Test All
Test All
Test All
/ Donations
Modules 5 - 7: Monitoring
and Managing Devices
Group Exam Answers
Modules 15 - 17:
How to find: Press “Ctrl + F” in the browser and fill in
Cryptography Group
whatever wording is in the question to find that
Exam Answers
question/answer. If the question is not here, find it in
Questions Bank. Modules 18 - 19: VPNs
Group Exam Answers
Recent Comments
IBrahim on 1.1.7 Lab – Basic Switch
Configuration (Answers)
mesh network
secure segmentation
visibility
threat defense
servers
infrastructure
ACL
NAT
dynamic routing protocols
outside security zone level 0
web filtering
cloud access security
spam protection
Layer 4 traffic monitoring
denylisting
Snort IPS
DLP
DMZ
rootkit
Explanation:
Measure Purpose
CDP
802.1Q
IPsec
TACACS+
STP
EAPOL
protocol?
exchange of DH keys
negotiation of IPsec policy
negotiation of IKE policy sets
verification of peer identity
SHA
RSA
DH
MD5
AES
traffic.
Terminal servers can have direct console connections to
user devices needing management.
OOB management requires the creation of VPNs.
All devices appear to be attached to a single
management network.
hacktivists
cyber criminals
vulnerability brokers
script kiddies
state-sponsored hackers
multicast packet
ICMP packet
broadcast packet
router-generated packet
digital signatures
hashing algorithms
PKI certificates
symmetric keys
subordinate CA
OCSP
DNS
LDAP
CRL
SSL/TLS
X.500
LDAP
X.509
zero-day
Trojan horse
brute-force
man-in-the-middle
security
drop
reject
connectivity
inspect
balanced
action
length
trigger
type
depth
function
Other case:
SIP support
password encryption
802.1X support
separate authentication and authorization processes
utilization of transport layer protocols
local zone
inside zone
self zone
system zone
outside zone
With ZPF, the router will allow packets unless they are
explicitly blocked.
ICMP
UDP
DHCP
TCP
HTTP
Tripwire
L0phtcrack
Nessus
Metasploit
vulnerability scanning
network scanning
integrity checking
penetration testing
SIEM
SuperScan
Zenmap
Tripwire
RSA
Diffie-Hellman
DES
AES
negotiations to begin.
It indicates that IKE will be used to establish the IPsec
tunnel for protecting the traffic.
RSA
AES
MD5
PKI
HMAC
MD5
3DES
SHA-1
AES
hash key
symmetric key
asymmetric key
digital signature
Ask the user to stop immediately and inform the user that
this constitutes grounds for dismissal.
Create a firewall rule blocking the respective website.
Revise the AUP immediately and get all users to sign
the updated AUP.
Immediately suspend the network privileges of the user.
63. ACLs are used primarily to filter traffic. What are two
additional uses of ACLs? (Choose two.):
authentication
Nessus
Metasploit
L0phtcrack
SuperScan
host 192.168.1.4
range 192.168.1.10 192.168.1.20
host 192.168.1.3, host 192.168.1.4, and range
192.168.1.10 192.168.1.20
host 192.168.1.3
host 192.168.1.3 and host 192.168.1.4
host 192.168.1.4 and range 192.168.1.10 192.168.1.20
availability
integrity
scalability
confidentiality
authentication
nonrepudiation
integrity
Diffie-Hellman
confidentiality
authorization
authentication
auditing
accounting
automation
accounting
authentication
authorization
DHCP snooping
Dynamic ARP Inspection
IP source guard
port security
port scanning
SQL injection
ping of death
phishing
buffer overflow
transform sets
a permit access list entry
hashing algorithms
a security association
the hash
the peer
encryption
the ISAKMP policy
a valid access list
IP addresses on all active interfaces
the IKE Phase 1 policy
IPS
IDS
TAP
RSPAN
86. Which rule action will cause Snort IPS to block and
log a packet?
log
drop
alert
Sdrop
DHCP spoofing
DHCP starvation
STP manipulation
MAC and IP address spoofing
neighbor solicitations
echo requests
neighbor advertisements
echo replies
router solicitations
router advertisements
accounting
authenticity
compression
nonrepudiation
integrity
encryption
FTP
HTTP
SSH
Telnet
Traffic from the Internet and DMZ can access the LAN.
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet can access both the DMZ and
the LAN.
Traffic from the LAN and DMZ can access the
Internet.
SIEM
Nmap
L0phtcrack
Tripwire
Cisco IOS ACLs utilize an implicit deny all and Cisco ASA
ACLs end with an implicit permit all.
dscp
precedence
eq
established
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
level 0
level 15
level 7
level 16
level 1
inside NAT
static NAT
bidirectional NAT
outside NAT
brute force
port scan
ping sweep
man-in-the-middle
SYN flood
posture assessment
remediation of noncompliant systems
authentication and authorization
quarantining of noncompliant systems
and decryption.
Set up an authentication server to handle incoming
connection requests. 1
Enable SSH on the physical interfaces where the
incoming connection requests will be received.
confidentiality
authentication
integrity
nonrepudiation
SHA
RSA
Diffie-Hellman
AES
stateless firewall
packet filtering firewall
next generation firewall
stateful firewall
SCP
TFTP
ACLs on the file server
out-of-band communication channel
or
crypto isakmp keykeystring hostname peer-hostnameSo,
the correct answer would be the following:
R1(config)# crypto isakmp key cisco123 address
209.165.200.227
R2(config)# crypto isakmp key cisco123 address
209.165.200.226
the date and time that the switch was brought online
the hostname of the switch
the MAC address of the switch
the extended system ID
the bridge priority value
the IP address of the management VLAN
rule sets.
A stateful firewall provides more stringent control
over security than a packet filtering firewall.
A packet filtering firewall is able to filter sessions that use
dynamic port negotiations while a stateful firewall cannot.
A stateful firewall will provide more logging
information than a packet filtering firewall.
A statefull firewall will examine each packet individually
while a packet filtering firewall observes the state of a
connection.
any
$HTTP_PORTS
$HOME_NET
tcp
disabled
down
unauthorized
blocking
! Subscribe !
"
58 COMMENTS
Reply
Navigation Bar
Reply
Reply
stateless firewall
packet filtering firewall
next generation firewall
stateful firewall
Reply
Reply
Reply
46
What are the three components of an STP bridge ID?
(Choose three.)
Reply
33
What are two differences between stateful and packet
filtering firewalls? (Choose two.)
Reply
the date and time that the switch was brought online
* the MAC address of the switch
the IP address of the management VLAN
the hostname of the switch
* the bridge priority value
* the extended system ID
Reply
any
* $HTTP_PORTS
$HOME_NET
tcp
Reply
Frame Relay
remote access VPN
Layer 3 MPLS VPN
Layer 2 MPLS VPN
site-to-site VPN
Reply
Reply
Reply
//////////////////////////////////////////////////////////////////////////////////////
//////////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
///////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
//////////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
//////////////////////////////////
stateless firewall
stateful firewall
//////////////////////////////////////////////////////////////////////////////////////
//////////////////////////////////
SCP
TFTP
//////////////////////////////////////////////////////////////////////////////////////
//////////////////////////////////
Reply View Replies (1) "
Question
Reply
Reply
Reply
Reply
Reply
Question DRAG-AND-DROP
Reply
more
Reply
ping sweep
port scan
man-in-the-middle
brute force
SYN flood
Reply
DHCP Snooping
Port Security
Dynamic ARP Inspection
IP Source Guard
posture assessment
remediation of noncompliant systems
authentication and authorization
quarantining of noncompliant systems
Reply
Reply
confidentiality
authentication
integrity
nonrepudiation
Reply
Reply
/ Donations
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 1 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
Modules 15 - 17:
00:00/00:00 World Tech
Cryptography Group Exam
Answers
How to find: Press “Ctrl + F” in the browser and fill in Modules 18 - 19: VPNs
whatever wording is in the question to find that Group Exam Answers
question/answer. If the question is not here, find it in
Modules 20 - 22: ASA
Questions Bank.
Group Exam Answers
form below this article. We will update answers for Network Security 1.0
you in the shortest time. Thank you! We truly value Final PT Skills Exam
your contribution to the website. (PTSA) Answers
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 2 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
IPsec
SSL Related Posts
S/MIME 21.9.5 Lab – Configure ASA Basic
EAP-TLS Settings and Firewall Using ASDM
Answers
Explanation: Many applications use the X.509 standard 1.2.7 Check Your Understanding –
Network Topology Protection
format of digital certificates to authenticate websites,
Overview Answers
public key distribution, and end devices connected to
switch ports. User email agents use the S/MIME protocol Network Security (Version1.0)
Modules 5 – 7: Monitoring and
to support email protection. S/MIME uses X.509
Managing Devices Group Test
certificates. Online
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 3 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 4 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 5 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
Match the security policy with the description. (Not all options
are used.)
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 6 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
10. Which benefit does SSH offer over Telnet for remotely
managing a router?
encryption
TCP usage
authorization
connections via multiple VTY lines
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 7 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
IPSec
HTTPS
SSH
Telnet
TFTP
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 8 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
warning
notification
informational
debugging
ntp master 1
ntp server 172.16.0.1
ntp broadcast client
clock set 11:00:00 DEC 20 2010
authentication
authorization
accounting
accessing
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 9 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
superuser view
root view
superview
CLI view
admin view
config view
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 10 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
router
to facilitate the establishment of neighbor adjacencies
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 11 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 12 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 13 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 14 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
Card (AIP-SSC)
Advanced Inspection and Prevention Security Services
Module (AIP-SSM)
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 15 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
stateless firewall
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 16 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
stateful firewall
proxy firewall
application gateway firewall
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 17 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 18 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
31. What are two shared characteristics of the IDS and the
IPS? (Choose two.)
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 19 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
log
hold
drop
inspect
copy
forward
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 20 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 21 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
AMP
802.1X
RADIUS
BitLocker
RADIUS
TACACS+
SSH
MD5
SNMP
EAPOL
broadcasts such as ARP
any data encrypted with 3DES or AES
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 22 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
root guard
PortFast with BPDU guard enabled
protected ports
storm control with the trap option
port security with the shutdown violation mode
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 23 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
Disable DTP.
Enable trunking manually.
Set the native VLAN to an unused VLAN.
Enable BPDU guard.
Enable Source Guard.
Use private VLANs.
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 24 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
RC4
Caesar
Enigma
One-time pad
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 25 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
cybertext
meet-in-the-middle
frequency analysis
known-plaintext
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 26 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
ip
tcp
udp
icmp
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 27 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
ASA devices and Cisco IOS routers are similar in that they
both support an implicit deny within an ACL.
penetration testing
network scanning
integrity checking
vulnerability scanning
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 28 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
51. Match the network security testing tool with the correct
function. (Not all options are used.)
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 29 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
using a fuzzer
rooting
jailbreaking
packet sniffing
using a Trojan Horse
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 30 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
networks.
security
scalability
cost savings
compatibility
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 31 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 32 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 33 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
PKI
NIST-SP800
x.503
x.509
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 34 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
MD5
SHA
AES
DH
RSA
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 35 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
SIEM
Wireshark
SNMP
SPAN
network tap
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 36 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
Security Onion
Snort
ASDM
AMP
! Subscribe !
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 37 of 38
Network Security (Version 1.0) - Practice Final Exam Answers 20/12/2023, 3:12 AM
"
0 COMMENTS
Close
https://itexamanswers.net/network-security-version-1-0-practice-final-exam-answers.html Page 38 of 38
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
/ Donations
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 1 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Exam Answers
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 2 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
configures AAA authentication on R1. The administrator CCNA Security v2.0 Skills
then tests the configuration by telneting to R1. The ACS Assessment – B (Answer Key)
servers are configured and running. What will happen if
CCNA Security v2.0 Final Test
the authentication fails? Online Exam Answers
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 3 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
password recovery
password auditing
identification of Layer 3 protocol support on hosts
TCP and UDP port scanning
validation of IT system configuration
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 4 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 5 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
When the router boots up, the Cisco IOS image is loaded
from a secured FTP location.
The Cisco IOS image file is not visible in the output
of the show flash command.
The Cisco IOS image is encrypted and then automatically
backed up to the NVRAM.
The Cisco IOS image is encrypted and then automatically
backed up to a TFTP server.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 6 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
MPLS
hairpinning
GRE
split tunneling
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 7 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
ISAKMP SA policy
DH groups
interesting traffic
transform sets
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 8 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 9 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
RSA
DH
AES
HMAC
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 10 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
untrusted.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 11 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Other case:
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 12 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
DHCP spoofing
DHCP starvation
STP manipulation
MAC and IP address spoofing
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 13 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
symmetric algorithms
hashing algorithms
asymmetric algorithms
public key algorithms
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 14 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 15 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Install a UPS.
Keep a secure copy of router operating system
images.
Configure the router with the maximum amount of
memory possible.
Disable default router services that are not necessary.
Reduce the number of ports that can be used to access
the router.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 16 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
209.165.201.1
192.168.1.3
172.16.3.1
172.16.3.3
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 17 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
192.168.1.1
Traffic that is sent from the LAN and the Internet to the
DMZ is considered inbound.
Traffic that is sent from the DMZ and the Internet to the
LAN is considered outbound.
Traffic that is sent from the LAN to the DMZ is considered
inbound.
Traffic that is sent from the LAN to the DMZ is considered
is considered inbound.
Traffic that is sent from the DMZ and the LAN to the
Internet is considered outbound.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 18 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
default route
access list
VLAN ID
NAT/PAT
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 19 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 20 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
honey pot-based
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 21 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
anomaly-based
signature-based
policy-based
34. Which three actions can the Cisco IOS Firewall IPS
feature be configured to take when an intrusion activity is
detected? (Choose three.)
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 22 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
alert
isolate
inoculate
drop
Telnet
SSH
SSL
ESP
IPsec
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 23 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 24 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 25 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 26 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 27 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
DSL switch
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 28 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
DHCP spoofing
ARP spoofing
VLAN hopping
ARP poisoning
authorization
authentication
auditing
accounting
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 29 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
PSK
DH
RSA
AES
SHA
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 30 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 31 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
vulnerability scanning
password cracking
network scanning
integrity checker
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 32 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 33 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 34 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 35 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
56. Which two ports can send and receive Layer 2 traffic
from a community port on a PVLAN? (Choose two.)
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 36 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 37 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
password recovery
security policy compliance
IDS signature development
logging of security events
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 38 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
1
Explanation: Policy maps are used to bind class maps
with actions Class maps are configured to identify Layer
3 and 4 traffic. Service policies are configured to attach
the policy map to an interface.
exec default
connection
exec
network
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 39 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 40 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet and DMZ can access the LAN.
Traffic from the Internet can access both the DMZ and
the LAN.
Traffic from the LAN and DMZ can access the
Internet.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 41 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
topic?
root guard
UDLD
BPDU guard
loop guard
PortFast
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 42 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
L0phtcrack
Tripwire
Nessus
Metasploit
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 43 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
RADIUS
802.1x
SSH
TACACS
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 44 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
end-user policy
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 45 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
application policy
governing policy
technical policy
Configure 802.1x.
Configure Telnet.
Configure SSH.
Configure an ACL and apply it to the VTY lines.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 46 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
routed mode
transparent mode
stateful packet inspection
split tunneling
MPLS
GRE
Hairpinning
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 47 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
script kiddies
vulnerability brokers
cyber criminals
state-sponsored hackers
hacktivists
VLAN 2
Ethernet 0/2
Ethernet 0/1
VLAN 1
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 48 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
authentication
accounting
access
authorization
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 49 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Webtype
Standard
Ethertype
Extended
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 50 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
none
manually configured vty line password
local username/password database
default
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 51 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
IPsec VPN
advanced malware protection
security level settings
stateful firewall
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 52 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 53 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 54 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
address.
The interface needs to be previously configured with the
no shutdown command.
The interface must be initially configured with the
switchport mode access command.
! Subscribe !
"
16 COMMENTS
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 55 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Correct
Response
Your
Response
The user can only execute the subcommands
under the show ip route command.
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 56 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 57 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 58 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Reply
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 59 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
Reply
Reply
Reply
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 60 of 61
CCNA Security v2.0 Final Exam Answers 100% 20/12/2023, 7:45 AM
https://itexamanswers.net/ccna-security-v2-0-final-exam-answers.html Page 61 of 61
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
َ
اﺑق ﻋﻠﻰ اﺗﺻﺎل
.ﻛن ﻋﻠﻰ اﺗﺻﺎل داﺋم ﺑﺄﺣﺑﺎﺋك ﻋﻠﻰ ﻓﯾﺳﺑوك
اﻻﺷﺗراك Facebook®
4. Which two practices are associated with securing the features and
performance of router operating systems? (Choose two.)
Install a UPS.
Keep a secure copy of router operating system images.*
Configure the router with the maximum amount of memory
possible.*
Disable default router services that are not necessary.
Reduce the number of ports that can be used to access the router.
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 1 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
209.165.201.1*
192.168.1.3
172.16.3.1
172.16.3.3
192.168.1.1
Traffic that is sent from the LAN and the Internet to the DMZ is considered
inbound.
Traffic that is sent from the DMZ and the Internet to the LAN is considered
outbound.
Traffic that is sent from the LAN to the DMZ is considered is considered
inbound.
Traffic that is sent from the DMZ and the LAN to the Internet is
considered outbound.*
8. What two assurances does digital signing provide about code that is
downloaded from the Internet? (Choose two.)
The code contains no errors.
The code contains no viruses.
The code has not been modified since it left the software
publisher.*
The code is authentic and is actually sourced by the publisher.*
The code was encrypted with both a private and public key.
9. What is a result of securing the Cisco IOS image using the Cisco IOS
Resilient Configuration feature?
When the router boots up, the Cisco IOS image is loaded from a secured
FTP location.
The Cisco IOS image file is not visible in the output of the show
flash command.*
The Cisco IOS image is encrypted and then automatically backed up to
the NVRAM.
The Cisco IOS image is encrypted and then automatically backed up to a
TFTP server.
10. The corporate security policy dictates that the traffic from the
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 2 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
13. What are two benefits of using a ZPF rather than a Classic Firewall?
(Choose two.)
ZPF allows interfaces to be placed into zones for IP inspection.
The ZPF is not dependent on ACLs.*
Multiple inspection actions are used with ZPF.
ZPF policies are easy to read and troubleshoot.*
With ZPF, the router will allow packets unless they are explicitly blocked.
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 3 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
19. What is the one major difference between local AAA authentication
and using the login local command when configuring device access
authentication?
Local AAA authentication provides a way to configure backup
methods of authentication, but login local does not.*
The login local command requires the administrator to manually
configure the usernames and passwords, but local AAA authentication
does not.
Local AAA authentication allows more than one user account to be
configured, but login local does not.
The login local command uses local usernames and passwords stored
on the router, but local AAA authentication does not.
The enable secret password could be used in the next login attempt.
The authentication process stops. *
The username and password of the local user database could be used in
the next login attempt.
The enable secret password and a random username could be used in
the next login attempt.
21. What are two tasks that can be accomplished with the Nmap and
Zenmap network tools? (Choose two.)
password recovery
password auditing
identification of Layer 3 protocol support on hosts*
TCP and UDP port scanning*
validation of IT system configuration
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 4 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
23. Refer to the exhibit. The administrator can ping the S0/0/1 interface of
RouterB but is unable to gain Telnet access to the router by using the
password cisco123. What is a possible cause of the problem?
DHCP spoofing
DHCP starvation
STP manipulation
MAC and IP address spoofing*
25. Refer to the exhibit. Which conclusion can be made from the show
crypto map command output that is shown on R1?
28. Refer to the exhibit. In the network that is shown, which AAA
command logs the use of EXEC session commands?
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 5 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
29. Which interface option could be set through ASDM for a Cisco ASA?
default route
access list
VLAN ID*
NAT/PAT
33. Which IDS/IPS signature alarm will look for packets that are destined
to or from a particular port?
honey pot-based
anomaly-based
signature-based*
policy-based
34. Which three actions can the Cisco IOS Firewall IPS feature be
configured to take when an intrusion activity is detected? (Choose
three.)
reset UDP connection
reset TCP connection*
alert*
isolate
inoculate
drop*
35. Which two protocols can be selected using the Cisco AnyConnect VPN
Wizard to protect the traffic inside a VPN tunnel? (Choose two.)
Telnet
SSH
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 6 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
SSL*
ESP
IPsec*
37. Match the network security testing technique with how it is used to
test network security. (Not all options are used)?
38. Which statement describes the use of certificate classes in the PKI?
A class 5 certificate is more trustworthy than a class 4
certificate.*
Email security is provided by the vendor, not by a certificate.
The lower the class number, the more trusted the certificate.
A vendor must issue only one class of certificates when acting as a CA.
Because the login delay command was not used, a one-minute delay
between login attempts is assumed.
The hosts that are identified in the ACL will have access to the
device.*
The login block-for command permits the attacker to try 150 attempts
before being stopped to try again.
These enhancements apply to all types of login connections.
40. A company deploys a Cisco ASA with the Cisco CWS connector
enabled as the firewall on the border of corporate network. An
employee on the internal network is accessing a public website. What
should the employee do in order to make sure the web traffic is
protected by the Cisco CWS?
Register the destination website on the Cisco ASA.
Use the Cisco AnyConnect Secure Mobility Client first.
Use a web browser to visit the destination website.*
First visit a website that is located on a web server in the Cisco CWS
infrastructure.
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 7 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
The user can execute all subcommands under the show ip interfaces
command.
The user can issue the show version command.*
The user can only execute the subcommands under the show ip
route command.*
The user can issue all commands because this privilege level can
execute all Cisco IOS commands.
The user can issue the ip route command.
43. Which two end points can be on the other side of an ASA site-to-site
VPN configured using ASDM? (Choose two.)
DSL switch
Frame Relay switch
ISR router*
another ASA*
multilayer switch
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 8 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
RSA
AES*
SHA*
50. A network analyst wants to monitor the activity of all new interns.
Which type of security testing would track when the interns sign on
and sign off the network?
vulnerability scanning
password cracking
network scanning
integrity checker*
51. Refer to the exhibit. What two pieces of information can be gathered
from the generated message? (Choose two.)
52. What is required for auto detection and negotiation of NAT when
establishing a VPN link?
Both VPN end devices must be configured for NAT.
No ACLs can be applied on either VPN end device.
Both VPN end devices must be NAT-T capable.*
Both VPN end devices must be using IPv6.
53. Refer to the exhibit. The network administrator is configuring the port
security feature on switch SWC. The administrator issued the
command show port-security interface fa 0/2 to verify the
configuration. What can be concluded from the output that is shown?
(Choose three.)
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 9 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
54. In which two instances will traffic be denied as it crosses the ASA
5505 device? (Choose two.)
traffic originating from the inside network going to the DMZ network
traffic originating from the inside network going to the outside network
traffic originating from the outside network going to the DMZ network
traffic originating from the DMZ network going to the inside
network*
traffic originating from the outside network going to the inside
network*
55. Refer to the exhibit. Based on the configuration that is shown, which
statement is true about the IPS signature category?
56. Which two ports can send and receive Layer 2 traffic from a
community port on a PVLAN? (Choose two.)
community ports belonging to other communities
promiscuous ports*
isolated ports within the same community
PVLAN edge protected ports
community ports belonging to the same community*
59. What is the benefit of the network-based IPS (NIPS) over host-based
IPS (HIPS) deployment models?
NIPS provides individual host protection.
NIPS relies on centrally managed software agents.
NIPS monitors all operations within an operating system.*
NIPS monitors network segments.
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 10 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
64. What is indicated by the use of the local-case keyword in a local AAA
authentication configuration command sequence?
That AAA is enabled globally on the router.
That passwords and usernames are case-sensitive.?
That a default local database AAA authentication is applied to all lines.
That user access is limited to vty terminal lines.
66. Refer to the exhibit. Based on the security levels of the interfaces on
ASA1, what traffic will be allowed on the interfaces?
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet and DMZ can access the LAN.
Traffic from the Internet can access both the DMZ and the LAN.
Traffic from the LAN and DMZ can access the Internet.?
67. What are two reasons to enable OSPF routing protocol authentication
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 11 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 12 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
logging begins.
Administrators can decide what actions can be taken in the
future.*
Administrators can use the brief summary that is generated to quickly
determine how to handle the packets.
Attacker packets can be stopped immediately.
79. Which security policy outlines the overall security goals for managers
and technical personnel within an organization and includes the
consequences of noncompliance with the policy?
end-user policy
application policy
governing policy*
technical policy
81. On what switch ports should BPDU guard be enabled to enhance STP
stability?
only ports that attach to a neighboring switch
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 13 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
84. What are two drawbacks in assigning user privilege levels on a Cisco
router? (Choose two.)
Privilege levels must be set to permit access control to specific device
interfaces, ports, or slots.
Assigning a command with multiple keywords allows access to
all commands using those keywords.*
Only a root user can add or remove commands.
Commands from a lower level are always executable at a higher
level.*
AAA must be enabled.
85. Which two types of hackers are typically classified as grey hat
hackers? (Choose two.)
script kiddies
vulnerability brokers*
cyber criminals
state-sponsored hackers
hacktivists*
86. What is the default preconfigured interface for the outside network on
a Cisco ASA 5505?
VLAN 2*
Ethernet 0/2
Ethernet 0/1
VLAN 1
88. What determines which switch becomes the STP root bridge for a
given VLAN?
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 14 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
90. What is used to determine the root bridge when the priority of the
switches are the same?
the MAC address with the highest hexadecimal value
the lowest ip address
the layer 2 address with the lowest hexadecimal value*
the highest BID
none*
manually configured vty line password
local username/password database
default
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 15 of 16
CCNA Security v2.0 Final Answers - Implementing Network Security 20/12/2023, 7:43 AM
0
Article Rating
{} [+] "
0 COMMENTS # $
" HOME CYBEROPS ASSOCIATELEVEL 2 CCNA SECURITY V2.0LEVEL 3 CCNAS V2 INSTRUCTOR LAB
https://ccnasec.com/ccna-security-v2-0-final-answers-implementing-network-security.html Page 16 of 16