CCNA Security for certification practice. Take this quiz and learn more about CCNA routing and switching.
Script kiddy
Hacktivist
Phreaker
White hat hacker
Rate this question:
QPM
SAA
SMS
SDM
Rate this question:
Confidentiality
Redundancy
Integrity
Availability
Rate this question:
Risk
Exploit
Mitigation
Vulnerability
Rate this question:
AVVID
Defense in Depth
SONA
IINS
Rate this question:
It sends a ping request to a subnet, requesting that devices on that subnet send ping replies to a target system.
It sends ping requests in segments of an invalid size.
It intercepts the third step in a TCP three-way handshake to hijack a session
It uses aTrojan horse applications to create a distributed collection of zombie computers, which can be used to launch a coordinated DDoS attack.
Rate this question:
Creating a back door
Launching a DOS attack
Starting a Smurf attack
Conducting social engineering
Rate this question:
Cisco IOS router
Cisco ASA 5500 series security appliance
Cisco PIX 500 series security appliance
Cisco 4200 series IPS appliance
Rate this question:
0
1
15
16
Rate this question:
As ingle text character that will appear as the message of the day
A delimiter indicating the beginning and the end of a message of the day
A reference to a system variable that contains a message of the day
The enable mode prompt from where the message of the day will be entered into the IOS configuration
Rate this question:
OOB
OTP
SAFE
MARS
Rate this question:
From the Internet
From the inside network
From universities
From intruders who gain physical access to the computer resources
Rate this question:
No service timeout
Timeout-line none
Exec-timeout 0 0
Service timeout default
Rate this question:
Root Guard
BPDU Guard
PortFast
UplinkFast
Rate this question:
The Bootset
The configset
The backupset
Thebackup-config
Rate this question:
LDAP
CEF
FIB
MIB
Rate this question:
Because the enable secret is a hash, it cannot be decrypted. Therefore, the enable password is used to matched the password that was entered, and the enable secret is used to verify that the enable password has not been modified since the hash was generated.
The enable pasword is used for IKE phase I, whereas the enable secret password is used for IKE phase II
The enable password is concidered to be a routers public key whereas the enable secret password is concidered to be the router's private key
The enable password is present for backward compatability
256
512
1024
2048
Rate this question:
Additional Tasks
Interfaces and Connections
Security Audit
Intrusion Prevention
Rate this question:
SBU
Confidentual
Secret
Top Secret
Rate this question:
ARP cache
FIB table
Adjacencey database
CAM Table
Rate this question:
With a method list
With a "method" statemement
With the "method" command
With the "method aaa" command
Rate this question:
Static secure MAC address
Dynamic secure MAC address
Sticky secure MAC address
Pervasive secure MAC address
Rate this question:
Security policy
Best-practice recommendations
Identity-based networking policy
Acceptable-use executive summary
Rate this question:
A CLI view supports only commands configured for that specific view, whereas a privilege level supports commands available to that level and all the lowwer levels
A CLI view can function without a AAA configuration, whereas a privilege level requires AAA to be configured
A CLI view supports only monitoring commands, whereas a privilege level allows a user to make changes to an IOS configuration
A CLI view and a privilege level perform the same function. However, a CLI view is used on a catalyst switch, whereas a privilege level is used on a IOS router
Rate this question:
Education
Training
Awareness
Remediation
Rate this question:
The period of time between successive login attempts
The period of time when no one is attempting to login
The period of time in which virtual loging attempts are blocked, following repeated failed login attempts
The period of time in which virtual logins are blocked as security services fully initialize
Rate this question:
Nonblind spoofing
Promiscuous spoofing
Autonomous spoofing
Blind spoofing
Rate this question:
Private VLAN
Policing
Per-VLAN Spanning Tree (PVST)
Dynamic ARP Inspection (DAI)
Rate this question:
Influencing users to provide personal information over a web page
Influencing users to provide personal information over a phone
Influencing users to forward a call to a toll number
Using an inside facilitator to intentionaly forward a call to a toll number
Rate this question:
An explicit allow all
An implicit deny all
An implicit allow all
An explicit deny all
Rate this question:
Finger
TCP small services
CDP
NTP
Rate this question:
The frame is dropped
Acopy of the frame is forwarded out all switch ports other than the port the frame was received on.
The frame is transmitted on the native VLAN.
The switch sendsa NACK segment to the frames source MAC address.
Rate this question:
Protect
Isolate
Restrict
Shut down
Rate this question:
Guidelines
Standards
Procedures
Tenets
Rate this question:
Chief Security Officer (CSO)
Chief Executive Officer (CEO)
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Rate this question:
Local
Remote
TACACS+
RADIUS
IPSec
Rate this question:
AutoQoS
AutoSecure
Cisco SDM's One-Step Lockdown
Cisco IPS Device Manager (IDM)
Rate this question:
ATA
IDE
EIDE
SCSI
Rate this question:
Business needs
Risk analysis
Security policy
Security operations
They are all equally important
Rate this question:
Running SDM from a router flash
Running SDM from the Cisco web portal
Running SDM from within CiscoWorks
Running SDM from a PC
Rate this question:
UDP port 2000
TCP port 2002
UDP port 1645
TCP port 49
UDP port 1812
Rate this question:
Software overflows
Heap overflows
Stack vulnerabilities
Buffer overflows
Rate this question:
Doppler waves
Emanations
Gaussian distributions
Multimode distortion
Rate this question:
Integrated
Collaborative
Autonomous
Adaptive
Rate this question:
Data diddling
Botnet attack
Hijacking a session
Salami attack
Rate this question:
Privileged EXEC
Command mode
Global configuration
Admin EXEC
Rate this question:
2
2c
3
3c
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.