIUS
cloud combines
environment. anitian.com 
authentication and authorization as one process. RADIUS
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 14/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

supports remote access technology, such as 802.1x and SIP;


TACACS+ does not.

39. What function is provided by the RADIUS protocol?


80% Faster,

RADIUS provides encryption of the complete packet during


transfer. 50% of the

RADIUS provides separate AAA services.


RADIUS provides separate ports for authorization and Cost
accounting.
RADIUS provides secure communication using TCP port 49. FedRAMP Moderate
Quickly deploy a

Explanation: When an AAA user is authenticated, RADIUS FedRAMP-compliant

uses UDP port 1645 or 1812 for authentication and UDP port cloud environment.
1646 or 1813 for accounting. TACACS provides separate
authorization and accounting services. When a RADIUS anitian.com
client is authenticated, it is also authorized. TACACS
provides secure connectivity using TCP port 49. RADIUS
hides passwords during transmission and does not encrypt
the complete packet.

40. What are three characteristics of the RADIUS protocol? OPEN


(Choose three.)

utilizes TCP port 49


uses UDP ports for authentication and accounting
supports 802.1X and SIP
separates the authentication and authorization processes
encrypts the entire body of the packet
is an open RFC standard AAA protocol

Explanation: RADIUS is an open-standard AAA protocol


using UDP port 1645 or 1812 for authentication and UDP port
1646 or 1813 for accounting. It combines authentication and
authorization into one process; thus, a password is encrypted
for transmission while the rest of the packet will be sent in
plain text. RADIUS offers the expedited service and more
comprehensive accounting desired by remote-access
providers but provides lower security and less potential for
customization than TACACS+.

41. Which zone-based policy firewall zone is system-defined


and applies to traffic destined for the router or originating
from the router?

local zone
inside zone
How
self zoneto Speed Up FedRAMP - Cloud DevOps OPEN

system zonea FedRAMP-compliant cloud environment. anitian.com
Quickly deploy

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 15/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

outside zone
42. What are two benefits of using a ZPF rather than a Classic
Firewall? (Choose two.)

ZPF allows interfaces to be placed into zones for IP


inspection.
80% Faster,

The ZPF is not dependent on ACLs. 50% of the

Multiple inspection actions are used with ZPF.


ZPF policies are easy to read and troubleshoot. Cost
With ZPF, the router will allow packets unless they are
explicitly blocked. FedRAMP Moderate
Quickly deploy a

Explanation: There are several benefits of a ZPF:


FedRAMP-compliant

– It is not dependent on ACLs.


cloud environment.
– The router security posture is to block unless explicitly
allowed.
anitian.com
– Policies are easy to read and troubleshoot with C3PL.

– One policy affects any given traffic, instead of needing


multiple ACLs and inspection actions.

I​n addition, an interface cannot be simultaneously configured as a


security zone member and for IP inspection.​ OPEN

43. Place the steps for configuring zone-based policy (ZPF)


firewalls in order from first to last. (Not all options are used.)

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 16/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Start Reselling SSL Certs now


Resell SSL as low as $0/month 80% Faster,

50% of the

We offer an API for automatic SSL issuance. WHMCS modules included.

Cost
cyberssl.com OPEN
FedRAMP Moderate
Quickly deploy a

44. How does a firewall handle traffic when it is originating FedRAMP-compliant

from the private network and traveling to the DMZ network? cloud environment.
The traffic is selectively denied based on service
requirements. anitian.com
The traffic is usually permitted with little or no restrictions.
The traffic is selectively permitted and inspected.
The traffic is usually blocked.

Explanation: With a three interface firewall design that has


OPEN
internal, external, and DMZ connections, typical
configurations include the following:

– Traffic originating from DMZ destined for the internal


network is normally blocked.

– Traffic originating from the DMZ destined for external


networks is typically permitted based on what services are
being used in the DMZ.

– Traffic originating from the internal network destined from


the DMZ is normally inspected and allowed to return.

– Traffic originating from external networks (the public


network) is typically allowed in the DMZ only for specific
services.

45. Which two protocols generate connection information


within a state table and are supported for stateful filtering?
(Choose two.)

ICMP
UDP
DHCP
TCP
HTTP
46. Which type of firewall is supported by most routers and is
the easiest to implement?

next generation firewall


How to firewall
stateless Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
stateful firewall
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 17/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

proxy firewall

Explanation: Packet Filtering (Stateless) Firewall uses a


simple policy table look-up that filters traffic based on
specific criteria and is considered the easiest firewall to 80% Faster,

implement.
50% of the

47. What network testing tool would an administrator use to Cost


assess and validate system configurations against security
policies and compliance standards? FedRAMP Moderate
Tripwire Quickly deploy a

L0phtcrack FedRAMP-compliant

Nessus cloud environment.


Metasploit
anitian.com
Explanation: Tripwire – This tool assesses and validates
IT configurations against internal policies, compliance
standards, and security best practices.

48. What type of network security test can detect and report OPEN
changes made to network systems?

vulnerability scanning
network scanning
integrity checking
penetration testing

Explanation: Integrity checking is used to detect and


report changes made to systems. Vulnerability scanning is
used to find weaknesses and misconfigurations on network
systems. Network scanning is used to discover available
resources on the network.

49. What network security testing tool has the ability to


provide details on the source of suspicious network
activity?

SIEM
SuperScan
Zenmap
Tripwire
50 How do modern cryptographers defend against brute-
force attacks?

Use statistical analysis to eliminate the most common


encryption keys.
How
Use atokeyspace
SpeedlargeUp FedRAMP
enough that it -takes Cloud DevOps
too much OPEN
Quickly deploy a FedRAMP-compliant cloud environment.
money and too much time to conduct a successful anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 18/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

attack.
Use an algorithm that requires the attacker to have both
ciphertext and plaintext to conduct a successful attack.
Use frequency analysis to ensure that the most popular
letters used in the language are not used in the cipher 80% Faster,

message.
50% of the

Explanation: In a brute-force attack, an attacker tries


every possible key with the decryption algorithm knowing Cost
that eventually one of them will work. To defend against the
FedRAMP Moderate
brute-force attacks, modern cryptographers have as an
objective to have a keyspace (a set of all possible keys) Quickly deploy a

large enough so that it takes too much money and too FedRAMP-compliant

much time to accomplish a brute-force attack. A security cloud environment.


policy requiring passwords to be changed in a predefined
interval further defend against the brute-force attacks. The anitian.com
idea is that passwords will have been changed before an
attacker exhausts the keyspace.

51. How does a Caesar cipher work on a message?

Letters of the message are replaced by another letter OPEN


that is a set number of places away in the alphabet.
Letters of the message are rearranged randomly.
Letters of the message are rearranged based on a
predetermined pattern.
Words of the message are substituted based on a
predetermined pattern.
52. What is the main factor that ensures the security of
encryption of modern algorithms?

complexity of the hashing algorithm


the use of 3DES over AES
secrecy of the keys
secrecy of the algorithm

Explanation: With most modern algorithms, successful


decryption requires knowledge of the appropriate
cryptographic keys. This means that the security of
encryption lies in the secrecy of the keys, not the algorithm.

53 What is the next step in the establishment of an IPsec


VPN after IKE Phase 1 is complete?

negotiation of the ISAKMP policy


negotiation of the IPsec SA policy
detection of interesting traffic
authentication
How to Speed of peers
Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 19/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Explanation: Establishing an IPsec tunnel involves five


steps:

detection of interesting traffic defined by an ACL

IKE Phase 1 in which peers negotiate ISAKMP SA policy


IKE Phase 2 in which peers negotiate IPsec SA policy

80% Faster,

Creation of the IPsec tunnel

Termination of the IPsec tunnel


50% of the

Cost
54. Refer to the exhibit. What algorithm will be used for
providing confidentiality?

FedRAMP Moderate
Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

RSA
Diffie-Hellman
DES OPEN
AES

Explanation: The IPsec framework uses various protocols


and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. Two popular
algorithms that are used to ensure that data is not
intercepted and modified (data integrity) are MD5 and SHA.
AES is an encryption protocol and provides data
confidentiality. DH (Diffie-Hellman) is an algorithm that is
used for key exchange. RSA is an algorithm used for
authentication.

55. After issuing a show run command, an analyst notices


the following command:

crypto ipsec transform-set MYSET esp-aes 256 esp-m

What is the purpose of this command?

It establishes the set of encryption and hashing


algorithms used to secure the data sent through an IPsec
tunnel.
It defines the default ISAKMP policy list used to establish
the IKE Phase 1 tunnel.
How to Speed Up FedRAMP - Cloud DevOps OPEN
It establishes the criteria to force the IKE Phase 1
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
negotiations to begin.
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 20/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

It indicates that IKE will be used to establish the IPsec


tunnel for protecting the traffic.
56. Which algorithm can ensure data integrity?

RSA
AES 80% Faster,

MD5
PKI
50% of the

Cost
Explanation: Data integrity guarantees that the message
was not altered in transit. Integrity is ensured by FedRAMP Moderate
implementing either of the Secure Hash Algorithms (SHA-2
Quickly deploy a

or SHA-3). The MD5 message digest algorithm is still


FedRAMP-compliant

widely in use.
cloud environment.

57. A company implements a security policy that ensures anitian.com


that a file sent from the headquarters office to the branch
office can only be opened with a predetermined code. This
code is changed every day. Which two algorithms can be
used to achieve this task? (Choose two.)

HMAC
OPEN
MD5
3DES
SHA-1
AES

Explanation: The task to ensure that only authorized


personnel can open a file is data confidentiality, which can
be implemented with encryption. AES and 3DES are two
encryption algorithms. HMAC can be used for ensuring
origin authentication. MD5 and SHA-1 can be used to
ensure data integrity.

58. A network technician has been asked to design a virtual


private network between two branch routers. Which type of
cryptographic key should be used in this scenario?

hash key
symmetric key
asymmetric key
digital signature

Explanation: A symmetric key requires that both routers


have access to the secret key that is used to encrypt and
decrypt exchanged data.

How to Speed Up FedRAMP - Cloud DevOps OPEN


59.Quickly
Which two options can limit the information discovered
deploy a FedRAMP-compliant cloud environment. anitian.com 
from port scanning? (Choose two.)
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 21/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

intrusion prevention system


firewall
authentication
passwords
encryption 80% Faster,

Explanation: Using an intrusion prevention system (IPS) 50% of the

and firewall can limit the information that can be discovered


with a port scanner. Authentication, encryption, and Cost
passwords provide no protection from loss of information
FedRAMP Moderate
from port scanning.
Quickly deploy a

FedRAMP-compliant

60. An administrator discovers that a user is accessing a


newly established website that may be detrimental to cloud environment.
company security. What action should the administrator
anitian.com
take first in terms of the security policy?

Ask the user to stop immediately and inform the user that
this constitutes grounds for dismissal.
Create a firewall rule blocking the respective website.
Revise the AUP immediately and get all users to sign
the updated AUP. OPEN
Immediately suspend the network privileges of the user.
61. If AAA is already enabled, which three CLI steps are
required to configure a router with a specific view?
(Choose three.)

Create a superview using the parser view view-name


command.
Associate the view with the root view.
Assign users who can use the view.
Create a view using the parser view view-name
command.
Assign a secret password to the view.
Assign commands to the view.

Explanation: There are five steps involved to create a


view on a Cisco router.

1) AAA must be enabled.

2) the view must be created.

3) a secret password must be assigned to the view.

4) commands must be assigned to the view.

5) view configuration mode must be exited.

62. Refer to the exhibit. A network administrator configures


a named ACL on the router. Why is there no output
displayed when the show command is issued?

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 22/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

80% Faster,

50% of the

Cost
FedRAMP Moderate
A network administrator configures a named ACL on the
router Quickly deploy a

FedRAMP-compliant

The ACL is not activated. cloud environment.


The ACL name is case sensitive.
The ACL has not been applied to an interface. anitian.com
No packets have matched the ACL statements yet.
63. ACLs are used primarily to filter traffic. What are two
additional uses of ACLs? (Choose two.):

specifying internal hosts for NAT


identifying traffic for QoS
OPEN
specifying source addresses for authentication
reorganizing traffic into VLANs
filtering VTP packets

Explanation: ACLs are used to filter traffic to determine


which packets will be permitted or denied through the
router and which packets will be subject to policy-based
routing. ACLs can also be used to identify traffic that
requires NAT and QoS services. Prefix lists are used to
control which routes will be redistributed or advertised to
other routers.

64. What two features are added in SNMPv3 to address the


weaknesses of previous versions of SNMP? (Choose two.)

authentication
authorization with community string priority
bulk MIB objects retrieval
ACL management filtering
encryption
65. What network testing tool is used for password auditing
and recovery?

Nessus
Metasploit
L0phtcrack
How to Speed
SuperScan Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 23/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

66. Which type of firewall makes use of a server to connect


to destination devices on behalf of clients?

packet filtering firewall


proxy firewall
stateless firewall 80% Faster,

stateful firewall
50% of the

Explanation: An application gateway firewall, also called a Cost


proxy firewall, filters information at Layers 3, 4, 5, and 7 of
the OSI model. It uses a proxy server to connect to remote FedRAMP Moderate
servers on behalf of clients. Remote servers will see only a
Quickly deploy a

connection from the proxy server, not from the individual


FedRAMP-compliant

clients.
cloud environment.

67. Refer to the exhibit. What will be displayed in the output anitian.com
of the show running-config object command after the
exhibited configuration commands are entered on an ASA
5506-X?

OPEN

host 192.168.1.4
range 192.168.1.10 192.168.1.20
host 192.168.1.3, host 192.168.1.4, and range
192.168.1.10 192.168.1.20
host 192.168.1.3
host 192.168.1.3 and host 192.168.1.4
host 192.168.1.4 and range 192.168.1.10 192.168.1.20

Explanation: The show running-config object command is


used to display or verify the IP address/mask pair within
the object. There can only be one statement in the network
object. Entering a second IP address/mask pair will replace
the existing configuration.

68. Refer to the exhibit. According to the command output,


which three statements are true about the DHCP options
entered on the ASA? (Choose three.)

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 24/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

80% Faster,

The dhcpd address [ start-of-pool ]-[ end-of-pool ] 50% of the

inside command was issued to enable the DHCP server.


The dhcpd address [ start-of-pool ]-[ end-of-pool ] inside Cost
command was issued to enable the DHCP client.
The dhcpd enable inside command was issued to FedRAMP Moderate
enable the DHCP server.
Quickly deploy a

The dhcpd auto-config outside command was issued


FedRAMP-compliant

to enable the DHCP client.


cloud environment.
The dhcpd auto-config outside command was issued to
enable the DHCP server.
anitian.com
The dhcpd enable inside command was issued to enable
the DHCP client.
69. Which two statements describe the characteristics of
symmetric algorithms? (Choose two.)

They are commonly used with VPN traffic.


They use a pair of a public key and a private key. OPEN
They are commonly implemented in the SSL and SSH
protocols.
They provide confidentiality, integrity, and availability.
They are referred to as a pre-shared key or secret key.

Explanation: Symmetric encryption algorithms use the


same key (also called shared secret) to encrypt and
decrypt the data. In contrast, asymmetric encryption
algorithms use a pair of keys, one for encryption and
another for decryption.

70. A web server administrator is configuring access


settings to require users to authenticate first before
accessing certain web pages. Which requirement of
information security is addressed through the
configuration?

availability
integrity
scalability
confidentiality

Explanation: Confidentiality ensures that data is accessed


only by authorized individuals. Authentication will help
verify
Howthetoidentity
Speed of the
Upindividuals.
FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 25/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

71. The use of 3DES within the IPsec framework is an


example of which of the five IPsec building blocks?

authentication
nonrepudiation
integrity 80% Faster,

Diffie-Hellman
confidentiality
50% of the

Cost
Explanation: The IPsec framework consists of five building
blocks. Each building block performs a specific securty FedRAMP Moderate
function via specific protocols. The function of providing
Quickly deploy a

confidentiality is provided by protocols such as DES,


FedRAMP-compliant

3DES, and AES.


cloud environment.

72. What function is provided by Snort as part of the anitian.com


Security Onion?

to generate network intrusion alerts by the use of rules and


signatures
to normalize logs from various NSM data logs so they can
be represented, stored, and accessed through a common
OPEN
schema
to display full-packet captures for analysis
to view pcap transcripts generated by intrusion
detection tools

Explanation: Snort is an open source network intrusion


prevention system (NIPS) and network intrusion detection
system (NIDS) developed by Sourcefire. It has the ability to
perform real time traffic analysis and packet logging on
Internet Protocol (IP) networks and can also be used to
detect probes or attacks.

73. What are two drawbacks to using HIPS? (Choose two.)

With HIPS, the success or failure of an attack cannot be


readily determined.
With HIPS, the network administrator must verify
support for all the different operating systems used in
the network.
HIPS has difficulty constructing an accurate network
picture or coordinating events that occur across the
entire network.
If the network traffic stream is encrypted, HIPS is unable to
access unencrypted forms of the traffic.
HIPS installations are vulnerable to fragmentation attacks
or variable
How to TTL
Speedattacks.
Up FedRAMP - Cloud DevOps OPEN
74.Quickly
In an deploy
AAA-enabled network,cloud
a FedRAMP-compliant a user issuesanitian.com
environment. the configure 
terminal command from the privileged executive mode of
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 26/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

operation. What AAA function is at work if this command is


rejected?

authorization
authentication
auditing 80% Faster,

accounting
50% of the

Explanation: Authentication must ensure that devices or Cost


end users are legitimate. Authorization is concerned with
allowing and disallowing authenticated users access to FedRAMP Moderate
certain areas and programs on the network. The configure
Quickly deploy a

terminal command is rejected because the user is not


FedRAMP-compliant

authorized to execute the command.


cloud environment.

75. A company has a file server that shares a folder named anitian.com
Public. The network security policy specifies that the
Public folder is assigned Read-Only rights to anyone who
can log into the server while the Edit rights are assigned
only to the network admin group. Which component is
addressed in the AAA network service framework?
OPEN
automation
accounting
authentication
authorization

Explanation: After a user is successfully authenticated


(logged into the server), the authorization is the process of
determining what network resources the user can access
and what operations (such as read or edit) the user can
perform.

76. What is a characteristic of a DMZ zone?

Traffic originating from the inside network going to the


DMZ network is not permitted.
Traffic originating from the outside network going to
the DMZ network is selectively permitted.
Traffic originating from the DMZ network going to the
inside network is permitted.
Traffic originating from the inside network going to the
DMZ network is selectively permitted.

Explanation: The characteristics of a DMZ zone are as


follows:

​Traffic originating from the inside network going to the DMZ


How to
network Speed Up FedRAMP - Cloud DevOps
is permitted.
OPEN
Quickly deploy a FedRAMP-compliant cloudnetwork
environment. anitian.com 
​Traffic originating from the outside going to the

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 27/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

DMZ network is selectively permitted.

Traffic originating from the DMZ network going to the inside


network is denied.

77. Which measure can a security analyst take to perform 80% Faster,

effective security monitoring against network traffic


encrypted by SSL technology? 50% of the

Use a Syslog server to capture network traffic. Cost


Deploy a Cisco SSL Appliance.
Require remote access connections through IPsec FedRAMP Moderate
VPN.
Quickly deploy a

Deploy a Cisco ASA.


FedRAMP-compliant

78. Refer to the exhibit. Port security has been configured


cloud environment.
on the Fa 0/12 interface of switch S1. What action will occur
when PC1 is attached to switch S1 with the applied
anitian.com
configuration?

OPEN

Frames from PC1 will be forwarded since the switchport


port-security violation command is missing.
Frames from PC1 will be forwarded to its destination, and
a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a
log entry will not be created.
Frames from PC1 will cause the interface to shut down
immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log
of the violation.
Frames from PC1 will be dropped, and a log message will
be created.

Explanation: Manual configuration of the single allowed


MAC address has been entered for port fa0/12. PC1 has a
different MAC address and when attached will cause the
port to shut down (the default action), a log message to be
automatically created, and the violation counter to
increment. The default action of shutdown is recommended
because the restrict option might fail if an attack is
underway.
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 28/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

79. What security countermeasure is effective for


preventing CAM table overflow attacks?

DHCP snooping
Dynamic ARP Inspection
IP source guard 80% Faster,

port security
50% of the

Explanation: Port security is the most effective method for Cost


preventing CAM table overflow attacks. Port security gives
an administrator the ability to manually specify what MAC FedRAMP Moderate
addresses should be seen on given switch ports. It
Quickly deploy a

provides a method for limiting the number of MAC


FedRAMP-compliant

addresses that can be dynamically learned over a switch


cloud environment.
port.

anitian.com
80. What are two examples of DoS attacks? (Choose two.)

port scanning
SQL injection
ping of death
phishing
OPEN
buffer overflow

Explanation: The buffer overflow and ping of death DoS


attacks exploit system memory-related flaws on a server by
sending an unexpected amount of data or malformed data
to the server.

81. Which method is used to identify interesting traffic


needed to create an IKE phase 1 tunnel?

transform sets
a permit access list entry
hashing algorithms
a security association
82. When the CLI is used to configure an ISR for a site-to-
site VPN connection, which two items must be specified to
enable a crypto map policy? (Choose two.)

the hash
the peer
encryption
the ISAKMP policy
a valid access list
IP addresses on all active interfaces
the IKE Phase 1 policy

How to Speed Up FedRAMP - Cloud DevOps OPEN


Explanation: After the crypto map
Quickly deploy a FedRAMP-compliant cloud command
environment. in global
anitian.com 
configuration mode has been issued, the new crypto map
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 29/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

will remain disabled until a peer and a valid access list


have been configured.

83. How does a firewall handle traffic when it is originating


from the public network and traveling to the DMZ network? 80% Faster,

Traffic that is originating from the public network is 50% of the

inspected and selectively permitted when traveling to the


DMZ network. Cost
Traffic that is originating from the public network is usually
permitted with little or no restriction when traveling to the DMZ FedRAMP Moderate
network.
Quickly deploy a

Traffic that is originating from the public network is usually


FedRAMP-compliant

forwarded without inspection when traveling to the DMZ


cloud environment.
network.
Traffic that is originating from the public network is usually
anitian.com
blocked when traveling to the DMZ network.
84. A client connects to a Web server. Which component of
this HTTP connection is not examined by a stateful
firewall?

the source IP address of the client traffic


the destination port number of the client traffic OPEN
the actual contents of the HTTP connection
the source port number of the client traffic

Explanation: Stateful firewalls cannot prevent application


layer attacks because they do not examine the actual
contents of the HTTP connection.

85. Which network monitoring technology uses VLANs to


monitor traffic on remote switches?

IPS
IDS
TAP
RSPAN

Explanation: Remote SPAN (RSPAN) enables a network


administrator to use the flexibility of VLANs to monitor
traffic on remote switches.

86. Which rule action will cause Snort IPS to block and log
a packet?

log
drop
alert
How to Speed Up FedRAMP - Cloud DevOps OPEN
Sdrop
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 30/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Explanation: Snort IPS mode can perform all the IDS


actions plus the following:

– Drop – Block and log the packet.

– Reject – Block the packet, log it, and then send a TCP
reset if the protocol is TCP or an ICMP port unreachable 80% Faster,

message if the protocol is UDP.

– Sdrop – Block the packet but do not log it. 50% of the

87. What is typically used to create a security trap in the


Cost
data center facility? FedRAMP Moderate
IDs, biometrics, and two access doors Quickly deploy a

high resolution monitors FedRAMP-compliant

redundant authentication servers cloud environment.


a server without all security patches applied
anitian.com
Explanation: Security traps provide access to the data
halls where data center data is stored. As shown in the
figure below, a security trap is similar to an air lock. A
person must first enter the security trap using their badge
ID proximity card. After the person is inside the security
trap, facial recognition, fingerprints, or other biometric OPEN
verifications are used to open the second door. The user
must repeat the process to exit the data hall.

88. A company is concerned with leaked and stolen


corporate data on hard copies. Which data loss mitigation
technique could help with this situation?

strong PC security settings


strong passwords
shredding
encryption

Explanation: Confidential data should be shredded when


no longer required. Otherwise, a thief could retrieve
discarded reports and gain valuable information.

89. Upon completion of a network security course, a


student decides to pursue a career in cryptanalysis. What
job would the student be doing as a cryptanalyst?

cracking code without access to the shared secret key


creating hashing codes to authenticate data
making and breaking secret codes
creating transposition and substitution ciphers
90. What command is used on a switch to set the port
How to Speed Up FedRAMP - Cloud DevOps
access entity type so the interface acts only as an OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 31/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

authenticator and will not respond to any messages meant


for a supplicant?

dot1x pae authenticator


authentication port-control auto
aaa authentication dot1x default group radius 80% Faster,

dot1x system-auth-control
50% of the

Explanation: Sets the Port Access Entity (PAE) type.


Cost
dot1x pae [supplicant | authenticator | both]
supplicant—The interface acts only as a supplicant FedRAMP Moderate
and does not respond to messages that are meant for an
Quickly deploy a

authenticator.
FedRAMP-compliant

authenticator-—The interface acts only as an


cloud environment.
authenticator and does not respond to any messages
meant for a supplicant.
anitian.com
both—The interface behaves both as a supplicant
and as an authenticator and thus does respond to all
dot1x messages.

91. What are two disadvantages of using an IDS? (Choose


two.) OPEN
The IDS does not stop malicious traffic.
The IDS works offline using copies of network traffic.
The IDS has no impact on traffic.
The IDS analyzes actual forwarded packets.
The IDS requires other devices to respond to attacks.

Explanation: The disadvantage of operating with mirrored


traffic is that the IDS cannot stop malicious single-packet
attacks from reaching the target before responding to the
attack. Also, an IDS often requires assistance from other
networking devices, such as routers and firewalls, to
respond to an attack. An advantage of an IDS is that by
working offline using mirrored traffic, it has no impact on
traffic flow.

92. Refer to the exhibit. The ip verify source command is


applied on untrusted interfaces. Which type of attack is
mitigated by using this configuration?

How tospoofing
DHCP Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
DHCP starvation

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 32/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

STP manipulation
MAC and IP address spoofing

Explanation: To protect against MAC and IP address


spoofing, apply the IP Source Guard security feature, using 80% Faster,

the ip verify source command, on untrusted ports.


50% of the

93. What ports can receive forwarded traffic from an Cost


isolated port that is part of a PVLAN?
FedRAMP Moderate
other isolated ports and community ports
only promiscuous ports Quickly deploy a

all other ports within the same community FedRAMP-compliant

only isolated ports cloud environment.

Explanation: PVLANs are used to provide Layer 2 anitian.com


isolation between ports within the same broadcast domain.
The level of isolation can be specified

with three types of PVLAN ports:

– Promiscuous ports that can forward traffic to all other


ports

– Isolated ports that can only forward traffic to promiscuous OPEN


ports

– Community ports that can forward traffic to other


community ports and promiscuous ports

94. A user complains about being locked out of a device


after too many unsuccessful AAA login attempts. What
could be used by the network administrator to provide a
secure authentication access method without locking a
user out of a device?

Use the login delay command for authentication


attempts.
Use the login local command for authenticating user
access.
Use the aaa local authentication attempts max-fail global
configuration mode command with a higher number of
acceptable failures.
Use the none keyword when configuring the authentication
method list.

Explanation: The login delay command introduces a delay


between failed login attempts without locking the account​.
This provides a user with unlimited attempts at accessing a
device without causing the user account to become locked
and thus requiring administrator intervention.
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 33/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

95. What are two drawbacks in assigning user privilege


levels on a Cisco router? (Choose two.)

Only a root user can add or remove commands.


Privilege levels must be set to permit access control to
specific device interfaces, ports, or slots. 80% Faster,

Assigning a command with multiple keywords allows


access to all commands using those keywords.
50% of the

Commands from a lower level are always executable


at a higher level.
Cost
AAA must be enabled. FedRAMP Moderate
Quickly deploy a

Explanation: Privilege levels may not provide desired


FedRAMP-compliant

flexibility and specificity because higher levels always


cloud environment.
inherit commands from lower levels, and commands with
multiple keywords give the user access to all commands
anitian.com
available for each keyword. Privilege levels cannot specify
access control to interfaces, ports, or slots. AAA is not
required to set privilege levels, but is required in order to
create role-based views. The role of root user does not
exist in privilege levels.

OPEN
96. Refer to the exhibit. Which conclusion can be made
from the show crypto map command output that is shown
on R1?

The crypto map has not yet been applied to an


interface.
The current peer IP address should be 172.30.2.1.
There is a mismatch between the transform sets.
The tunnel configuration was established and can be
tested with extended pings.

Explanation:
How to Speed AccordingUptoFedRAMP
the show crypto map DevOps
- Cloud OPEN
command output,
Quickly deploy all required SAs
a FedRAMP-compliant cloudare in place,anitian.com
environment. but no 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 34/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

interface is currently using the crypto map. To complete the


tunnel configuration, the crypto map has to be applied to
the outbound interface of each router.

97. What are two reasons to enable OSPF routing protocol 80% Faster,

authentication on a network? (Choose two.)


50% of the

to prevent data traffic from being redirected and then


discarded Cost
to ensure faster network convergence
to provide data security through encryption FedRAMP Moderate
to prevent redirection of data traffic to an insecure link
Quickly deploy a

to ensure more efficient routing


FedRAMP-compliant

cloud environment.
Explanation: The reason to configure OSPF
authentication is to mitigate against routing protocol attacks anitian.com
like redirection of data traffic to an insecure link, and
redirection of data traffic to discard it. OSPF authentication
does not provide faster network convergence, more
efficient routing, or encryption of data traffic.

98. Which three functions are provided by the syslog OPEN


logging service? (Choose three.)

gathering logging information


authenticating and encrypting data sent over the network
retaining captured messages on the router when a router
is rebooted
specifying where captured information is stored
distinguishing between information to be captured
and information to be ignored
setting the size of the logging buffer

Explanation: Syslog operations include gathering


information, selecting which type of information to capture,
and directing the captured information to a storage
location. The logging service stores messages in a logging
buffer that is time-limited, and cannot retain the information
when a router is rebooted. Syslog does not authenticate or
encrypt messages.

99. What two ICMPv6 message types must be permitted


through IPv6 access control lists to allow resolution of
Layer 3 addresses to Layer 2 MAC addresses? (Choose
two.)

neighbor solicitations
How
echoto Speed Up FedRAMP - Cloud DevOps
requests OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
neighbor advertisements

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 35/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

echo replies
router solicitations
router advertisements
100. Which three services are provided through digital
signatures? (Choose three.) 80% Faster,

accounting
authenticity
50% of the

compression
nonrepudiation
Cost
integrity FedRAMP Moderate
encryption
Quickly deploy a

FedRAMP-compliant

Explanation: Digital signatures use a mathematical


cloud environment.
technique to provide three basic security services:Integrity;
Authenticity; Nonrepudiation
anitian.com

101. A technician is to document the current configurations


of all network devices in a college, including those in off-
site buildings. Which protocol would be best to use to
securely access the network devices?
OPEN
FTP
HTTP
SSH
Telnet

Explanation: Telnet sends passwords and other


information in clear text, while SSH encrypts its data. FTP
and HTTP do not provide remote device access for
configuration purposes.

102. An administrator is trying to develop a BYOD security


policy for employees that are bringing a wide range of
devices to connect to the company network. Which three
objectives must the BYOD security policy address?
(Choose three.)

All devices must be insured against liability if used to


compromise the corporate network.
All devices must have open authentication with the
corporate network.
Rights and activities permitted on the corporate
network must be defined.
Safeguards must be put in place for any personal
device being compromised.
The level of access of employees when connecting to
the
How corporate
to Speed network
Upmust be defined.- Cloud DevOps
FedRAMP OPEN
All devices
Quickly should be allowed
deploy a FedRAMP-compliant to environment.
cloud attach to the corporate
anitian.com 
network flawlessly.
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 36/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

103. What is the function of the pass action on a Cisco IOS


Zone-Based Policy Firewall?

logging of rejected or dropped packets


inspecting traffic between zones for traffic control
tracking the state of connections between zones 80% Faster,

forwarding traffic from one zone to another


50% of the

Explanation: The pass action performed by Cisco IOS Cost


ZPF permits forwarding of traffic in a manner similar to the
permit statement in an access control list. FedRAMP Moderate
Quickly deploy a

104. Refer to the exhibit. Based on the security levels of the FedRAMP-compliant

interfaces on ASA1, what traffic will be allowed on the cloud environment.


interfaces?

anitian.com

OPEN

Traffic from the Internet and DMZ can access the LAN.
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet can access both the DMZ and the
LAN.
Traffic from the LAN and DMZ can access the Internet.

Explanation: ASA devices have security levels assigned


to each interface that are not part of a configured ACL.
These security levels allow traffic from more secure
interfaces, such as security level 100, to access less
secure interfaces, such as level 0. By default, they allow
traffic from more secure interfaces (higher security level) to
access less secure interfaces (lower security level). Traffic
from the less secure interfaces is blocked from accessing
more secure interfaces.

105. What network testing tool can be used to identify


network layer protocols running on a host?

SIEM
Nmap
How to Speed Up FedRAMP - Cloud DevOps
L0phtcrack OPEN
Quickly
Tripwire a FedRAMP-compliant cloud environment. anitian.com
deploy 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 37/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

106. In the implementation of security on multiple devices,


how do ASA ACLs differ from Cisco IOS ACLs?

Cisco IOS routers utilize both named and numbered ACLs


and Cisco ASA devices utilize only numbered ACLs.
Cisco IOS ACLs are configured with a wildcard mask 80% Faster,

and Cisco ASA ACLs are configured with a subnet mask.


Cisco IOS ACLs are processed sequentially from the top
50% of the

down and Cisco ASA ACLs are not processed sequentially.


Cisco IOS ACLs utilize an implicit deny all and Cisco ASA
Cost
ACLs end with an implicit permit all. FedRAMP Moderate
Quickly deploy a

Explanation: The Cisco IOS ACLs are configured with a


FedRAMP-compliant

wildcard mask and the Cisco ASA ACLs are configured


cloud environment.
with a subnet mask. Both devices use an implicit deny, top
down sequential processing, and named or numbered
anitian.com
ACLs.

107. Which statement describes an important characteristic


of a site-to-site VPN?

It must be statically set up.


OPEN
It is ideally suited for use by mobile workers.
It requires using a VPN client on the host PC.
After the initial connection is established, it can
dynamically change connection information.
It is commonly implemented over dialup and cable modem
networks.

Explanation: A site-to-site VPN is created between the


network devices of two separate networks. The VPN is
static and stays established. The internal hosts of the two
networks have no knowledge of the VPN.

108. Which two options are security best practices that


help mitigate BYOD risks? (Choose two.)

Use paint that reflects wireless signals and glass that


prevents the signals from going outside the building.
Keep the device OS and software updated.
Only allow devices that have been approved by the
corporate IT team.
Only turn on Wi-Fi when using the wireless network.
Decrease the wireless antenna gain level.
Use wireless MAC address filtering.

Explanation: Many companies now support employees


How
and to Speed
visitors attaching Up FedRAMP
and using - Cloud
wireless devices thatDevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
connect to and use the corporate wireless network. This

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 38/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

practice is known as a bring-your-own-device policy or


BYOD. Commonly, BYOD security practices are included in
the security policy. Some best practices that mitigate
BYOD risks include the following:

Use unique passwords for each device and account.


80% Faster,

Turn off Wi-Fi and Bluetooth connectivity when not being


used. Only connect to trusted networks.
50% of the

Keep the device OS and other software updated.

Backup any data stored on the device.


Cost
Subscribe to a device locator service with a remote wipe
feature.
FedRAMP Moderate
Provide antivirus software for approved BYODs.
Quickly deploy a

Use Mobile Device Management (MDM) software that


FedRAMP-compliant

allows IT teams to track the device and implement security


cloud environment.
settings and software controls.
anitian.com
109. Refer to the exhibit. A network administrator
configures AAA authentication on R1. Which statement
describes the effect of the keyword single-connection in
the configuration?

OPEN

R1 will open a separate connection to the TACACS+


server for each user authentication session.
The authentication performance is enhanced by
keeping the connection to the TACACS+ server open.
The TACACS+ server only accepts one successful try for a
user to authenticate with it.
R1 will open a separate connection to the TACACS server
on a per source IP address basis for each authentication
session.

Explanation: The single-connection keyword enhances


TCP performance with TACACS+ by maintaining a single
TCP connection for the life of the session. Without the
single-connection keyword, a TCP connection is opened
and closed per session.

110. A recently created ACL is not working as expected.


The admin determined that the ACL had been applied
How on
inbound tothe
Speed Upand
interface FedRAMP
that was the- incorrect
Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment.
direction. How should the admin fix this issue? anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 39/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Delete the original ACL and create a new ACL,


applying it outbound on the interface.
Add an association of the ACL outbound on the same
interface.
Fix the ACE statements so that it works as desired 80% Faster,

inbound on the interface.


Remove the inbound association of the ACL on the 50% of the

interface and reapply it outbound.


111. What characteristic of the Snort term-based Cost
subscriptions is true for both the community and the
subscriber rule sets? FedRAMP Moderate

Both have a 30-day delayed access to updated signatures. Quickly deploy a

Both use Cisco Talos to provide coverage in advance of FedRAMP-compliant

exploits. cloud environment.


Both are fully supported by Cisco and include Cisco
customer support. anitian.com
Both offer threat protection against security threats.

Explanation: There are two types of term-based


subscriptions:
– Community Rule Set – Available for free, this
OPEN
subscription offers limited coverage against threats. The
community rule set focuses on reactive response to
security threats versus proactive research work. There is
also a 30-day delayed access to updated signatures
meaning that newest rule will be a minimum of 30 days old.
In addition, there is no Cisco customer support available.
– Subscriber Rule Set – Available for a fee, this service
provides the best protection against threats. It includes
coverage of advance exploits by using the research work of
the Cisco Talos security experts. The Subscriber Rule Set
also provides the fastest access to updated signatures in
response to a security incident or the proactive discovery of
a new threat. This subscription is fully supported by Cisco.

112. A security analyst is configuring Snort IPS. The


analyst has just downloaded and installed the Snort OVA
file. What is the next step?

Verify Snort IPS.


Configure Virtual Port Group interfaces.
Enable IPS globally or on desired interfaces.
Activate the virtual services.

Explanation: To deploy Snort IPS on supported devices,


perform the following steps:

–How
Step 1. toDownload
Speedthe UpSnort OVA file.
- Cloud DevOps
FedRAMP OPEN
–Quickly
Step deploy
2. Install the OVA file.
cloud environment. anitian.com
a FedRAMP-compliant 
– Step 3. Configure Virtual Port Group interfaces.

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 40/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

– Step 4. Activate the virtual services.

– Step 5. Configure Snort specifics.

– Step 6. Enable IPS globally or on desired interfaces.

– Step 7. Verify Snort IPS.


80% Faster,

113. The security policy in a company specifies that


employee workstations can initiate HTTP and HTTPS 50% of the

connections to outside websites and the return traffic is


allowed. However, connections initiated from outside hosts Cost
are not allowed. Which parameter can be used in extended
FedRAMP Moderate
ACLs to meet this requirement?
Quickly deploy a

dscp
FedRAMP-compliant

precedence
cloud environment.
eq
established
anitian.com
114. A researcher is comparing the differences between a
stateless firewall and a proxy firewall. Which two additional
layers of the OSI model are inspected by a proxy firewall?
(Choose two.)

Layer 3
Layer 4 OPEN
Layer 5
Layer 6
Layer 7

Explanation: Packet filtering firewalls are usually part of a


router firewall, which permits or denies traffic based on
Layer 3 and Layer 4 information. They are stateless
firewalls that use a simple policy table look-up that filters
traffic based on specific criteria.

115. Refer to the exhibit. A network administrator is


configuring a VPN between routers R1 and R2. Which
commands would correctly configure a pre-shared key for
the two routers?

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 41/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

R1(config)# username R2 password 5tayout!

R2(config)# username R1 password 5tayout!

R1(config)# crypto isakmp key 5tayout! address 64.100.0.2

R2(config)# crypto isakmp key 5tayout! address 64.100.0.1


80% Faster,

R1(config)# crypto isakmp key 5tayout! hostname R1

R2(config)# crypto isakmp key 5tayout! hostname R2 50% of the

R1(config-if)# ppp pap sent-username R1 password 5tayout!

R2(config-if)# ppp pap sent-username R2 password 5tayout!


Cost
116. Refer to the exhibit. Which statement is true about the FedRAMP Moderate
effect of this Cisco IOS zone-based policy firewall Quickly deploy a

configuration?
FedRAMP-compliant

cloud environment.

anitian.com

OPEN

The firewall will automatically drop all HTTP, HTTPS, and


FTP traffic.
The firewall will automatically allow HTTP, HTTPS, and
FTP traffic from s0/0/0 to g0/0 and will track the connections.
Tracking the connection allows only return traffic to be
permitted through the firewall in the opposite direction.
The firewall will automatically allow HTTP, HTTPS, and
FTP traffic from s0/0/0 to g0/0, but will not track the state of
connections. A corresponding policy must be applied to allow
return traffic to be permitted through the firewall in the
opposite direction.
The firewall will automatically allow HTTP, HTTPS, and
FTP traffic from g0/0 to s0/0/0 and will track the
connections. Tracking the connection allows only
return traffic to be permitted through the firewall in the
opposite direction.
The firewall will automatically allow HTTP, HTTPS, and
FTP traffic from g0/0 to s0/0/0, but will not track the state of
connections. A corresponding policy must be applied to allow
return traffic to be permitted through the firewall in the
opposite direction.
117. Which privilege level has the most access to the Cisco
IOS?

How
level to
0 Speed Up FedRAMP - Cloud DevOps OPEN
Quickly
leveldeploy
15 a FedRAMP-compliant cloud environment. anitian.com

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 42/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

level 7
level 16
level 1
118. Refer to the exhibit. A network administrator has
configured NAT on an ASA device. What type of NAT is 80% Faster,

used?

50% of the

Cost
FedRAMP Moderate
Quickly deploy a

inside NAT FedRAMP-compliant

static NAT cloud environment.


bidirectional NAT
outside NAT anitian.com

Explanation: NAT can be deployed on an ASA using one


of these methods:

inside NAT – when a host from a higher-security interface


has traffic destined for a lower-security interface and the
ASA translates the internal host address to a global OPEN
address

outside NAT – when traffic from a lower-security interface


destined for a host on the higher-security interface is
translated

bidirectional NAT – when both inside NAT and outside NAT


are used together

Because the nat command is applied so that the inside


interface is mapped to the outside interface, the NAT type
is inside. Also, the dynamic keyword in the nat command
indicates that it is a dynamic mapping.

119. A network analyst is configuring a site-to-site IPsec


VPN. The analyst has configured both the ISAKMP and
IPsec policies. What is the next step?

Configure the hash as SHA and the authentication as pre-


shared.
Apply the crypto map to the appropriate outbound
interfaces.
Issue the show crypto ipsec sa command to verify the
tunnel.
Verify that the security feature is enabled in the IOS.
120. When an inbound Internet-traffic ACL is being
implemented, what should be included to prevent the
spoofing of internal networks?
How to Speed Up FedRAMP - Cloud DevOps OPEN
ACEs to prevent traffic from private address spaces
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
ACEs to prevent broadcast address traffic
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 43/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

ACEs to prevent ICMP traffic


ACEs to prevent HTTP traffic
ACEs to prevent SNMP traffic

Explanation: Common ACEs to assist with antispoofing 80% Faster,

include blocking packets that have a source address in the


127.0.0.0/8 range, any private address, or any multicast 50% of the

addresses. Furthermore, the administrator should not allow


any outbound packets with a source address other than a Cost
valid address that is used in the internal networks of the
FedRAMP Moderate
organization.
Quickly deploy a

FedRAMP-compliant

121. Match the security term to the appropriate description.


(Not all options are used.)
cloud environment.

anitian.com

OPEN

Match the security term to the appropriate description

122. Which two types of attacks are examples of


reconnaissance attacks? (Choose two.)

brute force
port scan
ping sweep
man-in-the-middle
SYN flood
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 44/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Explanation: Reconnaissance attacks attempt to gather


information about the targets. Ping sweeps will indicate
which hosts are up and responding to pings, whereas port
scans will indicate on which TCP and UDP ports the target
is listening for incoming connections. Man-in-the-middle
80% Faster,

and brute force attacks are both examples of access


attacks, and a SYN flood is an example of a denial of
50% of the

service (DoS) attack. Cost


123. Which Cisco solution helps prevent ARP spoofing and
FedRAMP Moderate
ARP poisoning attacks? Quickly deploy a

Dynamic ARP Inspection FedRAMP-compliant

IP Source Guard cloud environment.


DHCP Snooping
Port Security anitian.com
124. When the Cisco NAC appliance evaluates an incoming
connection from a remote device against the defined
network policies, what feature is being used?

posture assessment
remediation of noncompliant systems OPEN
authentication and authorization
quarantining of noncompliant systems
125. Which two steps are required before SSH can be
enabled on a Cisco router? (Choose two.)

Give the router a host name and domain name.


Create a banner that will be displayed to users when they
connect.
Generate a set of secret keys to be used for encryption
and decryption.
Set up an authentication server to handle incoming
connection requests.
Enable SSH on the physical interfaces where the incoming
connection requests will be received.

Explanation: There are four steps to configure SSH on a


Cisco router. First, set the host name and domain name.
Second, generate a set of RSA keys to be used for
encrypting and decrypting the traffic. Third, create the user
IDs and passwords of the users who will be connecting.
Lastly, enable SSH on the vty lines on the router. SSH
does not need to be set up on any physical interfaces, nor
does an external authentication server need to be used.
While it is a good idea to configure a banner to display
legal information for connecting users, it is not required to
enable SSH.​
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 45/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

126. The network administrator for an e-commerce website


requires a service that prevents customers from claiming
that legitimate orders are fake. What service provides this
type of guarantee?

confidentiality 80% Faster,

authentication
integrity
50% of the

nonrepudiation
127. Match the security technology with the description.

Cost
FedRAMP Moderate
Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

OPEN

128. What functionality is provided by Cisco SPAN in a


switched network?

It mirrors traffic that passes through a switch port or


VLAN to another port for traffic analysis.
It prevents traffic on a LAN from being disrupted by a
broadcast storm.
It protects the switched network from receiving BPDUs on
ports that should not be receiving them.
It copies traffic that passes through a switch interface and
sends the data directly to a syslog or SNMP server for
analysis.
It inspects voice protocols to ensure that SIP, SCCP,
H.323, and MGCP requests conform to voice standards.
It mitigates MAC address overflow attacks.

Explanation: SPAN is a Cisco technology used by network


administrators to monitor suspicious traffic or to capture
traffic to be analyzed.

129. Which three statements are generally considered to be


best practices in the placement of ACLs? (Choose three.)

Filter unwanted traffic before it travels onto a low-


How to link.
bandwidth Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 46/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Place standard ACLs close to the destination IP address


of the traffic.
Place standard ACLs close to the source IP address of the
traffic.
Place extended ACLs close to the destination IP address 80% Faster,

of the traffic.
Place extended ACLs close to the source IP address of 50% of the

the traffic.
For every inbound ACL placed on an interface, there Cost
should be a matching outbound ACL.
FedRAMP Moderate
Explanation: Extended ACLs should be placed as close Quickly deploy a

as possible to the source IP address, so that traffic that FedRAMP-compliant

needs to be filtered does not cross the network and use cloud environment.
network resources. Because standard ACLs do not specify
a destination address, they should be placed as close to anitian.com
the destination as possible. Placing a standard ACL close
to the source may have the effect of filtering all traffic, and
limiting services to other hosts. Filtering unwanted traffic
before it enters low-bandwidth links preserves bandwidth
and supports network functionality. Decisions on placing
ACLs inbound or outbound are dependent on the OPEN
requirements to be met.

130. What function is performed by the class maps


configuration object in the Cisco modular policy
framework?

identifying interesting traffic


applying a policy to an interface
applying a policy to interesting traffic
restricting traffic through an interface

Explanation: There are three configuration objects in the


MPF; class maps, policy maps, and service policy. The
class maps configuration object uses match criteria to
identify interesting traffic.

131. In an attempt to prevent network attacks, cyber


analysts share unique identifiable attributes of known
attacks with colleagues. What three types of attributes or
indicators of compromise are helpful to share? (Choose
three.)

IP addresses of attack servers


changes made to end system software
netbios names of compromised firewalls
How to Speed
features Upfiles
of malware FedRAMP - Cloud DevOps OPEN
Quickly 
BIOS of attacking systems cloud environment. anitian.com
deploy a FedRAMP-compliant

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 47/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

system ID of compromised systems

Explanation: Many network attacks can be prevented by


sharing information about indicators of compromise (IOC).
Each attack has unique identifiable attributes. Indicators of 80% Faster,

compromise are the evidence that an attack has occurred.


IOCs can be identifying features of malware files, IP 50% of the

addresses of servers that are used in the attack, filenames,


and characteristic changes made to end system software. Cost
FedRAMP Moderate
132. What two assurances does digital signing provide
Quickly deploy a

about code that is downloaded from the Internet? (Choose


FedRAMP-compliant

two.)
cloud environment.
The code is authentic and is actually sourced by the
publisher. anitian.com
The code contains no errors.
The code has not been modified since it left the
software publisher.
The code contains no viruses.
The code was encrypted with both a private and public
key. OPEN

Explanation: Digitally signing code provides several


assurances about the code:

The code is authentic and is actually sourced by the


publisher.

The code has not been modified since it left the software
publisher.

The publisher undeniably published the code. This


provides nonrepudiation of the act of publishing.

133. Refer to the exhibit. What algorithm is being used to


provide public key exchange?

SHA
RSA
Diffie-Hellman
AES
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 48/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Explanation: The IPsec framework uses various protocols


and algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. DH (Diffie-
Hellman) is an algorithm used for key exchange. DH is a
public key exchange method and allows two IPsec peers to
80% Faster,

establish a shared secret key over an insecure channel. 50% of the

134. Which two statements describe the use of asymmetric Cost


algorithms? (Choose two.)
FedRAMP Moderate
Public and private keys may be used interchangeably.
If a public key is used to encrypt the data, a public key
Quickly deploy a

must be used to decrypt the data. FedRAMP-compliant

If a private key is used to encrypt the data, a public key cloud environment.
must be used to decrypt the data.
If a public key is used to encrypt the data, a private key anitian.com
must be used to decrypt the data.
If a private key is used to encrypt the data, a private key
must be used to decrypt the data.

Explanation: Asymmetric algorithms use two keys: a OPEN


public key and a private key. Both keys are capable of the
encryption process, but the complementary matched key is
required for decryption. If a public key encrypts the data,
the matching private key decrypts the data. The opposite is
also true. If a private key encrypts the data, the
corresponding public key decrypts the data.

135. Which statement is a feature of HMAC?

HMAC uses a secret key that is only known to the sender


and defeats man-in-the-middle attacks.
HMAC uses protocols such as SSL or TLS to provide
session layer confidentiality.
HMAC uses a secret key as input to the hash function,
adding authentication to integrity assurance.
HMAC is based on the RSA hash function.

Explanation: A keyed-hash message authentication code


(HMAC or KHMAC) is a type of message authentication
code (MAC). HMACs use an additional secret key as input
to the hash function, adding authentication to data integrity
assurance.

136. What is the purpose of the webtype ACLs in an ASA?

How to Speed
to inspect Up
outbound FedRAMP
traffic headed towards- Cloud
certainDevOps
web OPEN
sites
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 49/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

to restrict traffic that is destined to an ASDM


to monitor return traffic that is in response to web server
requests that are initiated from the inside interface
to filter traffic for clientless SSL VPN users
80% Faster,

Explanation: The webtype ACLs are used in a


configuration that supports filtering for clientless SSL VPN 50% of the

users.
Cost
137. Which two statements describe the effect of the FedRAMP Moderate
access control list wildcard mask 0.0.0.15? (Choose two.)
Quickly deploy a

The first 28 bits of a supplied IP address will be FedRAMP-compliant

matched. cloud environment.


The last four bits of a supplied IP address will be matched.
The first 28 bits of a supplied IP address will be ignored. anitian.com
The last four bits of a supplied IP address will be
ignored.
The last five bits of a supplied IP address will be ignored.
The first 32 bits of a supplied IP address will be matched.

Explanation: A wildcard mask uses 0s to indicate that bits OPEN


must match. 0s in the first three octets represent 24 bits
and four more zeros in the last octet, represent a total of 28
bits that must match. The four 1s represented by the
decimal value of 15 represents the four bits to ignore.

138. Which type of firewall is the most common and allows


or blocks traffic based on Layer 3, Layer 4, and Layer 5
information?

stateless firewall
packet filtering firewall
next generation firewall
stateful firewall
139. Which protocol or measure should be used to mitigate
the vulnerability of using FTP to transfer documents
between a teleworker and the company file server?

SCP
TFTP
ACLs on the file server
out-of-band communication channel

Explanation: File transfer using FTP is transmitted in plain


text. The username and password would be easily
captured if the data transmission is intercepted. Secure
HowProtocol
Copy to Speed (SCP) Up FedRAMP
conducts - Cloud
the authentication andDevOps
file OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
transfer under SSH, thus the communication is encrypted.

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 50/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Like FTP, TFTP transfers files unencrypted. ACLs provide


network traffic filtering but not encryption. Using an out-of-
band communication channel (OOB) either requires
physical access to the file server or, if done through the
internet, does not necessarily encrypt the communication. 80% Faster,

140. Refer to the exhibit. The IPv6 access list 50% of the

LIMITED_ACCESS is applied on the S0/0/0 interface of R1


in the inbound direction. Which IPv6 packets from the ISP Cost
will be dropped by the ACL on R1?
FedRAMP Moderate
Quickly deploy a

FedRAMP-compliant

cloud environment.

anitian.com

OPEN

HTTPS packets to PC1


ICMPv6 packets that are destined to PC1
packets that are destined to PC1 on port 80
neighbor advertisements that are received from the ISP
router

Explanation: The access list LIMITED_ACCESS will block


ICMPv6 packets from the ISP. Both port 80, HTTP traffic,
and port 443, HTTPS traffic, are explicitly permitted by the
ACL. The neighbor advertisements from the ISP router are
implicitly permitted by the implicit permit icmp any any nd-
na statement at the end of all IPv6 ACLs.

141. What tool is available through the Cisco IOS CLI to


initiate security audits and to make recommended
configuration changes with or without administrator input?

Control Plane Policing


Cisco AutoSecure
Cisco ACS
Simple Network Management Protocol
142. Refer to the exhibit. Which pair of crypto isakmp key
commands would correctly configure PSK on the two

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 51/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

routers?

80% Faster,

50% of the

Cost
FedRAMP Moderate
R1(config)# crypto isakmp key cisco123 address
209.165.200.227
Quickly deploy a

R2(config)# crypto isakmp key cisco123 address FedRAMP-compliant

209.165.200.226 cloud environment.


R1(config)# crypto isakmp key cisco123 address
209.165.200.226
anitian.com
R2(config)# crypto isakmp key cisco123 address
209.165.200.227
R1(config)# crypto isakmp key cisco123 hostname R1

R2(config)# crypto isakmp key cisco123 hostname R2


R1(config)# crypto isakmp key cisco123 address
209.165.200.226
OPEN
R2(config)# crypto isakmp key secure address
209.165.200.227

Explanation: The correct syntax of the crypto isakmp key


command is as follows:

crypto isakmp key keystring address peer-address

or
crypto isakmp keykeystring hostname peer-hostnameSo,
the correct answer would be the following:

R1(config)# crypto isakmp key cisco123 address


209.165.200.227

R2(config)# crypto isakmp key cisco123 address


209.165.200.226

143. Which two technologies provide enterprise-managed


VPN solutions? (Choose two.)

Layer 3 MPLS VPN


Frame Relay
site-to-site VPN
Layer 2 MPLS VPN
remote access VPN
144. What are the three components of an STP bridge ID?
(Choose three.)

the date
How and time that
to Speed Upthe switch was brought
FedRAMP - Cloudonline
DevOps OPEN
the hostname
Quickly of the switch cloud environment. anitian.com
deploy a FedRAMP-compliant 
the MAC address of the switch
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 52/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

the extended system ID


the bridge priority value
the IP address of the management VLAN
145. What are two differences between stateful and packet
filtering firewalls? (Choose two.) 80% Faster,

A packet filtering firewall will prevent spoofing by


determining whether packets belong to an existing connection
50% of the

while a stateful firewall follows pre-configured rule sets.


A stateful firewall provides more stringent control over
Cost
security than a packet filtering firewall. FedRAMP Moderate
A packet filtering firewall is able to filter sessions that use
dynamic port negotiations while a stateful firewall cannot. Quickly deploy a

A stateful firewall will provide more logging FedRAMP-compliant

information than a packet filtering firewall. cloud environment.


A statefull firewall will examine each packet individually
while a packet filtering firewall observes the state of a anitian.com
connection.

Explanation: There are many differences between a


stateless and stateful firewall.

Stateless firewalls (packet filtering firewalls):

OPEN
– are susceptible to IP spoofing

– do not reliably filter fragmented packets

– use complex ACLs, which can be difficult to implement


and maintain

– cannot dynamically filter certain services

– examine each packet individually rather than in the


context of the state of a connection
Stateful firewalls:

– are often used as a primary means of defense by filtering


unwanted, unnecessary, or undesirable traffic

– strengthen packet filtering by providing more stringent


control over security
– improve performance over packet filters or proxy servers

– defend against spoofing and DoS attacks by determining


whether packets belong to an existing connection or are
from an unauthorized source

– provide more log information than a packet filtering


firewall

146. Which portion of the Snort IPS rule header identifies


the destination port?

alert tcp $HOME_NET any -> $EXTERNAL_NET


$HTTP_PORTS

any

$HTTP_PORTS

$HOME_NET

How to Speed Up FedRAMP - Cloud DevOps OPEN


tcp Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 53/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Incomplete (Please share if you have) – Updating….


Match the IPS alarm type to the description.

Match each SNMP operation to the corresponding


description. (Not all options are used.)
80% Faster,

50% of the

The FedRAMP Journey


Cost
Audit-Ready in 60 Days
FedRAMP Moderate
Cut time-to-compliance by 80% with Anitian FedRAMP Automation on AWS

and Azure.
Quickly deploy a

FedRAMP-compliant

cloud environment.
anitian.com OPEN
anitian.com

Related Articles
OPEN

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 54/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Join the discussion


80% Faster,

46 COMMENTS
50% of the

 Comment search... Cost


FedRAMP Moderate
Austin Graves 
15 days ago Quickly deploy a

Match the security management function with the


FedRAMP-compliant

description.
cloud environment.

0 0
Reply View Replies (1)  anitian.com

Artur 
26 days ago

Which two technologies provide enterprise-managed VPN


solutions? (Choose two.)

Layer 3 MPLS VPN OPEN


Frame Relay
site-to-site VPN * correct
Layer 2 MPLS VPN
remote access VPN * (correct)

 Last edited 26 days ago by Artur

0 0
Reply View Replies (1) 

Koma 
30 days ago

46 What are the three components of an STP bridge ID?


(Choose three.)

46

What are the three components of an STP bridge ID?


(Choose three.)

the date and time that the switch was brought online
the hostname of the switch
the MAC address of the switch
the extended system ID
the bridge priority value
the IP address of the management VLAN
Navigation Bar

How to 0Speed
0
Up
Reply
FedRAMP - Cloud DevOps
View Replies (1)  OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 55/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

Koma 
30 days ago

What are the three components of an STP bridge ID?


(Choose three.)

80% Faster,

0 0
Reply 50% of the

Koma 
30 days ago
Cost
What are two differences between stateful and packet FedRAMP Moderate
filtering firewalls? (Choose two.)
Quickly deploy a

FedRAMP-compliant

cloud environment.
33

What are two differences between stateful and packet


anitian.com
filtering firewalls? (Choose two.)

A packet filtering firewall will prevent spoofing by


determining whether packets belong to an existing
connection while a stateful firewall follows pre-
configured rule sets.
A stateful firewall provides more stringent control OPEN
over security than a packet filtering firewall.
A packet filtering firewall is able to filter sessions that
use dynamic port negotiations while a stateful firewall
cannot.
A stateful firewall will provide more logging
information than a packet filtering firewall.
A statefull firewall will examine each packet
individually while a packet filtering firewall observes the
state of a connection.

 Last edited 30 days ago by lucas sanju

0 0
Reply

billionaries_killer 
30 days ago

Match each SNMP operation to the corresponding


description. (Not all options are used.)

0 0
Reply View Replies (1) 

billionaries_killer 
30 days ago

Which two technologies provide enterprise-managed VPN

How solutions?
to Speed (Choose two.)
Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 56/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

* remote access VPN

Layer 3 MPLS VPN

* site-to-site VPN

Layer 2 MPLS VPN

Frame Relay 80% Faster,

0 0
Reply View Replies (1) 
50% of the

billionaries_killer 
30 days ago Cost
What are the three components of an STP bridge ID?
FedRAMP Moderate
(Choose three.)
Quickly deploy a

the date and time that the switch was brought online

FedRAMP-compliant

* the MAC address of the switch

cloud environment.
the IP address of the management VLAN

the hostname of the switch

anitian.com
* the bridge priority value

* the extended system ID

0 0
Reply

billionaries_killer 
30 days ago
OPEN
Which portion of the Snort IPS rule header identifies the
destination port? alert tcp $HOME_NET any ->
$EXTERNAL_NET $HTTP_PORTS

any

* $HTTP_PORTS

$HOME_NET

tcp

0 0
Reply

billionaries_killer 
30 days ago

What are two differences between stateful and packet


filtering firewalls? (Choose two.)

A statefull firewall will examine each packet individually


while a packet filtering firewall observes the state of a
connection.

A stateful firewall provides more stringent control over


security than a packet filtering firewall.

A packet filtering firewall will prevent spoofing by


determining whether packets belong to an existing
connection while a stateful firewall follows pre-configured
rule sets.

How Atopacket
SpeedfilteringUp FedRAMP
firewall is able to filter-sessions
CloudthatDevOps
use
OPEN
dynamic
Quickly deploy port negotiations while
a FedRAMP-compliant a stateful firewall
cloud environment. cannot.
anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 57/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

A stateful firewall will provide more logging


information than a packet filtering firewall.

0 0
Reply

joseph climber 
1 month ago
80% Faster,

true positive true negative false positive false negative


50% of the

Cost
verified attack traffic is generating an alarm

normal user traffic is not generating an alarm

attack traffic is not generating an alarm

FedRAMP Moderate
normal user traffic is generating an alarm

Reply
Quickly deploy a

0 0
FedRAMP-compliant

cloud environment.
efbium 
1 month ago

Which two technologies provide enterprise-managed VPN anitian.com


solutions? (Choose two.)

Frame Relay
remote access VPN
Layer 3 MPLS VPN
Layer 2 MPLS VPN OPEN
site-to-site VPN

0 0
Reply View Replies (1) 

Anon 
1 month ago

Refer to the exhibit. Which pair of crypto isakmp


key commands would correctly configure PSK on the two
routers?

R1(config)# crypto isakmp key cisco123 address


209.165.200.226
R2(config)# crypto isakmp key secure address
209.165.200.227
R1(config)# crypto isakmp key cisco123 address
209.165.200.226
R2(config)# crypto isakmp key cisco123 address
209.165.200.227
R1(config)# crypto isakmp key cisco123 address
209.165.200.227
R2(config)# crypto isakmp key cisco123 address
209.165.200.226
R1(config)# crypto isakmp key cisco123 hostname
R1
R2(config)# crypto isakmp key cisco123 hostname

How toR2Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
1 0
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 58/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full
1 0

Reply View Replies (1) 

Anon 
1 month ago

What tool is available through the Cisco IOS CLI to initiate


security audits and to make recommended configuration
80% Faster,

changes with or without administrator input? 50% of the

Control Plane Policing


Cisco AutoSecure Cost
Cisco ACS
FedRAMP Moderate
Simple Network Management Protocol
Quickly deploy a

0 0
Reply FedRAMP-compliant

cloud environment.
Anon 
1 month ago
anitian.com
Which two statements describe the effect of the access
control list wildcard mask 0.0.0.15? (Choose two.)

The first 32 bits of a supplied IP address will be


matched.
The first 28 bits of a supplied IP address will be
OPEN
ignored.
The last four bits of a supplied IP address will be
ignored.
The first 28 bits of a supplied IP address will be
matched.
The last four bits of a supplied IP address will be
matched.
The last five bits of a supplied IP address will be
ignored.

0 0
Reply

Anon 
1 month ago

Refer to the exhibit. The IPv6 access list


LIMITED_ACCESS is applied on the S0/0/0 interface of R1
in the inbound direction. Which IPv6 packets from the ISP
will be dropped by the ACL on R1?

HTTPS packets to PC1


packets that are destined to PC1 on port 80
ICMPv6 packets that are destined to PC1
neighbor advertisements that are received from the
ISP router

0 0
Reply
How to Speed Up FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 59/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full
Blindvision 
1 month ago

Thanks for the materialof study.

Bellow some new questions to be added

Which two statements describe the use of asymmetric 80% Faster,

algorithms

If a public key is used to encrypt the data, a private key


50% of the

must be used to decrypt the data.


Cost
If a private key is used to encrypt the data, a private key
must be used to decrypt the data.
FedRAMP Moderate

If a public key is used to encrypt the data, a public key Quickly deploy a

must be used to decrypt the data. FedRAMP-compliant

cloud environment.
Public and private keys may be used interchangeably.

If a private key is used to encrypt the data, a public key anitian.com


must be used to decrypt the data.

//////////////////////////////////////////////////////////////////////////////////////////////
//////////////////////////

Which statement is a feature of HMAC


OPEN
HMAC uses a secret key as input to the hash function,
adding authentication to integrity assurance.

HMAC uses a secret key that is only known to the sender


and defeats man-in-the-middle attacks.

HMAC uses protocols such as SSL or TLS to provide


session layer confidentiality.

HMAC is based on the RSA hash function.

//////////////////////////////////////////////////////////////////////////////////////////////
///////////////////////

What is the purpose of the webtype ACLs in an ASA

to monitor return traffic that is in response to web server


requests that are initiated from the inside interface

to inspect outbound traffic headed towards certain web


sites

to filter traffic for clientless SSL VPN users (Correct


Answer)

to restrict traffic that is destined to an ASDM

//////////////////////////////////////////////////////////////////////////////////////////////
//////////////////////////

Which two statements describe the effect of the access


How control
to Speed Upmask
list wildcard FedRAMP - Cloud
0.0.0.15? (Choose two.) DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
The first 32 bits of a supplied IP address will be matched.
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 60/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

The last four bits of a supplied IP address will be ignored.

The last five bits of a supplied IP address will be ignored.

The first 28 bits of a supplied IP address will be matched.

The first 28 bits of a supplied IP address will be ignored. 80% Faster,

The last four bits of a supplied IP address will be matched. 50% of the

//////////////////////////////////////////////////////////////////////////////////////////////
//////////////////////////
Cost
Which type of firewall is the most common and allows or FedRAMP Moderate
blocks traffic based on Layer 3, Layer 4, and Layer 5
Quickly deploy a

information?
FedRAMP-compliant

stateless firewall cloud environment.


packet filtering firewall
anitian.com
next generation firewall

stateful firewall

//////////////////////////////////////////////////////////////////////////////////////////////
//////////////////////////
OPEN
Which protocol or measure should be used to mitigate the
vulnerability of using FTP to transfer documents between a
teleworker and the company file server?

SCP

out-of-band communication channel

ACLs on the file server

TFTP

//////////////////////////////////////////////////////////////////////////////////////////////
//////////////////////////

0 0
Reply View Replies (1) 

3r!v@s 
1 month ago

Question

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
1 0
Reply View Replies (1) 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 61/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

3r!v@s 
1 month ago

What two assurances does digital signing provide about


code that is downloaded from the Internet? (Choose two.)
80% Faster,

The code has not been modified since it left the


software publisher. 50% of the

The code is authentic and is actually sourced by the Cost


publisher.
FedRAMP Moderate
The code was encrypted with both a private and
Quickly deploy a

public key.
FedRAMP-compliant

The code contains no viruses. cloud environment.

The code contains no errors anitian.com

0 0
Reply

3r!v@s 
1 month ago

In an attempt to prevent network attacks, cyber analysts


OPEN
share unique identifiable attributes of known attacks with
colleagues. What three types of attributes or indicators of
compromise are helpful to share? (Choose three.)

IP addresses of attack servers

features of malware files

changes made to end system software

BIOS of attacking systems

system ID of compromised systems

netbios names of compromised firewalls

0 0
Reply

3r!v@s 
1 month ago

What function is performed by the class maps


configuration object in the Cisco modular policy
framework?

applying a policy to interesting traffic

restricting traffic through an interface

How to Speed
identifying Up FedRAMP
interesting traffic - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
applying a policy to an interface
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 62/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

0 0
Reply

3r!v@s
80% Faster,


1 month ago

Which three statements are generally considered to be


best practices in the placement of ACLs? (Choose three.)
50% of the

Filter unwanted traffic before it travels onto a low-


bandwidth link. Cost
Place standard ACLs close to the destination IP FedRAMP Moderate
address of the traffic.
Quickly deploy a

Place extended ACLs close to the source IP address FedRAMP-compliant

of the traffic. cloud environment.

Place extended ACLs close to the destination IP anitian.com


address of the traffic.

Place standard ACLs close to the source IP address


of the traffic.

For every inbound ACL placed on an interface, there


OPEN
should be a matching outbound ACL.

0 0
Reply

3r!v@s 
1 month ago

What functionality is provided by Cisco SPAN in a switched


network?

It prevents traffic on a LAN from being disrupted by a


broadcast storm.

It mitigates MAC address overflow attacks.

It protects the switched network from receiving


BPDUs on ports that should not be receiving them.

It mirrors traffic that passes through a switch port or


VLAN to another port for traffic analysis.

It copies traffic that passes through a switch interface


and sends the data directly to a syslog or SNMP server
for analysis.

It inspects voice protocols to ensure that SIP, SCCP,


H.323, and MGCP requests conform to voice standards.

How to 0Speed
0 Up
Reply
FedRAMP - Cloud DevOps OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 63/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full
3r!v@s 
1 month ago

Question DRAG-AND-DROP

80% Faster,

50% of the

Cost
FedRAMP Moderate
Quickly deploy a

0 0
Reply FedRAMP-compliant

cloud environment.
Max 
1 month ago
anitian.com
When an inbound Internet-traffic ACL is being
implemented, what should be included to prevent the
spoofing of internal networks?

ACEs to prevent broadcast address traffic


ACEs to prevent SNMP traffic
OPEN
ACEs to prevent traffic from private address spaces
ACEs to prevent ICMP traffic
ACEs to prevent HTTP traffic

1 0
Reply View Replies (1) 

Max 
1 month ago

more

0 0
Reply

Max 
1 month ago

Which two types of attacks are examples of


reconnaissance attacks? (Choose two.)
How to Speed Up FedRAMP - Cloud DevOps OPEN
ping sweep
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 
port scan
https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 64/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

man-in-the-middle
brute force
SYN flood

0 0
Reply 80% Faster,

Max 
1 month ago
50% of the

Which Cisco solution helps prevent ARP spoofing and Cost


ARP poisoning attacks?
FedRAMP Moderate
DHCP Snooping
Port Security Quickly deploy a

Dynamic ARP Inspection FedRAMP-compliant

IP Source Guard cloud environment.

0 0
Reply anitian.com

Max 
1 month ago

When the Cisco NAC appliance evaluates an incoming


connection from a remote device against the defined
network policies, what feature is being used? OPEN

posture assessment
remediation of noncompliant systems
authentication and authorization
quarantining of noncompliant systems

0 0
Reply

Max 
1 month ago

Which two steps are required before SSH can be enabled


on a Cisco router? (Choose two.)

Enable SSH on the physical interfaces where the


incoming connection requests will be received.
Create a banner that will be displayed to users when
they connect.
Give the router a host name and domain name.
Set up an authentication server to handle incoming
connection requests.
Generate a set of secret keys to be used for
encryption and decryption.

0 0
Reply

How Max
to Speed Up FedRAMP - Cloud DevOps

1 month ago
OPEN
Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 65/66
25/08/2021 Network Security (Version1.0) - Final Exam Answers Full

The network administrator for an e-commerce website


requires a service that prevents customers from claiming
that legitimate orders are fake. What service provides this
type of guarantee?

confidentiality
80% Faster,

authentication
integrity
50% of the

nonrepudiation
Cost
0 0
Reply FedRAMP Moderate
Quickly deploy a

Max 
1 month ago FedRAMP-compliant

Match the security technology with the description.


cloud environment.

anitian.com

OPEN

0 0
Reply

Alex43 
2 months ago

Thanks so much, how many question in this exam?

0 0
Reply View Replies (1) 

Ahuys 
2 months ago

Passed, good site, many thanks

0 0
Reply View Replies (1) 

ITExamAnswers.net Copyright © 2021. Privacy Policy | Contact

How to Speed Up FedRAMP - Cloud DevOps OPEN


Quickly deploy a FedRAMP-compliant cloud environment. anitian.com 

https://itexamanswers.net/network-security-version1-0-final-exam-answers-full.html 66/66

You might also like